SlideShare a Scribd company logo
1 of 28
Download to read offline
October 2023: Top CitedArticles
in UbiquitousComputing (IJU)
International Journal of Ubiquitous
Computing (IJU)
ISSN : 0975 - 8992(Online); 0976 - 2213(Print)
http://www.airccse.org/journal/iju/index.html
Content Based Video Retrieval Systems
B V Patel1
and B B Meshram2
1
Department of Applied Engineering, ESTO, Oujda,
Morocco 2
Department Mathematics & Computer Science,
FSO, Oujda, Morocco3
Academy Hassan II of Sciences &
Technology, Rabat, Morocco
ABSTRACT
With the development of multimedia data types and available bandwidth there is huge demand
of video retrieval systems, as users shift from text based retrieval systems to content based
retrieval systems. Selection of extracted features play an important role in content based video
retrieval regardless of video attributes being under consideration. These features are intended
for selecting, indexing and ranking according to their potential interest to the user. Good
features selection also allows the time and space costs of the retrieval process to be reduced.
This survey reviews the interesting features that can be extracted from video data for indexing
and retrieval along with similarity measurement methods. We also identify present research
issues inarea of content based video retrieval systems.
KEYWORDS
CBVR, Feature Extraction, Video Indexing, Video Retrieval
Volume URL : https://www.airccse.org/journal/iju/vol3.html
Source URL : https://airccse.org/journal/iju/papers/3212iju02.pdf
Cited by: 132
References:
[1] Umer Rashid, Iftikhar Azim Niaz, Muhammad Afzal Bhatti, (2009) “M3L: Architecture for
Multimedia Information Retrieval”, Proce. Of 2009 Sixth International Conference on
Information Technology: New Generations, pp. 1067-1072.
[2] Ramesh Jain, (2008) “EventWeb: Events and Experiences in Human Centered Computing”,
(Cover Feature) in IEEE Computer, February 2008.
[3] M. S. Kankanhalli and Y. Rui, (2008) “Application Potential of Multimedia Information
Retrieval”, Proc. IEE, April 2008.
[4] R Datta, D Joshi, J Li, and J. Wang, (2008) “Image Retrieval: Ideas, Influences, and Trends of
the New Age”, ACM Computing Surveys, VOl 40, No. 2, April 2008.
[5] P. Sinha and Ramesh Jain,(2008) “Concept Annotation and Search Space Decrement of
Digital Photos using Optical Context Information”, In Proceedings of SPIE, Multimedia content
Access: Algorithms and System.
[6] B. Gong and R. Jain,(2008) “Hierarchical photo stream segmentation using context”, In
Proceedings of SPIE, Multimedia content Access: Algorithms and System.
[7] G. Utz Westermann and Ramesh Jain,(2007)” Towards a Common Event Model for
Multimedia Applications”, in IEEE Multimedia.
[8] A. Scherp and R. Jain,(2007) “Towards an ecosystem for semantics”, In Proceedings of
Workshop on Many faces of Multimedia Semantics, at ACM Multimedia 2007, pp. 3-12.
[9] Hampapur, A. Borger, S. Brown, L. Carlson, C. Connell, J. Lu, M. Senior, A. Reddy, V. Shu,
C. Tian, Y. (2007), ” S3: The IBM Smart Surveillance System: From Transactional Systems to
Observational Systems,” in Proc. Acoustics, Speech and Signal Processing.
[10] B. V. Patel, B. B. Meshram (2007), “Retrieving and Summarizing Images from PDF
Documents”, International Conference on Soft computing and Intelligent Systems(ICSCSI-07),
Jabalpur, India.
[11] B Liu, A. Gupta, and R. Jain (2207), “MEDSMAN: a live multimedia stream querying
system”, Int. Journal of Multimedia Tools and Applications.
[12] A. Del Bimbo and P. Pala (2006), Content-Based Retrieval of 3D Models, ACM
Transactions on Multimedia Computing, Communications and Applications, Vol. 2, No. 1, pp.
20-43.
[13] M. Lew, N. Sebe, C Djerba, and R. Jain (2006), “Content-based Multimedia Information
Retrieval: State of the Art and Challenges”, ACM TOMCAPP vol.2, No. 1, pp. 1-19.
[14] Milind Naphade , John R. Smith , Jelena Tesic , Shih-Fu Chang , Winston Hsu , Lyndon
Kennedy , Alexander Hauptmann , Jon Curtis (2006), “Large-Scale Concept Ontology for
Multimedia,” IEEE Multimedia, April 2006.
[15] Keiji Yanai, Kobus Barnard (2006), “Finding Visual Concepts by Web Image Mining”, in
proc. Of WWW 2006, Edinburgh, Scotland.
[16] Michael S. Lew, N. Sebe, C. Djeraba, R. Jain (2006), “Content-Based Multimedia
Information Retrieval: State of the Art and Challenges”, ACM Transactions on Multimedia
Computing, Communications and Applications, Vol. 2, No. 1, February 2006, Pp. 1–19.
[17] B. Erol, K. Berkner, S. Joshi (2006), “Multimedia thumbnails for documents”, MM-ACM,
USA.
[18] Tuomas Aura, Thomas A. Kuhn, Micheal Roe (2006), “Scanning electronic documents for
personally identifiable information”, WEPS, USA, ACM.
[19] R. Varadarajan, V. hristidis (2006), “A system for query-specific document summarization”,
CIKM, USA, ACM, June 2006.Adam Jatowt, Mitsuru Ishizuka, “Temporal multi-page
summarization”, Web Intelligence and Agent System, Volume 4 Issue 2, IOS Press.
[20] B. V. Patel, B. B. Meshram(2006), “Mining and clustering images to improve image search
engines for geo-informatics database”, In the proceedings of National Conference on
Geoinformatics, VPM Polytechnic, Mumbai, Dec-2006.
[21] Ryutarou Ohbuchi, Jun Kobayashi (2006),” Unsupervised learning from a Corpus for Shape-
Based 3D Model Retrieval”, MIR'06, October 26–27, 2006, Santa Barbara, California, USA.
[22] Michael S. L., Nicu Sebe, Chabane Djeraba, Ramesh Jain(2006), “Content-Based
Multimedia Information Retrieval: State of the Art and Challenges”, ACM Transactions on
Multimedia Computing, Communications and Applications, Vol. 2, No. 1.
[23] R. Dufour, Y. Estève, P. Deléglise, and F. Béchet (2009), “Local and global models for
spontaneous speech segment detection andcharacterization,” in ASRU 2009, Merano, Italy.
[24] Tristan Glatard, Johan Montagnat, Isabelle E. Magnin (2004),” Texture Based Medical
Image Indexing and Retrieval: Application to Cardiac Imaging”, MIR’04, October 15–16, 2004,
New York, New York.
[25] Egon L. van den Broek, Peter M. F. Kisters, and Louis G. Vuurpijl (2004),” Design
Guidelines for a Content-Based Image Retrieval Color-Selection Interface”ACM Dutch
Directions in HCI, Amsterdam.
[26] Tristan Glatard, Johan Montagnat, Isabelle E. Magnin (2004), “Texture Based Medical
Image Indexing and Retrieval: Application to Cardiac Imaging”, ACM Proc. Of MIR’04, October
15–16, 2004, New York, New York, USA.
[27] H. Baird, D. Lopresti, B. Davison, W. Pottenger (2004), “Robust document image
understanding technologies”, HDP, ACM.
[28] R. Datta D. Joshi, J. LI,, JAMES Z. W., “Image Retrieval: Ideas, Influences, and Trends of
the New Age”, ACM Transactions on Computing Surveys, Vol. , No. , 20, pp. 1-65.
[29] Guo, Y.; Stylios, G. (2003); “An intelligent algorithm for automatic document
summarization”, In proceedings International Conference on Natural Language Processing and
Knowledge Engineering, pp. 740 – 745.
[30] C. V. Jawahar, Balakrishna Chennupati, Balamanohar Paluri, Nataraj Jammalamadaka
(2005), Video Retrieval Based on Textual Queries, International Conference on Advanced
Computing and Communication. [31] Ankush Mittal, Sumit Gupta(2006), “Automatic content-
based retrieval and semantic classification of video content”, Int. J. on Digital Libraries 6(1): pp.
30-38.
[32] Liu Huayong (2004), “Content-Based TV Sports Video Retrieve Based on Audio- Visual
Features and Text Information”, IEEE Int. conf. on Web Intelligence.
[33] Daniel DeMenthon, David Doermann (2003), “Video Retrieval of Near–Duplicates using k–
Nearest Neighbor Retrieval of Spatio–Temporal Descriptors”, ACM Multimedia '03, November
2.8, 2003, Berkeley, California, USA.
[34] Jing-Fung Chen,, Hong-Yuan Mark Liao1, and Chia-Wen Lin (2005),” Fast Video Retrieval
via the Statistics of Motion Within the Regions-of-Interest”, KES'05 Proceedings of the 9th
international conference on Knowledge-Based Intelligent Information and Engineering Systems -
Volume Part III Springer.
[35] Xi Li, Weiming Hu, Zhongfei Zhang, Xiaoqin Zhang, Guan Luo (2008), “Trajectory-Based
Video Retrieval Using Dirichlet Process Mixture Models”, 19th British Machine Vision
Conference (BMVC).
[36] Hisashi Miyamori Shun-ichi Iisaku(2000), “Video Annotation for Content-based Retrieval
using Human Behavior Analysis and Domain Knowledge” Fourth IEEE International Conference
on Automatic Face and Gesture Recognition.
Time Synchronization in Wireless Sensor Networks: A Survey
Prakash Ranganathan, Kendall Nygard
Department of Computer Science, North Dakota State University, Fargo, ND,
USA
ABSTRACT
Time synchronization is a critical piece of infrastructure for any distributed system. Wireless
sensor networks have emerged as an important and promising research area in the recent years.
Time synchronization is important for many sensor network applications that require very
precise mapping of gathered sensor data with the time of the events, for example, in tracking
and vehicular surveillance. It also plays an important rolein energy conservation in MAC layer
protocols. The paper studies different existing methods, protocols, significant time parameters
(clock drift, clock speed, synchronization errors, and topologies) to achieve accurate
synchronization in a sensor network. The studied Synchronization protocols include
conventional time sync protocols (RBS, Timing-sync Protocol for Sensor Networks -TPSN,
FTSP), and other application specific approaches such as all node-based approach, a diffusion-
based method and group sync approaches aiming at providing network-wide time. The goal for
writing this paper is to study most common existing time synchronization approaches and
stress the need of a new class of secure-time synchronization protocol that is scalable, topology
independent, fast convergent, energy efficient, less latent and less application dependent in a
heterogeneous hostile environment. Our survey provides a valuable framework by which
protocol designers can compare new and existing synchronization protocols from various
metric discussed in the paper. So, we are hopeful that this paper will serve a complete one-stop
investigation to study the characteristics of existing time synchronization protocols and its
implementation mechanism in a Sensor network environment.
KEYWORDS
Secure-time, Synchronization, MAC Layer
Volume URL : https://www.airccse.org/journal/iju/vol1.html
Source URL : https://www.airccse.org/journal/iju/papers/0410iju6.pdf
Cited by: 132
References:
[1] S. Ganeriwal, M. Srivastava, “Timing-sync Protocol for Sensor Networks (TPSN) on
Berkeley Motes,” NESL, 2003.
[2] NTP: The Network Time Protocol, http://www.ntp.org/.
[3] Jeremy Elson, Lewis Girod, and Deborah Estrin. Fine-grained network time synchronization
using reference broadcasts. In ACM OSDI 2002,Boston, MA, December 2002.
[ 4] Kay Romer. Time synchronization in ad hoc networks. In ACM MobiHoc, Long Beach, CA,
Oct. 2001.
[5] S. Ganeriwal, R. Kumar, M. Srivastava. “Timing Sync Protocol for Sensor Networks,” ACM
SenSys ’03, 2003.
[6] Chipcon CC1000 Radio
Datasheet,http://www.chipcon.com/files/CC1000_Data_Sheet_2_1.pdf
[ 7] T Robert Akl Yanos Saravanos, The 18th Annual IEEE International Symposium on
Personal, Indoor and Mobile Radio Communications (PIMRC'07) Hybrid Energy – aware
Synchronization algorithm in Wireless sensor networks, 2007.
[8]. J.V. Greunen, and J. Rabaey, Lightweight Time Synchronization for Sensor Networks",
Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and
Applications(WSNA), San Diego, CA, September 2003.
[9] Maroti, M., Kusy, B., Simon, G., and Ledeczi, A., The Flooding Time Synchronization
Protocol, Proc. of the 2nd ACN Conf. on Embedded Networked Sensor Systems (SenSys),
Baltimore, Maryland, 2004, pp. 39–49
[10] C. Karlof and D. Wagner, “Secure Routing in Sensor Networks:Attacks and
Countermeasures,” Proc. 1st IEEE Int’l.Wksp. Sensor Network Protocols and Apps., 2003.
[11] H. Chan and A. Perrig, “Security and Privacy in Sensor Networks,” Computer, vol. 36, no.
10, Oct. 2003, pp. 103–05.
[12] H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor
Networks,” Proc. 2003 IEEE Symp. Sec. and Privacy, May 2003, pp. 197–213.
[13] D. Liu and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” Proc.
10th ACM Conf. Comp. and Commun. Sec., 2003, pp. 52–61.
[14] Philipp Sommer, Roger, Wattenhofer, Gradient clock synchronization in wireless sensor
networks, Proceedings of the International Conference on Information Processing in Sensor
Networks,2009
[15] Optimal Clock Synchronization in Networks, Christoph Lenzen et al., Sensys 2009.
[16] Saurabh Ganeriwal, Srdjan Capkun, Chih-Chieh Han, Mani B. Srivastava , Secure Time
Synchronization Service for Sensor Networks, WiSE’05, September 2, 2005, Cologne, Germany
[17] G. Asada, M. Dong, T. Lin, F. Newberg, G. Pottie, W. Kaiser, and H. Marcy. Wireless
Integrated Network Sensors: Low Power Systems on a Chip. In Proceedings of the European
Solid State Circuits Conference, 1998. [18] Crossbow MICA2Dot Wireless Microsensor Mote,
Document Part Number 6020-0043-05 Rev A, http://www.xbow.com/Products/
Product_pdf_files/Wireless_pdf/MICA2DOT_Datasheet.pdf.
[19] Qun Li, Daniela Rus “Global Clock Synchronization in Sensor Networks, IEEE INFOCOM
2004
[ 20] Cheng Liao, Margaret Martonosi, and Douglas W. Clark. Experience with an adaptive
globally-synchronizing clock algorithm. In ACM SPAA, pages 106–114, New York, June 1999.
[21] Chalermek Intanagonwiwat, Ramesh Govindan, and Deborah Estrin. Directed diffusion: A
scalable and robust communication paradigm for sensor networks. In MobiCOM 2000, Boston,
Massachusetts, August 2000. [22] H. Song, S. Zhu, and G. Cao, “Attack-Resilient Time
Synchronization for Wireless Sensor Networks,” Proc. 2nd IEEE Int’l. Conf. Mobile Ad Hoc and
Sensor Sys.,Washington, DC, Nov. 2005.
[23] N. Gura et al., “Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs,” Proc. 6th
Int’l. Wksp. Cryptographic Hardware and Embedded Sys., Boston, MA, Aug. 2004.
[24 ] D. Malan, M. Welsh, and M. D. Smith, “A Public-Key Infrastructure for Key Distribution in
TinyOS Based on Elliptic Curve Cryptography,” Proc. 1st IEEE Int’l. Conf. Commun. and
Networks, Santa Clara, CA, Oct. 2004.
[25] M. Mock, R. Frings, E. Nett, and S. Trikaliotis. Continuous Clock Synchronization in
Wireless Real-time Applications.Proc. 19th IEEE Symposium on Reliable Distributed Systems
(SRDS-00), pp. 125–133, Oct. 2000. [26]S. Ping. Delay Measurement Time Synchronization for
Wireless Sensor Networks. Intel Research, IRB-TR-03-013, June 2003.
[27] SLTP: Scalable Lightweight Time Synchronization Protocol for Wireless Sensor Network
Sepideh Nazemi Gelyan, Arash Nasiri Eghbali, Laleh Roustapoor, Seyed Amir Yahyavi Firouz
Abadi, and Mehdi Dehghan, Springer-Verlag Berlin Heidelberg 2007.
Real Time Hand Gesture Recognition System for Dynamic
Applications
Siddharth S. Rautaray1
, Anupam Agrawal2
Department of Information and Communication Technology Manipal
Institute ofTechnology, Manipal University, Manipal-576104, India
ABSTRACT
Virtual environments have always been considered as a means for more visceral and efficient
human computer interaction by a diversified range of applications. The spectrum of
applications includes analysis of complex scientific data, medical training, military simulation,
phobia therapy and virtual prototyping. Evolution of ubiquitous computing, current user
interaction approaches with keyboard, mouse and pen are not sufficient for the still widening
spectrum of Human computer interaction. Gloves and sensor based trackers are unwieldy,
constraining and uncomfortable to use. Due to the limitation of these devices the useable
command set based diligences is also limited. Direct use of hands as an input device is an
innovative method for providing natural Human Computer Interaction which has its
inheritance from textbased interfaces through 2D graphical-based interfaces, multimedia-
supported interfaces, to full-fledged multi-participant Virtual Environment (VE) systems.
Conceiving a future era of human-computer interaction with the implementations of 3D
application where the user may be able to move and rotate objects simply by moving and
rotating his hand - all without help of any input device.
The research effort centralizes on the efforts of implementing an application that employs
computer vision algorithms and gesture recognition techniques which in turn results in
developing a low cost interface device for interacting with objects in virtual environment using
hand gestures. The prototype architecture of the application comprises of a central
computational module that applies the camshift technique for tracking of hands and its
gestures. Haar like technique has been utilized as a classifier that is creditworthy for locating
hand position and classifying gesture. The patterning of gestures has been done for recognition
by mapping the number of defects that is formed in the hand with the assigned gestures. The
virtual objects are produced using Open GL library. This hand gesture recognition technique
aims to substitute the use of mouse for interaction with the virtual objects. This will be useful
to promote controlling applications like virtual games, browsing images etc in virtual
environment using hand gestures.
KEYWORDS
Hand gesture, virtual objects, virtual environment, tracking, recognition.
Volume URL
https://www.airccse.org/journal/iju/vol3.html
Source URL
https://airccse.org/journal/iju/papers/3112iju03.pdf
Cited by: 129
References:
[1] Conic, N., Cerseato, P., De & Natale, F. G. B., (2007), “Natural Human- Machine Interface
using an Interactive Virtual Blackboard”, In Proceeding of ICIP 2007, pp.181-184.
[2] Ismail, N. A., & O’Brien, A., (2008), “ Enabling Multimodal Interaction in Web-Based
Personal Digital Photo Browsing”, Proceedings of the International Conference on Computer and
Communication Engineering , Kuala Lumpur, Malaysia, May 13-15, pp. 907-910.
[3] Pang, Y. Y., Ismail, N. A., & Gilbert, P. L. S., (2010), “ A Real Time Vision-Based Hand
Gesture Interaction”, Fourth Asia International Conference on Mathematical Analytical
Modelling and Computer Simulation, pp. 237-242.
[4] Kortum, P., (2008) “HCI Beyond the GUI: Design for Haptic, Speech, Olfactory, and Other
Nontraditional Interfaces” Morgan Kaufmann Publishers, pp. 75-106.
[5] Viola & Jones, (2001), “Rapid object detection using boosted cascade of simple features", In
Proceedings of Computer Vision and Pattern Recognition, pp. I-511 - I-518.
[6] Chen, Q., Coredea, M. D., Petriu, E. M., Varkony, A. R., Koczy, I., & Whalen, T.E., (2009), “
Human Computer Interaction for Smart Applications Using Hand Gesture and Facial
Expressions,” International Journal of Advanced Media and Communication, vol. 3c.1/2, pp. 95-
109.
[7] Jain, G. (2009), “Vision-Based Hand Gesture Pose Estimation for Mobile Devices”,
University of Toronto. [8] Pavlovic. V., Sharma, R., & Huang, T.S. (1997), “Visual interpretation
of hand gestures for humancomputer interaction: A review.” IEEE Trans. on Pattern Analysis and
Machine Intelligence (PAMI), 7(19):pp. 677–695. [9] Marcel, S., Bernier, O., Viallet, J. E., &
Collobert, D (2000), “Hand Gesture Recognition using InputOutput Hidden Markov Models.” In
Proc. of the FG’2000 Conference on Automatic Face and Gesture Recognition. [10] Rautaray,
S.S., & Agrawal, A. (2010), “A Novel Human Computer Interface Based On Hand Gesture
Recognition Using Computer Vision Techniques”, In Proceedings of ACM IITM’10, pp.292-296.
[11] Aran, O., Ari, I., Benoit, F., Campr, A., Carrillo, A. H., Fanard, Akarun, L., Caplier, a.,
Rombaut, M., & Sankuru, B., (2006) “ Sign Language Tutoring Tool”, eNTERFACE 2006, The
Summer Workshop on Multimodal Interfaces, Croatia.
[12] Liu, N., & Lovell, B. (2001) “Mmx-accelerated realtime hand tracking system” In
Proceedings of IVCNZ. [13] F. Chen, C. Fu, & C. Huang, 2003 , “Hand gesture recognition using
a real-time tracking method and hidden Markov models” Image and Vision Computing, pp. 745-
758.
[14] Lee, C. S., Ghyme, S. W., Park, C. J., Wohn, K., (1998) “The Control of avatar motion using
hand gesture”, In Proceeding of Virtual Reality Software and technology (VRST), pp. 59-65.
[15] Ahn, S. C., Lee, T. S., Kim, I. J., Kwon, Y. M., & Kim, H. G. (2004),“ Computer Vision-
Based Interactive Presentation System,” Proceedings of Asian Conference for Computer Vision.
[16] Moeslund, T. B., & Norgaard, L. (2002) “A brief overview of hand gestures used in
wearable human computer interfaces”, Technical report, Aalborg University, Denmark.
An Intelligent Driver Assistance System [I-DAS) for Vehicle Safety
Modellingusing Ontology Approach
Saravanan Kannan, Arunkumar Thangavelu, RameshBabu
Kalivaradhan
Department of Information and Communication Technology Manipal
Institute ofTechnology, Manipal University, Manipal-576104, India
ABSTRACT
This paper proposes an ontology modelling approach for assisting vehicle drivers through
safety warning messages during time critical situation. Intelligent Driver Assistance System
(I-DAS) is a major component of InVANET[12], which focuses on generating the alert
messages based on the context aware parameters such as driving situations, vehicle dynamics,
driver activity and environment. I-DAS manages the parameter representation, consistent
update /maintenance in XML format while the interpretation of a critical situation isdone using
ontology modeling. Related safety technologies such as Adaptive Cruise Control, Collision
Avoidance System, Lane Departure Warning System, Driver Drowsiness detection system,
Parking Assistance System, which generate warnings and alerts to driver continuously, for
assistance according to context which is integrated in Vehicle and Vehicle 2 Driver (V2D)
communications by DVI(Driver Vehicle Interface) had been applied. The simulation test bed
developed using Java framework[21] to generate safety alerts in various driving situations
shows the usefulness of this approach. The response time graph for the simulation of context
IDAS is depicted and analysed. The effective performance of the driving scenarios in various
modes like day and night for single, 2-way and 4-way road scenario for the best, worst and
average cases of simulation had been studied. The system works in VANET scenario, which
needs to be adaptive for environment changes and to vary according to the context. The
presented approach shows the simulation that can be implemented to all vehicles in real time
scenario with promising results.
KEYWORDS
Context Awareness, Ontology Modeling, Driver Vehicle Interface(DVI), Driver
Assistance System (DAS)
Volume URL : https://www.airccse.org/journal/iju/vol1.html
Source URL : https://airccse.org/journal/iju/papers/0710iju2.pdf
Cited by: 81
References:
[1] Akira Iihoshi, “Driver Assistance System (Lane Keep Assist System)”, Presentation to WP-29
ITS Round Table Geneva, 2004.
[2] Bouquet, Petal, “Theories and uses of context in knowledge representation and reasoning”,
Journal of Pragmatics, vol no-335, pg 455-484, 2003.
[3] Bradley, “A multidisciplinary model of context to support context-aware computing”,
HumanComputer Interaction vol 20, pg 403-446, 2005.
[4] Daniele Bagni, Roberto Marzotto, Paul Zoratti, “Building Automotive Driver Assistance
Algorithms with Xilinx FPGA platforms”, Xcell Journal Fourth quarter 2008.
[5] E.Bekiaris, S.Nikolaou, A.Mousadakou, “System for effective Assessment of driver vigilance
and Warning according to traffic risk Estimation”, National Center for Research and Technology,
Hellas (CERTH) AWAKE Consortium August 2004.
[6] Hella KGaA, Hueck & Co, “Electronics – Driver Assistance Systems”, Technical
Information, 2005.
[7] Hella KGaA, Hueck & Co, “Light – ADILIS Night Vision System”, Technical Information,
2007.
[8] Huei Peng, “Evaluation of Driver Assistance Systems- A Human Centered Approach”,
supported by the U.S. Army TARDEC, NSF and the TRW Automotive,2006.
[9] Jie Sun, Zhao-hui Wu, Gang Pan, “Context-aware smart car: from model to prototype”,
Journal of Zhejiang University Science A,10(7):1049-1059, 2009.
[10] K.Henricksen, J.Indulska. “Software Engineering Framework for Context-Aware Pervasive
Computing”, 2nd IEEE Conference on Pervasive Computing and Communications (PerCom),
2004.
[11] Peter Seiler, Bongsob Song, J.Karl Hedrick, “Development of a Collision Avoidance
System”, Society of Automotive Engineers 1998.
[12] Saravanan K, Arunkumar Thangavelu, Rameshbabu, "A Middleware Architectural
framework for Vehicular Safety over VANET (InVANET)", NETCOM 2009, First International
Conference on Networks & Communications, pp.277-282, 2009.
[13] Simone Fuchs, Stefan Rass, Bernhard Lamprecht, Kyandoghere Kyamakya, “A Model for
OntologyBased Scene Description for Context-Aware Driver Assistance Systems”,ACM
SIGCHI, ICST Canada, 2008. [14]Simone Fuchs, Stefan Rass, Kyandoghere Kyamak-ya,
“Integration of Ontological Scene Representation and Logic-Based Reasoning for Context-Aware
Driver Assistance Systems”, Proceedings of the First International DisCoTec Workshop on
Context-aware Adaptation Mechanisms for Pervasive and Ubiquitous Services (CAMPUS
2008),2008.
[15]T.A.Lasky,K.S. YEN,B.Ravani, “The advanced snowplow Driver Assistance system”
supported by Caltrans New technology and new Program through (AHMCT) program at UC-
Devis under IA65X875- TO-96-9,2009. [16]Tom Airaksinen, Hedvig Aminoff, Erik Byström,
Gustav Eimar, Iracema Mata,David Schmidt, “Automatic Parallel Parking Assistance System
User Interface Design – Easier Said Than Done?”,Technical Description, 2004.
[17]W.S. Lee, D.H. Sung, J.Y. Lee, Y.S. Kim , J.H. Cho,“Driving Simulation for Evaluation of
Driver Assistance Systems and Driving Management Systems”, sponsored by the Korea
Transportation Institute under the national project, ‘Development of National Traffic Core
Technology’,2007.
[18]Xuetao Zhang, Junjie Qin, Huub van de Wetering, “Interactive Road Situation Analysis for
Driver Assistance and Safety Warning Systems: Framework and Algorithms”, IEEE Transactions
On Intelligent Transportation Systems, Vol. 8, No. 1, March 2007.
[19] http://protege.stanford.edu/ Protégé Software
[20] http://safety.transportation.org/htmlguides/RORcrashes/descriptionofstrat
[21] http://www.jcreator.com/
[22] Bray, J. Memo on "Skid Accident Reduction Program," NYSDOT. 2001. Hatcher, C. W.
"Grooving Streets and Highways Can Help Stop Skid Crashes." Traffic Engineering. 1989
[23] Meier et.al, “Towards real-time middleware for vehicular ad hoc networks”, LNCS,
Springer, 2005.
[24] CARS- Context Aware Rate Selection for Vehicular Networks
[25] Guido Gehlen and Georgios Mavromatis, INVENT-VMTL “A Web Service based
middleware for Mobile Vehicular Applications”.
[26] Erik Weiss et.al., “MYCAREVENT- Vehicular communications gateway for Car
Maintenance and Remote Diagnosis”.
[27] Jose Santa and Antonio F. Gomez-Skarmeta, “Sharing context-aware road and safety
information”, IEEE Pervasive Computing, Volume 8 Issue 3, 2009, pages 58-65.
[28] Jose Santa et.al., “A Multiplatform OSGi based Architecture for Developing Road Vehicle
Services”, IEEE 2007, page 706-710.
Performance Comparison of OCR Tools
Sarmistha Neogy
Department of Computer Science & Engineering, Jadavpur University,
India
ABSTRACT
Optical Character Recognition (OCR) is a technique, used to convert scanned image into
editable text format. Many different types of Optical Character Recognition (OCR) tools are
commercially available today; it is a useful and popular method for different types of
applications. OCR can predict the accurate result depends on text pre-processing and
segmentation algorithms. Image quality is one of the most important factors that improve
quality of recognition in performing OCR tools. Images can be processed independently (.png,
.jpg, and .gif files) or in multi-page PDF documents (.pdf). The primary objective of this work
is to provide the overview of various Optical Character Recognition (OCR) tools and analyses
of their performance by applying the two factors of OCR tool performance i.e. accuracy and
error rate.
KEYWORDS
Optical Character Recognition (OCR),Online OCR, Free Online OCR, OCR Convert,
Convertimage to text.net, Free OCR, i2OCR, Free OCR to Word Convert, Google
Docs.
Volume URL : https://www.airccse.org/journal/iju/vol6.html
Source URL : https://airccse.org/journal/iju/papers/6315iju03.pdf
Cited by: 50
References:
[1] ShivaniDhiman, A.J Singh, “TesseractVsGocr A Comparative Study” International Journal of
Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-2, Issue-4
[2] Chirag Patel, Atul Patel, Dharmendra Patel, “Optical Character Recognition by Open Source
OCR Tool Tesseract: A Case Study” International Journal of Computer Applications (0975 –
8887) Volume 55– No.10
[3] http://en.wikipedia.org/wiki/Optical_character_recognition
[4] http://www.onlineocr.net/
[5] http://www.newocr.com/
[6] http://www.ocrconvert.com/
[7] http://www.convertimagetotext.net/
[8] http://www.free-ocr.com/
[9] http://www.i2ocr.com/
[10] http://www.ocrtoword.com/
[11] https://docs.google.com/
[12] Yasser Alginahi, “Preprocessing Techniques in Character Recognition”
[13] Oivind due trier, Anil K.Jain, TorfinnTaxt, “Future extraction methods for character
recognition A survey”. [14] Pritpal Singh, SumitBudhiraja, “Feature Extraction and Classification
Techniques in O.C.R. Systems for Handwritten Gurmukhi Script – A Survey” Pritpal Singh,
SumitBudhiraja / International Journal of Engineering Research and Applications (IJERA), Vol.
1, Issue 4, pp. 1736-1739.
[15] Youssef Bassil, Mohammad Alwani, “Ocr Post-Processing Error Correction Algorithm
Using Google's Online Spelling Suggestion” Journal of Emerging Trends in Computing and
Information Sciences, Vol.3, No. 1 [16] Archana A. Shinde, D.G.Chougule, “Text Pre-processing
and Text Segmentation for OCR”IJCSET, Vol2
[17]https://www.google.co.in/search?q=k+means+algorithm&biw=1366&bih=615&source=lnms
&tbm=isc h&sa=X&sqi=2&ved=0CAcQ_AUoAmoVChMI5-DkrIvaxgIVD4-
OCh0leQqA#imgrc=TQ19POvnV7mNbM%3A
[18] Sandeep Dangi, Ashish Oberoi, Nishi Goel “Performance Comparison between Different
Feature Extraction Techniques with SVM Using Gurumukhi Script” International journal of
Engineering Research and Applications(IJERA) ISSN : 2248-9622, Vol. 4, Issue 7( Version 5),
July 2014, pp.123- 128
Hmr Log Analyzer: Analyze Web Application Logs Over Hadoop
Map reduce
Sayalee Narkhede1
and Tripti Baraskar2
ETH Zurich University, CH-8092 Z¨ urich, Switzerland
ABSTRACT
In today’s Internet world, log file analysis is becoming a necessary task for analyzing the
customer’s behavior in order to improve advertising and sales as well as for datasets like
environment, medical, banking system it is important to analyze the log data to get required
knowledge from it. Web mining is the process of discovering the knowledge from the web
data. Log files are getting generated very fast at the rate of 1-10 Mb/s per machine, a single
data center can generate tens of terabytes of log data in a day. These datasets are huge. In order
to analyze such large datasets we need parallel processing system and reliable data storage
mechanism. Virtual database system is an effective solution for integrating the data but it
becomes inefficient for large datasets. The Hadoop framework provides reliable data storage
by Hadoop Distributed File System and MapReduce programming model which is a parallel
processing system for large datasets. Hadoop distributed file system breaks up input data and
sends fractions of the original data to several machines in hadoop cluster to hold blocks of
data. This mechanism helps to process log data in parallel using all the machines in the hadoop
cluster and computes result efficiently. The dominant approach provided by hadoop to “Store
first query later”, loads the data to the Hadoop Distributed File System and then executes
queries written in Pig Latin. This approach reduces the response time as well as the load on to
the end system. This paper proposes a log analysis system using Hadoop MapReduce which
will provide accurate results in minimum response time.
KEYWORDS
Hadoop, MapReduce, Log Files, Parallel Processing, Hadoop Distributed File System.
Source URL : https://www.airccse.org/journal/iju/vol4.html
Volume URL : https://airccse.org/journal/iju/papers/4313iju04.pdf
Cited by: 40
References:
[1] S.Sathya Prof. M.Victor Jose, (2011) “Application of Hadoop MapReduce Technique to
Virtual Database System Design”, International Conference on Emerging Trends in Electrical
and Computer Technology (ICETECT), pp. 892-896.
[2] Yulai Yuan, Yongwei Wu_, Xiao Feng, Jing Li, Guangwen Yang, Weimin Zheng, (2010)
“VDBMR: MapReduce- based distributed data integration using virtual database”, Future
Generation Computer Systems, vol. 26, pp. 1418-1425.
[3] Jeffrey Dean and Sanjay Ghemawat., (2004) “MapReduce: Simplified Data Processing on
Large Clusters”, Google Research Publication.
[4] Konstantin Shvachko, Hairong Kuang, Sanjay Radia, Robert Chansler, (2010) “The Hadoop
Distributed File System”, Mass Storage Systems and Technologies(MSST), Sunnyvale,
California USA, vol. 10, pp. 1-10.
[5] C.Olston, B.Reed, U.Srivastava, R.Kumar, and A.Tomkins, (2008) “Pig latin: a not-so-foreign
language for data processing”, ACM SIGMOD International conference on Management of data,
pp. 1099– 1110.
[6] Tom White, (2009) “Hadoop: The Definitive Guide. O’Reilly”, Scbastopol, California.
[7] M.Zaharia, A.Konwinski, A.Joseph, Y.zatz, and I.Stoica, (2008) “Improving mapreduce
performance in heterogeneous environments” OSDI’08: 8th USENIX Symposium on Operating
Systems Design and Implementation.
[8] Mr. Yogesh Pingle, Vaibhav Kohli, Shruti Kamat, Nimesh Poladia, (2012)“Big Data
Processing using Apache Hadoop in Cloud System”, National Conference on Emerging Trends in
Engineering & Technology.
[9] Cooley R., Srivastava J., Mobasher B., (1997) “Web mining: informationa and pattern
discovery on world wide web”, IEEE International conference on tools with artificial
intelligence, pp. 558- 567.
[10] Liu Zhijing, Wang Bin, (2003) “Web mining research”, International conference on
computational intelligence and multimedia applications, pp. 84-89.
[11] Yang, Q. and Zhang, H., (2003) “Web-Log Mining for predictive Caching”, IEEE Trans.
Knowledge and Data Eng., 15( 4), pp. 1050-1053.
[12] P. Nithya, Dr. P. Sumathi, (2012) “A Survey on Web Usage Mining: Theory and
Applications”, International Journal Computer Technology and Applications, Vol. 3, pp. 1625-
1629.
[13] Andrew Pavlo, Erik Paulson, Alexander Rasin, Daniel J. Abadi, David J. DeWitt, Samuel
Madden, Michael Stonebraker, (2009) ”A Comparison of Approaches to Large-Scale Data
Analysis”, ACM SIGMOD’09.
[14] Gates et al., (2009) “Building a High-Level Dataflow System on top of Map-Reduce: The
Pig Experience”, VLDB 2009, Section 4.
[15] LI Jing-min, HE Guo-hui, (2010) “Research of Distributed Database System Based on
Hadoop”, IEEE International conference on Information Science and Engineering (ICISE), pp.
1417-1420.
[16] T. Hoff, (2008) “How Rackspace Now Uses MapReduce and Hadoop To Query Terabytes
of Data”.
[17]Apache-Hadoop,http://Hadoop.apache.org
Data Storage on a RFID Tag for a Distributed System
Sarita Pais1 and Judith
Symonds2
1
Whitireia Community Polytechnic, Auckland
2
Auckland University of Technology, Auckland
ABSTRACT
RFID tags can store more than just a tag ID. Data on an RFID tag can be updated through local
processing. This is in contrast to the EPC global standard of data-on-network. The research
study explores how much data can be stored on an RFID tag. The scope of this study is to find
a suitable data format for data stored in the tags. Two data formats viz CSV and XML along
with compression techniques were discussed. The experiment conducted using the prototype
examinedhow relevant data can be stored in the RFID tags and used in local processing
without the need for a central database or network connectivity. The findings of the experiment
results demonstrate sufficient proof of concept to suggest CSV data format. Issues encountered
in the experiment are discussed, particularly related to writing data into the tag. The conclusion
explores the direction for future research on improving writing data on tag, using the data-on-
tag approach.
KEYWORDS
RFID tag, data-on-tag, user memory, data format.
Source URL : https://www.airccse.org/journal/iju/vol2.html
Volume URL : https://airccse.org/journal/iju/papers/2211iju03.pdf
Cited by: 36
References:
[1] Weiser, M. (1993). “Hot topics - Ubiquitous computing”.Computer 26, 71-72.
[2] Matsuoka, K. ,Katou,N., Dejima, S. &Takami, K. (2010). Information selection and delivery
algorithm for delivering advertisements suitable for the pedestrians present at a particular site,
International Journal of UbiComp (IJU), 1(4), 13-21.
[3] Haas, L. M., & Miller, R. J. (1997). “Transforming heterogeneous data with database
middleware: Beyond integration”.Bulletin of the IEEE Computer Society Technical Committee
on Data engineering, 1-6.
[4] Hardgrave, B. C., Armstrong, D. J., &Riemenschneider, C. K. (2007). “RFID assimilation
hierarchy”.Proceedings of the 40th Hawaii International conference on System Sciences, Hawaii,
1-10.
[5] Diekmann, T., Melski, A., & Schumann, M. (2007). “Data-on-network vs. Data-on-tag:
Managing data in complex RFID environments”. Proceedings of the 40th Annual Hawaii
International Conference on System Sciences, Hawaii, 224-233.
[6] Harmon, C. K. (2006).“The necessity for a uniform organisation of user memory in
RFID”.International Journal Radio Frequency Identification Technology and Applications, 1(1),
41-51.
[7] Jiang, W., & Xiang, D. (2008). “A compression framework for personal image used in mobile
RFID system”. 9th International Conference for Young Scientists, Zhang JiaJie, China, 769-774.
[8] Ward, M., Kraneneburg, R., & Backhouse, G. (2006). “RFID: Frequency, standards, adoption
and innovation”. JISC Technology and standards Watch, 1-36. Retrieved from
http://www.rfidconsultation.eu/docs/ficheiros/TSW0602.pdf
[9] Bacheldor, B. (2009). “Tego Launches 32-Kilobyte EPC RFID Tag”. Retrieved 3-3-2010,
from http://www.rfidjournal.com/article/view/4578
[10] Want, R. (2004). “The magic of RFID”.Queue, 2(7), 40-48.
[11] Wal-Mart spells out RFID vision, RFID Journal 2003. Retrieved 8-09-2010, from
http://www.rfidjournal.com/article/purchase/463
[12] Wu, N. C., Nystrom, M. A., Lin, T. R., & Yu, H. C. (2006).”Challenges to global RFID
adoption”.Technovation, 26(12), 1317-1323.
[13] Melski, A., Thoroe, L., Caus, T., & Schumann, M. (2007).” Beyond EPC – Insights from
multiple RFID case studies on the storage of additional data on tag”. International Conference on
wireless Algorithms, Systems and Applications, Chicago, 281- 286.
[14] Chan, A. T. S., Cao, J., Chan, H., & Young, G. (2001). “A web-enabled framework for smart
card application in health services”.Communications of the ACM, 44(9), 77-82.
[15] Romer, K., Schoch, T., &Mattern, F. (2004). “Smart identification frameworks for
ubiquitous computing applications”.Wireless Networks, 10, 689-700.
[16] Sugawara, K., Yamaoka, K., & Sakai, Y. (1997). “A study on image searching method in
super distributed database”.IEEE Global Telecommunications Conference, Phoenix, AZ, USA, 2,
736- 740.
[17] Bohn,J. (2008). “Prototypical implementation of location-aware services based on a
middleware architecture for super-distributed RFID tag infrastructures”, Personal and ubiquitous
computing, 12 (2), 155- 166.
[18] Mamei, M., Quaglieri, R., & Franco Zambonelli, F. (2006). “Making tuple spaces physical
with RFID tags”.Proceedings of the 2006 ACM symposium on Applied computing, Dijon,
France, 434 - 439.
[19] Landt, J. (2005). “The history of RFID”.Potentials IEEE, 24(4), 8 – 11.
[20] Lin, D., Elmongui, H. G., Bertino, E., &Ooi, B. C. (2007). “Data management in RFID
applications”.DEXA, 434-444.
[21] Tracient. (2007). Tracient user manual.from www.tracient.com
[22] Tribowski, C., Spin, K., Guenther, O., and Sielemann, O.,(2009) "Storing data on RFID tags:
A standards-basedapproach". ECIS 2009 Proceedings.http://aisel.aisnet.org/ecis2009/146
[23] Willis, S., &Helal , S. (2005).”RFID information grid for blind navigation and wayfinding”.
Paper presented at the Proceedings of the ninth annual IEEE International Symposium on
Wearable Computers, Osaka, Japan. from http://www.icta.ufl.edu/projects/publications/willis-
RFIDISWC%20v2.pdf
[24] Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004).” Design science in information
systems research”. MIS Quarterly, 28(1), 75-105.
[25] Floerkemeier, C., & Lampe, M. (2005). “RFID middleware design - addressing application
requirements and RFID constraints”.Joint sOc-EUSAI conference, Grenoble, 1-6.
Practical Attacks on a RFID Authentication Protocol
Conforming to EPCC-1 G-2 Standard
Mohammad Hassan Habibi1
, Mahmud Gardeshi2
, Mahdi R. Alaghband3
1
Faculty of Electrical Engineering, I.H University, Tehran, Iran
2
Faculty of Electrical Engineering, I.H University, Tehran, Iran
3
EEDepartment, Science and Research Campus, Islamic Azad University,
Tehran, Iran
ABSTRACT
Yeh et al. recently have proposed a mutual authentication protocol based on EPC Class-1 Gen.-
2 standard [1].They have claimed that their protocol is secure against adversarial attacks and
also provides forward secrecy. In this paper we will show that the proposed protocol does not
have proper security features. A powerful and practical attack is presented on this protocol
whereby the whole security of the protocol is broken. Furthermore, Yeh et al. protocol does not
assure the untraceabilitiyand backwarduntraceabilitiy aspects. Namely, all past and next
transactions of a compromised tag will be traceable by an adversary.
KEYWORDS
RFID, EPC C-1 G-2 standard, Security, Attacks, Untraceability
Source URL : https://www.airccse.org/journal/iju/vol2.html
Volume URL : https://airccse.org/journal/iju/papers/2111iju01.pdf
Cited by: 37
References:
[1] Yeh, T.-C., Wang, Y.-J., Kuo, T.-C., Wang, S.-S.,“Securing RFID systems conforming to
EPC Class-1 Generation-2 standard”, Expert Systems with Applications 37 (2010) 7678–7683
[2] Transport for London, Oyster card, http://www.oystercard.co.uk.
[3] “Michelin Embeds RFID Tags in Tires”, RFID Journal,http://www.rfidjournal.com/article/
articleview/ 269 /1/1/. Accessed 17 Jan 2003
[4] Hoepman, J.-H.,Hubbers, E., Jacobs, B., Oostdijk, M., Scherer, R.W.,“Crossing borders:
Security and privacy issues of the European e-passport”, NAME (IWSEC 2006). LNCS,
Springer-Heidelberg, vol. 4266 (2006) 152–167
[5] E.-C. Australia, “Access control, sensor control, and trans-ponders”, at:
http://www.rfid.com.au/rfid uhf.htm,2008.
[6] D. C. Wyld, “24-Karat protection: RFID and retail jewelry marketing”, International Journal
of UbiComp (IJU), Vol 1, Num 1, January 2010.
[7]K. K. Khedo, D.Sathan, R.Elaheebocus, R. K. Subramanian, andS.D.V. Rughooputh,
“Overlapping zone partitioning localization technique for RFID”, International Journal of
UbiComp (IJU), Vol 1, Num 2, April 2010.
[8] EPCglobal Inc., http://www.epcglobalinc.org/.
[9] EPCglobal Inc., EPCTM Radio-Frequency Identity Protocols Class-1 Generation-2 UHF
RFID Protocols for Communications at 860 MHz – 960 MHz version 1.1.0, Available at [6].
[10] Lim, C.H., and Kwon, T., “Strong and robust RFID authentication enabling perfect
ownership transfer”, In Proceedings of ICICS ’06, LNCS 4307 (2006) 1–20
[11] Van Deursen, T., Radomirovic, S., “Attacks on RFID protocols”, Cryptology ePrint Archive,
Report 2008/310, 2008. .
[12] R. Phan, “Cryptanalysis of a new ultralightweight RFID authentication protocol-SASI”,
IEEE Transactionson Dependable and Secure Computing 6(4): Oct.-Dec. (2009) 316–320
[13] Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., and Ribagorda, A.,
“Vulnerability analysis of RFID protocols for tag ownership transfer”, Computer Networks 54
(2010) 1502–1508
[14] Chien, H., Chen, C.,“Mutual Authentication Protocol for RFID Conforming to EPC Class-1
Generation-2 Standards”, Computer Standards & Interfaces, 29 (2007) 254–259
[15] Han, D., Kwon, D.: Vulnerability of an RFID authentication protocol conforming to EPC
Class1Generation-2 Standards. Computer Standards & Interfaces 31 (2009) 648–652.
[16] Fu, J., Wu, C., Chen, X., Fan, R., and Ping, L., “Scalable pseudo random RFID private
mutual authentication”, 2nd IEEE International Conference on Computer Engineering and
Technology(ICCET). V. 7, pp. 497-500, China, 2010.
[17] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, “EMAP:
An efficient mutual authentication protocol for low-cost RFID tags”, In Proc. of IS’06, volume
4277 of LNCS, pages 352–361, Springer-Verlag, 2006.
[18] Gu, Y., Wu, W., “Mutual authentication protocol based on tag ID number updating for low-
cost RFID”, In Proceedings of the first IEEE International Conference on Network Infrastructure
and Digital Content(IC-NIDC2009), pp. 548-551, 2009.
[19] Kim, K. H., Choi, E. Y., Lee, S. M., and Lee, D.H., “Secure EPCglobal Class-1 Gen-2 RFID
system against security and privacy problems”, In Proc. of OTM-IS’06, volume 4277 of LNCS,
pages 362–371. Springer-Verlag, 2006.
[20]Duc, D.N., Park, J., Lee, H., and Kwangjo, K., “Enhancing security of epcglobal Gen-2 RFID
tag against traceability and cloning”, In Proc. of Symposium on Cryptography and Information
Security, 2006.
[21] Li T., and Wang, G., “SLMAP-A secure ultra-lightweight rfid mutual authentication
protocol”, Proc. of Chinacrypt’07, 2007.
[22] Kulseng, L., Yu, Z., Wei, Y., and Guan, Y., “Lightweight mutual authentication and
ownership transfer for RFID Systems”, In Proceedings of IEEE INFOCOM 2010, 1-5, CA,
March (2010).
[23] Song, B., and Mitchell, C. J., “RFID authentication protocol for low-cost tags”, In Wisec
2008, pages 140-147.
[24] Chien, H. Y., “SASI: A new ultralightweightrfid authentication protocol providing strong
authentication and strong integrity”, IEEE Transactions on Dependable and Secure Computing,
4(4):337–340, 2007.
[25] Peris-Lopez, P., Li, T., Lim, T.-L., Hernandez-Castro, J. C., Estevez- Tapiador, J. M., and
Ribagorda, A.,“Vulnerability analysis of a mutual authentication scheme under the epc class-1
generation-2 standard”, In Hand. of RFIDSec’08, 2008
[26] Rizomiliotis, P., Rekleitis, E., Gritzalis, S.,“Security analysis of the Song– Mitchell
authentication protocol for low-cost RFID tags”, Communications Letters, IEEE 13 (4) (2009),
pp. 274–276..
[27] Lin, C.-L., and Chang, G.-G., “Cryptanalysis of EPC class 1 generation 2 RFID
authentications”,Information Security Conference 2007, ChiaYi, Taiwan.
[28] Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., and Ribagorda, A.,
“Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2
standard”, Computer Communications 32 (2009) 1185–1193.
[29] Habibi, M. H.,Gardeshi, M.,Alaghband, M., “Cryptanalysis of a mutual authentication
protocol for low-cost RFID”, In proceedings of IEEE International Conference on Intelligent
Information Networks (ICIIN 2011), UAE, 2011.
[30] Van Deursen, T., Radomirovi´c, S., “Security of RFID protocols – A case study”, Electronic
Notes in Theoretical Computer Science 244 (2009) 41–52.
[31] Habibi, M. H., Gardeshi, M., Alaghband, M., “Cryptanalysis of two mutual authentication
protocols for low-cost RFID”, International Journal of Distributed and Parallel systems, Volume
1, Number 3 ,(2011)
[32] Habibi, M. H., Gardeshi, M., Alaghband, M., “Security analysis of an RFID mutual
authentication protocol for RFID systems”, In proceedings of IEEE International Conference on
Intelligent Information Networks (ICIIN 2011), UAE, 2011.
[33] Habibi, M. H., Gardeshi, M., Alaghband, M., “Attacks and improvements to a new RFID
mutual Authentication protocol”, In proceedings of Third Workshop on RFID Security: RFIDsec
Asia 2011, China, 2011.
[34] Li, T., Deng, R.H., “Vulnerability analysis of EMAP-An efficient RFID
mutualauthentication protocol”, In: AReS 2007: Second International Conference on Availability,
Reliability and Security (2007).
[35]Alomair, B., Lazos, L., and Poovendran, R., “Passive attacks on a class of authentication
protocols for RFID”, K.-H. Nam and G. Rhee (Eds.): ICISC 2007, LNCS 4817, pp. 102–115,
2007.
[36] Juels, A., “Minimalist cryptography for low-cost RFID tags”, In Proc. of SCN’04, volume
3352 of LNCS, pp. 149–164, Springer-Verlag, 2004.
[37] Peris-Lopez, P., Li, T., Lim, T.-L., Hernandez-Castro, J. C., Estevez- Tapiador, J. M., and
Ribagorda, A.,, “Cryptanalysis of a novel authentication protocol conforming to EPC-C-1G-2
standard”, Computer Standards & Interfaces, Elsevier Science Publishers,
doi:10.1016/j.csi.2008.05.012, 2008.
[38] Han, D., Kwon, D.: Vulnerability of an RFID authentication protocol conforming to EPC
Class1Generation-2 Standards. Computer Standards & Interfaces 31 (2009) 648–652.
[39] Dimitriou, T., “A lightweight RFID protocol to protect against traceability and cloning
attacks”, In SecureComm, pages 59-66, 2005.
[40] Ohkubo, M., Suzuki, K., Kinoshita, S., “Cryptographic approach to ”privacy-friendly tags”,
In 2003 MIT RFID Privacy Workshop, 2003.
[41] Karthikeyan, S., Nesterenko, M., “RFID security without extensive cryptography”, In Proc.
of SASN '05, ACM (2005) 63–67.
[42] Juels, A., and Weis, S.A., “Defining strong privacy for RFID”, In Proceedings of PerCom
’07 (2007) 342–347, http://eprint.iacr.org/2006/137.
[43]Avoine, G., “Adversarial model for radio frequency identification”, Cryptology ePrint
Archive, report 2005/049. http://eprint.iacr.org/2005/049.
[44] Ouafi, K., and Phan, R.C.-W. “Privacy of recent RFID authentication protocols”,L. Chen, Y.
Mu, and W. Susilo (Eds.): ISPEC 2008, LNCS 4991, pp. 263–277, 2008.
A proposed Novel Approach for Sentiment Analysis and
Opinion Mining
Ravendra Ratan Singh Jandail
Mobile & Cloud Lab, Institute of Computer Science, University of Tartu, Ülikooli
17 - 324,Tartu 50090, Estonia
ABSTRACT
as the people are being dependent on internet the requirement of user view analysis is
increasing exponentially. Customer posts their experience and opinion about the product policy
and services. But, because of the massive volume of reviews, customers can’t read all reviews.
In order to solve this problem, a lot of research is being carried out in Opinion Mining. In order
to solve this problem, a lot of research is being carried out in Opinion Mining. Through the
Opinion Mining, we can know about contents of whole product reviews, Blogs are websites
that allow one or more individuals to write about things they want to share with other The
valuable data contained in posts from a large number of users across geographic, demographic
and cultural boundaries provide a rich data source not only for commercial exploitation but
also for psychological & sociopolitical research. This paper tries to demonstrate the plausibility
of the idea through our clustering and classifying opinion mining experiment on analysis of
blog posts on recent product policy and services reviews. We are proposing a Nobel approach
for analyzing the Review for the customer opinion.
Source URL : https://www.airccse.org/journal/iju/vol5.html
Volume URL : https://airccse.org/journal/iju/papers/5214iju01.pdf
Cited by: 28
References:
[1] Khairullah Khan, BaharumB.Baharudin, Aurangzeb Khan, Fazal-e-Malik , Mining Opinion
from text Documents: A Survey, 3rd IEEE International Conference on Digital Ecosystems and
Technologie, 2009
[2] David Alfred Ostrowski, Sentiment Mining within Social Media forTopic Identification
,IEEE Fourth International Conference on Semantic Computing 2010
[3] ANA SUFIAN ,RANJITH ANANTHARAMAN ,Social Media Data Mining and Inference
system based on Sentiment Analysis 2011
[4] KENNETH BLOOM,Sentiment Analysis Based On Appraisal Theory And Functional Local
Grammar 2011.
[5] ANA SUFIAN ,RANJITH ANANTHARAMAN , Social Media Data Mining and Inference
system based on Sentiment Analysis 2011
[6] Hsinchun Chen and David Zimbra,AI and Opinion Mining ,IeeeInTeLLIGenTSySTeMS 2010
[7] Bo Pang and Lillian Lee Opinion Mining and Sentiment Analysis, Foundations and TrendsR_
inInformation Retrieval 2008
[8] NorlelaSamsudin, MazidahPuteh, Abdul RazakHamdan, MohdZakree Ahmad Nazri , Is
Artificial Immune System Suitable for OpinionMining? 4th Conference on Data Mining and
Optimization (DMO) , Langkawi, Malaysia 02-04 September 2012
[9] rik Cambria, Bj rnSchuller, unqing ia, Catherine Havasi, Published by the IEEE Computer
Society 2013
[10] ThanhThung ,evaluation of natural language Processing technique for Sentiment Analysis ,
2012
Ubiquitous Healthcare Monitoring System Using Integrated
TriaxialAccelerometer, Spo2 and Location Sensors
Ogunduyile O.O1
., Zuva K2
., Randle O.A 3
., Zuva T4
1,3,4
Department of Computer Science, Tshwane University of Technology, Pretoria,
South Africa
2
Department of Computer Science, University of Botswana, Gaborone, Botswana
ABSTRACT
Ubiquitous healthcare has become one of the prominent areas of research inorder to address
the challenges encountered in healthcare environment. In contribution to this area, this study
developed a system prototype that recommends diagonostic services based on physiological
data collected in real time from a distant patient. The prototype uses WBAN body sensors to
be worn by the individual and an android smart phone asa personal server. Physiological data
is collected and uploaded to a Medical Health Server (MHS) via GPRS/internet to be analysed.
Our implemented prototype monitors the activity, location and physiological data such as
SpO2 and Heart Rate (HR) of the elderly and patients in rehabilitation. The uploaded
information can be accessed in real time by medical practitioners through a web application.
KEYWORDS
Android smart phone, Ubiquitous Healthcare, Web application server, Wireless
Body AreaNetworks
Source URL : https://www.airccse.org/journal/iju/vol4.html
Volume URL : https://airccse.org/journal/iju/papers/4213iju01.pdf
Cited by: 26
References:
[1]. Olugbara, O.O., Ojo, S.O. and Adigun, M.O. (2011). A Grid enabled framework for
ubiquitous healthcare service provisioning, Advances in Grid Computing. Zoran
Constantinescu (Ed.), InTech, Croatia, ISBN: 978-953-307-301-9, 229-252.
[2]. Shaikh, A., Memon, M., Memon, M. and Misbahuddin, M. (2009). The Role of Service
Oriented Architecture in Telemedicine Healthcare System. International Conference on
Complex, Intelligent and Software Intensive Systems CISIS ‘09. IEEE, Fukuoka, Japan, 208
– 214.
[3]. Purwar, A., Jeong, D. and Chung W. (2007). Activity Monitoring from Real-Time
Accelerometer data using sensor Network. International Conference on Control, Automation
and Systems, COEX, Seoul Korea., 2402 – 2406.
[4]. Asad M.K., Pervez Z., Lee S and Lee Y.K (2011). Intelligent Healthcare Service
Provisioning Using Ontology with Low – Level Sensory Data. KSII Transactions on Internet
and Information Technology Systems 5(11). 2016 – 2033.
[5]. Sneha, S., Virginia, L. and Bick, M. (2010). Ubiquitous and Pervasive Computing in
Healthcare. 15th Americas Conference on Information Systems. San Francisco, California
(2010)
[6]. Sneha, S and Varshney, U. (2006). Ubiquitous healthcare: a new frontier in e-health.
Proceedings of Americas Conference on Information Systems (2006), 319.
[7]. Wang, H. Choi,H., Agoulmine, N., Deen, M.J. and Hong, J.W. (2010). Information-based
sensor tasking wireless body area networks in U-health systems. CNSM 2010. 517 – 522.
[8]. Rotariu C and Manta V (2012). Wireless System for Remote Monitoring of Oxygen
Saturation and Heart Rate. Proceedings of the Federated Conference on Computer Science
and Information Systems pp. 193–196
[9]. Patil D.D., Mantri S.T., Himangi Milind Pande H.M., Wadhai V.M and Kharat M.U
(2012). Feature Extraction Techniques for Mining ECG Signals in WBAN for Healthcare
Applications. International Journal of Advances in Computing and Information Research
(IJACIR). 1(1).
[10]. Latre, B., Braem, B., Moerman, I., Blondia, C. and Demeester, P. (2011). A survey on
wireless body area networks. Journal of Wireless Networks, 17(1), 1 – 18.
[11]. Kim, S. (2002). Ubiquitous healthcare: the OnkoNet mobile agents architecture.
Proceeding Workshop on Mobile Computing in Medicine, 105 – 118.
[12]. Jovanov, E., Milenkovic, A., Otto, C. and De Groen, P.C. (2005). A wireless body area
network of intelligent motion sensors for computer assisted physical rehabilitation. Journal of
Neuro Engineering and Rehabilitation, 2005, 2(1), 6
[13]. Jung, J., Ha, K., Lee, J., Kim, Y. and Kim, D. (2008). Wireless body area network in a
ubiquitous healthcare system for physiological signal monitoring and health consulting.
International Journal of Signal Processing, Image Processing and Pattern Recognition, 1(1),
47 – 54.
[14]. Yick, J. Mukherjee, B. and Ghosal, D. (2008). Wireless sensor networks survey.
Computer Networks, 52. 2292 2330.
[15]. Tapia, I.D., Rodriguez, S., Bajo, J., Corchado, J.M. and Garcia, O. (2010). Wireless
sensor networks for data acquisition and information fusion: a case study. 13th IEEE
International Conference on Information Fusion. Salamanca, Spain, 1 – 8.
[16]. Nikolidakis, S.A., Georgakakis, E., Giotsas, V., Vergados, D.D and Douligeris, C.
(2010). Secure ubiquitous healthcare system based on IMS and the HL7 standards.
Proceedings of the 3rd International Conference on Pervasive Technologies Related to
Assistive Environments, (PETRA’10), Samos Greece, 42, 1 – 7.
[17]. Olugbara, O.O., Adigun, M.O., Ojo, S.O and Mudali, P. (2007). Utility grid computing
and body area network as enabler for ubiquitous rural e-healthcare service provisioning.
Proceedings of
[18]. Hao, Y. and Foster, R. (2008). Wireless body sensor networks for health-monitoring.
Physiological Measurement, 29(11), 27 – 56.
[19]. Bouten, C., Koekkoek, K., Verduin, M., Kodde, R. and Janssen, J. (1997). A triaxial
accelerometer and portable data processing unit for the assessment of daily physical activity.
IEEE Transactions on Biomedical Engineering, 44(3), 136 – 147.
[20]. Mendelson, M., Duckworth, R.J. and Comtois, G. (2006). A Wearable Reflectance Pulse
Oximeter for Remote Physiological Monitoring. 2006 International Conference of the IEEE
Engineering in Medicine and Biology Society (2006), 912 – 915.
[21]. Watthanawisuth, N., Lomas,L., Wisitsoraat, A. and Tuantranont, A. (2010). Wireless
Wearable Pulse Oximeter for Health Monitoring using ZigBee Wireless Sensor Network.
International conference on Electrical Engineering/Electronics and Information Technology
(ECTI-CON), Chiang Mai, 575 – 579.
[22]. Morón, M.J., Luque J.R., Gómez-Jaime,A., Casilari, E. and Díaz-Estrella,A (2009).
Prototyping of a remote monitoring system for a medical Personal Area Network using
Python. 3rd International Conference on Pervasive Computing Technologies for Healthcare,
2009. PervasiveHealth 1 – 5.

More Related Content

Similar to October 2023-Top Cited Articles in IJU.pdf

July 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image ProcessingJuly 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
April 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image ProcessingApril 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image Processingsipij
 
May 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image ProcessingMay 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image Processingsipij
 
October 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image ProcessingOctober 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
August 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image ProcessingAugust 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing	January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing sipij
 
September 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image ProcessingSeptember 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
Top Cited Articles in Computer Science & Information Technology: June 2022
Top Cited Articles in Computer Science & Information Technology: June 2022Top Cited Articles in Computer Science & Information Technology: June 2022
Top Cited Articles in Computer Science & Information Technology: June 2022AIRCC Publishing Corporation
 
January 2023: Top 10 Cited Articles in Computer Science & Information Technology
January 2023: Top 10 Cited Articles in Computer Science & Information TechnologyJanuary 2023: Top 10 Cited Articles in Computer Science & Information Technology
January 2023: Top 10 Cited Articles in Computer Science & Information TechnologyAIRCC Publishing Corporation
 
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...ijwmn
 
Top 20 Cited Article in Computer Science & Information Technology
Top 20 Cited Article in Computer Science & Information TechnologyTop 20 Cited Article in Computer Science & Information Technology
Top 20 Cited Article in Computer Science & Information TechnologyAIRCC Publishing Corporation
 
Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 - Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 - gerogepatton
 
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...ijujournal
 
May 2022: Top 10 Read Articles in Data Mining & Knowledge Management Process
May 2022: Top 10 Read Articles in Data Mining & Knowledge Management ProcessMay 2022: Top 10 Read Articles in Data Mining & Knowledge Management Process
May 2022: Top 10 Read Articles in Data Mining & Knowledge Management ProcessIJDKP
 
New Research Articles - 2018 November Issue-International Journal of Artifici...
New Research Articles - 2018 November Issue-International Journal of Artifici...New Research Articles - 2018 November Issue-International Journal of Artifici...
New Research Articles - 2018 November Issue-International Journal of Artifici...gerogepatton
 
June 2020: Most Downloaded Article in Soft Computing
June 2020: Most Downloaded Article in Soft Computing  June 2020: Most Downloaded Article in Soft Computing
June 2020: Most Downloaded Article in Soft Computing ijsc
 
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...ijujournal
 
Data Mining and Knowledge Management
Data Mining and Knowledge ManagementData Mining and Knowledge Management
Data Mining and Knowledge ManagementIRJET Journal
 
Physical-Cyber-Social Data Analytics & Smart City Applications
Physical-Cyber-Social Data Analytics & Smart City ApplicationsPhysical-Cyber-Social Data Analytics & Smart City Applications
Physical-Cyber-Social Data Analytics & Smart City ApplicationsPayamBarnaghi
 
June 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational IntelligenceJune 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational Intelligenceaciijournal
 

Similar to October 2023-Top Cited Articles in IJU.pdf (20)

July 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image ProcessingJuly 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image Processing
 
April 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image ProcessingApril 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image Processing
 
May 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image ProcessingMay 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image Processing
 
October 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image ProcessingOctober 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image Processing
 
August 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image ProcessingAugust 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image Processing
 
January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing	January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing
 
September 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image ProcessingSeptember 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image Processing
 
Top Cited Articles in Computer Science & Information Technology: June 2022
Top Cited Articles in Computer Science & Information Technology: June 2022Top Cited Articles in Computer Science & Information Technology: June 2022
Top Cited Articles in Computer Science & Information Technology: June 2022
 
January 2023: Top 10 Cited Articles in Computer Science & Information Technology
January 2023: Top 10 Cited Articles in Computer Science & Information TechnologyJanuary 2023: Top 10 Cited Articles in Computer Science & Information Technology
January 2023: Top 10 Cited Articles in Computer Science & Information Technology
 
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
 
Top 20 Cited Article in Computer Science & Information Technology
Top 20 Cited Article in Computer Science & Information TechnologyTop 20 Cited Article in Computer Science & Information Technology
Top 20 Cited Article in Computer Science & Information Technology
 
Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 - Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 -
 
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
 
May 2022: Top 10 Read Articles in Data Mining & Knowledge Management Process
May 2022: Top 10 Read Articles in Data Mining & Knowledge Management ProcessMay 2022: Top 10 Read Articles in Data Mining & Knowledge Management Process
May 2022: Top 10 Read Articles in Data Mining & Knowledge Management Process
 
New Research Articles - 2018 November Issue-International Journal of Artifici...
New Research Articles - 2018 November Issue-International Journal of Artifici...New Research Articles - 2018 November Issue-International Journal of Artifici...
New Research Articles - 2018 November Issue-International Journal of Artifici...
 
June 2020: Most Downloaded Article in Soft Computing
June 2020: Most Downloaded Article in Soft Computing  June 2020: Most Downloaded Article in Soft Computing
June 2020: Most Downloaded Article in Soft Computing
 
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
 
Data Mining and Knowledge Management
Data Mining and Knowledge ManagementData Mining and Knowledge Management
Data Mining and Knowledge Management
 
Physical-Cyber-Social Data Analytics & Smart City Applications
Physical-Cyber-Social Data Analytics & Smart City ApplicationsPhysical-Cyber-Social Data Analytics & Smart City Applications
Physical-Cyber-Social Data Analytics & Smart City Applications
 
June 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational IntelligenceJune 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational Intelligence
 

More from ijujournal

Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
 
Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
 
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSijujournal
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataijujournal
 
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...ijujournal
 
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESijujournal
 
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEHMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEijujournal
 
SERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISONSERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISONijujournal
 
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSSIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSijujournal
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)ijujournal
 
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...ijujournal
 
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion MiningA proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion Miningijujournal
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)ijujournal
 
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...ijujournal
 
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSSECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSijujournal
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSijujournal
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
A SURVEY: TO HARNESS AN EFFICIENT ENERGY IN CLOUD COMPUTING
A SURVEY: TO HARNESS AN EFFICIENT ENERGY IN CLOUD COMPUTINGA SURVEY: TO HARNESS AN EFFICIENT ENERGY IN CLOUD COMPUTING
A SURVEY: TO HARNESS AN EFFICIENT ENERGY IN CLOUD COMPUTINGijujournal
 

More from ijujournal (20)

Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase II
 
Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase II
 
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
 
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
 
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
 
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEHMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
 
SERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISONSERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISON
 
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSSIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
 
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
 
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion MiningA proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
 
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
 
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSSECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLS
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLS
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
A SURVEY: TO HARNESS AN EFFICIENT ENERGY IN CLOUD COMPUTING
A SURVEY: TO HARNESS AN EFFICIENT ENERGY IN CLOUD COMPUTINGA SURVEY: TO HARNESS AN EFFICIENT ENERGY IN CLOUD COMPUTING
A SURVEY: TO HARNESS AN EFFICIENT ENERGY IN CLOUD COMPUTING
 

Recently uploaded

Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
Data Warehouse , Data Cube Computation
Data Warehouse   , Data Cube ComputationData Warehouse   , Data Cube Computation
Data Warehouse , Data Cube Computationsit20ad004
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...Suhani Kapoor
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 

Recently uploaded (20)

Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
Data Warehouse , Data Cube Computation
Data Warehouse   , Data Cube ComputationData Warehouse   , Data Cube Computation
Data Warehouse , Data Cube Computation
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 

October 2023-Top Cited Articles in IJU.pdf

  • 1. October 2023: Top CitedArticles in UbiquitousComputing (IJU) International Journal of Ubiquitous Computing (IJU) ISSN : 0975 - 8992(Online); 0976 - 2213(Print) http://www.airccse.org/journal/iju/index.html
  • 2. Content Based Video Retrieval Systems B V Patel1 and B B Meshram2 1 Department of Applied Engineering, ESTO, Oujda, Morocco 2 Department Mathematics & Computer Science, FSO, Oujda, Morocco3 Academy Hassan II of Sciences & Technology, Rabat, Morocco ABSTRACT With the development of multimedia data types and available bandwidth there is huge demand of video retrieval systems, as users shift from text based retrieval systems to content based retrieval systems. Selection of extracted features play an important role in content based video retrieval regardless of video attributes being under consideration. These features are intended for selecting, indexing and ranking according to their potential interest to the user. Good features selection also allows the time and space costs of the retrieval process to be reduced. This survey reviews the interesting features that can be extracted from video data for indexing and retrieval along with similarity measurement methods. We also identify present research issues inarea of content based video retrieval systems. KEYWORDS CBVR, Feature Extraction, Video Indexing, Video Retrieval Volume URL : https://www.airccse.org/journal/iju/vol3.html Source URL : https://airccse.org/journal/iju/papers/3212iju02.pdf Cited by: 132
  • 3. References: [1] Umer Rashid, Iftikhar Azim Niaz, Muhammad Afzal Bhatti, (2009) “M3L: Architecture for Multimedia Information Retrieval”, Proce. Of 2009 Sixth International Conference on Information Technology: New Generations, pp. 1067-1072. [2] Ramesh Jain, (2008) “EventWeb: Events and Experiences in Human Centered Computing”, (Cover Feature) in IEEE Computer, February 2008. [3] M. S. Kankanhalli and Y. Rui, (2008) “Application Potential of Multimedia Information Retrieval”, Proc. IEE, April 2008. [4] R Datta, D Joshi, J Li, and J. Wang, (2008) “Image Retrieval: Ideas, Influences, and Trends of the New Age”, ACM Computing Surveys, VOl 40, No. 2, April 2008. [5] P. Sinha and Ramesh Jain,(2008) “Concept Annotation and Search Space Decrement of Digital Photos using Optical Context Information”, In Proceedings of SPIE, Multimedia content Access: Algorithms and System. [6] B. Gong and R. Jain,(2008) “Hierarchical photo stream segmentation using context”, In Proceedings of SPIE, Multimedia content Access: Algorithms and System. [7] G. Utz Westermann and Ramesh Jain,(2007)” Towards a Common Event Model for Multimedia Applications”, in IEEE Multimedia. [8] A. Scherp and R. Jain,(2007) “Towards an ecosystem for semantics”, In Proceedings of Workshop on Many faces of Multimedia Semantics, at ACM Multimedia 2007, pp. 3-12. [9] Hampapur, A. Borger, S. Brown, L. Carlson, C. Connell, J. Lu, M. Senior, A. Reddy, V. Shu, C. Tian, Y. (2007), ” S3: The IBM Smart Surveillance System: From Transactional Systems to Observational Systems,” in Proc. Acoustics, Speech and Signal Processing. [10] B. V. Patel, B. B. Meshram (2007), “Retrieving and Summarizing Images from PDF Documents”, International Conference on Soft computing and Intelligent Systems(ICSCSI-07), Jabalpur, India. [11] B Liu, A. Gupta, and R. Jain (2207), “MEDSMAN: a live multimedia stream querying system”, Int. Journal of Multimedia Tools and Applications. [12] A. Del Bimbo and P. Pala (2006), Content-Based Retrieval of 3D Models, ACM Transactions on Multimedia Computing, Communications and Applications, Vol. 2, No. 1, pp. 20-43. [13] M. Lew, N. Sebe, C Djerba, and R. Jain (2006), “Content-based Multimedia Information Retrieval: State of the Art and Challenges”, ACM TOMCAPP vol.2, No. 1, pp. 1-19. [14] Milind Naphade , John R. Smith , Jelena Tesic , Shih-Fu Chang , Winston Hsu , Lyndon Kennedy , Alexander Hauptmann , Jon Curtis (2006), “Large-Scale Concept Ontology for Multimedia,” IEEE Multimedia, April 2006. [15] Keiji Yanai, Kobus Barnard (2006), “Finding Visual Concepts by Web Image Mining”, in proc. Of WWW 2006, Edinburgh, Scotland. [16] Michael S. Lew, N. Sebe, C. Djeraba, R. Jain (2006), “Content-Based Multimedia Information Retrieval: State of the Art and Challenges”, ACM Transactions on Multimedia Computing, Communications and Applications, Vol. 2, No. 1, February 2006, Pp. 1–19. [17] B. Erol, K. Berkner, S. Joshi (2006), “Multimedia thumbnails for documents”, MM-ACM, USA. [18] Tuomas Aura, Thomas A. Kuhn, Micheal Roe (2006), “Scanning electronic documents for personally identifiable information”, WEPS, USA, ACM. [19] R. Varadarajan, V. hristidis (2006), “A system for query-specific document summarization”,
  • 4. CIKM, USA, ACM, June 2006.Adam Jatowt, Mitsuru Ishizuka, “Temporal multi-page summarization”, Web Intelligence and Agent System, Volume 4 Issue 2, IOS Press. [20] B. V. Patel, B. B. Meshram(2006), “Mining and clustering images to improve image search engines for geo-informatics database”, In the proceedings of National Conference on Geoinformatics, VPM Polytechnic, Mumbai, Dec-2006. [21] Ryutarou Ohbuchi, Jun Kobayashi (2006),” Unsupervised learning from a Corpus for Shape- Based 3D Model Retrieval”, MIR'06, October 26–27, 2006, Santa Barbara, California, USA. [22] Michael S. L., Nicu Sebe, Chabane Djeraba, Ramesh Jain(2006), “Content-Based Multimedia Information Retrieval: State of the Art and Challenges”, ACM Transactions on Multimedia Computing, Communications and Applications, Vol. 2, No. 1. [23] R. Dufour, Y. Estève, P. Deléglise, and F. Béchet (2009), “Local and global models for spontaneous speech segment detection andcharacterization,” in ASRU 2009, Merano, Italy. [24] Tristan Glatard, Johan Montagnat, Isabelle E. Magnin (2004),” Texture Based Medical Image Indexing and Retrieval: Application to Cardiac Imaging”, MIR’04, October 15–16, 2004, New York, New York. [25] Egon L. van den Broek, Peter M. F. Kisters, and Louis G. Vuurpijl (2004),” Design Guidelines for a Content-Based Image Retrieval Color-Selection Interface”ACM Dutch Directions in HCI, Amsterdam. [26] Tristan Glatard, Johan Montagnat, Isabelle E. Magnin (2004), “Texture Based Medical Image Indexing and Retrieval: Application to Cardiac Imaging”, ACM Proc. Of MIR’04, October 15–16, 2004, New York, New York, USA. [27] H. Baird, D. Lopresti, B. Davison, W. Pottenger (2004), “Robust document image understanding technologies”, HDP, ACM. [28] R. Datta D. Joshi, J. LI,, JAMES Z. W., “Image Retrieval: Ideas, Influences, and Trends of the New Age”, ACM Transactions on Computing Surveys, Vol. , No. , 20, pp. 1-65. [29] Guo, Y.; Stylios, G. (2003); “An intelligent algorithm for automatic document summarization”, In proceedings International Conference on Natural Language Processing and Knowledge Engineering, pp. 740 – 745. [30] C. V. Jawahar, Balakrishna Chennupati, Balamanohar Paluri, Nataraj Jammalamadaka (2005), Video Retrieval Based on Textual Queries, International Conference on Advanced Computing and Communication. [31] Ankush Mittal, Sumit Gupta(2006), “Automatic content- based retrieval and semantic classification of video content”, Int. J. on Digital Libraries 6(1): pp. 30-38. [32] Liu Huayong (2004), “Content-Based TV Sports Video Retrieve Based on Audio- Visual Features and Text Information”, IEEE Int. conf. on Web Intelligence. [33] Daniel DeMenthon, David Doermann (2003), “Video Retrieval of Near–Duplicates using k– Nearest Neighbor Retrieval of Spatio–Temporal Descriptors”, ACM Multimedia '03, November 2.8, 2003, Berkeley, California, USA. [34] Jing-Fung Chen,, Hong-Yuan Mark Liao1, and Chia-Wen Lin (2005),” Fast Video Retrieval via the Statistics of Motion Within the Regions-of-Interest”, KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III Springer. [35] Xi Li, Weiming Hu, Zhongfei Zhang, Xiaoqin Zhang, Guan Luo (2008), “Trajectory-Based Video Retrieval Using Dirichlet Process Mixture Models”, 19th British Machine Vision Conference (BMVC). [36] Hisashi Miyamori Shun-ichi Iisaku(2000), “Video Annotation for Content-based Retrieval using Human Behavior Analysis and Domain Knowledge” Fourth IEEE International Conference on Automatic Face and Gesture Recognition.
  • 5. Time Synchronization in Wireless Sensor Networks: A Survey Prakash Ranganathan, Kendall Nygard Department of Computer Science, North Dakota State University, Fargo, ND, USA ABSTRACT Time synchronization is a critical piece of infrastructure for any distributed system. Wireless sensor networks have emerged as an important and promising research area in the recent years. Time synchronization is important for many sensor network applications that require very precise mapping of gathered sensor data with the time of the events, for example, in tracking and vehicular surveillance. It also plays an important rolein energy conservation in MAC layer protocols. The paper studies different existing methods, protocols, significant time parameters (clock drift, clock speed, synchronization errors, and topologies) to achieve accurate synchronization in a sensor network. The studied Synchronization protocols include conventional time sync protocols (RBS, Timing-sync Protocol for Sensor Networks -TPSN, FTSP), and other application specific approaches such as all node-based approach, a diffusion- based method and group sync approaches aiming at providing network-wide time. The goal for writing this paper is to study most common existing time synchronization approaches and stress the need of a new class of secure-time synchronization protocol that is scalable, topology independent, fast convergent, energy efficient, less latent and less application dependent in a heterogeneous hostile environment. Our survey provides a valuable framework by which protocol designers can compare new and existing synchronization protocols from various metric discussed in the paper. So, we are hopeful that this paper will serve a complete one-stop investigation to study the characteristics of existing time synchronization protocols and its implementation mechanism in a Sensor network environment. KEYWORDS Secure-time, Synchronization, MAC Layer Volume URL : https://www.airccse.org/journal/iju/vol1.html Source URL : https://www.airccse.org/journal/iju/papers/0410iju6.pdf Cited by: 132
  • 6. References: [1] S. Ganeriwal, M. Srivastava, “Timing-sync Protocol for Sensor Networks (TPSN) on Berkeley Motes,” NESL, 2003. [2] NTP: The Network Time Protocol, http://www.ntp.org/. [3] Jeremy Elson, Lewis Girod, and Deborah Estrin. Fine-grained network time synchronization using reference broadcasts. In ACM OSDI 2002,Boston, MA, December 2002. [ 4] Kay Romer. Time synchronization in ad hoc networks. In ACM MobiHoc, Long Beach, CA, Oct. 2001. [5] S. Ganeriwal, R. Kumar, M. Srivastava. “Timing Sync Protocol for Sensor Networks,” ACM SenSys ’03, 2003. [6] Chipcon CC1000 Radio Datasheet,http://www.chipcon.com/files/CC1000_Data_Sheet_2_1.pdf [ 7] T Robert Akl Yanos Saravanos, The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'07) Hybrid Energy – aware Synchronization algorithm in Wireless sensor networks, 2007. [8]. J.V. Greunen, and J. Rabaey, Lightweight Time Synchronization for Sensor Networks", Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications(WSNA), San Diego, CA, September 2003. [9] Maroti, M., Kusy, B., Simon, G., and Ledeczi, A., The Flooding Time Synchronization Protocol, Proc. of the 2nd ACN Conf. on Embedded Networked Sensor Systems (SenSys), Baltimore, Maryland, 2004, pp. 39–49 [10] C. Karlof and D. Wagner, “Secure Routing in Sensor Networks:Attacks and Countermeasures,” Proc. 1st IEEE Int’l.Wksp. Sensor Network Protocols and Apps., 2003. [11] H. Chan and A. Perrig, “Security and Privacy in Sensor Networks,” Computer, vol. 36, no. 10, Oct. 2003, pp. 103–05. [12] H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” Proc. 2003 IEEE Symp. Sec. and Privacy, May 2003, pp. 197–213. [13] D. Liu and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” Proc. 10th ACM Conf. Comp. and Commun. Sec., 2003, pp. 52–61. [14] Philipp Sommer, Roger, Wattenhofer, Gradient clock synchronization in wireless sensor networks, Proceedings of the International Conference on Information Processing in Sensor Networks,2009 [15] Optimal Clock Synchronization in Networks, Christoph Lenzen et al., Sensys 2009. [16] Saurabh Ganeriwal, Srdjan Capkun, Chih-Chieh Han, Mani B. Srivastava , Secure Time Synchronization Service for Sensor Networks, WiSE’05, September 2, 2005, Cologne, Germany [17] G. Asada, M. Dong, T. Lin, F. Newberg, G. Pottie, W. Kaiser, and H. Marcy. Wireless Integrated Network Sensors: Low Power Systems on a Chip. In Proceedings of the European Solid State Circuits Conference, 1998. [18] Crossbow MICA2Dot Wireless Microsensor Mote, Document Part Number 6020-0043-05 Rev A, http://www.xbow.com/Products/ Product_pdf_files/Wireless_pdf/MICA2DOT_Datasheet.pdf. [19] Qun Li, Daniela Rus “Global Clock Synchronization in Sensor Networks, IEEE INFOCOM 2004 [ 20] Cheng Liao, Margaret Martonosi, and Douglas W. Clark. Experience with an adaptive globally-synchronizing clock algorithm. In ACM SPAA, pages 106–114, New York, June 1999. [21] Chalermek Intanagonwiwat, Ramesh Govindan, and Deborah Estrin. Directed diffusion: A scalable and robust communication paradigm for sensor networks. In MobiCOM 2000, Boston, Massachusetts, August 2000. [22] H. Song, S. Zhu, and G. Cao, “Attack-Resilient Time Synchronization for Wireless Sensor Networks,” Proc. 2nd IEEE Int’l. Conf. Mobile Ad Hoc and Sensor Sys.,Washington, DC, Nov. 2005. [23] N. Gura et al., “Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs,” Proc. 6th
  • 7. Int’l. Wksp. Cryptographic Hardware and Embedded Sys., Boston, MA, Aug. 2004. [24 ] D. Malan, M. Welsh, and M. D. Smith, “A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography,” Proc. 1st IEEE Int’l. Conf. Commun. and Networks, Santa Clara, CA, Oct. 2004. [25] M. Mock, R. Frings, E. Nett, and S. Trikaliotis. Continuous Clock Synchronization in Wireless Real-time Applications.Proc. 19th IEEE Symposium on Reliable Distributed Systems (SRDS-00), pp. 125–133, Oct. 2000. [26]S. Ping. Delay Measurement Time Synchronization for Wireless Sensor Networks. Intel Research, IRB-TR-03-013, June 2003. [27] SLTP: Scalable Lightweight Time Synchronization Protocol for Wireless Sensor Network Sepideh Nazemi Gelyan, Arash Nasiri Eghbali, Laleh Roustapoor, Seyed Amir Yahyavi Firouz Abadi, and Mehdi Dehghan, Springer-Verlag Berlin Heidelberg 2007.
  • 8. Real Time Hand Gesture Recognition System for Dynamic Applications Siddharth S. Rautaray1 , Anupam Agrawal2 Department of Information and Communication Technology Manipal Institute ofTechnology, Manipal University, Manipal-576104, India ABSTRACT Virtual environments have always been considered as a means for more visceral and efficient human computer interaction by a diversified range of applications. The spectrum of applications includes analysis of complex scientific data, medical training, military simulation, phobia therapy and virtual prototyping. Evolution of ubiquitous computing, current user interaction approaches with keyboard, mouse and pen are not sufficient for the still widening spectrum of Human computer interaction. Gloves and sensor based trackers are unwieldy, constraining and uncomfortable to use. Due to the limitation of these devices the useable command set based diligences is also limited. Direct use of hands as an input device is an innovative method for providing natural Human Computer Interaction which has its inheritance from textbased interfaces through 2D graphical-based interfaces, multimedia- supported interfaces, to full-fledged multi-participant Virtual Environment (VE) systems. Conceiving a future era of human-computer interaction with the implementations of 3D application where the user may be able to move and rotate objects simply by moving and rotating his hand - all without help of any input device. The research effort centralizes on the efforts of implementing an application that employs computer vision algorithms and gesture recognition techniques which in turn results in developing a low cost interface device for interacting with objects in virtual environment using hand gestures. The prototype architecture of the application comprises of a central computational module that applies the camshift technique for tracking of hands and its gestures. Haar like technique has been utilized as a classifier that is creditworthy for locating hand position and classifying gesture. The patterning of gestures has been done for recognition by mapping the number of defects that is formed in the hand with the assigned gestures. The virtual objects are produced using Open GL library. This hand gesture recognition technique aims to substitute the use of mouse for interaction with the virtual objects. This will be useful to promote controlling applications like virtual games, browsing images etc in virtual environment using hand gestures. KEYWORDS Hand gesture, virtual objects, virtual environment, tracking, recognition. Volume URL https://www.airccse.org/journal/iju/vol3.html Source URL https://airccse.org/journal/iju/papers/3112iju03.pdf
  • 9. Cited by: 129 References: [1] Conic, N., Cerseato, P., De & Natale, F. G. B., (2007), “Natural Human- Machine Interface using an Interactive Virtual Blackboard”, In Proceeding of ICIP 2007, pp.181-184. [2] Ismail, N. A., & O’Brien, A., (2008), “ Enabling Multimodal Interaction in Web-Based Personal Digital Photo Browsing”, Proceedings of the International Conference on Computer and Communication Engineering , Kuala Lumpur, Malaysia, May 13-15, pp. 907-910. [3] Pang, Y. Y., Ismail, N. A., & Gilbert, P. L. S., (2010), “ A Real Time Vision-Based Hand Gesture Interaction”, Fourth Asia International Conference on Mathematical Analytical Modelling and Computer Simulation, pp. 237-242. [4] Kortum, P., (2008) “HCI Beyond the GUI: Design for Haptic, Speech, Olfactory, and Other Nontraditional Interfaces” Morgan Kaufmann Publishers, pp. 75-106. [5] Viola & Jones, (2001), “Rapid object detection using boosted cascade of simple features", In Proceedings of Computer Vision and Pattern Recognition, pp. I-511 - I-518. [6] Chen, Q., Coredea, M. D., Petriu, E. M., Varkony, A. R., Koczy, I., & Whalen, T.E., (2009), “ Human Computer Interaction for Smart Applications Using Hand Gesture and Facial Expressions,” International Journal of Advanced Media and Communication, vol. 3c.1/2, pp. 95- 109. [7] Jain, G. (2009), “Vision-Based Hand Gesture Pose Estimation for Mobile Devices”, University of Toronto. [8] Pavlovic. V., Sharma, R., & Huang, T.S. (1997), “Visual interpretation of hand gestures for humancomputer interaction: A review.” IEEE Trans. on Pattern Analysis and Machine Intelligence (PAMI), 7(19):pp. 677–695. [9] Marcel, S., Bernier, O., Viallet, J. E., & Collobert, D (2000), “Hand Gesture Recognition using InputOutput Hidden Markov Models.” In Proc. of the FG’2000 Conference on Automatic Face and Gesture Recognition. [10] Rautaray, S.S., & Agrawal, A. (2010), “A Novel Human Computer Interface Based On Hand Gesture Recognition Using Computer Vision Techniques”, In Proceedings of ACM IITM’10, pp.292-296. [11] Aran, O., Ari, I., Benoit, F., Campr, A., Carrillo, A. H., Fanard, Akarun, L., Caplier, a., Rombaut, M., & Sankuru, B., (2006) “ Sign Language Tutoring Tool”, eNTERFACE 2006, The Summer Workshop on Multimodal Interfaces, Croatia. [12] Liu, N., & Lovell, B. (2001) “Mmx-accelerated realtime hand tracking system” In Proceedings of IVCNZ. [13] F. Chen, C. Fu, & C. Huang, 2003 , “Hand gesture recognition using a real-time tracking method and hidden Markov models” Image and Vision Computing, pp. 745- 758. [14] Lee, C. S., Ghyme, S. W., Park, C. J., Wohn, K., (1998) “The Control of avatar motion using hand gesture”, In Proceeding of Virtual Reality Software and technology (VRST), pp. 59-65. [15] Ahn, S. C., Lee, T. S., Kim, I. J., Kwon, Y. M., & Kim, H. G. (2004),“ Computer Vision- Based Interactive Presentation System,” Proceedings of Asian Conference for Computer Vision. [16] Moeslund, T. B., & Norgaard, L. (2002) “A brief overview of hand gestures used in wearable human computer interfaces”, Technical report, Aalborg University, Denmark.
  • 10. An Intelligent Driver Assistance System [I-DAS) for Vehicle Safety Modellingusing Ontology Approach Saravanan Kannan, Arunkumar Thangavelu, RameshBabu Kalivaradhan Department of Information and Communication Technology Manipal Institute ofTechnology, Manipal University, Manipal-576104, India ABSTRACT This paper proposes an ontology modelling approach for assisting vehicle drivers through safety warning messages during time critical situation. Intelligent Driver Assistance System (I-DAS) is a major component of InVANET[12], which focuses on generating the alert messages based on the context aware parameters such as driving situations, vehicle dynamics, driver activity and environment. I-DAS manages the parameter representation, consistent update /maintenance in XML format while the interpretation of a critical situation isdone using ontology modeling. Related safety technologies such as Adaptive Cruise Control, Collision Avoidance System, Lane Departure Warning System, Driver Drowsiness detection system, Parking Assistance System, which generate warnings and alerts to driver continuously, for assistance according to context which is integrated in Vehicle and Vehicle 2 Driver (V2D) communications by DVI(Driver Vehicle Interface) had been applied. The simulation test bed developed using Java framework[21] to generate safety alerts in various driving situations shows the usefulness of this approach. The response time graph for the simulation of context IDAS is depicted and analysed. The effective performance of the driving scenarios in various modes like day and night for single, 2-way and 4-way road scenario for the best, worst and average cases of simulation had been studied. The system works in VANET scenario, which needs to be adaptive for environment changes and to vary according to the context. The presented approach shows the simulation that can be implemented to all vehicles in real time scenario with promising results. KEYWORDS Context Awareness, Ontology Modeling, Driver Vehicle Interface(DVI), Driver Assistance System (DAS) Volume URL : https://www.airccse.org/journal/iju/vol1.html Source URL : https://airccse.org/journal/iju/papers/0710iju2.pdf Cited by: 81
  • 11. References: [1] Akira Iihoshi, “Driver Assistance System (Lane Keep Assist System)”, Presentation to WP-29 ITS Round Table Geneva, 2004. [2] Bouquet, Petal, “Theories and uses of context in knowledge representation and reasoning”, Journal of Pragmatics, vol no-335, pg 455-484, 2003. [3] Bradley, “A multidisciplinary model of context to support context-aware computing”, HumanComputer Interaction vol 20, pg 403-446, 2005. [4] Daniele Bagni, Roberto Marzotto, Paul Zoratti, “Building Automotive Driver Assistance Algorithms with Xilinx FPGA platforms”, Xcell Journal Fourth quarter 2008. [5] E.Bekiaris, S.Nikolaou, A.Mousadakou, “System for effective Assessment of driver vigilance and Warning according to traffic risk Estimation”, National Center for Research and Technology, Hellas (CERTH) AWAKE Consortium August 2004. [6] Hella KGaA, Hueck & Co, “Electronics – Driver Assistance Systems”, Technical Information, 2005. [7] Hella KGaA, Hueck & Co, “Light – ADILIS Night Vision System”, Technical Information, 2007. [8] Huei Peng, “Evaluation of Driver Assistance Systems- A Human Centered Approach”, supported by the U.S. Army TARDEC, NSF and the TRW Automotive,2006. [9] Jie Sun, Zhao-hui Wu, Gang Pan, “Context-aware smart car: from model to prototype”, Journal of Zhejiang University Science A,10(7):1049-1059, 2009. [10] K.Henricksen, J.Indulska. “Software Engineering Framework for Context-Aware Pervasive Computing”, 2nd IEEE Conference on Pervasive Computing and Communications (PerCom), 2004. [11] Peter Seiler, Bongsob Song, J.Karl Hedrick, “Development of a Collision Avoidance System”, Society of Automotive Engineers 1998. [12] Saravanan K, Arunkumar Thangavelu, Rameshbabu, "A Middleware Architectural framework for Vehicular Safety over VANET (InVANET)", NETCOM 2009, First International Conference on Networks & Communications, pp.277-282, 2009. [13] Simone Fuchs, Stefan Rass, Bernhard Lamprecht, Kyandoghere Kyamakya, “A Model for OntologyBased Scene Description for Context-Aware Driver Assistance Systems”,ACM SIGCHI, ICST Canada, 2008. [14]Simone Fuchs, Stefan Rass, Kyandoghere Kyamak-ya, “Integration of Ontological Scene Representation and Logic-Based Reasoning for Context-Aware Driver Assistance Systems”, Proceedings of the First International DisCoTec Workshop on Context-aware Adaptation Mechanisms for Pervasive and Ubiquitous Services (CAMPUS 2008),2008. [15]T.A.Lasky,K.S. YEN,B.Ravani, “The advanced snowplow Driver Assistance system” supported by Caltrans New technology and new Program through (AHMCT) program at UC- Devis under IA65X875- TO-96-9,2009. [16]Tom Airaksinen, Hedvig Aminoff, Erik Byström, Gustav Eimar, Iracema Mata,David Schmidt, “Automatic Parallel Parking Assistance System User Interface Design – Easier Said Than Done?”,Technical Description, 2004. [17]W.S. Lee, D.H. Sung, J.Y. Lee, Y.S. Kim , J.H. Cho,“Driving Simulation for Evaluation of Driver Assistance Systems and Driving Management Systems”, sponsored by the Korea Transportation Institute under the national project, ‘Development of National Traffic Core Technology’,2007. [18]Xuetao Zhang, Junjie Qin, Huub van de Wetering, “Interactive Road Situation Analysis for Driver Assistance and Safety Warning Systems: Framework and Algorithms”, IEEE Transactions On Intelligent Transportation Systems, Vol. 8, No. 1, March 2007. [19] http://protege.stanford.edu/ Protégé Software [20] http://safety.transportation.org/htmlguides/RORcrashes/descriptionofstrat [21] http://www.jcreator.com/
  • 12. [22] Bray, J. Memo on "Skid Accident Reduction Program," NYSDOT. 2001. Hatcher, C. W. "Grooving Streets and Highways Can Help Stop Skid Crashes." Traffic Engineering. 1989 [23] Meier et.al, “Towards real-time middleware for vehicular ad hoc networks”, LNCS, Springer, 2005. [24] CARS- Context Aware Rate Selection for Vehicular Networks [25] Guido Gehlen and Georgios Mavromatis, INVENT-VMTL “A Web Service based middleware for Mobile Vehicular Applications”. [26] Erik Weiss et.al., “MYCAREVENT- Vehicular communications gateway for Car Maintenance and Remote Diagnosis”. [27] Jose Santa and Antonio F. Gomez-Skarmeta, “Sharing context-aware road and safety information”, IEEE Pervasive Computing, Volume 8 Issue 3, 2009, pages 58-65. [28] Jose Santa et.al., “A Multiplatform OSGi based Architecture for Developing Road Vehicle Services”, IEEE 2007, page 706-710.
  • 13. Performance Comparison of OCR Tools Sarmistha Neogy Department of Computer Science & Engineering, Jadavpur University, India ABSTRACT Optical Character Recognition (OCR) is a technique, used to convert scanned image into editable text format. Many different types of Optical Character Recognition (OCR) tools are commercially available today; it is a useful and popular method for different types of applications. OCR can predict the accurate result depends on text pre-processing and segmentation algorithms. Image quality is one of the most important factors that improve quality of recognition in performing OCR tools. Images can be processed independently (.png, .jpg, and .gif files) or in multi-page PDF documents (.pdf). The primary objective of this work is to provide the overview of various Optical Character Recognition (OCR) tools and analyses of their performance by applying the two factors of OCR tool performance i.e. accuracy and error rate. KEYWORDS Optical Character Recognition (OCR),Online OCR, Free Online OCR, OCR Convert, Convertimage to text.net, Free OCR, i2OCR, Free OCR to Word Convert, Google Docs. Volume URL : https://www.airccse.org/journal/iju/vol6.html Source URL : https://airccse.org/journal/iju/papers/6315iju03.pdf Cited by: 50
  • 14. References: [1] ShivaniDhiman, A.J Singh, “TesseractVsGocr A Comparative Study” International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-2, Issue-4 [2] Chirag Patel, Atul Patel, Dharmendra Patel, “Optical Character Recognition by Open Source OCR Tool Tesseract: A Case Study” International Journal of Computer Applications (0975 – 8887) Volume 55– No.10 [3] http://en.wikipedia.org/wiki/Optical_character_recognition [4] http://www.onlineocr.net/ [5] http://www.newocr.com/ [6] http://www.ocrconvert.com/ [7] http://www.convertimagetotext.net/ [8] http://www.free-ocr.com/ [9] http://www.i2ocr.com/ [10] http://www.ocrtoword.com/ [11] https://docs.google.com/ [12] Yasser Alginahi, “Preprocessing Techniques in Character Recognition” [13] Oivind due trier, Anil K.Jain, TorfinnTaxt, “Future extraction methods for character recognition A survey”. [14] Pritpal Singh, SumitBudhiraja, “Feature Extraction and Classification Techniques in O.C.R. Systems for Handwritten Gurmukhi Script – A Survey” Pritpal Singh, SumitBudhiraja / International Journal of Engineering Research and Applications (IJERA), Vol. 1, Issue 4, pp. 1736-1739. [15] Youssef Bassil, Mohammad Alwani, “Ocr Post-Processing Error Correction Algorithm Using Google's Online Spelling Suggestion” Journal of Emerging Trends in Computing and Information Sciences, Vol.3, No. 1 [16] Archana A. Shinde, D.G.Chougule, “Text Pre-processing and Text Segmentation for OCR”IJCSET, Vol2 [17]https://www.google.co.in/search?q=k+means+algorithm&biw=1366&bih=615&source=lnms &tbm=isc h&sa=X&sqi=2&ved=0CAcQ_AUoAmoVChMI5-DkrIvaxgIVD4- OCh0leQqA#imgrc=TQ19POvnV7mNbM%3A [18] Sandeep Dangi, Ashish Oberoi, Nishi Goel “Performance Comparison between Different Feature Extraction Techniques with SVM Using Gurumukhi Script” International journal of Engineering Research and Applications(IJERA) ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.123- 128
  • 15. Hmr Log Analyzer: Analyze Web Application Logs Over Hadoop Map reduce Sayalee Narkhede1 and Tripti Baraskar2 ETH Zurich University, CH-8092 Z¨ urich, Switzerland ABSTRACT In today’s Internet world, log file analysis is becoming a necessary task for analyzing the customer’s behavior in order to improve advertising and sales as well as for datasets like environment, medical, banking system it is important to analyze the log data to get required knowledge from it. Web mining is the process of discovering the knowledge from the web data. Log files are getting generated very fast at the rate of 1-10 Mb/s per machine, a single data center can generate tens of terabytes of log data in a day. These datasets are huge. In order to analyze such large datasets we need parallel processing system and reliable data storage mechanism. Virtual database system is an effective solution for integrating the data but it becomes inefficient for large datasets. The Hadoop framework provides reliable data storage by Hadoop Distributed File System and MapReduce programming model which is a parallel processing system for large datasets. Hadoop distributed file system breaks up input data and sends fractions of the original data to several machines in hadoop cluster to hold blocks of data. This mechanism helps to process log data in parallel using all the machines in the hadoop cluster and computes result efficiently. The dominant approach provided by hadoop to “Store first query later”, loads the data to the Hadoop Distributed File System and then executes queries written in Pig Latin. This approach reduces the response time as well as the load on to the end system. This paper proposes a log analysis system using Hadoop MapReduce which will provide accurate results in minimum response time. KEYWORDS Hadoop, MapReduce, Log Files, Parallel Processing, Hadoop Distributed File System. Source URL : https://www.airccse.org/journal/iju/vol4.html Volume URL : https://airccse.org/journal/iju/papers/4313iju04.pdf Cited by: 40
  • 16. References: [1] S.Sathya Prof. M.Victor Jose, (2011) “Application of Hadoop MapReduce Technique to Virtual Database System Design”, International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT), pp. 892-896. [2] Yulai Yuan, Yongwei Wu_, Xiao Feng, Jing Li, Guangwen Yang, Weimin Zheng, (2010) “VDBMR: MapReduce- based distributed data integration using virtual database”, Future Generation Computer Systems, vol. 26, pp. 1418-1425. [3] Jeffrey Dean and Sanjay Ghemawat., (2004) “MapReduce: Simplified Data Processing on Large Clusters”, Google Research Publication. [4] Konstantin Shvachko, Hairong Kuang, Sanjay Radia, Robert Chansler, (2010) “The Hadoop Distributed File System”, Mass Storage Systems and Technologies(MSST), Sunnyvale, California USA, vol. 10, pp. 1-10. [5] C.Olston, B.Reed, U.Srivastava, R.Kumar, and A.Tomkins, (2008) “Pig latin: a not-so-foreign language for data processing”, ACM SIGMOD International conference on Management of data, pp. 1099– 1110. [6] Tom White, (2009) “Hadoop: The Definitive Guide. O’Reilly”, Scbastopol, California. [7] M.Zaharia, A.Konwinski, A.Joseph, Y.zatz, and I.Stoica, (2008) “Improving mapreduce performance in heterogeneous environments” OSDI’08: 8th USENIX Symposium on Operating Systems Design and Implementation. [8] Mr. Yogesh Pingle, Vaibhav Kohli, Shruti Kamat, Nimesh Poladia, (2012)“Big Data Processing using Apache Hadoop in Cloud System”, National Conference on Emerging Trends in Engineering & Technology. [9] Cooley R., Srivastava J., Mobasher B., (1997) “Web mining: informationa and pattern discovery on world wide web”, IEEE International conference on tools with artificial intelligence, pp. 558- 567. [10] Liu Zhijing, Wang Bin, (2003) “Web mining research”, International conference on computational intelligence and multimedia applications, pp. 84-89. [11] Yang, Q. and Zhang, H., (2003) “Web-Log Mining for predictive Caching”, IEEE Trans. Knowledge and Data Eng., 15( 4), pp. 1050-1053. [12] P. Nithya, Dr. P. Sumathi, (2012) “A Survey on Web Usage Mining: Theory and Applications”, International Journal Computer Technology and Applications, Vol. 3, pp. 1625- 1629. [13] Andrew Pavlo, Erik Paulson, Alexander Rasin, Daniel J. Abadi, David J. DeWitt, Samuel Madden, Michael Stonebraker, (2009) ”A Comparison of Approaches to Large-Scale Data Analysis”, ACM SIGMOD’09. [14] Gates et al., (2009) “Building a High-Level Dataflow System on top of Map-Reduce: The Pig Experience”, VLDB 2009, Section 4. [15] LI Jing-min, HE Guo-hui, (2010) “Research of Distributed Database System Based on Hadoop”, IEEE International conference on Information Science and Engineering (ICISE), pp. 1417-1420. [16] T. Hoff, (2008) “How Rackspace Now Uses MapReduce and Hadoop To Query Terabytes of Data”. [17]Apache-Hadoop,http://Hadoop.apache.org
  • 17. Data Storage on a RFID Tag for a Distributed System Sarita Pais1 and Judith Symonds2 1 Whitireia Community Polytechnic, Auckland 2 Auckland University of Technology, Auckland ABSTRACT RFID tags can store more than just a tag ID. Data on an RFID tag can be updated through local processing. This is in contrast to the EPC global standard of data-on-network. The research study explores how much data can be stored on an RFID tag. The scope of this study is to find a suitable data format for data stored in the tags. Two data formats viz CSV and XML along with compression techniques were discussed. The experiment conducted using the prototype examinedhow relevant data can be stored in the RFID tags and used in local processing without the need for a central database or network connectivity. The findings of the experiment results demonstrate sufficient proof of concept to suggest CSV data format. Issues encountered in the experiment are discussed, particularly related to writing data into the tag. The conclusion explores the direction for future research on improving writing data on tag, using the data-on- tag approach. KEYWORDS RFID tag, data-on-tag, user memory, data format. Source URL : https://www.airccse.org/journal/iju/vol2.html Volume URL : https://airccse.org/journal/iju/papers/2211iju03.pdf Cited by: 36
  • 18. References: [1] Weiser, M. (1993). “Hot topics - Ubiquitous computing”.Computer 26, 71-72. [2] Matsuoka, K. ,Katou,N., Dejima, S. &Takami, K. (2010). Information selection and delivery algorithm for delivering advertisements suitable for the pedestrians present at a particular site, International Journal of UbiComp (IJU), 1(4), 13-21. [3] Haas, L. M., & Miller, R. J. (1997). “Transforming heterogeneous data with database middleware: Beyond integration”.Bulletin of the IEEE Computer Society Technical Committee on Data engineering, 1-6. [4] Hardgrave, B. C., Armstrong, D. J., &Riemenschneider, C. K. (2007). “RFID assimilation hierarchy”.Proceedings of the 40th Hawaii International conference on System Sciences, Hawaii, 1-10. [5] Diekmann, T., Melski, A., & Schumann, M. (2007). “Data-on-network vs. Data-on-tag: Managing data in complex RFID environments”. Proceedings of the 40th Annual Hawaii International Conference on System Sciences, Hawaii, 224-233. [6] Harmon, C. K. (2006).“The necessity for a uniform organisation of user memory in RFID”.International Journal Radio Frequency Identification Technology and Applications, 1(1), 41-51. [7] Jiang, W., & Xiang, D. (2008). “A compression framework for personal image used in mobile RFID system”. 9th International Conference for Young Scientists, Zhang JiaJie, China, 769-774. [8] Ward, M., Kraneneburg, R., & Backhouse, G. (2006). “RFID: Frequency, standards, adoption and innovation”. JISC Technology and standards Watch, 1-36. Retrieved from http://www.rfidconsultation.eu/docs/ficheiros/TSW0602.pdf [9] Bacheldor, B. (2009). “Tego Launches 32-Kilobyte EPC RFID Tag”. Retrieved 3-3-2010, from http://www.rfidjournal.com/article/view/4578 [10] Want, R. (2004). “The magic of RFID”.Queue, 2(7), 40-48. [11] Wal-Mart spells out RFID vision, RFID Journal 2003. Retrieved 8-09-2010, from http://www.rfidjournal.com/article/purchase/463 [12] Wu, N. C., Nystrom, M. A., Lin, T. R., & Yu, H. C. (2006).”Challenges to global RFID adoption”.Technovation, 26(12), 1317-1323. [13] Melski, A., Thoroe, L., Caus, T., & Schumann, M. (2007).” Beyond EPC – Insights from multiple RFID case studies on the storage of additional data on tag”. International Conference on wireless Algorithms, Systems and Applications, Chicago, 281- 286. [14] Chan, A. T. S., Cao, J., Chan, H., & Young, G. (2001). “A web-enabled framework for smart card application in health services”.Communications of the ACM, 44(9), 77-82. [15] Romer, K., Schoch, T., &Mattern, F. (2004). “Smart identification frameworks for ubiquitous computing applications”.Wireless Networks, 10, 689-700. [16] Sugawara, K., Yamaoka, K., & Sakai, Y. (1997). “A study on image searching method in super distributed database”.IEEE Global Telecommunications Conference, Phoenix, AZ, USA, 2, 736- 740. [17] Bohn,J. (2008). “Prototypical implementation of location-aware services based on a middleware architecture for super-distributed RFID tag infrastructures”, Personal and ubiquitous computing, 12 (2), 155- 166. [18] Mamei, M., Quaglieri, R., & Franco Zambonelli, F. (2006). “Making tuple spaces physical with RFID tags”.Proceedings of the 2006 ACM symposium on Applied computing, Dijon, France, 434 - 439. [19] Landt, J. (2005). “The history of RFID”.Potentials IEEE, 24(4), 8 – 11. [20] Lin, D., Elmongui, H. G., Bertino, E., &Ooi, B. C. (2007). “Data management in RFID applications”.DEXA, 434-444. [21] Tracient. (2007). Tracient user manual.from www.tracient.com [22] Tribowski, C., Spin, K., Guenther, O., and Sielemann, O.,(2009) "Storing data on RFID tags:
  • 19. A standards-basedapproach". ECIS 2009 Proceedings.http://aisel.aisnet.org/ecis2009/146 [23] Willis, S., &Helal , S. (2005).”RFID information grid for blind navigation and wayfinding”. Paper presented at the Proceedings of the ninth annual IEEE International Symposium on Wearable Computers, Osaka, Japan. from http://www.icta.ufl.edu/projects/publications/willis- RFIDISWC%20v2.pdf [24] Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004).” Design science in information systems research”. MIS Quarterly, 28(1), 75-105. [25] Floerkemeier, C., & Lampe, M. (2005). “RFID middleware design - addressing application requirements and RFID constraints”.Joint sOc-EUSAI conference, Grenoble, 1-6.
  • 20. Practical Attacks on a RFID Authentication Protocol Conforming to EPCC-1 G-2 Standard Mohammad Hassan Habibi1 , Mahmud Gardeshi2 , Mahdi R. Alaghband3 1 Faculty of Electrical Engineering, I.H University, Tehran, Iran 2 Faculty of Electrical Engineering, I.H University, Tehran, Iran 3 EEDepartment, Science and Research Campus, Islamic Azad University, Tehran, Iran ABSTRACT Yeh et al. recently have proposed a mutual authentication protocol based on EPC Class-1 Gen.- 2 standard [1].They have claimed that their protocol is secure against adversarial attacks and also provides forward secrecy. In this paper we will show that the proposed protocol does not have proper security features. A powerful and practical attack is presented on this protocol whereby the whole security of the protocol is broken. Furthermore, Yeh et al. protocol does not assure the untraceabilitiyand backwarduntraceabilitiy aspects. Namely, all past and next transactions of a compromised tag will be traceable by an adversary. KEYWORDS RFID, EPC C-1 G-2 standard, Security, Attacks, Untraceability Source URL : https://www.airccse.org/journal/iju/vol2.html Volume URL : https://airccse.org/journal/iju/papers/2111iju01.pdf Cited by: 37
  • 21. References: [1] Yeh, T.-C., Wang, Y.-J., Kuo, T.-C., Wang, S.-S.,“Securing RFID systems conforming to EPC Class-1 Generation-2 standard”, Expert Systems with Applications 37 (2010) 7678–7683 [2] Transport for London, Oyster card, http://www.oystercard.co.uk. [3] “Michelin Embeds RFID Tags in Tires”, RFID Journal,http://www.rfidjournal.com/article/ articleview/ 269 /1/1/. Accessed 17 Jan 2003 [4] Hoepman, J.-H.,Hubbers, E., Jacobs, B., Oostdijk, M., Scherer, R.W.,“Crossing borders: Security and privacy issues of the European e-passport”, NAME (IWSEC 2006). LNCS, Springer-Heidelberg, vol. 4266 (2006) 152–167 [5] E.-C. Australia, “Access control, sensor control, and trans-ponders”, at: http://www.rfid.com.au/rfid uhf.htm,2008. [6] D. C. Wyld, “24-Karat protection: RFID and retail jewelry marketing”, International Journal of UbiComp (IJU), Vol 1, Num 1, January 2010. [7]K. K. Khedo, D.Sathan, R.Elaheebocus, R. K. Subramanian, andS.D.V. Rughooputh, “Overlapping zone partitioning localization technique for RFID”, International Journal of UbiComp (IJU), Vol 1, Num 2, April 2010. [8] EPCglobal Inc., http://www.epcglobalinc.org/. [9] EPCglobal Inc., EPCTM Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocols for Communications at 860 MHz – 960 MHz version 1.1.0, Available at [6]. [10] Lim, C.H., and Kwon, T., “Strong and robust RFID authentication enabling perfect ownership transfer”, In Proceedings of ICICS ’06, LNCS 4307 (2006) 1–20 [11] Van Deursen, T., Radomirovic, S., “Attacks on RFID protocols”, Cryptology ePrint Archive, Report 2008/310, 2008. . [12] R. Phan, “Cryptanalysis of a new ultralightweight RFID authentication protocol-SASI”, IEEE Transactionson Dependable and Secure Computing 6(4): Oct.-Dec. (2009) 316–320 [13] Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., and Ribagorda, A., “Vulnerability analysis of RFID protocols for tag ownership transfer”, Computer Networks 54 (2010) 1502–1508 [14] Chien, H., Chen, C.,“Mutual Authentication Protocol for RFID Conforming to EPC Class-1 Generation-2 Standards”, Computer Standards & Interfaces, 29 (2007) 254–259 [15] Han, D., Kwon, D.: Vulnerability of an RFID authentication protocol conforming to EPC Class1Generation-2 Standards. Computer Standards & Interfaces 31 (2009) 648–652. [16] Fu, J., Wu, C., Chen, X., Fan, R., and Ping, L., “Scalable pseudo random RFID private mutual authentication”, 2nd IEEE International Conference on Computer Engineering and Technology(ICCET). V. 7, pp. 497-500, China, 2010. [17] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, “EMAP: An efficient mutual authentication protocol for low-cost RFID tags”, In Proc. of IS’06, volume 4277 of LNCS, pages 352–361, Springer-Verlag, 2006. [18] Gu, Y., Wu, W., “Mutual authentication protocol based on tag ID number updating for low- cost RFID”, In Proceedings of the first IEEE International Conference on Network Infrastructure and Digital Content(IC-NIDC2009), pp. 548-551, 2009. [19] Kim, K. H., Choi, E. Y., Lee, S. M., and Lee, D.H., “Secure EPCglobal Class-1 Gen-2 RFID system against security and privacy problems”, In Proc. of OTM-IS’06, volume 4277 of LNCS, pages 362–371. Springer-Verlag, 2006. [20]Duc, D.N., Park, J., Lee, H., and Kwangjo, K., “Enhancing security of epcglobal Gen-2 RFID tag against traceability and cloning”, In Proc. of Symposium on Cryptography and Information Security, 2006. [21] Li T., and Wang, G., “SLMAP-A secure ultra-lightweight rfid mutual authentication protocol”, Proc. of Chinacrypt’07, 2007. [22] Kulseng, L., Yu, Z., Wei, Y., and Guan, Y., “Lightweight mutual authentication and
  • 22. ownership transfer for RFID Systems”, In Proceedings of IEEE INFOCOM 2010, 1-5, CA, March (2010). [23] Song, B., and Mitchell, C. J., “RFID authentication protocol for low-cost tags”, In Wisec 2008, pages 140-147. [24] Chien, H. Y., “SASI: A new ultralightweightrfid authentication protocol providing strong authentication and strong integrity”, IEEE Transactions on Dependable and Secure Computing, 4(4):337–340, 2007. [25] Peris-Lopez, P., Li, T., Lim, T.-L., Hernandez-Castro, J. C., Estevez- Tapiador, J. M., and Ribagorda, A.,“Vulnerability analysis of a mutual authentication scheme under the epc class-1 generation-2 standard”, In Hand. of RFIDSec’08, 2008 [26] Rizomiliotis, P., Rekleitis, E., Gritzalis, S.,“Security analysis of the Song– Mitchell authentication protocol for low-cost RFID tags”, Communications Letters, IEEE 13 (4) (2009), pp. 274–276.. [27] Lin, C.-L., and Chang, G.-G., “Cryptanalysis of EPC class 1 generation 2 RFID authentications”,Information Security Conference 2007, ChiaYi, Taiwan. [28] Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., and Ribagorda, A., “Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard”, Computer Communications 32 (2009) 1185–1193. [29] Habibi, M. H.,Gardeshi, M.,Alaghband, M., “Cryptanalysis of a mutual authentication protocol for low-cost RFID”, In proceedings of IEEE International Conference on Intelligent Information Networks (ICIIN 2011), UAE, 2011. [30] Van Deursen, T., Radomirovi´c, S., “Security of RFID protocols – A case study”, Electronic Notes in Theoretical Computer Science 244 (2009) 41–52. [31] Habibi, M. H., Gardeshi, M., Alaghband, M., “Cryptanalysis of two mutual authentication protocols for low-cost RFID”, International Journal of Distributed and Parallel systems, Volume 1, Number 3 ,(2011) [32] Habibi, M. H., Gardeshi, M., Alaghband, M., “Security analysis of an RFID mutual authentication protocol for RFID systems”, In proceedings of IEEE International Conference on Intelligent Information Networks (ICIIN 2011), UAE, 2011. [33] Habibi, M. H., Gardeshi, M., Alaghband, M., “Attacks and improvements to a new RFID mutual Authentication protocol”, In proceedings of Third Workshop on RFID Security: RFIDsec Asia 2011, China, 2011. [34] Li, T., Deng, R.H., “Vulnerability analysis of EMAP-An efficient RFID mutualauthentication protocol”, In: AReS 2007: Second International Conference on Availability, Reliability and Security (2007). [35]Alomair, B., Lazos, L., and Poovendran, R., “Passive attacks on a class of authentication protocols for RFID”, K.-H. Nam and G. Rhee (Eds.): ICISC 2007, LNCS 4817, pp. 102–115, 2007. [36] Juels, A., “Minimalist cryptography for low-cost RFID tags”, In Proc. of SCN’04, volume 3352 of LNCS, pp. 149–164, Springer-Verlag, 2004. [37] Peris-Lopez, P., Li, T., Lim, T.-L., Hernandez-Castro, J. C., Estevez- Tapiador, J. M., and Ribagorda, A.,, “Cryptanalysis of a novel authentication protocol conforming to EPC-C-1G-2 standard”, Computer Standards & Interfaces, Elsevier Science Publishers, doi:10.1016/j.csi.2008.05.012, 2008. [38] Han, D., Kwon, D.: Vulnerability of an RFID authentication protocol conforming to EPC Class1Generation-2 Standards. Computer Standards & Interfaces 31 (2009) 648–652. [39] Dimitriou, T., “A lightweight RFID protocol to protect against traceability and cloning attacks”, In SecureComm, pages 59-66, 2005. [40] Ohkubo, M., Suzuki, K., Kinoshita, S., “Cryptographic approach to ”privacy-friendly tags”, In 2003 MIT RFID Privacy Workshop, 2003. [41] Karthikeyan, S., Nesterenko, M., “RFID security without extensive cryptography”, In Proc. of SASN '05, ACM (2005) 63–67.
  • 23. [42] Juels, A., and Weis, S.A., “Defining strong privacy for RFID”, In Proceedings of PerCom ’07 (2007) 342–347, http://eprint.iacr.org/2006/137. [43]Avoine, G., “Adversarial model for radio frequency identification”, Cryptology ePrint Archive, report 2005/049. http://eprint.iacr.org/2005/049. [44] Ouafi, K., and Phan, R.C.-W. “Privacy of recent RFID authentication protocols”,L. Chen, Y. Mu, and W. Susilo (Eds.): ISPEC 2008, LNCS 4991, pp. 263–277, 2008.
  • 24. A proposed Novel Approach for Sentiment Analysis and Opinion Mining Ravendra Ratan Singh Jandail Mobile & Cloud Lab, Institute of Computer Science, University of Tartu, Ülikooli 17 - 324,Tartu 50090, Estonia ABSTRACT as the people are being dependent on internet the requirement of user view analysis is increasing exponentially. Customer posts their experience and opinion about the product policy and services. But, because of the massive volume of reviews, customers can’t read all reviews. In order to solve this problem, a lot of research is being carried out in Opinion Mining. In order to solve this problem, a lot of research is being carried out in Opinion Mining. Through the Opinion Mining, we can know about contents of whole product reviews, Blogs are websites that allow one or more individuals to write about things they want to share with other The valuable data contained in posts from a large number of users across geographic, demographic and cultural boundaries provide a rich data source not only for commercial exploitation but also for psychological & sociopolitical research. This paper tries to demonstrate the plausibility of the idea through our clustering and classifying opinion mining experiment on analysis of blog posts on recent product policy and services reviews. We are proposing a Nobel approach for analyzing the Review for the customer opinion. Source URL : https://www.airccse.org/journal/iju/vol5.html Volume URL : https://airccse.org/journal/iju/papers/5214iju01.pdf Cited by: 28
  • 25. References: [1] Khairullah Khan, BaharumB.Baharudin, Aurangzeb Khan, Fazal-e-Malik , Mining Opinion from text Documents: A Survey, 3rd IEEE International Conference on Digital Ecosystems and Technologie, 2009 [2] David Alfred Ostrowski, Sentiment Mining within Social Media forTopic Identification ,IEEE Fourth International Conference on Semantic Computing 2010 [3] ANA SUFIAN ,RANJITH ANANTHARAMAN ,Social Media Data Mining and Inference system based on Sentiment Analysis 2011 [4] KENNETH BLOOM,Sentiment Analysis Based On Appraisal Theory And Functional Local Grammar 2011. [5] ANA SUFIAN ,RANJITH ANANTHARAMAN , Social Media Data Mining and Inference system based on Sentiment Analysis 2011 [6] Hsinchun Chen and David Zimbra,AI and Opinion Mining ,IeeeInTeLLIGenTSySTeMS 2010 [7] Bo Pang and Lillian Lee Opinion Mining and Sentiment Analysis, Foundations and TrendsR_ inInformation Retrieval 2008 [8] NorlelaSamsudin, MazidahPuteh, Abdul RazakHamdan, MohdZakree Ahmad Nazri , Is Artificial Immune System Suitable for OpinionMining? 4th Conference on Data Mining and Optimization (DMO) , Langkawi, Malaysia 02-04 September 2012 [9] rik Cambria, Bj rnSchuller, unqing ia, Catherine Havasi, Published by the IEEE Computer Society 2013 [10] ThanhThung ,evaluation of natural language Processing technique for Sentiment Analysis , 2012
  • 26. Ubiquitous Healthcare Monitoring System Using Integrated TriaxialAccelerometer, Spo2 and Location Sensors Ogunduyile O.O1 ., Zuva K2 ., Randle O.A 3 ., Zuva T4 1,3,4 Department of Computer Science, Tshwane University of Technology, Pretoria, South Africa 2 Department of Computer Science, University of Botswana, Gaborone, Botswana ABSTRACT Ubiquitous healthcare has become one of the prominent areas of research inorder to address the challenges encountered in healthcare environment. In contribution to this area, this study developed a system prototype that recommends diagonostic services based on physiological data collected in real time from a distant patient. The prototype uses WBAN body sensors to be worn by the individual and an android smart phone asa personal server. Physiological data is collected and uploaded to a Medical Health Server (MHS) via GPRS/internet to be analysed. Our implemented prototype monitors the activity, location and physiological data such as SpO2 and Heart Rate (HR) of the elderly and patients in rehabilitation. The uploaded information can be accessed in real time by medical practitioners through a web application. KEYWORDS Android smart phone, Ubiquitous Healthcare, Web application server, Wireless Body AreaNetworks Source URL : https://www.airccse.org/journal/iju/vol4.html Volume URL : https://airccse.org/journal/iju/papers/4213iju01.pdf Cited by: 26
  • 27. References: [1]. Olugbara, O.O., Ojo, S.O. and Adigun, M.O. (2011). A Grid enabled framework for ubiquitous healthcare service provisioning, Advances in Grid Computing. Zoran Constantinescu (Ed.), InTech, Croatia, ISBN: 978-953-307-301-9, 229-252. [2]. Shaikh, A., Memon, M., Memon, M. and Misbahuddin, M. (2009). The Role of Service Oriented Architecture in Telemedicine Healthcare System. International Conference on Complex, Intelligent and Software Intensive Systems CISIS ‘09. IEEE, Fukuoka, Japan, 208 – 214. [3]. Purwar, A., Jeong, D. and Chung W. (2007). Activity Monitoring from Real-Time Accelerometer data using sensor Network. International Conference on Control, Automation and Systems, COEX, Seoul Korea., 2402 – 2406. [4]. Asad M.K., Pervez Z., Lee S and Lee Y.K (2011). Intelligent Healthcare Service Provisioning Using Ontology with Low – Level Sensory Data. KSII Transactions on Internet and Information Technology Systems 5(11). 2016 – 2033. [5]. Sneha, S., Virginia, L. and Bick, M. (2010). Ubiquitous and Pervasive Computing in Healthcare. 15th Americas Conference on Information Systems. San Francisco, California (2010) [6]. Sneha, S and Varshney, U. (2006). Ubiquitous healthcare: a new frontier in e-health. Proceedings of Americas Conference on Information Systems (2006), 319. [7]. Wang, H. Choi,H., Agoulmine, N., Deen, M.J. and Hong, J.W. (2010). Information-based sensor tasking wireless body area networks in U-health systems. CNSM 2010. 517 – 522. [8]. Rotariu C and Manta V (2012). Wireless System for Remote Monitoring of Oxygen Saturation and Heart Rate. Proceedings of the Federated Conference on Computer Science and Information Systems pp. 193–196 [9]. Patil D.D., Mantri S.T., Himangi Milind Pande H.M., Wadhai V.M and Kharat M.U (2012). Feature Extraction Techniques for Mining ECG Signals in WBAN for Healthcare Applications. International Journal of Advances in Computing and Information Research (IJACIR). 1(1). [10]. Latre, B., Braem, B., Moerman, I., Blondia, C. and Demeester, P. (2011). A survey on wireless body area networks. Journal of Wireless Networks, 17(1), 1 – 18. [11]. Kim, S. (2002). Ubiquitous healthcare: the OnkoNet mobile agents architecture. Proceeding Workshop on Mobile Computing in Medicine, 105 – 118. [12]. Jovanov, E., Milenkovic, A., Otto, C. and De Groen, P.C. (2005). A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation. Journal of Neuro Engineering and Rehabilitation, 2005, 2(1), 6 [13]. Jung, J., Ha, K., Lee, J., Kim, Y. and Kim, D. (2008). Wireless body area network in a ubiquitous healthcare system for physiological signal monitoring and health consulting. International Journal of Signal Processing, Image Processing and Pattern Recognition, 1(1), 47 – 54. [14]. Yick, J. Mukherjee, B. and Ghosal, D. (2008). Wireless sensor networks survey. Computer Networks, 52. 2292 2330. [15]. Tapia, I.D., Rodriguez, S., Bajo, J., Corchado, J.M. and Garcia, O. (2010). Wireless sensor networks for data acquisition and information fusion: a case study. 13th IEEE International Conference on Information Fusion. Salamanca, Spain, 1 – 8.
  • 28. [16]. Nikolidakis, S.A., Georgakakis, E., Giotsas, V., Vergados, D.D and Douligeris, C. (2010). Secure ubiquitous healthcare system based on IMS and the HL7 standards. Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments, (PETRA’10), Samos Greece, 42, 1 – 7. [17]. Olugbara, O.O., Adigun, M.O., Ojo, S.O and Mudali, P. (2007). Utility grid computing and body area network as enabler for ubiquitous rural e-healthcare service provisioning. Proceedings of [18]. Hao, Y. and Foster, R. (2008). Wireless body sensor networks for health-monitoring. Physiological Measurement, 29(11), 27 – 56. [19]. Bouten, C., Koekkoek, K., Verduin, M., Kodde, R. and Janssen, J. (1997). A triaxial accelerometer and portable data processing unit for the assessment of daily physical activity. IEEE Transactions on Biomedical Engineering, 44(3), 136 – 147. [20]. Mendelson, M., Duckworth, R.J. and Comtois, G. (2006). A Wearable Reflectance Pulse Oximeter for Remote Physiological Monitoring. 2006 International Conference of the IEEE Engineering in Medicine and Biology Society (2006), 912 – 915. [21]. Watthanawisuth, N., Lomas,L., Wisitsoraat, A. and Tuantranont, A. (2010). Wireless Wearable Pulse Oximeter for Health Monitoring using ZigBee Wireless Sensor Network. International conference on Electrical Engineering/Electronics and Information Technology (ECTI-CON), Chiang Mai, 575 – 579. [22]. Morón, M.J., Luque J.R., Gómez-Jaime,A., Casilari, E. and Díaz-Estrella,A (2009). Prototyping of a remote monitoring system for a medical Personal Area Network using Python. 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009. PervasiveHealth 1 – 5.