2015-CAFIC_IACIS_Call for Papers——香港理工大学

合集下载

教育事业活动中信息系统概念化及集成研究(IJIEEB-V5-N2-5)

教育事业活动中信息系统概念化及集成研究(IJIEEB-V5-N2-5)

I.J. Information Engineering and Electronic Business, 2013, 2, 28-33Published Online August 2013 in MECS (/)DOI: 10.5815/ijieeb.2013.02.05Conceptualization and Integration of Information Systems in Educational Business ActivitiesSalah AlkhafajiAssociate Prof, IST Department, Sur University College, PO: 440, PC: 411, Sur,Sultanate of OmanE-mail: dr_salahalkhafaji@, Tel: +968-92626890, Tel : +968-25546691B. SriramQuality Assurance Officer and Lecturer, IST Department, Sur University College, PO: 440, PC: 411, Sur, Sultanate ofOmanEmail: srishan11@, sriram@.om, Tel: +968-92186725Abstract —The business activities are highly incorporated with the technology development and needto be updated periodically. Business activities have made the technology to be more creative and innovative. The organizations need to integrate their business activities into a single system to achieve their aims and objectives successfully. V arious studies are already conducted in integrating such business activities as Business Process Management System. In particular, various management systems are available in the market to integrate the educational business processes. The educational business processes are changing due to the various international bench markings. The educational business processes perspectives could not be met exactly to the requirements in some of the available software. As the currently available systems suits to some of the educational institutions in particular region of the world, there are needs to review them to the current requirements. This paper identifies the gaps between the current potential educational requirements and availability of educational business processes management systems. The major impact factors of the educational processes are identified and based on the findings a model has been proposed.Index Terms —Harmonic Integration, Business Intelligence Systems, Business Process Management System, Educational Business Activities.Note: This is fully revised and updated version of: Dr. Salah Alkhafaji, Sriram.B – “Harmonic Integration of Information Systems in Business Processes” – Accepted for First International Conference on Information Technology – College of Applied Science, Sur, Oman to be scheduled.I.INTRODUCTION1.1.General IntroductionThe technological development helps in each and every activities of the business either directly or indirectly. The organizations are made to link their business processes using various business process management systems available based on the requirements. The enterprise resource planning tools help to conduct the business activities smoothly and effectively. A ll the business activities need to be integrated for efficient performances. The set of interrelated activities performed by various departments and units of the business require proper integration for harmonic conduction of the business activities.The modern technology has transformed the business processes into various higher degrees to compete and exist in the business. Every business requires various inputs from internal and external units and manipulates the same for day to-day activities. The different levels of the organization need the information regarding its business activities in time to work cost effectively. In education field, there are various activities that have to be linked properly in order to maintain quality in all activities. The fundamental principle of such integration of activities is to enable free flow of information. Managing such business activities through proper information system has nevertheless vital role in business successes. The information technology helps the organizations to apply the various management techniques to achieve the mission and vision. Managing business processes need critical evaluation on available systems for proper integration. Apart from that, there isa need to integrate all business processes into a single information system and to be economical and feasible. Various studies were conducted to integrate the business processes in single system as business process management systems. The core idea of this paper is to elicit the major business activities of an educational institution that have to be integrated in order to run the business smoothly. Also, this paper identifies the gaps between the educational requirements and the currently available business process management systems. The factors that influences the day – to – day educational business activities are identified and a model has been proposed considering the business processes of a higher education institution.The current problems in the existing systems were identified and the corresponding objectives andhypotheses were set. The previous studies on this topic were referred under literature review. The research methodology has been identified and the findings were summarized with respect to various perspectives of the systems. Finally we have proposed a model for the applications.1.2.Statement of ProblemThough most of the currently available business process management systems have the necessary techniques to integrate the various business processes into one system, still they are not sufficient in some cases. As the educational processes depend on the nature and type of the institution, the business processes in education do not follow the same activities that are available in the current systems. The issue is to integrate these processes harmonically into single system which will be useful for any educational institutions. The business activities are influenced by various factors, in turn, the whole system.1.3.Objectives and HypothesesObjective 1: To identify the factors that affects the educational business processesHypothesis 1: The major factors that affect the educational business processes are: Students and Student Support Activities, Staff and Staff Support Activities, Financial Activities, and Academic Learning Processes. Objective 2: To identify the business process management system potentials and the educational business activities requirementsHypothesis 2: The currently available business processes management systems address all the requirements of the educational activitiesObjective 3: To identify the methodologies to harmonically integrate the educational business processes into single systemHypothesis 3: The educational processes shall be harmonically integrated into single system with maximum efficiencies by using currently available widgets and toolsObjective 4: To identify the gaps between the currently available business process management systems and educational requirementsHypothesis 4: There is no gap in the currently available bus iness processes management sys tems and the educational requirementsII.LITERATURE REVIEWDan et al (2010)identified that the business processes must be agile. This will help the processes to respond to the changes in the environment. Event Driven business process management is an enhancement of business process management [1]Cale and Kanter (1998) clearly stated that a major concern of senior information technology executives is achieving alignment between the technology and strategic interest of the overall organization [2]. Henderson and Venketraman (1993) said, though Information technology has evolved from the administrative support toward more strategic role within an organization, still there are lacking in fundamental frameworks for the future of the organization [3].Apart from that as Hollander et al (2000) suggested the information risks in the business activities need to be considered. The organizations must develop and implement a system of controls to manage such risks. The most important issue of translating strategic objectives into effective business process design is challenging. The lack of a clear definition of business processes has been the principal cause of a longstanding disconnect between strategy formulation and implementation. [4].As Kalpan et al (2008) said the companies are madeto trim their bottom line activities due to rapid dot-com boom. The business sector has when IT and business executives jointly take an end to end look at business processes to cut the cost. In every organization the management processes depend on the business processes. The changes in the management processes and business processes affect the information processes. Thus, an organizations business processes, management processes and information processes need to be integrated for achieving the overall organization’s objectives. [5]As Sandoe et al (2001) said, to get the optimal benefits out of the integrated enterprise systems, the current business models and processes require significant changes. Computing has to be viewed from specialized tools to organizational resources. The organization has to allocate them most appropriately within the organizational setting [6].Vom Brocke et al (2010) discussed that the business process management has emerged as a popular management approach in information systems and business practices. Business process management has been given top priority during last decade. As they said, Business Process Management is mostly employed to improve, re-design or re-engineer existing business operations so as to improve overall effectiveness or efficiency of an enterprise. [7]Zott, Amit, Massa (2010) said that the burgeoning literature on business models is young. A common conceptual base is still lacking. According to their pointof views the business models should be considered as the activity system [8].III.RESEA RCH METHODOLOGYThe research has been conducted by analyzing the secondary data and analyzing the available software. To identify the potential requirements of educational activities, various educational business activities were observed and studied. The different frameworks defined by the accreditation authorities and government agencies were studied for identifying the major impact factors of the business processes. Interviews were conducted withthe staff members working in various departments. Currently available some software’s were studied for their available features and supports. Some available systems were analyzed for their performances. The student’s activities in class rooms, labs and examination were observed to identify the potential requirements. The instructors were also observed for the teaching, assessment requirements during their teaching.As suggested by Sommerville (2007), the available software was tested for maintainability, dependability, efficiency and usability which are considered as the essential attributes of a good software[9]. The functional and non functional emergent properties of the systems were analyzed critically to understand the interdependent components. The reliability, safety and security of the available systems were tested for operational performances. The designing of the system has to be designed by proper design space analysis described by Allan Dix et al (2008). [10]IV.FINDINGSThe information technology developments have made the business activities easy and creative. The previous studies on integrating educational business activities proved that the business process management system. The educational business requirements depend on the type and size of the higher education institute. A college with less number of students shall manage and integrate their activities with simple campus management systems and business process management systems. But, a higher education provider with more number of courses, more number of students and various other activities need specially designed system to meet their requirements. They need to integrate all their activities in order to meet their goal and objectives.The following activities were identified as the important factors that affect the educational processes. They are: Students and student’s related activities, Staff and Staff Support activities, Financial Related activities and Other Support Activities. Most of the currently available business processes management addresses the requirements of the educational activities. But some do not match to the individual requirements of the institutions. Some software found that they harmonically integrate the educational business processes into single system. But, it has been observed that some systems lackin efficiency, effectiveness, and regional requirements. 1.4.Students and Student’s related business activitiesIn educational processes students are the main entities who are related to all the other activities. The system should have Student Personal Records as one of the main entity. The business process management system should provide proper tools and gadgets to collect required information regarding the students including their personal information for record maintenance. The student’s photo should also be uploaded in the profile. Most of the currently available systems provide such facilities. The other major activities such as certificate management, mark sheet management, attendance management and document management should be maintained under “Student Support Activities”.Students and Students Support ActivitiesStudents PersonalRecordsStudents SupportActivitiesCertificateManagementMark SheetManagementAttendanceManagementDocumentManagementExtra & CocurricularActivitiesStudentsAffairsCareer Office Alumni HostelFigure 1: Business Processes hierarchy with respect tostudentsThe “Hostel Administration”, Alumni Association Management System”, “Career Office” and other student support activities such as “Students Affairs Management” should be maintained under this activity. Some institutions may not have hostel facilities. Based on the institution type and requirements the activities may be added or deleted. But based on the quality assurance requirements, alumni association and career office are most important entities of the system. The activities such as students co-curricular and extracurricular activities shall be considered in students’ affairs management section. Fig 1 depicts the activities related to this business activity.1.5.Staff and Staff Support ActivitiesThe second major entity of the system is all type of staffs. The staff members play the second major role in the system. Based on the performances of the staff, the number of students increases every year. The “Staff Personal Information System” should contain all the details of the staff members. Their qualification, nature of appointment, salary and other benefits should be clearly updated to this system. The increments and other allowance should be clearly mentioned in the database so as to generate the expenses reports and budgets. The type (academic, administrative, support), nature (full time, part time) and rank will help to generate the required reports as and when required. Fig 2 shows the staff and staff related activities.Staff and Staff Support ActivitiesStaff Personal Records Staff Support ActivitiesAdmin Activities Non AcademicActivitiesAcademicActivitiesSalary &IncrementsResearchActivitiesFigure 2: Staff Support Business Processes1.6.Financial ActivitiesThe financial activities such as fees collection and management, payroll management system and other income and expenses system should be maintained properly under this activity. This is the major activity that is linked to all the services of the higher education. The income and expenditure account related to each and every area of the higher education business process should be maintained in order to fulfill the mission and vision statements. There should be explicit link between the financial provisions, budgets to the strategic action plans of the higher education provider.The “Fees Collection & Management” is the most important factor that affects the whole educational activities, in particular, in private higher education providers. The fees generation is the major issue that to be addressed in the system. The student’s particular regarding their mode of study, fees payment, discounts if any should be maintained properly. As the discounts differ for each student, it has been observed that the finance department faces problems in fees generation. The higher education institutions aims and objectives shall be met only on proper fees generation and collection. The student’s fees play the vital role in meeting the budget and other expenses. Thus, the proper fees generation system should be implemented in the system. The fees management system should have the proper queries and reports in such a way that they can be formulated and printed at any point of time.The staff personal information should be linked to “Payroll Management System” of the financial activities. The staff salary shall be generated at the end of every month and approved digitally. The allowances for the staff’s other activities such as research and consultation, field trips and other staff development activities shall be updated manually every month based on their performance. This will help the financial administration department by all means. The time and work will be reduced considerably. Fig 3 reflects the Financial Activities involved in the educational business processes.These financial activities vary based on the size and type of the institution. The institution with more academic and support activities may have more financial activities.Financial ActivitiesStudents Related Staff RelatedAllowances &AdvancesSalary &IncrementsResearchSupport Fees CollectionFigure 3: Major Financial Activities1.7.Academic Learning ProcessThe “Course Administration System” should have the details of the courses selected by the students at each level and each semester. This system should contain the course code, course name, credit hours, practical session, prerequisite, course level and course major. This should be interrelated to the “Timetable Scheduling System” of other activities. Based on the expected number of students to register for the particular semester, the courses should be automated with the help of timetable scheduling system. The activities such as “Classroom Management System”, “Lab Management Systems” shall be maintained under this academic learning. Fig 4 shows the major activities under this area.Academic LearningCourse Management Timetable SchedulingExam SchedulingCourses Department ClassroomManagemenLabsManagementFigure 4: Academic Learning Related BusinessProcesses1.8.Other ActivitiesThe other activities such as “Quality Assurance Management System”, Inventory, Building and Provisions Management System, Library Management Systems shall be maintained under this activity system.V.PROPOSED MODELThe following model has been proposed based on the findings. We have defined a model by considering business processes of a higher education provider in general for integrating such business processes into a single affordable information system.Activity Diagram of the Model:FinanceActivities EBPMSStaff ActivitiesStudents ActivitiesOtherActivitiesAcademicLearning Support ActivitiesFigure 5: Activity Diagram of the ModelVI.CONCLUSIONThus Information technology development has made the business processes more stable and creative. In particular, educational business activities have been developed enormously. Due to increasing business challenges, the business key people have been stimulated to innovate new business strategies to manage business activities effectively and efficiently. Current business process approaches and models define enterprise activities with respect to potential applications. The business organizations select their business process systems based on their strategic aims, objectives and the nature of the business.Managing such business activities through proper information system has nevertheless vital role in business successes. The information technology has tremendous growth in past decades and continually improving and changing drastically. In this situation, managing business processes need critical evaluation on available systems for proper integration. Apart from that, there is a need to integrate all business processes into an enterprise application system “a single information system” to achieve their goals successfully.ACKNOW LEDGEMENTWe would like to thank Sur University College Management for their financial and moral supports for completing this research. We would also like to thank the dean of Sur University College for his extensive supports in conducting the research activities in the institution.REFERENCES[1].Dan, F. Gittler, and F. Toumani (Eds.):ICSOC/ServiceWave 2009, LNCS 6275, pp. 370–384, 2010. © Springer-Verlag Berlin Heidelberg2010.[2].Cale, E.G., Kanter, J., (1998) – “AligningInformation Systems and Business Strategy: A CaseStudy” – Journal of Information Technology Management – Vol IX, Number 1.[3].Henderson, J.C., Venketraman, N., (1999) –Strategic Alignment: Leveraging Information Technology for Transforming Organization – IBMSystem Journal, Vol 36, No 2 & 3.DOI:10.1147/sj.321.0002.[4].Hollander, A.S., Denna, E.L., Cherrington, J.O.,(2000) – Accounting, Information Technology andBusiness Solutions – 2e – Irwin McGraw Hill –ISBN: 0071164545.[5].Kalpan., J.M., Roberts, R.P., Sikes, J., (2008) –“Managing IT in a Downturn: Beyond Cost Cutting” – The Mckinsey Quarterly – Vis ited andretrieved from.[6]./article_print.aspx?L2=13&L3=13&ar=2196.[7].Sandoe, K., Corbitt, G., Boykin, R., (2001) –Enterprise Integration – John Wiley & Sons – ISBN:0471359939.[8].Vom Brocke, Jan and Recker, Jan C. and Mendling,Jan (2010) Value-oriented process modeling :integrating financial perspectives into businessprocess redesign.Business Process ManagementJournal, 16(2). pp. 333-356. Copyright 2010 Emerald. DOI:10.1108/14637151011035633.[9].Zott, C., A mit, R., Massa, L., (2010) – “TheBusiness Model: Theoretical Roots, Recent Developments and Future Research” – Workingpaper WP – 862 – IESE Business School.[10].Sommerville –Software Engineering – 8e – (2009) – Pearson Education.[11].Alan Dix, Janet Finlay, Abowd, G.D., Beale, R.(2008) – Human Computer Interaction – 3 e –Pearson Education – ISBN: 81 – 317 – 1703 – 8 [12].Academia ERP – Campus Management System –Serosoft, .Dr. Salah Alkhafaji – AssociateProfessor Dr. Salah Alkafaji,working for Sur University holdsBachelor degree in ComputerControl Engineering from theUniversity of Technology (Iraq)1984, Master degree in Computer Engineering from London College-Kensington University College (UK) 1999, and Ph.D degree inManagement Information Systems from London College-Kensington University College (UK) 2003.Dr. A lkhafaji held several academic and administration positions: Computer Control and Systems Senior Engineer for (8) years in the Military Industries Corporations (Iraq), IT manager for more than (6) years in the Military Industries Corporations (Iraq), He worked as Assistant Dean for Students' Affairs and Administrative Affairs - SUC since (August 2008), chair person of Information and technology department - SUC for more than (3) years, and More than 20 years of teaching experience in several universities. He is a member in different professional societies: Iraqi Engineering Association (IEA), Iraqi Engineering Union (IEU), and Iraqi Computer Association (ICA). Dr. Alkhafaji presented more than (14) papers in conferences and seminars, Published (8) research papers, (2) handbooks, and (3) articles in journals, and He developed a software system for educational hypermediaB. Sriram – is working for SurUniversity College, Sultanate ofOman as Lecturer since 2004 andQuality Assurance Officer since 2009.He has 20 years of teachingexperience in Mathematics and ITsubjects. He has published 14 research papers in peer reviewed national and international journals and presented 10 papers in national and international symposiums.He is an active researcher in his work profile (Quality Assurance), teaching areas (Information Systems and Technology) and in specialization (Mathematics and Education).。

哲学新角色和心理手段评价IJMECS-V5-N7-4

哲学新角色和心理手段评价IJMECS-V5-N7-4

I.J.Modern Education and Computer Science, 2013, 7, 34-40Published Online September 2013 in MECS (/)DOI: 10.5815/ijmecs.2013.07.04Evaluation: The New Philosophical Roles &Psychological MeansPrashant M. DoliaAssistant Professor, Department of Computer Science & Applications, Maharaja Krishnakumarsinhji BhavnagarUniversity, Bhavnagar Gujarat, IndiaEmail: prashant_dolia@Abstract—Evaluation Roles and Means are very broad. It concerns with n number of attributes. This paper discussed the relationship between evaluation & research, philosophy of evaluation, physiology of evaluation, Evaluation in applied psychology. In the above context, how the basic logic of evaluation is set with evaluation fields and the phases of evaluation process.Index Terms—Evaluation, philosophy of evaluation, psychology of evaluation, Evaluation fields, Evaluation phases.I. INTRODUCTIONEvaluation means many things to many people. According to Shadish W.R, Cook T.D, Leviton L.C [1] “Evaluation-More than any Science- is what people say it is, and people currently are saying it is many different things”. According to Torsten Husen and Neville Postlethwaite [2], “The process of defining the roles and the means of evaluation is almost as large as that of teaching.” To understand the concept of evaluation Nyberg.D [3] states, “the teacher is like a banker who should also control evaluation which is the currency of the classroom (and greater educational) economy. The evaluations are the loan notes that the student repays with interest and the bank may call at any time. In this system of exchange it is very likely that if the student shows great interest i. e. pays lot of attention, then the loan of positive evaluation is secure.”A.Evaluation ConceptsIt is continues process of improvements in concepts of evaluation over the years. From surveys and studies of concerned literature, it is found that these improvements have evolved primarily through interaction of evaluation practices with three other aspects. In one such interaction, evaluation practices have been affected by the acceptance of various learning theories and approaches. A second interaction has been that of evaluation practices with roles accepted for evaluation. The third interaction has been between evaluation practices and technical developments in measurement and evaluation itself. B.Philosophy & Psychology of Evaluation Philosophy based on truth and reality. Roles are assigned to researchers, evaluators, candidates, parents and decision making body like government with the use of philosophy. Basic logic of evaluation can be set after the roles are assigned. Psychology is based on reasoning. Psychological means can be determined by various phases of evaluation process. New Psychology roles and psychological means combined to gather, reconstruct the concept of evaluation.This paper discussed the use of basic evaluation concepts applied for evaluation, basic logic of evaluation can be set philosophically and new psychological roles and means of candidate and evaluator to complete the evaluation process.A balance must be struck between candidate and evaluation process. When candidate becomes an end in itself, the balance between candidate and process is upset, and process is a slighted partner. When a balance has been struck between candidate and process, evaluation become comprehensive and complete. The extent to which candidates know and comprehend things, and the extent to which they can do such things as think autonomously, use prior knowledge to solve new problems and to make decisions, are considered integral in this evaluative scheme.II. THE RELATIONSHIP BETWEENRESEARCH AND EVALUATIONThe relationship between research and evaluation need to be made explicit. It is an evident that many of the activities associated with evaluation in education are also associated with educational research. In many instances, no distinctions are made between evaluation and research. Let us first look at the broad objectives of research and of evaluation as they can now be observed in the field of education. It appears to be well agreed that the objectives of educational research is to add to our knowledge of the practices and methods of education. Whether new knowledge created by educational research, should have some immediate usefulness or whether such research is sufficiently justified by the potential value of any new knowledge orby the satisfaction of any ideal curiosity. Thorstein [4] suggested distinctions between applied researches and Basic research are often based on consideration of immediate utility against the possible usefulness of specific new knowledge.Evaluation studies are made to provide a basi s for making decisions about alternatives and question of utility. Regardless of the lack of precision in thinking, providing information for choice among alternatives remains the basic and utilitarian purpose of evaluation studies. It is necessary to regard research, particularly basic research, having a distinctly different objective than evaluation. Often the information to be provided by an evaluation study is needed because deci sion must be made. This decision-making is not usually an integral part of the evaluation study itself, but subsequent activity. This fact might lead to the conclusion that an evaluation could avoid questions of value and utility, leaving them to the decision-maker and not need to be distinguished research, either basic or applied. Evaluation studies differ from research in the manner in which value questions are involved- especially value questions that under gird choices about what information or knowledge are sought. The implications of primacy of utility in evaluation studies and the relative low consideration in research are profound. Although there are differences in points of view among behavioral scientists and ideal research study in the following manner: Hemphill [5]1.Problem selection and definition is theresponsibility of an individual doing the research.Many people are involved in its definition andbecause of the complexity the problem initially isdifficult to define.2.Hypotheses to the problem are derived bydeduction from theories or by induction from anorganized body of knowledge.3.Value judgments by the researcher are limited tothose implicit in the selection of the problem aswell as in the development and implementation ofprocedures of the study.4.The study is unique to a situation and seldom canbe replicated.5.The data to be collected are determined largely bythe problem and hypothesis.6.Relevant variables can be controlled ormanipulated by systematic effects of othervariables and they are eliminated by randomization.Evaluation studies are often undertaken in response to a need to know the usefulness of invented alternatives to an existing mode of action that has resulted from some combination of old and new knowledge. An evaluation provides test of generalization and thus goes beyond the point at which most research stops- the verification of the hypotheses within only a very controlled and restricted situation. In this respect, evaluation contributes side by side, but with distinctly important way, to the development of an education science. Both research and evaluation studies share many characteristics of method and approach. Both contribute to expand the knowledge and stimulate evaluation process.III.PHILOSOPHY OF EVA LUATIONWe all presumably subscribe to a democratic philosophy of living. One aspect of democracy is a concern for the worth and integrity of every individual. Our evaluation activity can be consistent with this democratic philosophy. In a class room there can be heterogeneous group and level of each student can be different. Today, teacher constantly reminded inabilities of poor student and keeps up with rest of the class. It is a very slow process and students are not directly responsible for slowness. It is important that we evaluate student such away that the individuals feel about their constant failure. Current evaluation method is inconsi stent with both of our democratic philosophy and everyday life.Psychologi sts are generally argued that all individuals need successful experiences, in order to carry out the normal living. If individuals do not have experiences in one way, they will attempt to do in another way. Many students are not comfortable with current evaluation pattern so, they are turn to other types of undesirable behavior.The solution of this problem would seem to be the teacher should be aware of individual differences and flexible enough to incorporate any level of student’s evaluation. The current student populations are so heterogeneous that the individual achievement in any given classroom is very comprehensively. Troyer [6] has summarized evaluation activities as follows:1.The major purpose of evaluation is to improvelearning.2.Evaluation should be done with group rather thanto an individual.3.Evaluation process identifies individual strengthsand weaknesses of each student.4.Evaluation of progress is on the basis of anindividual ability.The well known philosopher Dressel. P. L. [7] discusses the basic philosophy of evaluation as under:1.In democracy each individual is evaluated in suchan away that, they contribute to society and alsoreceive personal satisfaction.2.The judgments required in assessing anindividual’s potential are complex in their composition, difficult to make and filled with error.Such error can be reduced but never eliminated.Hence any evaluation can never be consideredfinal.posite assessment by a group of individuals ismuch less likely to be in error than assessmentmade by a single person.4.In a democracy every form of evaluation hascritics, which is a spur to change and improved.IV.PHYSIOLOGY OF EVA LUATIONTo make evaluation activities most effective, evaluator considers best possible techniques to be used with what we know to be the best and most effective psychological principles. For sound evaluation procedure, the following are the principles of psychology:1.In order to teach a child to read, he has to havereached a certain stage of mental and physicaldevelopment. In the same manner, evaluation ismost successful when the student is ready for it. Astudent is ready when he understands and acceptsthe values and objectives involved. Guilford [8]2.It has long been known that people tend to carryon those activities which have success associatedwith their results. This has been known asThorndike’s Law of Effect. Thus if certain testdemand rote memory, the student becomesmemorizes. If a test on the other hand, requiresstudents to apply principles, interpret data or solveproblem then student performs very well in suchtype of evaluation.3.The third psychological aspect of evaluation to bediscussed is motivation. The motivation ofstudents is one of the most important andsometimes the most difficult to handle of allproblems related to evaluation. A research studyhas shown that when a student is really motivated,performance is much closer to his real topperformance than when motivation is lacking.Little [9]4. A forth-psychological factor or principle, whichhas implications in evaluation, is the learning ismost efficient when there is activity on the part ofthe learner. When test results are not placed onanswer sheets and run through a scoring machine,teacher nor student learns anything about how thestudent performed on the test. Important is thetotal score that the machine operator wrote or themachine printed on the answer sheet Downie [10].V.EVA LUATION IN APPLIED PSYCHOLOGY Just as it was previously observed that a good grasp of probability and statistics had become an essential tool for a great deal of work in applied psychology, so we now find that knowledge of the logic of evaluation and of some of its specialized methodologies are increasingly crucial for much investigation in applied social sciences Scriven, Michael [11]. Funding agencies letting evaluation contracts or assigning staff to evaluation increasingly want to know not only what is happening when an intervention is supported, and exactly what causes the results - familiar questions for applied social science Downie [10]. 1.Whether the intervention is worth what it cost.2.Whether there are unintended bad results as wellas planned good ones,3.Whether the methods used in the intervention wereproper by current professional and ethicalstandards.4.Whether there are better ways to do the same thing. This is the domain of evaluation and none of those questions can be answered reliably without use of its special logic and special methodologies.VI.THE BASIC LOGIC OF EVA LUATIONIn order to reach evaluative conclusions it is necessary to establish or to identify the following kindsof premises: Factual premises (e.g., about nature, performance or impact) and Value premises (e.g., about the relevant legal or scientific principles).There are usually many of these premises in the evaluation of complex entities (or entities with complex functions). To obtain the required kind of overall evaluative conclusion, it is necessary to combine all of them by means of what is called 'the internal synthesi s process.' Scriven Michael [11]. This synthesis step is one of the key logical processes in evaluation and is a long way from the simple deduction and stati stical inference that are more common elements in scientific inference.Factual premises in a field like program evaluation are commonly established using the standard procedures of social science with the assistance of other disciplines such as history and jurisprudence. Value premises usually come from one or more of eight sources:1.Legal principles2.Scientific and mathematical standards of truth(especially relevant when the program disseminates information or is based on scientifictheories or common assumptions)3.Professional, cultural, or organizational standardsof proper conduct (e.g., the APA testing standards)4.Needs assessments5.Definitions (which provide linguistic standards ofpropriety)6.Market research7.Logic8.EthicsAgain, the social sciences are a common source for several of these types of values e.g., the scientific standards of truth used in judging the quality of the assertions--or assumptions--built into or propagated by the program. From psychology, we frequently encounter premises about maturational rates, cognitive processes, or leadership research. The logic of evaluation comes in with the frequent need to balance these value considerations when they conflict: that logic originates in jurisprudence and moral reasoning, but hasbeen expanded to cover other fields of evaluation besides these, e.g., evaluation of alternatives in high-stakes decision-making Scriven Michael [11].VII.EVA LUATION FIELDSThe better-known fields of applied evaluation vary considerably in quality as well as in their relevance are dependent on the social sciences, while personnel evaluation is heavily dependent on the social sciences and high degree of objectivity and utility. Remaining is independent from these dimensions and close to pseudo-evaluation (e.g., wine taste, art criticis m). There are partially valid evaluations like architectural criticis m, portfolio management and literary criticism. There are highly valid evaluations but are not dependent on the social sciences (e.g., the reviews done by appellate courts, the evaluations of claimed proofs of Fermat's Theorem in mathematical journals). All the eight applied fields equally important for practical and logical reason: they fall into two groups. The first Six are the fields of program, personnel, performance, policy, proposal, and product evaluation (the latter including technology assessment). The remaining two are:1.Interdisciplinary evaluation--the evaluation of theentities that are most important to faculty’s such astheories, hypotheses, classifications, data, researchdesigns and results, practitioners, contributions,and journals--and of the faculty itself.2.Meta-evaluation, the evaluation of evaluationsthemselves, a practice that demonstrates theimpulsive nature of evaluation and the philosophical reliability of its practitioners.The first is the backbone of all disciplines--it is what makes them disciplines. The second is the backbone of evaluation--it is what makes it consistent by making it practice what it preaches.The first Six fields--the conventional fields of evaluation--program evaluation is the one with the largest associated job market at the moment, with personnel evaluation (an Human Resources staple) and performance evaluation (especially in the educational area, where its academic fountain is often referred to as 'tests and measurement') coming next Robert [12].VIII.EVA LUATION IN THE SYSTEM OFEDUCATIONEvaluation chart is given in Fig. 1. Evaluation methods must be provided to accommodate candidate with special needs and interests. Each candidate having unique identity. Special curriculum expectations and evaluation methods may have to be adapted to meet the requirements of candidate.Figure 1. Evaluation ChartVIIII.CHARA CTERISTICS OF EVA LUATIONThe Education Commission (1964-66) has understood that, “Evaluation is continues process, forms an integral part of the total system of education and it is intimately related to educational objectives. The techniques of evaluation are means of collecting evidence about the student’s development in desirable directions. These techniques are valid, reliable, objective and practicable”. The following are the characteristics of Evaluation:C.Evaluation includes Academic and Non-AcademicFactors:Evaluation is essential in the never ending cycle of formulating goals, measuring progress towards them and determining the new goals which emerge as a resultof new warnings. Evaluation involves measurement that means objective qualitative evidence. But it is broader than measurement and implies that considerations have been given to certain values, standards and that interpretation of the evidence has been made in the lightof the particular situation.Ev a luat ion in its b road er con cept in c ludes examination of academic and non-academic aspects of education. According to J. Wayne Wright-stone [13], “Evaluation is a technical term, introduced to design a more comprehensive concept of measurement than is implied in conventional tests and examinations.” Evaluation involves the identification and formulation of a comprehensive range of the major objectives of a curriculum. This definition is in terms of studentbehavior and the selection or construction of valid, reliable and practical instruments for appraising the specified phases of student behavior. Academic and Non-Academic factors are mentioned in the table –I TABLE-I A CADEMIC & NON-ACA DEMICFACTORSD.Evaluation is a procedure for improving theproduct:Wiles [14] define evaluation as, “Evaluation is a process of making judgments that are to be used as basis for planning.” It consists of establishing goals, collecting evidence concerning growth or lack of growth towards goals and making judgment about the evidence and revising procedures and goals in the light of judgments. It is a procedure for improving the product, the process and even the goals themselves.E.Correlation between the Educational System andthe System of Evaluation:Evaluation cannot be done in vacuum. It is always with reference to the objectives of a particular system of education. Evaluation has to be very comprehensive in system of education which aims at the many sided development of the personality of student. The colleges concern them not only with intellectual pursuits but also with the emotional and social development of the student, his physical and mental health, his social adjustment and other equally important aspects of his life with all round development of his personality. In a light of these objectives of the system of education, a comprehensive program of evaluation includes:1.Evaluation of the academic subjects.2.Evaluation of the skills.3.Evaluation of Moral and Social Development F.Evaluation is a complex process:In modern times evaluation tends to become a complex process. It needs scientific techniques and tools. It needs the corporate efforts of teachers, students, parents and the administrative staff. It involves an element that brings cohesiveness or coordination in the whole activity Aggarwal. J.C [15].G.The need of Cross-National Evaluations: Evaluative judgments have always been passed upon the relative merits of educational systems in different countries. Apart from the results of the more formalized attempts of the educators to make comparisons, quite a lot of folklore has prevailed, particularly concerning the ‘productivity’ or ‘efficiency’ of the various systems. The need for making cross-national or cross-cultural evaluation in education has grown rapidly for various reasons during the last two decades. Some of the reasons for this need for more accurate evaluation of the outcomes of various educational systems are as follows: International student mobility has increased tremendously during the last few decades. The number of students in Europe and America, particularly from Africa and Asia, has recently grown to tens of thousands. Furthermore, a growing number of young people go for graduation and post graduation in a country other than their native one because of the movement of their parents. The increase in the exchange of university students has led to a growing demand for international baccalaureates whereby university entrance requirements are evaluated cross-nationally.The technical assistance in the educational field provided both multilaterally and bilaterally, has created a demand for techniques by which the ‘quality’ of the educational systems in emerging countries is assessed. There is indeed a strong need for both fruitful theoretical models and international standard by which educational systems are evaluated. The more interesting thing happed in education is an investment in human capital and bring the instrument for economic growth and social change, particularly in the developing countries, the stronger need to develop such models and measuring instruments for evaluation process. So far, many of the studies of the relationship between education and economic growth have been limited to the use of very crude ‘output’ variables – for instance, enrolment and graduation figures. No quality measures have been used until recently; because no internationally valid and applicable instruments for measuring outcomes of instruction are exist.So far, many of the cros s-national variables established are independent ones, many of them pertaining to input of money, phys ical plan and personnel. The situation has been much less satisfactory with regard to output variables. In mos t cas es, enrolment and graduation figures have been used as evaluative measures. Harbison [16] stated that attempt should be made to devise internationally valid criterion measures, which would make it possible to evaluateuniformly the educational practices including the standards of the different countries. The standard procedure in any evaluative process is of course, to begin with an analysis of the objectives, which are to be achieved in the educational systems under consideration. But since the curriculums and syllabuses in most of the participating countries are drawn up at the national level, the objectives vary in educational traditions but also upon variations in social and economic structure and values, which are implicit in the educational policy as stated by central authorities or leading national bodies.X.PHASES OF THE EVA LUATION PROCESS Although evaluation is not strictly sequential, it can be viewed as a cyclical process including four phases: preparation, assessment, evaluation, and reflection. The evaluation process involves the teacher as a decision maker throughout all four phases.A.Preparation Phase:In this phase, decisions are made by identifying what is to be evaluated, the type of evaluation (formative, summative, or diagnostic) to be used, the criteria against which student learning outcomes will be judged, and the most appropriate assessment strategies that provide student’s progress information collectively. The teacher's deci sions in this phase form the basis for the remaining phases.B.Assessment Phase:During this phase, the teacher identifies information-gathering strategies, collects student products, constructs or selects instruments, administers them to the student, and collects the information on student learning progress. The teacher continues to make decisions in this phase. The identification and elimination of bias (such as gender and culture bias) from the assessment strategies and instruments, and determining where, when, and how assessments will be conducted are examples of important considerations for the teacher in this phase of evaluation.C.Evaluation Phase:During this phase, the teacher interprets the assessment information and makes judgments about student progress. Based on the judgments or evaluations, teachers make decisions about student learning programs and report on progress to students, parents, and appropriate school personnel.D.Reflection Phase:It allows the teacher to consider the extent to which the previous phases in the evaluation process have been successful. Specifically, the teacher evaluates the utility and appropriateness of the assessment strategies used. Such reflection assists the teacher in making decisions concerning improvements or modifications to subsequent teaching and evaluation.All four phases are included in formative, diagnostic, and summative evaluation processes Walter [17]. TheyXI.CONCLUSIONSThis paper found that there is a tight coupling between evaluation and educational research. In many instances, no distinction between evaluation & research. Today evaluation method is inconsistent with both our democratic philosophy and everyday life. Evaluation in applied psychology is the domain of evaluation and use special logic and methodology to find reliable evaluation. The teacher should be aware of individual differences and flexible enough to incorporate any level of student’s evaluation. The current student populations are so heterogeneous that the individual achievement in any given class room is vary comprehensively.Internal synthesis process is one of the key logical processes in evaluation and is a long way from the simple deduction and statistical inference that are more common elements in scientific inference. Applied evaluation highly depends on social sciences while personnel evaluation heavily depends on high degree of objectivity and utility.REFERENCES[1].Shadish W.R, Cook T.D, Leviton L.C, “GoodTheory for Social program Evaluation”Foundation of program Evaluation, Theories ofPractice, Sage Publication P. 36-67, 1991.[2].Torsten Husen and Neville Postlethwaite,” TheInternational Encyclopedia of Education”,Supplementary Volume – 1, Published byPergamon, ISBN: 9780080349749, 1988-12-01. [3].Nybery. D, “Power Over Power: What powermeans in ordinary life, how it is related to actingfreely and What it can do to contribute renovatedethics of education”, Ithaca, NY: CornellUniversity Press, 1981.PreparationPhaseE valuationPhase。

人工智能之知识图谱

人工智能之知识图谱

图表目录图1知识工程发展历程 (3)图2 Knowledge Graph知识图谱 (9)图3知识图谱细分领域学者选取流程图 (10)图4基于离散符号的知识表示与基于连续向量的知识表示 (11)图5知识表示与建模领域全球知名学者分布图 (13)图6知识表示与建模领域全球知名学者国家分布统计 (13)图7知识表示与建模领域中国知名学者分布图 (14)图8知识表示与建模领域各国知名学者迁徙图 (14)图9知识表示与建模领域全球知名学者h-index分布图 (15)图10知识获取领域全球知名学者分布图 (23)图11知识获取领域全球知名学者分布统计 (23)图12知识获取领域中国知名学者分布图 (23)图13知识获取领域各国知名学者迁徙图 (24)图14知识获取领域全球知名学者h-index分布图 (24)图15 语义集成的常见流程 (29)图16知识融合领域全球知名学者分布图 (31)图17知识融合领域全球知名学者分布统计 (31)图18知识融合领域中国知名学者分布图 (31)图19知识融合领域各国知名学者迁徙图 (32)图20知识融合领域全球知名学者h-index分布图 (32)图21知识查询与推理领域全球知名学者分布图 (39)图22知识查询与推理领域全球知名学者分布统计 (39)图23知识查询与推理领域中国知名学者分布图 (39)图24知识表示与推理领域各国知名学者迁徙图 (40)图25知识查询与推理领域全球知名学者h-index分布图 (40)图26知识应用领域全球知名学者分布图 (46)图27知识应用领域全球知名学者分布统计 (46)图28知识应用领域中国知名学者分布图 (47)图29知识应用领域各国知名学者迁徙图 (47)图30知识应用领域全球知名学者h-index分布图 (48)图31行业知识图谱应用 (68)图32电商图谱Schema (69)图33大英博物院语义搜索 (70)图34异常关联挖掘 (70)图35最终控制人分析 (71)图36企业社交图谱 (71)图37智能问答 (72)图38生物医疗 (72)图39知识图谱领域近期热度 (75)图40知识图谱领域全局热度 (75)表1知识图谱领域顶级学术会议列表 (10)表2 知识图谱引用量前十论文 (56)表3常识知识库型指示图 (67)摘要知识图谱(Knowledge Graph)是人工智能重要分支知识工程在大数据环境中的成功应用,知识图谱与大数据和深度学习一起,成为推动互联网和人工智能发展的核心驱动力之一。

西安交通大学与香港理工大学合作举办

西安交通大学与香港理工大学合作举办

西安交通大学与香港理工大学合作举办“信息管理理学硕士”(MOE61HK1A20020395O)2017年度招生简章一、项目介绍信息管理是一个新兴的复合学科,着眼于将信息技术运用于管理中,提高企业管理效率和促进资源利用。

其主要目标为:培养具有广泛的科技知识和现代管理理论基础的高素质管理人才,使他们掌握信息管理理论和方法,掌握现代信息系统及技术手段,能够对信息进行分析、设计、实施和管理,并能够在信息资源的组织和管理以及信息产品的生产、经营、服务等环节进行创造性劳动。

信息管理专业毕业的学员,能成为:信息管理和技术方面的经营、战略计划制定者,电子商务系统的战略管理者,信息系统的管理决策者,信息技术专家等。

“信息管理理学硕士”项目由西安交通大学与香港理工大学合作举办,两校合作成立的西安通理国际深造培训学院(西安交通大学通理项目管理中心)负责实施,西安交通大学电信学院与香港理工大学工程学院负责学术及教学支持。

西安交通大学以其百余年悠久的历史、浓郁的文化、雄厚的师资、淳朴的校风享誉海内外,是我国中西部地区唯一一所以建设世界知名高水平大学为目标的大学。

西安交大信息管理学科具有强大的教学和科研师资队伍,在电子商务、知识和信息管理、管理信息系统、决策支持系统等领域颇有盛誉。

西安交大电信学院的学科几乎涵盖整个电子信息领域的所有新兴学科,肩负着为国家培养该领域高层次人才、进行高水平科学研究的双重任务。

百年来,电信学院为国家输送了大批全面发展的、具有创新能力的专业人才和一批具有成为科技将帅潜力的人才,为本世纪中叶交大进入世界一流大学行列做出了应有的贡献。

香港理工大学位于亚洲金融贸易的核心地,是一所以实用为主及与工商界联系密切的大学。

建校80年来,香港理大已为社会培育了40多万多名毕业生,在读学生28000余名,为香港高校人数最多的大学。

香港理大于1989年开始设立信息管理专业,至今已有众多毕业生任职于香港政府及其它各行业,成为信息管理和技术方面的战略决策者和专家。

Call_for__papers_Education_reform_in_Chinapdf

Call_for__papers_Education_reform_in_Chinapdf

1st Call for PapersASIA PACIFICJOURNAL OF EDUCATIONDecember 2009 Special IssuePrimary and Secondary Education Reform in China: Globalisation with Chinese Characteristics Abstracts and expressions of interest due by: 31 December 2008 Papers for full refereeing due by: 30 April 2009Special Issue Editors:Professor Yongbing LIU1Assistant Professor Yanping FANG21Northeast Normal University, China2National Institute of Education, SingaporeEDITORIAL STATEMENT FOR THEASIA PACIFIC JOURNAL OF EDUCATION SPECIAL ISSUEPrimary and Secondary Education Reform in China:Globalisation with Chinese CharacteristicsEditors: Yongbing Liu & Yanping FangOver the past 10 years, China’s primary and secondary education have changed as rapidly as its politics, economy, culture and society. The forces of globalisation, modernisation and economic development have led to substantial changes in China’s educational policy and governance, curriculum and pedagogy. These changes also impact on the everyday lives and practices of students and teachers.School governance, for example, has been diversified with a clear shift towards the local. The school curriculum has been overhauled with a strong orientation towards student autonomy (particularly since 1999). There has been a clear shift in the emphasis from teacher-centred to student learning-oriented pedagogy, and from knowledge transmission to knowledge construction.More recently, student-teachers are being encouraged to work in the countryside after graduation in a bid to improve the overall quality of education and to address the increasing gap in education between the rich and poor regions. They are offered incentives such as paid living expenses, exemption from tuition fees, and security of teaching jobs.However, these changes and other relevant research are seldom reported in the international research literature.How do policy makers and educationists in China deal with the relationship between the global and national, Chinese and western, central and local in terms of educational tradition, policy and governance? How do schools, teachers and students cope with changes in their practices in terms of curriculum, classroom pedagogy? And what is the impact of these changes on their everyday lives?This special issue of the Asia Pacific Journal of Education (APJE) provides a platform for a critical review of empirical research that addresses these questions broadly. Specifically, we are interested in receiving:• Research papers reporting original research work that leads to an understanding and/or improvement of the recent educational changes and outcomes in China(especially in disciplines or school subjects such as mathematics, science, socialscience and languages), using both descriptive/interpretative methodologiesand quantitative/confirmatory research methodologies and analytic frameworks as well as multidisciplinary and interdisciplinary approaches;• Critical review papers of the relationship between the global and national, Chinese and Western, central and local in terms of educational tradition, policyand governance in schools and classrooms. We welcome reviews of boththeoretical and empirical research carried out in China.About the Editors of the Special IssueYongbing LIU is currently Professor at Northeast Normal University, China. Prior to that, he worked at the National Institute of Education, Singapore, the University of Queensland, the University of Tasmania, Australia, and Jilin University China for many years. He got his master’s degree in applied linguistics from Northeast Normal University, and PhD in language education from University of Queensland. His major research interests are in language curriculum and pedagogy. He has published over 30 academic papers in journals such as Language and Education, Discourse, Pedagogy, Culture and Society, Language Policy, and Chinese Education in the World; and chapters in books including the International Handbook of Literacy and Technology (Lawrence Erlbaum Associates), Struggle Over Difference (SUNY), and Analyzing Identities in Discourse (Benjamins). He has also published two monographs and several textbooks in China. Yanping FANG is Assistant Professor at the Centre for Research in Pedagogy and Practice and with the Curriculum, Teaching and Learning Academic Group at the National Institute of Education, Singapore. She received her PhD from the College of Education, Michigan State University, with the support of a Spencer Research Training Grant. Her research has been focused on teacher learning and teacher development from international comparative perspectives. She has published book chapters and peer reviewed journal articles on education reform and teacher development in China as well as East Asian pedagogies. Currently, she is principal investigator of several intervention and research projects including one on lesson study in Singapore, and another on mathematical problem-solving in Singapore classrooms.ASIA PACIFIC JOURNAL OF EDUCATIONSCOPEOver the past half century, the education systems of the countries in the Asia-Pacific region have been engaged in rapid and near continual change. The forces of industrial modernity, postcolonialism and globalisation have led to major shifts in educational policy and governance, curriculum and pedagogy, and in the everyday lives and practices of students and teachers. The Asia Pacific Journal of Education is a platform for the critical analysis and review of these processes. Key issues include: cultural and linguistic continuity and change; ethnicity, class, gender and diversity in education; systems and infrastructure development; cultures and structures of educational organisations; educational policy responses; migrant and indigenous education; historical and current educational relationships between Asian and Pacific countries and systems; relationships with the educational ideas and systems of the “North” and “West”; and the impacts of new communications media and technologies, new and hybrid cultural forms and practices, and globalised economies on education. APJE welcomes research and scholarly articles and essays; reviews of research; issues pieces, short editorial commentaries and rejoinders; and book reviews.EXECUTIVE EDITORSAllan Luke –Queensland University of Technology, AustraliaS. Gopinathan –National Institute of Education, Nanyang Technological University, Singapore(From Vol. 29, No. 2)Jason Tan –National Institute of Education, Nanyang Technological University, Singapore David Hogan –National Institute of Education, Nanyang Technological University, Singapore REVIEW EDITORDennis Kwek – National Institute of Education, Nanyang Technological University, SingaporeINTERNATIONAL ADVISORY BOARDRobin Alexander – University of Cambridge, UKPhilip Altbach – Boston College, USAKathryn Au – University of Hawaii at Manoa, USAMark Bray – UNESCO, ParisSuresh A Canagarajah – City University of New York, USALorna K S Chan – Hong Kong Institute of Education, Hong KongJoy Chew Oon Ai – National Institute of Education, SingaporeZongyi Deng – University of Hong Kong, Hong KongKris Gutiérrez – University of California Los Angeles, USAAnne Hickling‐Hudson – Queensland University of Technology, AustraliaRyuko Kubota – University of North Carolina at Chapel Hill, USAEva Lam – Northwestern University, USAMolly N N Lee – UNESCO, BangkokYoonmi Lee – Hongik University, KoreaYongbing Liu – Northeast Normal University, ChinaRupert Maclean – UNESCO‐UNEVOC, GermanySimon Marginson – University of Melbourne, AustraliaShyam Menon – University of Delhi, IndiaYoshiko Nozaki – State University of New York at Buffalo, USAAlastair Pennycook – University of Technology Sydney, AustraliaFazal Rizvi – University of Illinois at Urbana Champaign, USALinda Tuhiwai Smith – University of Auckland, New ZealandJason Tan Eng Thye – Nanyang Technological University, SingaporeKonai Helu Thaman – University of the South Pacific, FijiKelleen Toohey – Simon Fraser University, CanadaGeoff Whitty – Institute of Education, UKTing‐Hong Wong – Academia Sinica, TaiwanRui Yang – University of Hong Kong, Hong KongEDITORIAL CORRESPONDENCEEditorial correspondence should be sent to: Lin Ai‐Leen, Editorial Administrator, Asia Pacific Journal of Education, Office of Education Research, National Institute of Education, Nanyang Technological University, 1 Nanyang Walk, Singapore 637616 or by email to APJE@.sg. Details concerning the preparation and submission of articles can be found in the Instructions for Authors section at/journals/authors/capeauth.aspNOTES FOR CONTRIBUTORSResearch articles should be between 6,000 to 8,000 words, and should include an abstract of 250 words or less and keywords of 5 words or less. All submissions should be written in English and must conform to the format of the Asia Pacific Journal of Education.Contributors should send a file copy of the manuscript to the Editorial Administrator at APJE@.sg. Only electronic submission of articles will be considered. A separate first page should include the full title, a short title for use as a running head, author name(s), institutional and e‐mail address(es), and indicate the author responsible for correspondence related to a manuscript submission. The title should be on page 1 andnot exceed 10 words (50 letters), and should be followed by an abstract of 100 to 200 words.The full postal address of the author who will check proofs and receive correspondence and offprints should also be included. All pages should be numbered. Contributors should be aware that they are addressing an international audience. Jargon should be avoided and “local” terminology clarified for an international audience. Authors should use non‐discriminatory language. Articles should be original work, where appropriate should acknowledge any significant contribution by others, and should not have been accepted for publication elsewhere.•Formatting guideo Any consistent spelling style is acceptableo Follow the APA Manual for punctuationo A Word template is available for this journal•Reference style informationo APA reference styleo Quick guideIf you have any questions about references or formatting your article, please contact authorqueries@.Tables and captions to illustrations. Tables must be typed out (double‐line spacing) on separate sheets and not included as part of the text. The captions to illustrations should be gathered together and also typed out on a separate sheet. Tables should be numbered by roman numerals and figures by Arabic numerals. The approximate position of tables and figures should be indicated in the manuscript. Captions should include keys to symbols.Figures. All line diagrams and photographs are termed “Figures” and should be numbered consecutively and given short descriptive captions. Line diagrams should be presented as camera‐ready copy. Photographs should be submitted as clear, glossy, unmounted black and white prints with good contrast range.References should follow the American Psychological Association system (APA Publications Manual, 5th edition), with the only exception that authors’ names should be presented with roman letters, upper and lower case, i.e., they should be indicated in the typescript by giving the authors’ names, with the year of publication in parentheses, e.g., Smith (1994); or if there are more than two authors—Smith, et al. (1994). If several papers from the same author(s) and from the same year are cited, (a), (b), (c), etc. should be listed in full alphabetically at the end of the paper on a separate sheet in the following standard form:For article: Mukundan, M. V. (2003). Democratic decentralization and primaryeducation: A comparison of continuity and change in twodistricts of Kerala (India). Asia Pacific Education Review, 4(1),27‐38.For book: Lin, A. M. Y. (1990). Teaching in two tongues: language alternation in foreign language classrooms. Kowloon: City Polytechnic ofHong Kong.For chapter in edited book: Freebody, P., & Baker, C. (2003). Categories and sense‐making in literacy research and education: Critical literacy and thespaces between people. In G. Bull & M. Anstey (Eds.), Theliteracy lexicon (2nd revised ed., pp. 225‐240). Sydney:Pearson.Titles of journals should not be abbreviated.Proofs will be sent to the authors. They should be corrected and returned to the editor within three days. Major alterations to the text cannot be accepted.Peer Review PolicyAll research articles in this journal will undergo rigorous peer review, based on initial editor screening and anonymised refereeing by at least two anonymous referees. Copyright. It is a condition of publication that authors assign copyright or license the publication rights in their articles, including abstracts, to the National Institute of Education, Nanyang Technological University, Singapore. This enables us to ensure full copyright protection and to disseminate the article, and of course the Journal, to the widest possible readership in print and electronic formats as appropriate. Authors may, of course, use the article elsewhere after publication without prior permission from Taylor & Francis provided that acknowledgement is given to the Journal as the original source of publication, and that Taylor & Francis is notified so that our records show that its use is properly authorised. Authors retain a number of other rights under the Taylor & Francis rights policies documents. Full details of these policies are referred to at /journals/authorrights.pdf. Authors are themselves responsible for obtaining permission to reproduce copyright material from other sources.Books for review can be sent to the Review Editor.The online version of this journal is available from the Taylor & Francis Web site at /journals/titles/02188791.asp。

人工智能在空管中应用的研究进展

人工智能在空管中应用的研究进展

《自动化技术与应用》2021年第40卷第1期综述Survey人工智能在空管中应用的研究进展*王吉豪,王在俊,王乾垒(中国民用航空飞行学院飞行技术与飞行安全重点实验室,四川广汉618300)摘要:在民航飞速发展的同时,空中交通也变得更加复杂、快速、多变,与之相关的种种问题也逐渐显现。

同时,作为近几年取得重大突破的计算机辅助技术,人工智能技术已经广泛地应用于多个领域。

人工智能技术与传统的空管相结合,更有利于构建一个更加安全、有序、高效的智能化空中交通管理系统。

本文主要从国内外空管发展现状、空管系统对人工智能技术的需求以及人工智能在空管系统的应用几个方面进行综述和分析,最后对人工智能技术在空中交通管理中应用所面临的挑战进行了分析和展望。

关键词:人工智能技术;空管系统;计算机辅助技术中图分类号:TP18文献标识码:B文章编号:1003-7241(2021)001-0001-05The Research Progress on The Application of Artificial Intelligence in Air Traffic ManagementWANG Ji -hao,WANG Zai -jun,WANG Qian -lei(Civil Aviation Flight University of China Key Laboratory of Flight Techniques and Flight Safety,Guanghan 618300China )Abstract:With the rapid development of civil aviation,air traffic becomes more complex,fast and changeable,and various prob-lems related to it is gradually emerged.At the same time,as a major breakthrough in computer aided technology in recent years,artificial intelligence technology is widely applied in many fields.The combination of artificial intelligence technol-ogy and traditional air traffic management is more conducive to the construction of a more secure,orderly and efficient in-telligent air traffic management system.This paper mainly reviews and analyzes the development history of air traffic con-trol at home and abroad,the requirements of air traffic management system for artificial intelligence technology and the application of artificial intelligence in air traffic management system,and finally analyzes and prospects the challenges faced by the application of artificial intelligence technology in air traffic management.Key words:artificial intelligence technology;air traffic management system;computer aided technology*基金项目:民航飞行技术与飞行安全科研基地开放基金项目(编号F2018KF06);2019大学生创新创业训练计划项目(编号S201910624009)收稿日期:2019-09-041引言据2019年全国民航工作会议报告,2018年全年乘坐中国民航航班的旅客人数已经达6.1亿人次,全年起降航班架次已经突破1000万架次,继续保持两位数的增速。

软件开发中利用评价设计度量降低不足的数量(IJITCS-V4-N4-2)

软件开发中利用评价设计度量降低不足的数量(IJITCS-V4-N4-2)
Related Work W
The object oriented (O OO) approach h to software e dev velopment as ssures better management t of software e com mplexity and d a likely improvement in project t ou utcomes in ter rms of quality y and timelines. There has s been a lot of research on metrics for OO software e dev velopment in n recent year rs, which sho ows that OO O me ethodology and project outcomes have some e rel lationship [3]. In the OO en nvironment, ce ertain integral l design concepts such as in nheritance, coupling, c and d coh hesion have been argue ed to signifi icantly affect t com mplexity [4]. The conce epts of soft ftware metric cs are well l est tablished, and many me etrics relating g to product t qu uality have be een developed d and used. To T evaluate a me etric's useful lness as a quantitative measure of f

call for papers

call for papers

Call for PapersDear author,This is Journal of Energy and Power Engineering (ISSN1934-8975), created in Dec. 2007. We are interested in various kinds of professional papers about energy and power. The Journal of Energy and Power Engineering, a monthly professional academic journal, is striving to provide the best platform for researchers and scholars worldwide to exchange their latest findings and results.Current Columns InvolveThermal Science; Fluid Mechanics; Energy and Environment; Power System and Automation; Power Electronic; High Voltage and Pulse Power; Sustainable Energy.Information for Authors1. The manuscript should be original, and has not been published previously. Please don’t submit material that is currently being considered by another journal.2. Manuscripts may be 3000-8000 words or longer if approved by the editor, including abstract, text, tables, footnotes, appendixes, and references. The title should not be exceeding 15 words, and abstract should not be exceeding 150 words. 3-8 keywords required.3. The manuscript should be in MS Word format, submitted as an email attachment to our email address.Editorial ProceduresAll papers considered appropriate for this journal are reviewed anonymously by at least two outside reviewers. The review process usually takes 4-5 weeks. Papers are accepted for publication subject to no substantive, stylistic editing. The Editor reserves the right to make any necessary changes in the papers, or request the author to do so, or reject the paper submitted. A copy of the edited paper along with the first proofs will be sent to the author for proofreading. They should be corrected and returned to the Editor within seven days. Once the final version of the paper has been accepted, authors are requested not to make further changes to the text.Submitting of ManuscriptsAll manuscripts submitted will be considered for publication. Please visit our website at for our automatic paper submission systems or as an email attachment to energy@, energy@, energy-power@ and energy@.Journal of Energy and Power EngineeringDavid Publishing CompanyTel: 001-323-984-7526, 001-323-410-1082; Fax: 001-323-984-7374。

1.20155英国文学A卷试卷

1.20155英国文学A卷试卷

北京理工大学2014-2015学年第二学期英国文学期末试题A卷班级________ 学号 ___________ 姓名 _________ 成绩I. Multiple Choice (50 points in all, 1for each)Select from the four choices of each item the one that best an swer the questi on or completes the stateme nt. Write the corresp onding letter on the An swer Sheet.1. The sentence "Shall I compare thee to a summe r s day" is the beg inning line of one ofShakespeare ' s __ .A. comediesB. tragediesC. sonn etsD. histories2. The major concern of _____ fiction lies in the tracing of the psychological development of hischaracters and in his energetic criticism of the dehumanizing effect of the capitalist in dustrializati on on huma n n ature.A. Charles Dicke ns ' sB. D. H. Lawre nee ' sC. Thomas Hardy ' sD. John Galsworthy ' s3. Daniel Defoe describes ___ as a typical English middle-class man of the eighteenth century, thevery prototype of the empire builder or the pion eer colo nist.A. Tom JonesB. GulliverC. Moll Fla ndersD. Robi nson Crusoe4. "She lived unknown, and few could know5. When Lucy ceased to be;6. But she is in her grave, and, oh,7. The differenee to me"8. The word "me" in the last line of the above stanza quoted from Wordsworth "She Dwelt s poemAmong the Un trodde n Ways'may possibly refer to ___ .A. the poetB. the readerC. her on e-sided loverD. everybody9. ____ is a typical feature of Swift ' s writ in gs.A. Bitter satireB. Elega nt styleC. Casual n arrati onD. Complicated sentence structure10. The statement "It reveals the dehumanizing workhouse system and the dark, criminalun derworld life" may well sum up the main theme of Dicke ns ' s ___ .A. David CopperfieldB. Bleak HouseC. Great Expectatio nsD. Oliver Twist11. "Do you think, because I am poor, obscure, pla in, and little, I am soulless and heartless ... And if God hadgifted me with some beauty, and much wealth, I should have made it as hard for you to leave me, as it is now for me to leave you."12. The above quoted passage is most probable take n from ___ .A. Pride and PrejudiceB. Jane EyreC. Wutheri ng HeightsD. Great Expectati ons13. The short story “Araby 'is one of the stories in James Joyce ' s collection ____ .A. A Portrait of the Artist as a You ng ManB. UlyssesC. Finn ega ns WakeD. Dubli ners14. In William Blake ' s poetry, the father (andny other in whom he saw the image of the fathersuch as God, priest, and king) was usually a figure of ___ .A. ben evole neeB. admirati onC. loveD. tyra nny15. After reading the first chapter of Pride and Prejudice, we may come to know that Mrs. Bennet isa woman of ___ .A. simple character and quick witB. simple character and poor understandingC. intricate character and quick witD. intricate character and poor understanding16. “ For a week after the commission of the impious and profane offence of asking?for more, Oliver remaineda close prisoner in the dark and solitary room ... ” (DickenOsl,iver Twist) What did Oliver ask forA. More time to play.B. More food to eat.C. More book to read.D. More money to spend.17. Christopher Marlow “'T s he Passionate Shepherd to His Loveis a (n)_” __ .A. pastoral lyricB. elegyC. folk songD. epic18.In Hardy 's Wessex novetlhse, re is a apparent ___ touch in his description of the simple andbeautiful though primitive rural life.A. humorousB. romanticC. nostalgicD. sarcastic19.In which of the following works can you find the proper names “ Lilliput, “ B”robdingnag, ” “ Houyhnhnm,”and “ Yahoo”A. James Joyce 'Ulyssses.B. Charles Dickens B'leask House.C. Jonathan Swift G'ullsiver s 'Travels.D. D. H. Lawrence W'osmen in love.20. We can perhaps describe the west wind in Shelley "Od'e tsoptoh e mWest Wind" with all the following terms except ___ .A. tamedB. swiftC. proudD. wild21. “ Whenthe evening is spread out against the sky Like a patient etherized upon a table. ”s(T. . Eliot, “TheLove song of J. Alfred Prufrock) What doe”s the image in the quoted lines suggest A. Violence. B. Horror.C. Inability.D. Indifference.22. Which of the following qualifies does NOT feature Jane Austen's styleA. Austen's main literary concern is about human beings in their personal relationships.B. Everything in Austen's novel results in an observation, of a quiet, uneventful and contented life of theEnglish country.C. Austen is a great realist and her characters are from all walks of life.D. Austen's works show clearly her firm belief in the predominance of reason over passion.23. The work that presented, for the first time in English literature, a comprehensive realistic picture of themedieval English society and created a whole gallery of vivid characters from all walks of life is most likely .A. William Langland Pi'er s PlowmanB. Geoffrey Chaucer Th'e s Canterbury TalesC. John Gower C'onfession AmantisD. Sir Gawain and the Green Knight24. " Damn the fool! There he is ', cried Heathcliff, sinking back into his seat. 'HuHush, hush, Catherine! I 'll stay. If he shot me so, I 'd expire with a blessing in my lips.novel from which the passage is taken must be _______ .A. Jane Austen P'risde and PrejudiceB. Charles Dickens T'hesOld Curiosity ShopC. Samuel Richardson 'PsamelaD. Emily Bronte W'usthering Heights25. James Joyce is the author of all the following novels except ____.A. DublinersB. Jude the ObscureC. A Portrait of the Artist as a Young ManD. Ulysses26. Naturalism is evolved from realism when the author 's tone in writing becomes less serious and lesssympathetic but more ironic and more ______ .A. rationalB. humorousC. optimisticD. pessimistic27. "He was afraid of her -the small, severe woman with graying hair suddenly bursting out in such frenzy. Thepostman came running back, afraid something had happened. They saw his tripped cap over the short curtains. Mrs. Morel rushes to the door." The above passage is taken fromA. Charlotte Bronte The'PsrofessorB. Charles Dickens Do'm s ebey and SonC. D. H. Lawrence 'Ssons and Lovers D. John Galsworthy T'hesForsyte Saga28. Tess of the D' Urbervilles, one of Thomas Hardy ' sbest known novels, portrays man asA. being hereditarily either good or badB. being self-sufficientC. having no control over his own fateD. still retaining his own faith in a world of confusion29. Romance, which uses narrative verse or prose to tell stories of ___ adventures or other heroicdeeds, is a popular literary form in the medieval period.A. ChristianB. KnightlyC. GreekD. Primitive30. "Bassanio: Antonio, I am married to a wifeWhich is as dear to me as life itself;But life itself, my wife, and all the world,Are not with me esteem ' d above thy life;I would lose all, ay, sacrifice them all,Here to the devil, to deliver you.Portia: Your wife would give you little thanks for that,If she were by to hear you make the offer."The above is a quotation taken from Shakespeare Th'e sMceormcheadnyt of Venice. The quoted part can be regarded as a good example to illustrate _____ .A. dramatic ironyB. personificationC. simileD. symbolism31. "If Winter comes, can spring be far behind"is an epigrammatic line by ____ .A. J. KeatsB. W. BlakeC. W. WordsworthD. P. B. Shelley32. The Victorian Age was largely and age of _______ , eminently represented by Dickens andThackeray.A. poetryB. dramaC. proseD. novel33. Which of the following is NOT a typical feature of ModernismA. To elevate the individual and inner being over the social being.B. To put the stress on traditional values.C. To portray the distorted and alienated relationships between man and his environment.D. To advocate a conscious break with the past.34. "And we will sit upon the rocks, /Seeing the shepherds feed their flocks, /By shallow rivers to whose falls/Melodious birds sing madrigals." The above lines are probably taken from _______________ .A. John Milton P 'arsadise LostB. John Donne '"Thse Sun Rising"C. Shakespeare "'So s nnet 18"D. Marlowe '"Tshe Passionate Shepherd to His Love"35. The Romantic writers would focus on all the following issues EXCEPT the ________ in theAmerican literary history.A. individual feelingsB. idea of survival of the fittestC. strong imaginationD. return to nature36. The essence of humanism is to ____ .A. restore a medieval reverence for the churchB. avoid the circumstances of earthly lifeC. explore the next world in which men could live after deathD. emphasize human qualities37. The poetic view of ____ can be best understood from his remark about poetry, that is, "allgood poetry is the spontaneous overflow of powerful feelings." A. Samuel Taylor Coleridge B. John KeatsC. William WordsworthD. Percy Bysshe Shelly38.In his poem, "Ode to the West Wind," Shelley intends to present his wind as a central ______around which the poem weaves various cycles ofdeath and rebirth. A. conceptC. simile39. “ Come to m -e come to me entirely now, my ear as his cheek was laid on mine, passagepresents a scene in _________ .A. Emily Bronte W 'itshering Heights C. John Galsworthy 'Tshe Forsyte Saga 40. Which of the following best describes the nature of ThomasHardy A. Sentimentalism. B. Tragic sense.C. Surrealism.D. Comic sense.41. A possible theme of James Joyce T s sh"Ao r atbstyo"ryis .A. hopeB. disillusionmentC. puppy loveD. loss42. The Normans brought the Mediterraneancivilization, include ________________________________________ to England. A. Greek cultureC. the Christian religionD. all of above43. ____________________________ The Enlighteners believed in EXCEPT .A. They believed in self-restraint, self-reliance and hard work.B. They believed in God and fate.C. They celebrated reason/rationality, equality and science.D. They advocated universal education, which could make people rational and perfect, they believed. 44.In the poem “Aviolet by a mossy stone?Half hidden from the eye!-Fair as a star, when only one?Is shiningin the sky. ” What literary devices are usedA. simile and personificationB. simile and metaphorC. metaphor and symbolD. simile and pun45.In Shakespeare'sMerchant of Venice, Antonio could not pay back the money he borrowed from Shylock,because _____________ .A .his money was all invested in the newly-emerging textile industry B. symbolD. personification said he ; and added, in his deepest?tone, speaking in “ Make my -haIp?pwinillemssake yours. ” Theabove B. Charlotte Bronte Jan 'e sEyreD. Thomas Hardy T esss of the D ' Urbervilles s later works B. Roman lawB. his enterprise went bankruptC. Bassanio was able to pay his own debtD. his ships had all been lost41. In the first part of Gulliver 'Travels, Gulliver told his experienee in __ .A. Brobdi ngnagB. LilliputC. Flying Isla ndD. Houyh nhnm42. All of the following novels by Thomas Hardy reveal the eonfliet between the traditional and themodern EXCEPT __A. The Mayor of CasterbridgeB. Tess of the DUrbervillesC. Jude the ObscureD. Un der the Gree nwood Tree43. D. H. Lawre nee' novel __ is a remarkable no vel in which the in dividual eon seious nessissubtly revealed and stra nds of themes are in trieately wound up.A. Sons and LoversB. The Rain bowC. Woma n in LoveD. Lady Chatterley'Lover44. All of the followi ng plays are among Shakespearesfour greatest tragediesEXCEPT _ 。

信息检索与利用汇总【全】

信息检索与利用汇总【全】

1、检索效果的评价指标主要有查全率和漏检率(N)2、Google不具有学术搜索功能。

(N)3、CNKI检索系统可以检索博硕士论文。

(Y)4、分类途径就是按照文献的名称体系查找文献的途径。

(N)5、布尔逻辑符有与、或、非三种。

(Y)6、连续出版物就是期刊。

(N)7、这篇文献是图书吗,请判断。

GB/T 3454-2011,数据终端设备(DTE)和数据电路终接设备(DCE)之间的接口电路定义表[S]2011. N8、这篇文献是图书吗,请判断。

Mathis, Kenneth puter-Based Training Methods for Surgical Training[R].ADA585366,2009 N9、这篇文献是会议文献吗,请判断。

武船重型工程股份有限公司.用于桥梁的刚性铰的安装调试检测方法:中国,CN201310299704.9[P].2013-10-16. N10、这篇文献是会议文献吗,请判断。

朱京海,徐光,刘家斌.无人机遥感系统在环境保护领域中的应用研究[J].环境保护与循环经济,2011,v.31;No.193(09):45-48. N11、这篇文献是会议文献吗,请判断。

彭振.等离子体点火对脉冲爆轰发动机两相爆轰过程影响的研究[D].南京理工大学,2011. N12、这篇文献是标准吗,请判断。

谭浩强.C++面向对象程序设计[M].北京:清华大学出版社,2006. N13、图书馆主页上的书目查询系统中的“读者信息”模块查询中,能了解读者所借图书的应还日期 Y14、图书馆主页上的书目查询系统中的“新书通报”模块查询中,能进行城东五校图书的预约 N15、如查看图书馆最近投入流通的图书,最好选择书目查询系统中的“新书通报模块” Y16、信息技术是指在信息的获取、整理、加工、存储、传递和利用过程中所采用的技术和方法。

Y17、信息必须依附于某种载体进行传播,文字、图像、图形、符号、声音、视频可以做为信息载体。

国际学术交流英语-call for paper教程文件

国际学术交流英语-call for paper教程文件
submit a Abstract Paper to a provided E-mail address, those excellent papers will be published
in Eengeering Geology or Bulletin of Eengeering Geology and the Environment.
3. Conference goals
➢State the purpose of the meeting ➢ Introduced the topics of discussion ➢Discuss ideas and solutions to the problem
4. Time and venue
7. Important dates
➢You may meet some deadlines, such as
➢Sub-mission Deadline,
➢Acceptance Deadline
Therefore, you must complete the manuscript submission, pay the attendance fee, and reply the a Letter of acceptance of the invitation within the requested time.
ering and offshore engineering facilities have been
designed and constructed in recent dacades……
6. Papers and submissions
➢Generally, conference papers consist of two forms, full paper and abstract paper

一种基于群体智能的移动云计算模型(IJITCS-V7-N2-4)

一种基于群体智能的移动云计算模型(IJITCS-V7-N2-4)

A Swarm Intelligence Based Model for Mobile Cloud Computing
Ahmed S. Salama
Computer and Information Systems Department, Sadat Academy for Management Sciences, Cairo, Egypt Email: ahmedsayedsalama@
Mobile cloud applications move the computing power and data storage away from mobile phones and into the cloud, bringing apps and mobile computing to not just smartphone users but a much broader range of mobile subscribers. In this section, we enlist the possible benefits of Mobile Cloud Computing [5]. • Mobile Cloud Computing will help to overcome limitations of mobile devices in particular of the processing power and data storage. • It also might help to extend the battery life by moving the execution of commutation-intensive application ‘to the cloud’. • Mobile Cloud Computing is also seen as a potential solution for the fragmented market of mobile operating systems with currently eight major operating systems. • Mobile Cloud Computing can increase security level for mobile devices achieved by a centralized monitoring and maintenance of software, • It can also become a omobile devices since Mobile Cloud Operators can simultaneously act as virtual network operators, provide e-payment services, and provide software, data storage, etc. as a service. • A number of new technical functionalities might be provided by mobile clouds. In particular, provisioning of context- and location-awareness enables personalization of services is an attractive functionality. • Mobile Cloud Computing might open the cloud computing business that is currently almost exclusively addressing businesses to consumers since they will significantly benefit from the above described options. B. Influence of Mobile Cloud Computing Upon ECommerce The Influence of the Cloud Computing upon the ECommerce can be summarized as follows: [6],[7] Cloud Computing Can Provide Good Economic Efficiency for the E-Commerce Application. Making good use of the cloud technology application in the business field, and taking effective use of resources will lead to reduced costs. Thus it will enchant enterprise's kernel competitive power and eventually finished goods and services trading. It is not only can provide service for multiple clients at the same time, but also can guarantee a high degree of security of its application environment.

基于小波NARM的生物医学图像稀疏表示(IJIGSP-V7-N3-6)

基于小波NARM的生物医学图像稀疏表示(IJIGSP-V7-N3-6)
I.J. Image, Graphics and Signal Processing, 2015, 3, 38-44
Published Online February 2015 in MECS (/) DOI: 10.5815/ijigsp.2015.03.06
Wavelet-NARM Based Spal Images
Sushma M, Malaya Kumar Nath
National Institute of Technology Puducherry, Karaikal, PIN-609605, India Email: {23sushma92, malaya.nath}@ Lokeshwari R, Premalatha T, and Santhini J V National Institute of Technology Puducherry, Karaikal, PIN-609605, India Email: {lokeshwary31, premcharan92, jvsanthini}@ Abstract—Sparse representation based super resolution deals with the problem of reconstructing a high resolution image from one or several of its low resolution counterparts. In this case the low resolution image is modelled as the down-sampled version of its high resolution counterpart after blurring. When the blurring kernel is

关键计算机强大的安全系统(IJITCS-V4-N6-4)

关键计算机强大的安全系统(IJITCS-V4-N6-4)

I.J. Information Technology and Computer Science, 2012, 6, 24-29Published Online June 2012 in MECS (/)DOI: 10.5815/ijitcs.2012.06.04Robust Security System for Critical ComputersPreet Inder SinghDepartment of CSE, Lovely Professional University (Punjab), PhagwaraEmail: preetindermail@Abstract—Among the various means of available resource protection including biometrics, password based system is most simple, user friendly, cost effective and commonly used, but this system having high sensitivity with attacks. Most of the advanced methods for authentication based on password encrypt the contents of password before storing or transmitting in physical domain. But all conventional cryptographic based encryption methods are having its own limitations, generally either in terms of complexity, efficiency or in terms of security. In this paper a simple method is developed that provide more secure and efficient means of authentication, at the same time simple in design for critical systems. Apart from protection, a step toward perfect security has taken by adding the feature of intruder detection along with the protection system. This is possible by merging various security systems with each other i.e password based security with keystroke dynamic, thumb impression with retina scan associated with the users. This new method is centrally based on user behavior and users related security system, which provides the robust security to the critical systems with intruder detection facilities.Index Terms—Thumb impression, Keystroke Dynamics, Computer Security & User Authentication etc.I.Introduction1.1 What are critical SystemsCritical systems are systems in which defects could have a dramatic impact on human life, sensitive information, the environment or significant assets. Such systems are expected to satisfy a variety of specific qualities including reliability, availability, security and safety. With the steady infiltration of computers and software in all aspects of our modern world, critical systems increasingly depend on software functionality. These systems are commonplace in many different products, ranging from aircraft systems to home use medical devices. Critical software must be embedded in the critical system/systems. Critical software can also be one element in a system of systems.1.2 Need of Robust Security to Critical SystemsTo protect the sensitive information from the intruder/hackers we need highest level of security for the critical systems. The number of critical computer/systems users and their databases are increasing day by day and robust security becomes the one of the challenging to these computers. Simple password based security system does not provide the robust security to these types of systems because simple password systems has many types of weakness. So, different types of attacks are possible on simplest password based system which is widely used because of its simplicity and easy to use. These are1. Phishing.2. Keylogging.3. A brute-force attack on the user's account (i.e. an attacker knows the userID and tries to guess thepassword).4. A bulk guessing attack on all accounts at theinstitution.5. Special knowledge or access attacks:(a) Guessing based on information about the user.(b) Shoulder surfing.(c) Console access to a machine where password auto-fill is enabled or a password manager is in use.As can be seen, none of the password "best practices" offers any real protection against phishing or key-logging, which appear to be the most prevalent attacks. Strong passwords are just as susceptible to being stolen by a phisher or keylogger as weak ones, and changing the password frequently helps only if the attacker is extremely slow to exploit the harvested credentials. Hence, to overcome this problem the ultimate level of security system is developed. Computer security has become an important issue in recent times. It has become necessary to control the access to computer systems due to more and more sensitive information being stored on them. Pattern recognition and classification is a technique that can be used to determine that an individual is really who hesays he is. Previous efforts have focused on handwriting analysis to determine the identity of the user, with limited success. More recently, classical pattern recognition techniques have been applied to the individual’s typing tec hnique to achieve user identification [l].The number of computer uses has increased rapidly and so too has the use of internet applications such as e-commerce, online banking services, webmail, and blogs. All internet applications require the user to use a password authentication scheme to make sure only the genuine individual can login to the application. Passwords and personal identification numbers (PIN) have traditionally been used to access such applications [2, 3, 4]. However, it is easy for unauthorized persons to access these systems without detection. In order to enhance such password authentication systems, typing biometrics, known as keystroke, can be used as a transparent layer of user authentication.The conventional security system can be shown in figure - 1 given below. The user which has the ID and corresponding password can easily logon to the computer system and access the resources [9].Figure 1: Conventional Security SystemDue to the deficiencies in traditional password-based access methods/Security systems, the new security system comes into existence which provides higher level of security is the Keystroke biometrics, which seeks to identify individuals by their typing characteristics [15].The idea of keystroke dynamics for recognition has been since World War II [5]. Operators were able to easily identify the sender from their key rhythms. Since then, many adaptations of this phenomenon have been studied. Keystroke dynamics is a process of analyzing keyboard typing characteristics or keyboard typing rhythms by monitoring keyboard inputs [6-8]. In other words, the system verifies how a person types. Keystroke verification techniques can be categorized as either static or continuous. Static verification system approaches study keystroke characteristics at a specific time.Two widely used features are duration of the key time interval that key remains pressed, and keystroke latency time interval between successive keystrokes. A more robust way is to use a combination of these features to analyze a keystroke system. Time accuracy, trials of authentication and classifiers are other examples of ways to analyze a keystroke authentication system [10-12].If the passwords are too simple and have meanings, they are easy to remember but vulnerable to attacks which use password cracker programs. If the passwords are more complex and random, they are difficult to remember and hence users have to write them down. In either case, the security of the systems is degraded.Passwords typed at a keypad are easily observed or especially in areas where attackers could plant wireless cameras or hardware keystroke sniffers. Key loggers capture keystrokes and store them somewhere in the machine, or send them back to the adversary. Shoulder surfing is a well-k nown method of stealing other’s passwords and other sensitive personal information by looking over victims’ shoulders while they are sitting in front of terminals or in front of an ATM machine [13].Biometric technologies are defined as automated methods of verifying or recognizing the identity of a living person based on physiological or behavioral characteristics [7]. Biometrics technologies are gaining popularity due to the reason that when used in conjunction with traditional methods of authentication they provide an extra level of security. Biometrics involves something a person is or does. These types of characteristics can be approximately divided into physiological and behavioral types [14]. Physiological characteristics refer to what the person is, or, in other words, they measure physical parameters of a certain part of the body. Some examples are Fingerprints, Hand Geometry, Vein Checking, Iris Scanning, Retinal Scanning, Facial Recognition.Keystroke dynamics is considered as a strong behavioral Biometric based Authentication system [16]. Keystroke Dynamics is one of those subtle technologies that will raise the bar on access security without users ever knowing it.The figure - 2 below shows where Keystroke Dynamics falls with respect to physical biometrics such as finger-print and other behavioral biometrics [17].Figure 2: Keystroke Dynamic with other Behavioral BiometricsAs user-system interaction takes place via the biometric sensor, attacking the device that captures the biometric becomes the first obvious point of attack. Systems that can imitate biometrics have successfully been used for this purpose while instructions on how to create prosthetic fingers can already be found on the internet [18]. The success of attacks using prosthetic fingers is crucial from a security standpoint; researchers from Japan have demonstrated a success rate in attacks on such biometric devices in the range of 67-100% [20]. The major factor that determines the success rate of the attacks was found to be the quality of the original print. There are of course some biometric systems that can be enriched by incorporating aliveness detection methods but those cost significantly more while most current commercially available aliveness tests can be easily cheated [20].The working of the biometric device is shown below in the figure–3. From the biometric sensors features are extracted and matches with the DB/Template according to which the decision can be made.Figure 3: Working of Biometric Sensor/deviceThe remainder of this paper is organized as follows: Section 2 gives Proposed Security System for Critical Computers. Section 3 presents the Experimental results and advantages of the proposed system. Conclusion is given in the final section.II.Proposed Security System For CriticalComputersIn this proposed security system we are merging the different security techniques with one another to provide the robust security system for critical computers. No one single security system/technique is fully (100%) secured. Hence, to protect the critical computers from unauthorized users we merge the different security systems/techniques with one another to provide the robust security with intruder detection facility specially for critical computers like servers, Network administrator Computers in the organizations, Colleges or Universities.2.1 First Level of Security to Critical SystemsThe first level of security to the critical systems is the user ID and Password which is widely used for many years because of its simplicity and easy to use. The password should be long enough so that it is difficult for the intruder to guess or crack. The strength of the password depends upon the length of the password as well as its entropy. For example, User that chooses a password of 7 characters is said to provide between 16 and 28 bits of entropy.2.2 Second Level of Security to the Critical SystemsThe second level of security to the critical systems is to merge the Password with the keystroke dynamic, which is the behavior keystroke biometric system. . It a process of analyzing keyboard typing characteristics or keyboard typing rhythms by monitoring keyboard inputs. It analysis how you type but not what are you typing.If the user enters the correct Password and typing behavior of the user matches with the existing pattern, then the system allows to enter into the next level of security otherwise the system does not allows the user to enter into the next level of security. The level of security can further be enhanced by locking the system after five failed login attempts and corresponding log file can be maintained at the backend helping the authored user to detect/find the intruder.Now, to unlock the critical system, the level of security can be further be enhanced by demanding the additional key, that key may be the person date of birth or any other secret key. Hence, by merging the password with the keystroke dynamic the security strength of the critical systems can be increased.2.3 Third Level of Security to the Critical Systems The third level of security comes into play after the correct Password corresponding to ID, and by matching the user typing behavior at real-time. In this level the user thumb impression as well as the retina will be scanned by the Biometrics device/sensors. Again if it matches with the existing record/database, the user login is successful to the critical system and can access the system resources. If the user thumb impression and retina will not be matched the user login to the system fails and cannot access the system resources.This level of security is very critical. Many biometric devices/sensors available in the market do not detect the aliveness of the persons/user which uses the biometric device. Hence, to achieve highest level of security we (Administrator) require special biometric device that can also check the aliveness of the user.2.4 Forth Level of Security to the Critical Systems After the successful login to the system the forth level of security comes into play. This is active only if the user wants to perform the critical operation on the critical system like update transaction/entry, write transaction/entry. So, at the time of updating operation and/or write operation can be performed by the user, the system needs the additional secret key which includes the minimum 8 characters with constraints like one special character, one upper case character, one digit.Hence, by using the above levels of security, the security of the critical systems can be increased asshown in figure-3 below.Figure 3: Levels of Security to Critical computerIII.Experimental Results3.1 Data collection and AnalysisAccording to specified description of logical parameters as discussed below ―300‖ readings from users have been taken in Visual Basic 6.0 as a front end and Microsoft Access 2003 as a backend by merging it with high quality biometric device (that check the aliveness of user) and it is found that to break the password with these logical parameters by merging it with b iometric device is impossible. It is also found that using these parameters the security of the simple password based system based on the user behavior is increased very much because it contains the multiple logical parameters as discussed below.1.Password Length.2.Number of trails.3.Total time to enter the password.4.Average time to enter the whole password.5.Status means login is done or not.6.Time difference between the two passwords ifin the first attempt login is not done/successful.7.Deviation from the current/actual password.8.Length difference from the current/old attemptpassword.9.If the password/Character is in the capitalletter whether Shift key is used or not.10. If the password/Character is in the capitalletter whether Caps Lock is used or not.3.2 Advantages of this proposed systemIn summary the critical security system given in this paper having advantages like: -a)Easy to deploy on the critical systems.b)Provides the intrusion detection facility.c)Can be implemented in wide range ofapplications where security is the primaryfactor.d)Free from service provider faith nesscircumference.e)Check the aliveness of the user by using thehigh quality biometric device. Hence, securityis further enhanced.f)Hierarchical protection gives optimum use ofsecurity model with high processing speed.g)It provides multi-user facility from samesecurity environment.h)Account can be protected by allocating themaximum number of attempts/trials to theuser by locking the account, when login toaccount is un-successful. Hence, providesbetter security.i)Logging of biometric access creates betterforensic evidence; and can deter many internalthreats to network security.j)This technology does not require changes to existing network access policies; it moreeffectively enforces these policies.k)This technology provides better audit control and promotes proper use of applicationlicensing.l)Provides high level of prevention from unauthorized access to resources and criticalparts/sections of the system.m)It is very difficult to break this security setup because it is depending upon multiple levelsof security systems merging with each other.IV.ConclusionThis new method provides the robust security to the critical computers where we need the highest level of security by merging all the security systems with one another. It can be implemented into wide range of applications where security is the primary factor. This technology does not require changes to existing network access policies; it more effectively enforces these policies and provides better audit control and promotes proper use of application licensing. Hence with these levels of security system the ultimate level of security to the critical systems can be achieved. References[1]S. Bleha and M. S. Obaidat, ―Dimensionalityreduction and feature extraction applications inidentifying computer users,‖ IEEE Trans. Sys.Man. Cybem., vol. 21, pp. 452-456, Mar./Apr.1991.[2]Jain, A. R. a. A. "Information fusion inbiometrics." Pattern Recognition Letters, 24(13),pp. 2115-2125, (2003).[3]U.Dieckmann, R. W. F. a. "Bioid: A multimodalbiometric identification systems." IEEE Computer, 33(2), pp. 64-68, (2000).[4] F. Monrose, a. D. R. "Keystroke Dynamics as aBiometric for Authentication." Future GenerationComputing Systems (FGCS), 12(12), pp. 351-359, (2000).[5]Checco, J. C. ―K eystroke dynamics & corporatesecurity‖. WSTA, 241 Maple Avenue, Red Bank,NJ 07701,2006./publications/articles/1003_article06.html[6]Davide Maltoni, D. M., Anil K.Jain, SalilPrabhakar Handbook of fingerprint recognition.New York: Springer, (2003).[7]Anil K. Jain, Arun Ross, and Salil Prabhakar, "AnIntroduction to Biometric Recognition." IEEETransactions On Circuits And Systems for VideoTechnology, 14(1), pp. 4-20, (2004).[8] F. Monrose, a. D. R. "Keystroke Dynamics as aBiometric for Authentication." Future GenerationComputing Systems (FGCS), 12(12), pp. 351-359, (2000).[9]Preet Inder Singh,Gour Sundar Mitra Thakur,"Enhanced Password Based Security SystemBased on User Behavior Using Neural Networks"International Journal of Information Engineeringand Electronic Business (IJIEEB), vol. 4, no. 2,pp.29-35, 2012.[10]Modi, S. K., & Elliott, S. J., ‖KeystrokeDynamics Verification Using SpontaneouslyGenerated Passwor d‖, 40th IEEE InternationalCarnahan Conferences Security Technology.Lexington, Kentucky, (2006).[11]R. Stockton Gaines, William Lisowski, S. JamesPress, and Norman Shapiro ―Authentication bykeystroke timing: Some preliminary results‖.Rand Report R-256- NSF, (1980).[12]Arau jo, L.C.F., Sucupira Jr., L.H.R., Lizarraga,M.G., Ling, L.L., Yabu-Uti, J.B.T., ―Userauthentication through typing biometrics features‖.IEEE Trans. on Signal Processing, 53 (2), 851–855, (2005).[13]J. Goldberg, J. Hagman, and V. Sazawal,"Doodling Our Way to Better Authentication,"presented at Proceedings of Human Factors inComputing Systems (CHI), Minneapolis,Minnesota, USA, 2002.[14]Lawrence O’Gorman, ―Comparing Passwords,Tokens, and Biometrics for User Authentication‖,Proceedings of the IEEE, Vol. 91, No. 12, Dec, pp.2019-2040, 2003.[15]A. Peacock, X. Ke and M. Wilkerson, ―Typingpatterns: A key to user Identification‖, IEEESecurity and Privacy 2(5) (2004).[16]Ahmed Awad E. Ahmed, and Issa Traore,―Anomaly Intrusion Detection based onBiom etrics‖, Proceedings of the IEEE, 2005. [17]John C. Checco," Keystroke Dynamics andCorporate Security", 2003.[18]Arndt, C. (2005). The loss of privacy and identity,Biometric Technology Today.[19]Matsumoto, T., H. Matsumoto, et al. (2002).Impact of Artificial Gummy Fingers onFingerprint Systems. Optical Security andCounterfeit Deterrence Techniques IV,Proceedings of SPIE.[20]FIDIS (2005). D3.2: A study on PKI andBiometrics. M. Gasson, M. Meints and K.Warwick: 1-138.Preet Inder Singh:M.Sc computer Science from D.A.V College, Amritsar in 2010. Currently pursuing M.Tech (CSE) from Lovely Professional University, Phagwara, interested in Network Security, Multi-media and Artificial Intelligent Systems.。

Conferences, workshops and journals

Conferences, workshops and journals

INTELLIGENTTRANSPORTATIONSYSTEMS/itsIEEE ITS SOCIETY NEWSLETTEREditor:Prof.Bart van Arem,b.vanarem@utwente.nl Vol.9,No.2,June2007In This IssueSociety News3Message from the Editor:Bart van Arem (3)Message VP Member Activities:Christoph Stiller (3)Message VP Technical Activities:Daniel Zeng (4)Bookreview:Algirdas Pakstas (6)IEEE Trans.on ITS Report:Alberto Broggi (8)IEEE Transactions on ITS-Index:Simona Bert´e (10)Technical Contributions17Second Generation Controller Interface Device Design,byZhen Li,Michael Kyte,Brian K.Johnson,RichardB.Wells,Ahmed Abdel-Rahim and Darcy Bullock.17Research Programs25Research Review,by Angelos Amditis (25)Conferences,Workshops,Symposia29By Massimo Bertozzi and Alessandra Fascioli (36)THEIEEE INTELLIGENT TRANSPORTATION SYSTEMSSOCIETY——————————————President2007:................Fei-Yue Wang,CAS,China and U.of Arizona,Tucson,AZ85721,USA President Elect2007:William T.Scherer,University of Virginia,Charlottesville,VA22904-4747,USA Vice President Financial Activities:..........Sudarshan S.Chawathe,University of Maine,Orono,ME04469-5752,USA Vice President for Publication Activities:..........Jason Geng,Rockville,MD20895-2504,USA Vice President for Conference Activities:..Umit Ozguner,Ohio State University,Columbus,OH43210,USA Vice President Technical Activities:..................Daniel Zeng,University of Arizona,Tucson,AZ85721,USA Vice President Administrative Activities:......Daniel J.Daily,University of Washington,Seattle,WA98195,USA Vice President Member Activities:........Christoph Stiller,Universit¨a t Karlsruhe,76131Karlruhe,Germany Transactions Editor:.....................Alberto Broggi,Universit`a di Parma,Parma,I-43100,Italy Newsletter Editor:...Bart van Arem,University of Twente,Enschede,NL-7500AE,The NetherlandsCOMMITTEESAwards Committee:Chip White(Chair):...................................cwhite@ Conferences and Meetings Committee:Umit Ozguner(Chair):..............u.ozguner@ Constitution and Bylaws Committee:Daniel J.Dailey(Chair):...............d.dailey@ Fellow Evaluation Committee:Petros Ioannou(Chair):..........................ioannou@ Finance Committee:Sudarshan S.Chawathe(Chair): History Committee:E.Ryerson Case(Chair):......................................r.case@ Long Range Planning Committee:Pitu B.Mirchandani(Chair):...........pitu@ Member Activities Committee:Christoph Stiller(Chair):......................stiller@a.de Nominations and Appointments Committee:William T.Scherer(Chair):.....w.scherer@ Publications Committee:Jason Geng(Chair):...............................jason.geng@ Standards Committee:Jason Geng(Chair):..................................jason.geng@ Student Activities Committee:Shuming Tang(Chair):..........................sharron@ Technical Activities Committee:Daniel Zeng(Chair):...................zeng@Society NewsFrom the Editorby Bart van AremDear reader of this newsletter,It is my pleasure to present to you the second newsletter of the ITS Society in2007.In this newsletter you willfind the usual content.In particular I would like to ask your attention for the technical activities of the ITS Society:there are now11technical committees covering a wide range of ITS topics and3more committees will be formed.You can learn more about these activities and how you can join in this newsletter.After this newsletter,Charles Herget(c.herget@)will be the new Editor in Chief of the newslet-ter.It has been my pleasure to serve the IEEE ITS Society during the past3years.In these years,the production of the newsletter was organized in a more professional way by setting up an Editorial Board and introducing the book review and research review sections.The user needs survey that we conducted shows that you the newsletter,The number of downloads of the newsletter has been steadily growing from1,000 in2005to about1,500now.I want to thank you as a reader for your appreciation,the ITS Society for their confidence and Dorette Alink-Olthof for the technical production and layout and Rob Quentemeijer for maintaining the e-mail list.I wish you the best!Bart van AremMessage from the VP Member Activitiesby Christoph StillerMessage from the VP of Member Activities by Christoph StillerMeanwhile,the IEEE Intelligent Transportation Systems Society(ITSS)has become a well established authority in the ITSfield.Every month,new professionals join us,thus improving their network with inter-disciplinary experts which is a keystone for a successful carreer.Since last year the ITSS promotes young as well as experienced engineers in ITS through its award pro-gramme.The following four ITSS awards will be presented at the IEEE Intelligent Transportation Systems Conference in Seattle this autumn.1.IEEE ITSS Best Ph.D.Dissertation Award2.IEEE ITSS Best Practice Award for Engineers3.IEEE ITSS Technical Career Achievement Award4.IEEE ITSS Leadership Award for Government,Institutes,and ResearchI am personally looking forward to see the winners of these awards at the ITSC conference in Seattle Sep. 30-Oct.3,2007!IEEE ITSS MEMBERSHIP:OPENING THE WORLD OF ITS TECHNOLOGYRemember to renew Your Membership for2007Join the IEEE Intelligent Transportation Systems Society ITSS membership includes the Transactions on ITS:/renewMessage from the VP Technical Activitiesby Daniel ZengDear Colleagues,I would like to take this opportunity to update you about ITSS Technical sub-Committees(TCs).These TCs,organized by ITS subject topics,are a central part of the ITSS Technical Activity Board(TAB).They are expected to promote various areas of ITS research by organizing special sessions at the ITSS-sponsored conferences,editing special sections/issues for the Transactions and the Newsletter,and pursuing other tech-nical activities with partners within or outside of the ITSS.Through efforts in the past couple of years,ITSS has extended the coverage of its TCs significantly.Now it has11TCs:•Mobile Communication Networks•Intelligence and Security Informatics for Transportation Systems•Artificial Transportation Systems and Simulation•Logistics and Services•Railroad Systems and Applications•ITS for Air Traffic•Communication Networks•Mechatronic and Embedded Systems in ITS•Port Automation and Management•Vehicle Safety Technologies and Applications•Software Infrastructure in ITSMany TCs have been very active in organizing ITSS events including both ITSS-sponsored conferences and special sessions within ITSS main events.They have also done a superb job reaching out to other profes-sional groups for joint technical activities.These efforts are certainly greatly appreciated by the ITSS and its members!We are continuing the expansion of the TC coverage.In the short term,we are hoping to form3more TCs covering the following critical areas:•Traffic and Travel Management•Public Transportation Management•Intelligent Water Transportation SystemsWe are encouraging established researchers in these areas to take the lead in setting up these TCs and certainly welcome our members to participate actively in these TCs.Please drop me an email atzeng@ if you have an interest.Of course,other suggestions about future ITSS technical activities are always welcome as well.Enjoy your summer!Bookreviewby Algirdas Pakstas London Metropolitan UniversityBook Review:Parking Management Best PracticesBy Todd LitmanReviewed by Dr.Farhi Marir,Knowledge Management Research Group,London Metropolitan Univer-sityThis book is written by Todd Litman who is the executive director ofthe Victoria Transport Policy Institute,an independent research organi-zation dedicated to developing innovative solutions to transport problems.His research is used worldwide in transport planning and policy analy-sis.In this book,Litman puts in writing his experience of best prac-tice in parking management,which is a major issue for a large numberof stake holders of parking space;the car drivers who is not happy whenthere is no parking space,the government which can not afford to main-tain large number of parking space,businesses who are not happy becausethey loose their customers when there is not enough parking space,thelocal communities who are asking for better land use and better environ-ment.The book in its introduction put forward strong arguments to the stakeholders that the solution to this conflict is not about providing abundantand free parking spaces but it is about managing efficiently these parkingspaces instead.The author presents a variety of strategies that encouragemore efficient use of existing parking facilities,improve the quality of serviceprovided to parking facility users and improve parking facility design.He also argues that the strategies put forward can help address a wide range of transportation problems,land use development,economic,and environmental objectives.The author devoted292pages in this book(8Chapters,Glossary and Index)to consolidate his strate-gies and present parking management best practices.Chapter1(Introduction)emphasises that parking is an important component of the transportation system. It presents the benefits of better management of parking space on individual,businesses and communities. It also presents different strategies for parking facilities efficiency and the parking management principles. Then,in Section two,the author emphasises that parking management represents a paradigm shift from the old paradigm which strives to maximise supply and minimise price to the new paradigm which strives to provide optimal parking supply and price.It consolidates these arguments by providing summaries of cost benefit analysis.Based on this paradigm shift and the results of the cost benefit analyses,the third Section redefines the parking problem supported by an extensive comparison of the increased supply against management solutions.Chapter2(How Much is Optimal?)focuses on how to achieve the objective of the new paradigm in terms of optimal parking supply and optimal pricing.In thefirst Section of this Chapter the author highlights the problem of the planner of the parking supply who,instead of using economic theory to determine optimal parking supply to satisfy the consumers,relies on recommended minimum standards published by profes-sional organisations.Although these standards seem rational and efficient,they are developed based onvarious biases that drive towards excessive parking supply.In Section two and three,the author presents conventional standards limitations and the evidence that they lead to excessive parking supply.Then in Section four,the author presents better ways that determine how much parking to supply.He argues that it will be more efficient to use efficiency-based standards that take into account specific needs of each location and its geographic,demographic,and economic factors.He backed this Chapter with16references and information resources.In Chapter3(Factors Affecting Parking Demand and Requirements),the author argues that many parking management strategies use these factors to increase efficiency and reduce the supply of parking needed at a particular location.In Section one,it is discussed how parking demand is affected by parking facility location,type and design and how this compares with other nearby portions.In Section two it is analysed how the geography factor is affecting parking demand.For instance,residents of communities with more diverse transportation systems tend to own fewer cars and take fewer vehicle trips than in more automobile-dependent areas.The third Section is devoted to the demographic factors,which affects vehicle ownership and use where for instance communities composed of students,renters,elderly people with disability tend to own fewer cars.In the last three Sections the author discusses in details how the pricing and regulations, parking mobility management programme and time period affect the parking demands.This Chapter ends with evaluation of multiple factors and33references and information sources used by the author to consoli-date his discussion.In Chapter4(Parking Facility Costs),the author emphasises that the major benefit of parking management is the ability to reduce various parking costs.He states that the magnitude of saving is an important factor when it comes to the evaluation of parking management strategies.In thefirstfive Sections of this Chapter, the author discusses the costs of parking space in terms of land use,construction of above ground parking, operation and maintenance of parking space,transaction such as cost for equipment,signs,attendants and other associated costs.In the Section seven and eight,the author presents the total and the sunk costs for parking and put some arguments that if an efficient parking management is in place it does not only reduce these costs but provides indirect benefits.In the last three Sections,the author presents an extensive comparisons between parking costs with total development costs and other transaction costs and he also highlights the implication of under priced costs.This Chapter ends with18references and information resources.Chapter5(Parking Management Strategies)is the largest Chapter where three strategies are described and evaluated extensively:strategies that increase parking facilities efficiency,strategies that reduce park-ing demand and support strategies.Each strategy is described in details including its impacts on parking demand and requirements,its benefit,costs and consumer impacts,where it could be best applied,how it could be implemented and its lists of useful reference and source of additional information.This Chapter is the core of this book where the author lays out his extensive experience and best practice that could be used by planners to implement an efficient parking management strategy.In this Chapter there are109references and information sources for the strategies that increase parking facilities efficiency,102references and infor-mation resources for strategies that reduce parking demand and76references and information resources for support strategies.Chapter6(Developing an Integrated Parking Plan)provides a clear and concise methodology for developing an integrated parking plan that includes an optimal combination of complementary management strategies. It describes the steps for an efficient planning process,providing leadership for innovation and cost benefits analysis in terms additional income,cost saving and increased benefits to users and community.These steps are enhanced with real world example to support the planner in his decisions.This Chapter ends with15 references and information resources.Chapter7(Evaluating Individual Parking Facilities)equips the planner with tools which can help to evalu-ate specific parking facilities in terms of various parking performance indicators and management strategies. This Chapter is enriched with many examples of well designed and efficiently managed parking facilities in contrast to unattractive and poorly managed parking facilities.This Chapter is another additional incentiveand supports the planner for better innovation when there is a need for planning or designing new parking facilities.This Chapter ends with16references and information resources.Chapter8(Examples)is devoted to description of examples/case studies of the various types of parking management.The study includes the description of the situation,a discussion on how practically the park-ing management could be applied,and also the list of appropriate parking management strategies best suited for that situation.This Chapter ends with16references and information resources.Glossary contains a rich set of terms related to Parking Management.Additional Chapter of References contains46references and information resources,which are relevant to the whole area considered in this book.The book is ended with Index on7pages.Parking Management Best Practices,By Todd Litman2006,292p.,Hardcover,ISBN:978-1-932364-05-7Publisher’s recommended price:69.95USDReport on IEEE Trans.on Intelligent Transportation Systems by Alberto BroggiTransactions EiC report,updated June1,2007Number of submissions:The number of submissions is increasing:167in2004,157in2005,234in2006,and97in thefirst5 months of2007.Rapid posting:All papers appear on Explore before being printed,thanks to rapid posting.Authors have expressed interest in this way of disseminating their results independently of the actual publication.Please be advised that authors can post their papers on their websites provided they add the specific disclaimer supplied by IEEE.Special Issues:The following special issues are under way:-special issue on On-the-road Mobile Networks-special issue on ITSC06Type of accepted manuscripts:From Jan1,2007,T-ITS accepts the following type of manuscripts:-regular papers-short papers(formerly known as’technical correspondences’)-survey papers(formerly known as’reviews’)-practitioners papersMaximum number of pages:From the2007September issue,the policy on the maximum number of pages will change:regular papers will be allowed10pages,short papers and practitioners papers6,while there will be no limit to survey papers. Current status:The attachedfigure shows:in blue the number of papers submitted in each month from April2003(when we switched to electronic submission),and in red the number of papers still without a decision;this means that either thefirst submission did not come to an end,or that a new revision is currently under evaluation. Thefigure shows that the trend is positive and,a part from isolated cases,all submitted papers receive a notification in a reasonably short time.IEEE Trans.on Intelligent Transportation Systems-Indexby Simona Bert´eWe are happy to present you an extension of this section in which you normally canfind the titles and abstracts of the upcoming issue of our Transactions.To go directly to the online Transactions Table of Contents,click on”Index”above.In addition we will give you the index of the past issue including direct access using a hyperlink.By using this link IEEE ITSS members have full access to the papers.Non-members can browse the abstracts.We hope you will appreciate this new feature.Vol.8,No.2,June2007:this issue is a collection of two special sections(on ITSC05and on ICVES05)•Video and Seismic Sensor-Based Structural Health Monitoring:Framework,Algorithms, and Implementation,by Gandhi,T.,Chang,R.and Trivedi,M.M.Abstract:This paper presents the design and application of novel multisensory testbeds forcollection,synchronization,archival,and analysis of multimodal data for health monitoring oftransportation infrastructures.The framework for data capture from vision and seismic sensorsis described,and the important issue of synchronization between these modalities is addressed.Computer-vision algorithms are used to detect and track vehicles and extract their properties.It isnoted that the video and seismic sensors in the testbed supply complementary information aboutpassing vehicles.Data fusion between features obtained from these modalities is used to per-form vehicle classification.Experimental results of vehicle detection,tracking,and classificationobtained with these testbeds are described.Page(s):169-180Digital Object Identifier10.1109/TITS.2006.888601AbstractPlus—Full Text:PDF(1309KB)Rights and Permissions•Determining Traffic-Flow Characteristics by Definition for Application in ITS,by Ni,D.Abstract:Traffic-flow characteristics such asflow,density,and space mean speed(SMS)arecritical to Intelligent Transportation Systems(ITS).For example,flow is a direct measure ofthroughput,density is an ideal indicator of traffic conditions,and SMS is the primary input tocompute travel times.An attractive method to compute traffic-flow characteristics in ITS isexpected to meet the following criteria:1)It should be a one-stop solution,meaning it involvesonly one type of sensor that is able to determineflow,SMS,and density;2)it should be accurate,meaning it determines these characteristics by definition rather than by estimation or by usingsurrogates;3)it should preserve the fundamental relationship amongflow,SMS,and density;and4)it should be compatible with ITS,meaning it uses ITS data and supports online application.Existing methods may be good for one or some of the above criteria,but none satisfies all ofthem.This paper tackles the challenge by formulating a method,called the n−t method,whichaddresses all these criteria.Its accuracy and the fundamental relationship are guaranteed byapplying a generalized definition of traffic-flow characteristics.Inputs to the method are time-stamped traffic counts which happen to be the strength of most ITS systems.Some empiricalexamples are provided to demonstrate the performance of the n−t method.Page(s):181-187Digital Object Identifier10.1109/TITS.2006.888621AbstractPlus—Full Text:PDF(607KB)Rights and Permissions•A Traffic Accident Recording and Reporting Model at Intersections,by Ki,Y.-K.and Lee, D.-Y.Abstract:In this paper,we suggested a vision-based traffic accident detection algorithm and developed a system for automatically detecting,recording,and reporting traffic accidents at inter-sections.A system with these properties would be beneficial in determining the cause of accidents and the features of an intersection that impact safety.This modelfirst extracts the vehicles from the video image of the charge-couple-device camera,tracks the moving vehicles(MVs),and ex-tracts features such as the variation rate of the velocity,position,area,and direction of MVs.The model then makes decisions on the traffic accident based on the extracted features.In afield test,the suggested model achieved a correct detection rate(CDR)of50%and a detection rate of 60%.Considering that a sound-based accident detection system showed a CDR of1%and a DR of66.1%,our result is a remarkable achievement.Page(s):188-194Digital Object Identifier10.1109/TITS.2006.890070AbstractPlus—Full Text:PDF(506KB)Rights and Permissions•Elucidating Vehicle Lateral Dynamics Using a Bifurcation Analysis,by Liaw,D.-C.,Chiang, H.-H.and Lee,T.-T.Abstract:Issues of stability and bifurcation phenomena in vehicle lateral dynamics are pre-sented.Based on the assumption of constant driving speed,a second-order nonlinear lateral dynamics model is obtained.Local stability and existence conditions for saddle-node bifurcation appearing in vehicle dynamics with respect to the variations in front wheel steering angle are then derived via system linearization and local bifurcation analysis.Bifurcation phenomena occurring in vehicle lateral dynamics might result in spin and/or system instability.A perturbation method is employed to solve for an approximation of system equilibrium near the zero value of the front wheel steering angle,which reveals the relationship between sideslip angle and the applied front wheel angle.Numerical simulations from an example model demonstrate the theoretical results. Page(s):195-207Digital Object Identifier10.1109/TITS.2006.888598AbstractPlus—Full Text:PDF(868KB)Rights and Permissions•Conflict Resolution and Train Speed Coordination for Solving Real-Time Timetable Per-turbations,by D’Ariano,A.,Pranzo,M.and Hansen,I.A.Abstract:During rail operations,unforeseen events may cause timetable perturbations,which ask for the capability of traffic management systems to reschedule trains and to restore the timetable feasibility.Based on an accurate monitoring of train positions and speeds,potential conflicting routes can be predicted in advance and resolved in real time.The adjusted targets (locationtimespeed)would be then communicated to the relevant trains by which drivers should be able to anticipate the changed traffic circumstances and adjust the train’s speed accordingly.We adopt a detailed alternative graph model for the train dispatching problem.Conflicts be-tween different trains are effectively detected and solved.Adopting the blocking time model, we ascertain whether a safe distance headway between trains is respected,and we also consider speed coordination issues among consecutive trains.An iterative rescheduling procedure provides an acceptable speed profile for each train over the intended time horizon.After afinite number of iterations,thefinal solution is a conflict-free schedule that respects the signaling and safety constraints.A computational study based on a hourly cyclical timetable of the Schiphol railway network has been carried out.Our automated dispatching system provides better solutions in terms of delay minimization when compared to dispatching rules that can be adopted by a human traffic controller.Page(s):208-222Digital Object Identifier10.1109/TITS.2006.888605AbstractPlus—Full Text:PDF(728KB)Rights and Permissions•Maximum Freedom Last Scheduling Algorithm for Downlinks of DSRC Networks,by Chang,C.-J.,Cheng,R.-G.,Shih,H.-T.and Chen,Y.-S.Abstract:This paper proposes a maximum freedom last(MFL)scheduling algorithm for down-links,from the roadside unit to the onboard unit(OBU),of dedicated short-range communication networks in intelligent transportation systems,to minimize the system handoffrate under the maximum tolerable delay constraint.The MFL scheduling algorithm schedules the service or-dering of OBUs according to their degree of freedom,which is determined by factors such as remaining dwell time of service channel,remaining transmission time,queueing delay,and max-imum tolerable delay.The algorithm gives the smallest chance of service to the OBU with the largest remaining dwell time,the smallest remaining transmission time,and the largest weighting factor,which is a function of the queueing delay and the maximum tolerable delay.Simulation results show that the MFL scheduling algorithm outperforms the traditionalfirst-comefirst-serve and earliest-deadline-first methods in terms of service failure and system handoffrates.Page(s):223-232Digital Object Identifier10.1109/TITS.2006.889440AbstractPlus—Full Text:PDF(621)Rights and Permissions•Collision Avoidance for Vehicle-Following Systems,by Gehrig,S.K.and Stein,F.J.Abstract:The vehicle-following concept has been widely used in several intelligent-vehicle appli-cations.Adaptive cruise control systems,platooning systems,and systems for stop-and-go traffic employ this concept:The ego vehicle follows a leader vehicle at a certain distance.The vehicle-following concept comes to its limitations when obstacles interfere with the path between the ego vehicle and the leader vehicle.We call such situations dynamic driving situations.This paper introduces a planning and decision component to generalize vehicle following to situations with nonautomated interfering vehicles in mixed traffic.As a demonstrator,we employ a car that is able to navigate autonomously through regular traffic that is longitudinally and laterally guided by actuators controlled by a computer.This paper focuses on and limits itself to lateral control for collision avoidance.Previously,this autonomous-driving capability was purely based on the vehicle-following concept using vision.The path of the leader vehicle was tracked.To extend this capability to dynamic driving situations,a dynamic path-planning component is introduced.Several driving situations are identified that necessitate responses to more than the leader vehicle.We borrow an idea from robotics to solve the problem.Treat the path of the leader vehicle as an elastic band that is subjected to repelling forces of obstacles in the surroundings.This elastic-band framework offers the necessary features to cover dynamic driving situations.Simulation results show the power of this approach.Real-world results obtained with our demonstrator validate the simulation results.Page(s):233-244Digital Object Identifier10.1109/TITS.2006.888594AbstractPlus—Full Text:PDF(530KB)Rights and Permissions。

主要电子图书数据库网址一览

主要电子图书数据库网址一览


4
主要电子期刊数据库/网络资源
OA期刊:
Hirewire免费电子期刊

DOAJ (Directory of Open Access Journals ) 中国科技论文在线
5
统计数据



infobank(高校财经数据库) EPS全球统计数据/分析平台 中宏教研支持系统 CNKI数字搜索 CNKI数字搜索统计网站导航 中国统计信息网 北京教育网 UNESCO Institute for Statisties Your Nation
综合搜索引le
Yahoo! Alta Vsita Ask Jeeves Dogpile ……
天网
微软bing
……
1
主要电子期刊数据库/网络资源

中国期刊全文数据库(CNKI)


万方数据库——数字化期刊数据库
中文科技期刊数据库(维普资讯)(calis镜像) 龙源电子期刊阅览室 人大复印报刊资料数据库(用户名/密码:BJSFDX)
18
年度资料——年鉴


中国年鉴全文数据库(CNKI)
infobank(高校财经数据库)
WorldAlmanac (OCLC FirstSearch)(并发用户14个)
19
学术搜索引擎—— Scholar Search Engines

Google Scholar(学术搜索)




全国报刊索引
中文社会科学引文索引(CSSCI学校中英文图书数字化国际合作计划(CADAL) 中国博士学位论文全文数据库(CNKI) 中国优秀硕士学位论文全文数据库(CNKI) 万方数据库——中国学位论文全文数据库 CALIS学位论文中心服务系统

通过帕累托分析选择驾驶员行为的定性特征(IJMECS-V10-N10-1)

通过帕累托分析选择驾驶员行为的定性特征(IJMECS-V10-N10-1)

I.J. Modern Education and Computer Science, 2018, 10, 1-10Published Online October 2018 in MECS (/)DOI: 10.5815/ijmecs.2018.10.01Selecting Qualitative Features of Driver Behaviorvia Pareto AnalysisKawtar ZinebiMohammed V University in Rabat. EMI - SIWEB Team. Rabat, MoroccoEmail: kawtarzinebi@Nissrine SouissiMohammed V University in Rabat. EMI - SIWEB Team. Rabat, MoroccoEmail: souissi@enim.ac.maKawtar TikitoÉcole Nationale Supérieure des Mines de Rabat. Computer Science Department. Rabat, MoroccoEmail: tikito@enim.ac.maReceived: 21 July 2018; Accepted: 05 September 2018; Published: 08 October 2018Abstract—Driver behavior is the main cause of road crashes; it is the key element that insures a better understanding and improves predictions of car accidents. The main goal of our study is to determine the set of driver behavior features that are the most encountered in literature; we were based on behavioral questionnaires as a source for these features. We selected the questionnaires that are most cited in literature and therefore proved their efficiency through many studies they were employed in. Then we extracted the features considered in their items and classified them by rate of appearance according to the Pareto & ABC principle. In the second part of our study we collaborated with the National Committee for Circulation Accident Prevention (CNPAC) of the Ministry of Transportation of Morocco in order to compare the findings we gathered from literature with the researches they administer. We prepared a questionnaire that contains the final set of features and we transmitted it to experts working in the road safety field to rate it according to their knowledge and experience. Data analysis showed significant differences in some features, which demonstrates the gap between theoretical results and field research.Index Terms—Driver behavior features, behavioral questionnaires, Pareto & ABC analysis, DBQ, DAX, MDSI, DSQ, DBI.I.I NTRODUCTIONVehicle related causalities are one of the most deadly causes worldwide. According to the World Health Organization, traffic accidents caused about 1.25 million deaths in 2015, 75% are male victims and 49% are among pedestrians, cyclists and motorists. The same report shows that car crashes are the first cause of deaths among population aged between 15-29 years.Many aspects are taken into account in defining causes of crash frequency and injuries severity, they can be classified into infrastructure, vehicle defects and human faults [1]. The first category consists of road traffic characteristics such as type of road and its conditions, weather and traffic flow, the second one includes conditions of the vehicle, and the last one involves around driver’s characteristics, like driving experience, fatigue, physiological and psychological state, personality traits and attitudes.Driver behavior proves to be the key element behind car crashes involvement [2], as data show that 70–80% of road accidents were completely the fault of drivers, and this rate is well known to be similar in the majority of countries in the world, which is why vigorous efforts are under way today to fully apprehend and model driver behavior.The description of such a system is not an obvious task, given the complexity and the diversity of activities and functions performed while driving. Many studies address driver’s poor perception as the main feature for accident involvement [2,3,4,5], others reported about risk taking to have a major impact on road crashes especially among young and male drivers [6,7,8].The main difficulty that researchers encounter is the absence of a unified definition and a standard method to model driver behavior. We realized that literature lacks a common model; it needs to acquire a universal model given its importance for safety organizations, industrial manufacturers and researchers all around the globe. Research on this topic had increased exponentially during the last decade considering the technological evolution of electronic devices and communication protocols, but still there is a deficiency in terms of standardized models that define driver behavior as a whole system, and not just portions of it. Therefore we decide to address such behavior by adopting a generic approach that doesn’tfocus on one or two features, but instead it considers the entirety of its elements in order to represent the multi-dimensional nature of this phenomenon.This is why our main objective in this paper is to collect the set of features that control driver behavior as a first step into defining a generic model for it. The main resources we consider for these features are behavioral questionnaires; our methodology is based on these questionnaires as an input in order to extract major features that need to be taken into account in a behavioral model.Our paper is organized as following; in the second section, we present our research method in details and explain the different steps we followed, next in the third section, we address each questionnaire and classify the features we extracted in them, and finally in the fourth section we conduct a comparative study with the CNPAC of Morocco in order to compare theoretical results from literature with their field projects.II.R ESEARCH M ETHODThe main reason we chose to work with behavioral questionnaires is the diversity of their items and the large amount of information they contain. They represent many situations that drivers are likely to encounter on the roads, that others collecting methods might miss. They also summarize the circumstances of these situations; their items express explicitly the causes of such behaviors and indicate the intents of the driver behind them. They also question about the driver’s state of mind, feelings, personal motivations and attitudes toward driving, which is a benefit for our research since our main goal is to collect as many features as possible, from quantitative measures (speed, acceleration etc.) to qualitative features (personality, state of mind, fatigue etc.)In this paper we are interested in analyzing the questionnaires items, their design and the information they include, we will not address the results of such measurements since this topic brings many controversy about reliability and bias.Step 1: Selecting driver behavior questionnairesIn this step, we represent the questionnaires we selected for our study. The main selection criteria are the number of citation and the diversity of themes. In table 1, we gathered the set of the most cited questionnaires in literature. For this purpose, we used the research motors ScholarGoogle, IEEXplore and ScienceDirect.Table 1. Most cited driver behavior questionnairesThis table shows that literature includes eight behavioral questionnaires as the most employed in traffic psychology studies. We chose to eliminate three questionnaires from this list for the main reason of avoiding redundancy; the items presented in the Reckless Driving Habit Scale, the DVQ and the DAS are all reproduced in the others questionnaires.Finally we ended up with five questionnaires indicated in the list below.∙Driver Behavior Questionnaire (DBQ) [9]: is one of the most widely used method to assess self-reported driving behaviors [17,18,19], its main objective is to help understanding the relation between violations, crash involvement and personal driving habits.∙Driving Anger Expression Inventory (DAX) [10]: isa measurement developed to evaluate how driversexpress their anger on the road, its items describe different situations driven by irritation or frustration form traffic or other drivers behavior.∙Multidimensional Driving Style Inventory (MDSI)[11]: it targets eight main styles: “dissociative,anxious, risky, angry, high-velocity, distress reduction, patient, and Carefulness”. It was designed to assess driver’s habitual behaviors and driving-specific features that can explain accident involvement and traffic law violations, it takes into account general socio-demographic and personality features∙Driving Style Questionnaire (DSQ) [14]: it contains15 items that target what the authors called drivingdimensions: speed, calmness, social resistance, focus, planning, and deviance.∙Driving Behavior Inventory (DBI) [15]: It is based on four elements which are driving aggression, dislike of driving, tension and frustration connected with successful or unsuccessful overtaking, irritation when overtaken and heightened alertness and concentration. The 35 items of the questionnaire highlights driver stress reactions to different situations.Step 2: Extracting driver behavior featuresAfter selecting the questionnaires, the next step is to extract behavior features from them. This operation depends on the items of each questionnaire. As an example, the first item in the DBQ is “Attempt to driv e away from traffic lights in third gear”; t he situation presented in this item contains one behavioral feature which is “Inattention”. Another item from the DBQ is “'Wake up' to realize that you have no clear recollection of the road along which you have just travelled”, it mainly refers to “Day dreaming”. More details of this phase are presented in the third section of our paper. Step 3: Pareto & ABC analysisPareto analysis is a technique that helps identifying the top most important elements in terms of appearance frequency. It is widely used by industrial management in order to diagnose failures in any kind of systems, itsprinciple is based on classifying causes of problems and select the top portions that need to be addressed. We aregoing to take advantage of the ordering aspect on the Pareto & ABC analysis to determine the predominant features taken into account in each questionnaire. This operation will help us acknowledge the most essential parameters that conduct driver behavior.Step 4: Comparison study with the CNPACThis step is the final phase of our study, it consists of validating the previous findings from step3. We need to compare our theoretical results with an accredited organization so we can deduce the gap between field studies and theoretical research. For this, we collaborated with the National Committee for Circulation Accident Prevention (CNPAC) of the Ministry of Transportation of Morocco in order to evaluate our findings from literature with their statistical studies.III.D RIVER B EHAVIOR Q UESTIONNAIRES &F EATURESE XTRACTIONIn this section, we represent the details of step3 and the results of Pareto & ABC analysis for all the questionnaires. Before that, we give a general presentation of the five questionnaires we analyze.A. Questionnaires PresentationAs mentioned in step1, our analysis is based on five questionnaires which we selected based on many criteria, namely their design and dimensions. We made sure the questionnaires addresses different aspects of driver behavior so we avoid repetitiveness. The main concepts we managed to frame are Risk taking, Anxiety, Anger, Mistakes and Inattention.These four concepts are a summary of the features presented in the questionnaires items. We created this four-dimension representation in order to demonstrate that these concepts are independently coherent and perpendicular to each other, which implies that they can be seen as independent and distinctive aspects of driver behavior.On the other hand, even though the questionnaires’ themes are disparate, they have some intersections points as shown in table2.As an example for the representation of these aspects in the questionnaires items , stress is illustrated in the MDSI by items such as “feel nervous while driving” and by “I feel anxious when overtaken at a junction” from the DBI. Revenge is represented in the DAX by “I do to other drivers what they did to me” and “Angered by another driver's behavior, you give chase with the intention of giving him/her a piece of your mind” from the DBQ.B. Pareto & ABC AnalysisIn this section, we apply Pareto & ABC analysis for each questionnaire and we represent their results.1) DBQ:The results of Pareto & ABC analysis for the DBQ are presented in figure 1.Table 2. Intersections between questionnairesResults of the DBQ show different percentages of various elements; Inattention, Overtaking, Bad perception, Speed, Turning, Absent-minded, Not respecting signs and Aggressive braking have the most rate of appearance as they belong in the class A, they show up in items like “Distracted or p reoccupied, realize belatedly that the vehicle ahead has slowed, and have to slam on the brakes to avoid a collision”, “Cut the corner on a right-hand turn and have to swerve violently to avoid an oncoming vehicle” and “Disregard red lights when driving la te at night along empty roads”.We remind that this classification does not mean that features with least rate of appearance are least significant, we don’t judge the features by their importance or impact on accident involvement, we order them according to their appearance frequency in the questionnaire items.Fig.1. Pareto & ABC analysis for the DBQ2) DAX:We applied the same Pareto principle as the previous questionnaire. Figure 2 illustrates the results for the DAX. According to these results, the elements that are most present in the DAX are Aggressive expression and Carefulness. These findings are completely predictable since the questionnaire is orientated toward hostile thinking and assertive behaviors. The aggressive expressions are a combination of many acts like glaring at other drivers, shaking head as an expression of anger, yelling things like “where did you get your license?”, and getting out of the car to tell others to get out of the way, while the careful actions are presented by items such as “I pay even closer attention to being a safe driver” and “I pay even closer attention to other’s driving to avoid accidents”.Fig.2. Pareto & ABC analysis for the DAX3) MDSI:The Multidimensional Driving Style Inventory is originally designed by [11], it has demonstrated its sufficiency through many studies aiming to evaluate the correspondence between personality traits and driving habits [20,21,22] and it has been translated into many languages [23,24]. The Pareto analysis for its items is presented in figure 3.Fig.3. Pareto & ABC analysis for the MDSIThe figure shows that the features most included are Anxiousness, Sensation seeking, Anger, Use of vehicle, Carefulness, Patience, Bad perception, Inattention and Route planning. We can make the first remark about the dominant themes of the MDSI, which are emotion-driven actions. These actions are presented by items such as “blow my horn or “flash” the car in front as a way of expressing frustrations”, “feel nervous while driving” and “nearly hit something due to misjudging my gap in a parking lot”.4) DSQ:The Pareto analysis for the DSQ is represented in figure 4.Fig.4. Pareto & ABC analysis for the DSQAccording to these results, the features that appear the most in the DSQ are Carefulness, Speed and Anxiousness. These features are directly related to the objective of the questionnaire, which is modeling decision making of drivers based on their driving style. These features are present in items such as “Do you exceed the speed limit in built up areas”, “Is your driving affected by pressure from other motorists?” and “Do you find it easy to ignore distractions while driving”.5) DBI:The Pareto analysis for the DBI is represented in figure 5.Fig.5. Pareto & ABC analysis for the DBIResults show that Anxiousness is the most cited feature, which is entirely predictable since the theme of the DBI is adjusted on driver stress. Overtaking also proves to be much referred to in items such as “I feel angry when overtaken at a junction”, “I feel anxious when o vertaken at a junction”, “I do not feel indifferent when overtaking another vehicle”, “I feel satisfied when overtaking another vehicle” and “I feel tense when overtaking another vehicle”.C. Classification and SynthesisIn this section, we gather all the features that we extracted from all the questionnaires above, and we calculate the number of times they occurred as a Class A, Class B, Class C. The results are presented in table 3.Table 3. ABC classification of driver behavior featuresAll of these driving-related features are crucial in predicting driving styles, as they figure in the most cited driving behavior questionnaires. We remind that this classification does not reflect the importance nor the influence of these features on the gravity of accidents, but this categorization illustrates their consideration rate in self-report measures and behavioral studies in traffic safety field.IV. C OMPARATIVE A NALYSIS:C NPAC C ASE S TUDY A. Participants and ProcedureThe final step of our analysis is to compare theoretical results collected from scientific literature with a real life case of study. To do so, we collaborated with the National Committee for Circulation Accidents Prevention (CNPAC) of the Ministry of Transport in Morocco. We prepared a questionnaire that contains the final set of features mentioned above and we transmitted it to experts working in the road safety field to answer it according to their knowledge and experience.The questionnaire is a 4 point Likert scale, we chose this scale so we keep coherence between the testing data we get from this questionnaire and the previous theoretical results we had from the literature review. We associated the Class A, Class B, Class C and Not mentioned respectiv ely with the Likert scale choices “4” (almost always), “3” (sometimes), “2” (every once in a while) and “1” (rarely) as shown in table 4.Table 4. Scaling of driving-related featuresThe comparison process begins by collecting data from answers of the questionnaire; for each feature we calculated the number of person who checked choices “1” to “4”. The questionnaire we ended up using is presented as following:“Based on a literature review of driver behavior models, we have identified a list of features considered important for understanding this behavior. Please note, according to your judgment and experience, the involvement degree of each feature in accidents and bad driving habits.”1) To what extent do the following features appear intraffic accident statistics? Responses are on a 4point Likert scale,1 = “rarely”, 2 = “every once in a while”, 3 = “sometimes” and 4 = ‘nearly all the time’.2) To what extent do the following features contributeto dangerous driving and affect driving performance? Responses are on a 4point Likert scale 1=”very mild”, 2 = “mild”, 3 = “moderate”, 4 = “severe”.B. Statistical Analysis and ResultsTable 5. Results of Driving-related featuresCarefulness 3/5 1/5 0 1/5 5/8 3/8 0 0 0,4 Anger 2/5 0 1/5 2/5 4/8 3/8 1/8 0 0,95 Bad perception 2/5 0 0 3/5 8/8 0 0 0 1,2 Inattention 2/5 0 0 3/5 7/8 1/8 0 0 1,2 Overtaking 2/5 0 1/5 2/5 6/8 1/8 1/8 0 0,95 Speed 2/5 1/5 0 2/5 8/8 0 0 0 1,2 Absent-minded 1/5 1/5 0 3/5 3/8 5/8 0 0 1,2 Aggressive braking 1/5 1/5 0 3/5 0 3/8 5/8 0 1,6 Aggressive expression 1/5 2/5 0 2/5 0 0 2/8 6/8 1,2 Not respecting 1/5 1/5 1/5 2/5 8/8 0 0 0 1,6 Patience 1/5 0 0 4/5 1/8 7/8 0 0 1,75 Route planning 1/5 1/5 1/5 2/5 0 1/8 4/8 3/8 0,6 Sensation seeking 1/5 0 1/5 3/5 2/8 3/8 2/8 1/8 0,95 Turning 1/5 0 0 4/5 1/8 6/8 1/8 0 1,75 Use of vehicle 1/5 2/5 0 2/5 4/8 2/8 2/8 0 1,1 Alcohol consumption 0 1/5 0 4/5 5/8 3/8 0 0 1,6 Distraction 0 1/5 0 4/5 7/8 1/8 0 0 1,75 Forgetfulness 0 2/5 0 3/5 0 3/8 4/8 1/8 1 Lane changing 0 0 1/5 4/5 3/8 4/8 1/8 0 1,75 Revenge 0 1/5 1/5 3/5 4/8 4/8 0 0 1,6 Slips 0 1/5 1/5 3/5 0 2/8 3/8 3/8 0,45 Tailgating2/53/52/82/84/81,2The main objective of this comparison is to observe the differences between driving behavior questionnaire features presented in literature and the parameters taken into account by the National Committee for Circulation Accidents Prevention (CNPAC) in Morocco. We calculate the sum of absolute differences to measure the statistical difference between the two data sets.Results of the data analysis are presented in table 5. The P-value of fisher’s exact test expresses the correlation between the findings we concluded from literature and the answers of road safety experts. This test is useful for small simple sizes, which applies in our case. The sum of absolute differences is a second test to uphold the values of the fisher’s exact tes t. We are not going to consider a threshold for the p-value, but we rather identify the features with the highest p-value.Not respecting signs, Turning, Alcohol consumption and Lane changing are the features with the highest values of SAD, which means there is a major divergence between data set 1 and data set 2. They are more ranked by the road safety professionals than by driver behavior questionnaires presented in literature. This difference can be explained by the nature of measurement studies of road users conducted by the CNPAC, they primarily depend on an information system that allow following basic law application and geographical monitoring of behavioral indicators, such as the distribution of speed according to different infrastructures, seat belt wearing for different types of road users, crossing light, respect of stop signs panels, helmet wearing etc. These features are selected in order to allow an understanding of accidents trends in different groups.The results for Patience, Revenge and Distraction also show some significant difference, they have higher scores in data set 2, which is the CNPAC one. This difference demonstrates that these features have severe impacts on the number of accidents, even though they have low appearance in questionnaires.V.C ONCLUSIONThis paper analyzes driver behavior from a qualitative approach; we collected the set of driving related features from behavioral questionnaires presented in literature. These features are collected from five questionnaires that have demonstrated their efficiency through many studies they were employed in. For each questionnaire we extracted the features considered in its items and ordered them by rate of appearance according to the Pareto principle. The outcome of this phase shows twenty three main features that have been considered as major aspects in the development of self-reported measurement for driver behavior, which are ; Anxiousness, Carefulness, Anger, Bad perception, Inattention, Overtaking, Speed, Absent-minded, Aggressive braking, Aggressive expression, Not respecting signs, Patience, Route planning, Sensation seeking, Turning, Use of vehicle, Alcohol consumption, Distraction, Forgetfulness, Lane changing, Revenge, Slips, and Tailgating. These features will help create a generic model for driver behavior that includes every aspect of driving situations.After assembling these features, we collaborated with the National Committee for Circulation Accident Prevention (CNPAC) of the Ministry of Transportation of Morocco. We developed our own questionnaire that includes all previous features, which experts of road safety rated according to their knowledge and experience. The questionnaire was targeted to collect data about the importance of each feature in the unfolding of projects conducted by the CNPAC each year to monitor the evolution of traffic accidents.A limitation of the present study is the narrowed sample of our targeted population in the comparative study, with only eight professionals from the CNPAC. The results would have been more accurate if the targeted sample was diverse in terms of geographical distribution, and the questionnaire was validated by organizations from other countries than Morocco. Another limitation is the number of questionnaires we employed, if a second study is conducted with more questionnaires, results will definitely be different as the Pareto & ABC analysis is directly related to the content of the questionnaires. From the results, we observed relevant differences between the two data sets. One of the most features to have significant difference is Distraction; it scored more in the CNPAC dataset than in the literature review. This finding shows that field researches give more attention to driver’s state of attention, which translates into distraction. Not respecting signs and Alcohol consumption have also higher rates in the CNPAC data set, which can be justified by their impact on accidents statistics.This paper may be used as a reference for building a generic model for driver behavior, as we presented a set of important features that were both considered in self-report measurements researches and in field studies conducted by governmental organizations in Morocco.R EFERENCES[1]Wang, B., Hensher, D. A., & Ton, T. (2002). Safety in theroad environment: a driver behavioural response perspective. Transportation, 29(3), 253-270. DOI:10.1023/A:1015661008598.[2]de Oña, J., de Oña, R., Eboli, L., Forciniti, C., &Mazzulla, G. (2014). How to identify the key features that affect driver perception of accident risk. A comparison between Italian and Spanish driver behavior., Accident Analysis & Prevention, 73, 225-235. DOI:10.1016/j.aap.2014.09.020.[3]Green, M. (2000). " How long does it take to stop?"Methodological analysis of driver perception-brake times.Transportation human features, 2(3), 195-216. DOI:10.1207/STHF0203_1.[4]Olson, P. L., Dewar, R., & Farber, E. (2010). Forensicaspects of driver perception and response.[5]Bella, F. (2013). Driver perception of roadsideconfigurations on two-lane rural roads: Effects on speed and lateral placement., Accident Analysis & Prevention, 50, 251-262. DOI: 10.1016/j.aap.2012.04.015.[6]Guo, F., & Fang, Y. (2013). Individual driver riskassessment using naturalistic driving data. AccidentAnalysis & Prevention, 61, 3-9. DOI:10.1016/j.aap.2012.06.014.[7]Jonah, B. A. (1986). Accident risk and risk-takingbehaviour among young drivers. Accident Analysis & Prevention, 18(4), 255-271. DOI: 10.1016/0001-4575(86)90041-2.[8]J. P. F. &. D. P. (. Cestac, Young drivers’ sensationseeking, subjective norms, and perceived behavioral control and their roles in predicting speeding intention:How risk-taking motivations evolve with gender and driving experience, Safety science, 49(3), 424-432. DOI:10.1016/j.ssci.2010.10.007.[9]Reason, J., Manstead, A., Stradling, S., Baxter, J., &Campbell, K. (1990). Errors and violations on the roads: areal distinction?. Ergonomics, 33(10-11), 1315-1332. DOI:10.1080/00140139008925335.[10]Deffenbacher, J. L., Lynch, R. S., Oetting, E. R., &Swaim, R. C. (2002). The Driving Anger ExpressionInventory: A measure of how people express their angeron the road., Behaviour research and therapy, 40(6), 717-737. DOI: 10.1016/S0005-7967(01)00063-8.[11]Taubman-Ben-Ari, O., Mikulincer, M. and Gillath, O.(2004)a. The multidimensional driving style inventory—scale construct and validation. Accident Analysis &Prevention, 36(3), pp.323-332. DOI: 10.1016/S0001-4575(03)00010-1.[12]Taubman-Ben-Ari, O., Mikulincer, M., & Iram, A.(2004)b. A multi-featureial framework for understanding reckless driving—appraisal indicators and perceived environmental determinants., Transportation Research Part F: Traffic Psychology and Behaviour, 7(6), 333-349.DOI: 10.1016/j.trf.2004.10.001.[13]Wiesenthal, D. L., Hennessy, D., & Gibson, P. M. (2000).The Driving Vengeance Questionnaire (DVQ): The development of a scale to measure deviant drivers' attitudes. Violence and Victims, 15(2), 115.[14]French, D. J., West, R. J., Elander, J., & Wilding, J. M.(1993). Decision-making style, driving style, and self-reported involvement in road traffic accidents.Ergonomics, 36(6), 627-644. DOI:10.1080/00140139308967925[15]Gulian, E., Matthews, G., Glendon, A. I., Davies, D. R.,& Debney, L. M. (1989). Dimensions of driver stress.Ergonomics, 32(6), 585-602. DOI:10.1080/00140138908966134.[16]Deffenbacher, J. L., Oetting, E. R., & Lynch, R. S. (1994).Development of a driving anger scale. Psychological reports, 74(1), 83-91.[17]Lucidi, F., Mallia, L., Lazuras, L., & Violani, C. (2014).Personality and attitudes as predictors of risky drivingamong older drivers. Accident Analysis & Prevention, 72,318-324. DOI: 10.1016/j.aap.2014.07.022.[18]Mallia, L., Lazuras, L., Violani, C., & Lucidi, F. (2015).Crash risk and aberrant driving behaviors among bus drivers: the role of personality and attitudes towardstraffic safety. Accident Analysis & Prevention, 79, 145-151., DOI: 10.1016/j.aap.2015.03.034.[19]Rowe, R., Roman, G. D., McKenna, F. P., Barker, E., &Poulter, D. (2015). Measuring errors and violations on theroad: A bifeature modeling approach to the Driver Behavior Questionnaire.,Accident Analysis & Prevention, 74, 118-125. DOI: 10.1016/j.aap.2014.10.012. [20]Wickens, C. M., Mann, R. E., Stoduto, G., Butters, J. E.,Ialomiteanu, A., & Smart, R. G. (2012). Does gender moderate the relationship between driver aggression and its risk features?, Accident Analysis & Prevention, 45, 10-18. DOI: 10.1016/j.aap.2011.11.013.[21]Zhang, T., Chan, A. H., & Zhang, W. (2015). Dimensionsof driving anger and their relationships with aberrant driving. Accident Analysis & Prevention, 81, 124-133.DOI: 10.1016/j.aap.2015.05.005.[22]Feature, R., Mahalel, D., & Yair, G. (2008). Inter-groupdifferences in road-traffic crash involvement. Accident Analysis & Prevention, 40(6), 2000-2007. DOI:10.1016/j.aap.2008.08.022.[23]Poó, F.M., Taubman - Ben-Ari, O., Ledesma, R.D., Díaz-Lázaro, C.M., 2013. Reliability and validity of a Spanish-language version of the multidimensional driving style inventory., Transp. Res. Part F: Traffic Psychol. Behav.17, 75–87. DOI: 10.1016/j.trf.2012.10.003.[24]Holman, A.C., Havârneanu, C.E., 2015. The Romanianversion of the multidimensional driving style inventory: psychometric properties and cultural specificities, Transp.Res. Part F: Traffic Psychol. Behav. 35, 45–59. DOI:10.1016/j.trf.2015.10.001.Authors’ ProfilesKawtar Zinebi obtained an engineeringdegree in industrial management andproduction systems from MINES-RABAT school in 2015. She is currentlypursuing a PhD in driver behaviormodeling at Mohammadia School ofEngineering.Pr. Nissrine Souissi is a fulltimeprofessor at the MINES-RABAT School,Morocco. She obtained a PhD incomputer science from the University ofParis XII in 2006, France and an engineerdegree in computer engineering fromMohammadia School of Engineers in2001, Morocco. Her research interests include process engineering, business process management, databases, data lifecycle, smart data, hospital information system, and information system.Pr. Kawtar Tikito is a fulltime professorat the MINES-RABAT School, Morocco.She obtained a PhD in computer sciencefrom the University Mohammed V ofRabat , Morocco and an engineer degreein computer engineering from HigherNational School of Computer Science andSystems Analysis -ENSIAS, Morocco. Her research interests include system analysis, system optimization, information system and supply chain management。

基于 ICAP 处理器的运行时可重构加密算法的设计与实现(IJCNIS-V11-N12-2)

基于 ICAP 处理器的运行时可重构加密算法的设计与实现(IJCNIS-V11-N12-2)

I. J. Computer Network and Information Security, 2019, 12, 10-16Published Online December 2019 in MECS (/)DOI: 10.5815/ijcnis.2019.12.02Design and Implementation of Runtime Reconfigurable Encryption Algorithms usingCustom ICAP ProcessorJamuna SDayanandaSagar College of Engineering, Bengaluru, IndiaE-mail:jamuna-ece@Dinesha PDayanandaSagar College of Engineering, Bengaluru, IndiaE-mail:drdinesh-ece@K PShashikalaDayanandaSagar College of Engineering, Bengaluru, IndiaE-mail:shashikala-ece@Kishore Kumar KDayanandaSagar College of Engineering, Bengaluru, IndiaE-mail:kishorekalluri8@Received: 27 August 2019; Accepted: 16 October 2019; Published: 08 December 2019Abstract—Field programmable gate arrays (FPGAs) are the reconfigurable logic devices which are widely used in many applications like space missions, automotive electronics, complex computing systems and system prototyping. Run time reconfigurability feature supported in high end FPGAs allows the designer to optimize design with respect to resource utilization and power consumption. Using partial reconfiguration a specific part of the FPGA can be reconfigured at run time without altering the original design. In data communication, safety and confidentiality of data is achieved through a suitable encryption algorithm. Encryption is most important aspect when it comes to security. Design flexibility can be increased by providing an option to the user to select a particular algorithm as per the requirement. Instead of using a single algorithm to encrypt data, multiple algorithms can be used with an option to switch between the algorithms. Thus optimizing the resource utilization and also can avoid security breach. Through this work, an attempt is made to include reconfiguration of the design at run-time. This design implements different encryption algorithms at different instance of time. In this paper two encryption algorithms i.e. Advance Encryption Standard (AES) and TwoFish both of 128-bit are chosen to reconfigure at runtime using a custom ICAP (Internal Configuration Access Port) controller IP provided by Xilinx and is implemented on Zedboard.Main advantage of this implementation is that the user have an option to switch between two algorithms, thus helping in overall resource optimization.Index Terms—Encryption, FPGA, ICAP Processor, Partial Reconfiguration.I.I NTRODUCTIONField Programmable Gate Arrays (FPGAs) are gaining importance because of the advantages they offer. They are flexible to implement any type of design.IP based design helps in reducing the design time and also feature like partial reconfiguration have added extra benefit to the FPGA. Reconfiguration at runtime reduces resource utilization and power consumption. During implementation partial bit files can be generated and used for reconfiguring a specific part in FPGA at runtime without altering the design. This can be carried out with the help of Internal Configuration Access Port (ICAP) [1]. It is a hard wired primitive, which allows user to access configuration memory. The partial bit files can be stored in either internal or external memory and during reconfiguration; they are transferred toconfiguration memory through ICAP. Run time reconfiguration is also called as dynamic partial reconfiguration (DPR) [2]. It is been widely used in a wide range of applications like mission critical applications and self-adaptive systems. Now a day’s data security is becoming a tough task since various attacks are making it difficult to communicate data without breach. Encryption plays a vital role in data management. Ensuring security of data pertaining to basic emails and to the most important bank data is a biggest challenge. Normally, in encryptionprocess, the secret data is combined with a specific key and a cipher text is generated which is then communicated. These encryption algorithms are classified into two types: Symmetric key and Asymmetric key encryption. If same key is used for encryption and decryption of data then it is called symmetric otherwise it is asymmetric. AES, Twofish, 3DES,Blowfish, RC5 algorithms are the important symmetric type algorithms[3].Objective of the proposed work is to validate runtime reconfiguration feature through Encryption algorithms. Two encryption algorithms namely AES and Twofish are designed using Verilog. Partial reconfiguration concept is applied for selecting any one algorithm at a time. This is performed using custom ICAP processor IP available in the Xilinx Vivado IDE. This processor requires basically three input signals i.e. ICAP_go, bitstreamlength and reconfiguration done signals. Initially partial bit streamfiles are stored in SD card and when partial reconfiguration is initiated, the appropriate partial bit files are then stored in DDR, and from there to ICAP processor. The proposed design has one reconfigurable partition (RP) with two functional reconfigurable modules. The ICAP signals are monitored using integrated logic analyzer (ILA) and the inputs and outputs are provided using virtual input-output IP (VIO). The entire design is implemented on Zed board.The paper is organized as: section 2,outlines previous related work; section 3, briefly describes the encryption algorithms; section 4, describes the proposed design implementation; section 5 shows the simulation results; finally, the conclusion and future work are followed in section 6.II.P REVIOUS R ELATED W ORKIn this section, most relevant works of encryption algorithms and partial reconfiguration are detailed. Yuwen Zhu et al [7] have implemented AES for 128, 192 and 256 bits on Virtex- V kit. They have tried to select any one key length at a time as per the requirement. They claim that hardware efficiency is better compared to other similar works. Only one type of algorithm is considered.Ye Yuan et al [8] have proposed a high performance AES system which works for all three key lengths. As they implemented the design based on pipelining concept, area and throughput are improved. ShuchishmanBurman et al [9] have proposed AES design considering different key sizes like 128-bit, 192-bit and 256-bit and used reconfiguration concept. They also implemented high speed and low area AES and on Zed board. Madhumita Panda [10] compared symmetric i.e. AES, Blowfish and DES design with asymmetric i.e. RSA cryptographic algorithms by taking text, binary and image files. Three parameters decryption time, encryption time and throughput are considered for comparison. Rashmi Mahajan et al [11] proposed a method to implement AES encryption with reconfigurable keys and it stands a good solution for preserving secrecy and also convenient in the numeric communication. Ramesh Yegireddi et al. [12] surveyed different commonly used encryption algorithms and reported their vulnerabilities so that they can be implemented correctly. This survey intended to design a new secure conventional encryption algorithm in Cryptography. Rizvi et al [13] performed analysis between security and performance of Twofish and AES algorithms. Initially they considered safety factor and encryption speed for both the algorithms by encrypting image, text and audio. They also analyzed performance of these algorithms in terms of throughput. Pil-Joong Kang et al. [14] proposed MDS-M2 Twofish algorithm that can be used for wireless communication. MDS-M2 block, modified version of MDS block is developed. The comparison proved improved speed, decreased complexity and power. A total of 11% improvement is achieved with MDS-M2 block and it also proved to be suitable for wireless data communication.III.E NCRYPTION A LGORITHMS AND R UN-T IMER ECONFIGURABILITYA. AES EncryptionAES is developed by Rijmen and JhonDeamen hence also known as Rijndeal. It is an alternative for Data Encryption Standard (DES). It stands good with both software and hardware. It is established for digital data encryption which is specified by National Institute of Standards and Technology (NIST), U.S. in 2001.[2,4, 15-18] AES can be used with 128-bit block size and it has three variants in which key length changes i.e. 128, 192 and 256 bits wide as shown in Figure 1.Fig.1. Block diagram of AESAES has N rounds which changes with the key width (128 bit: 10 rounds, 192 bit: 12 rounds, 256 bit:14rounds). Table 1 shoes the size of parameters for AES encryption. Four transformations named sub bytes, shift rows, mix columns and add round key are considered for AES encryption. Initially, before first round i.e. round 0, only add around key transformation is done for plain text. From 1 to N-2 round all the four transformations are performed but for N-1 round mix column is excluded. There are three functions in key expansion unit, rotate word, substitute word and reconfiguration unit. In rotate word 1-bit circular left shift is performed. Substitute word transforms 32-bit key word and reconfiguration unit does XOR with round constant.Table 1. AES parameters [2, 12, 15]B. Twofish EncryptionTwofish belongs to the symmetric key cipher similar to the AES. It is derives from Blowfish, Square and SAFER. It has a block size of 128-bits and a key size extendable up to 256-bits. It has a total of 16 rounds [5,6]. Similar to DES, Twofish also has a feistel structure and works on a maximum distance separable matrix. Figure 2 shows the block diagram for Twofish encryption. Initially for twofish, input whitening is performed by dividing 128-bit plain text into four parts each of 32-bits wide and performing exclusive-or with sub-keys. [2, 9]These 32-bit sub-keys are generated using sub-keygenerators.F-function contains two g-functions which comprises of S-box and MDS matrix multiplier. The outputs from two g-functions are combined to perform Pseudo Hadamard Transform (PHT). For the next round, two F-functions exchange their positions. After the final round (16th round), swapping is done and the result is passed through output whitening to get cipher text.Fig.2. Block diagram for Twofish algorithmC. Run-time ReconfigurabilityOne of the most important features of high-end FPGA devices is partial reconfiguration. It allows user to change the functionality of a specified area in FPGA without the need to alter the overall design. The main advantages of partial reconfiguration are reduction in power, size and cost of the design as compared to the normal design techniques [1].To implement reconfiguration, special bitstreams called partial bitstreams are generated which are then used in later stages to reconfigure the functionality at runtime. This is done through a configuration interface called ICAP which allows user to access (writing or reading) the configuration data. Fig. 3 depicts features ofthe ICAP module.Fig.3. ICAP PrimitiveIV. D ESIGN M ETHODOLOGYIn the proposed design switching between AES and Twofish algorithms are implemented using ICAP processor and UART port available on zed board. Initially individual algorithms are designed, synthesized and implemented to obtain respective partial bit files. This processor assists in realizing dynamic reconfiguration . Fig 4 shows the internal block details of the FPGA present on the ZED board. It mainly consists of processor section (PS) and programmable logic section (PL).Initially in the device floor-plan, a single partition (reconfigurable partition-RP) is created to accommodate partial reconfigurable blocks of encryption algorithms.Fig.4. Block diagram of the proposed designThis pre-defined partition region gets mapped with any one of the module at a time depending on the control signal. During the implementation process, AES and Twofish algorithms are defined individually as reconfigurable modules. Later, AES and Twofish are added in the RP since both AES and Twofish modules to be reconfigured. After implementation and bitstream generation, three partial (AES, Twofish and Blank) and one full bitstream are generated. Initially partial bitstreamfiles are stored in SD card and when partial reconfiguration is initiated, appropriate partial bit files are then stored in DDR, and from there to ICAP processor as shown in Figure 4. Reconfiguration is carried out through UART port. Three control inputs are included for specifying a particular encryption module to be executed. They are A, T and B for the blank module. Three partial bitstrams are reconfigured with a specific name each i.e.pressing A reconfigures AES; T reconfigures Twofish and B for Blank. The ICAP signals are monitored using integrated logic analyzer (ILA) and the inputs and outputs are provided using virtual input/ output (VIO). The complete design implementation is done on zedboard. The proposed design is simulated and then synthesized before implementing on the hardware ZED board. Fig 5 shows the outcome of synthesis process. The synthesis tool generated module level schematic of the proposed design overview is as in fig 5. Block design named system_i and reconfigurable encoder is highlighted and the overall design is shown in the right down corner as world view.Fig.5. RTL schematic of the proposed designA. Power Estimation Power consumed for implemented design is estimated from the tool generated report. The static and dynamic power report is shown in Table 2. It is the report as generated by the Vivado tool. The total power is 1.769W.Table 2. Power consumption of overall designB. Resource Utilization ReportThe final design is mapped on the FPGA device LUTs, registers etc. Table 3 shows the resource utilization summary for each internal block in the proposed design. It is been compiled based on the Vivado tool generated report after synthesizing the design.Table 3. Utilization summaryV. S IMULATION R ESULTSAs per the proposed methodology, design has been coded using Verlog-HDL. It is verified through simulation using ISIM simulator present in the Vivado IDE. Different combinations of input keys are considered as inputs and the outputs are checked. Fig 6 depicts both input and output values as a timing diagram.For AES encryption following are considered: Plain text: 0x0f0ffff, Cipher key: 0x0ff,Cipher key: 4cb227245c89afa8e431bd0098b5a846.Other details are mentioned in simulation outputs for AES and Twofish separately as shown in figure 6 and 7 respectively.Fig.6. Output for AES encryptionDifferent combinations of input keys are applied as inputs for the Twofish algorithm and the outputs are checked. Fig. 7 depicts both input and output values as a timing diagram.For Twofish encryption following are considered: Plain text: 0x0ffff0000ffff, Cipher key: 0x0ff00,Cipher key: c562b3685bcc5a1df489180ef5eb2198.Fig.7. Output for Twofish encryptionFig 8 shows the floorplan of the implemented design. The highlighted areas shows different modules placed on the zedboardZynq Evaluation and Development Kit (xc7z020clg484-1) after placement and routing. Partial reconfiguration region in the floorplan is dedicated only for reconfiguration; no static design can be placed in this region.Fig 9 shows the terminal window after connecting to the UART. Different reconfigurations can be observed by sending A (AES), B (Blank), T (twofish) and Q (quit). These commands are transferred to the processor though UART i.e. RS232 from PC.Fig.9. Terminal windowFig. 10 shows the ILA window; here various ICAP signals are monitored during reconfiguration.Fig.10. ILA windowThe ICAP_data_out signal (ffffff9b) shows that partial reconfiguration is successfully done. Figure 11 shows the VIO window where inputs can be forced and output can be monitored. This window shows the encrypted output after AES reconfiguration. Similarly results were obtained for twofish algorithm on VIO after two fish reconfiguration.Fig.11. VIO windowProposed design is been compared with the similar works as given in table 4. It does not give an exhaustive comparison, since very few papers were found in the available literature and also most of them have concentrated on only one algorithm. These works have not targeted on resource optimization. In the proposed design two different encryption algorithms were considered with a set of limited hardware resources, thus achieving area optimization.Table 4. Comparison with the existing techniquesVI.C ONCLUSIONThis paper explained about the implementation of reconfigurable encryption algorithms. A design methodology is illustrated which helps the user to select the type of algorithm depending on the requirement. ICAP processor was used for realizing run-time reconfiguration. Any digital application can be designed as a flexible design through runtime reconfiguration with less number of hardware resources. Resource utilization and power consumption are tabulated. It is been planned to implement three encryption algorithms based on the same methodology. In addition to resource optimization, ,reliability aspect for the design will be introduced in future. Since fault tolerance is a very important aspect for any system-on chip designs, it is been planned to implement encryption algorithm as fault tolerant design through single event upset management.A CKNOWLEDGEMENTThis work is been carried out as a part of DRDO- ERIP/ER/DG-Med&CoS/990916502/M/01/1659sponsored research work in the Department. We are grateful for the financial support provided.R EFERENCES[1]Xilinx “Partial Reconfiguration User Guide” UG 702.[2]“Practical cryptography”, Text book Ferguson N. SchneierB. Wiley, 2003 ISBN-0471223573, 9780471223573.[3]Xilinx “7 Series FPGAs Configuration User Guide”UG470.[4]Divya, Dinesha P, Jamuna S, “ Implementation ofAdvanced Encryption standard in Vivado Design sui te”JEITR, volume 5, August 2018[5]Aparna. K, Jyothy Solomon, Harini . M, Indhumathi “AStudy of Twofish Algorithm” 2016 IJEDR | Volume 4, Issue 2 | ISSN: 2321-9939[6]Sanjay Kumar, Shashi Bhushan Thakur, Yogesh, Sanjeethand Dr. Jamuna S, " Design and Implementation of Two Fish Encryption algorithm on ZED board", IJSRR, Volume 8, Issue 5, May 2019[7]Yuwen Zhu, Hongqi Zhang, YibaoBao “Study of the AESRealization Method on the Reconfigurable Hardware,”2013 International Conference on Computer Sciences and Applications. DOI: 10.1109/CSA.2013.23[8]Ye Yuan, Yijun Yang, Liji Wu, Xiangmin Zhang , “AHigh Performance Encryption System Based on AES Algorithm with Novel Hardware Implementation,” IEEE conference. DOI: 10.1109/EDSSC.2018.8487056[9]S. Burman, P. Rangababu and K. Datta, "Development ofdynamic reconfiguration implementation of AES on FPGA platform," 2017 Devices for Integrated Circuit (DevIC), Kalyani, 2017, pp. 247-251. DOI: 10.1109/DEVIC. 2017.8073945.[10]SnehalWankhade and Rashmi Mah ajan. “Dynamic partialreconfiguration implementation of AES algorithm,”International Journal of Computer Applications, 97(3), 2014. DOI: 10.5120/16986-7084[11]R. Yegireddi and R. K. Kumar, "A survey on conventionalencryption algorithms of Cryptography," 2016 International Conference on ICT in Business Industry & Government (ICTBIG),Indore, 2016, pp.1-4. DOI:10.1109/ ICTBIG. 2016.7892684.[12]S. A. M. Rizvi, S. Z. Hussainand N. Wadhwa, "Performance Analysis of AES and TwoFish Encryption Schemes," 2011 International Conference on Communication Systems and Network Technologies,Katra, Jammu, 2011, pp. 76-79. DOI: 10.1109/CSNT.2011.160.[13]M. Panda, "Performance analysis of encryption algorithmsfor security," 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), Paralakhemundi, 2016, pp. 278-284.DOI: 10.1109/SCOPES.2016.7955835.[14]Pil-Joong Kang, Seon-Keun Lee and Hwan-Yong Kim,"Study on the design of MDS-M2 Twofish cryptographic algorithm adapted to wireless communication," 2006 8th International Conference Advanced Communication Technology, Phoenix Park, 2006, pp. 4 pp.-695.DOI: 10.1109/ICACT.2006.206060.[15]Zine El AbidineAlaouiIsmaili and Ahmed Moussa. Self-partial and dynamic reconfiguration implementation for aes using fpga. ArXiv preprint arXiv:0909.2369, 2009. [16]PUB FIPS. 197, advanced encryption standard (aes),national institute of standards and technology, us department of commerce (November 2001). Link in: http://csrc. nist. gov/publications/fips/fips197/fips-197, 2009.[17]PawelChodowiec, Po Khuon, and Kris Gaj. Fastimplementations of secret-key block ciphers using mixedinner-and outer-round pipelining. In Proceedings of the 2001 ACM/SIGDA ninth international symposium on Field programmable gate arrays, pages 94–102. ACM, 2001.[18]Jos´e M Granado-Criado, Miguel A Vega-Rodr´ıguez,Juan M S´anchez- P´erez, and Juan A G´omez-Pulido. A new methodology to implement the aes algorithm using partial and dynamic reconfiguration. INTEGRATION, the VLSI journal, 43(1):72–80, 2010.Authors’ ProfilesJamuna S is working asa Professor in thedepartment of ECE, DayanandaSagarCollege of Engineering, Bangalore, Indiasince 2008. She has done M.Tech in VLSIDesign and Embedded Systems from VTU,Belgaum and Ph.D fromJNTU,Hyderabad.Her research domain includes VLSI design, verification and testing. She is currently, executing a funded project as principal investigator in thedepartment. Research funds are sanctioned from DRDO, New Delhi, India.Dinesha P is a Professor, Department ofElectronics and CommunicatingEngineering,Bangalore, India. He received his Ph. Ddegree from University of Mysore, India, inthe year 2014. His research interest is inVLSI Design (Digital Design), DigitalSystem Design and Nanotechnology (Applications of conducting polymer composites).KPShashikala is an associate professor inDayanandaSagar College of Engineering;Bangalore, India .She did her Bachelors inElectronics from MSRIT,Bangalore.Masters in DigitalCommunication from BMSCE, Bengaluru,and Doctorate in PalmprintBiometrics from Rayalseema University Kurnool, AP. Her areas of interests include Biometrics, Image processing and Digital Communication.Kishore Kumar K is working as a JuniorResearch Fellow in the department of ECE,DayanandaSagar College of Engineering,Bengalru, India. He has done M.Tech inVLSI design and embeddedsystemsfrom Bengaluru Institute ofTechnology, Bengaluru. His research domain includes VLSI design and Verification.How to cite this paper: Jamuna S, Dinesha P, K PShashikala, Kishore Kumar K, "Design and Implementation of Runtime Reconfigurable Encryption Algorithms using Custom ICAP Processor", International Journal of Computer Network and Information Security(IJCNIS), Vol.11, No.12, pp.10-16, 2019. DOI: 10.5815/ijcnis.2019.12.02。

Genetic Algorithm Framework for Spike Sorting(IJIGSP-V7-N4-5)

Genetic Algorithm Framework for Spike Sorting(IJIGSP-V7-N4-5)

Genetic Algorithm Framework for Spike Sorting
Sajjad Farashi
Shahid Beheshti University of Medical Sciences, Faculty of Medicine, Tehran,Iran E-mail: farashi@sbmu.ac.ir
Mohammad Mikaili
Department of Biomedical Engineering, Faculty of Engineering, Shahed University, Tehran, Iran E-mail: mikaili@shahed.ac.ir Abstract—Spike sorting involves clustering spikes according to the similarity of their shapes. Usually the sorting procedure is carried out by extracting appropriate features of neuronal spikes. In this study a new spike sorting procedure based on genetic algorithm is developed which contains two distinct phases. In the first phase a B-spline curve is fitted to each spike waveform and then the optimal features are selected from parameters of fitted B-spline curves. The genetic alg

Call for Papers

Call for Papers

Call for Papers佚名【期刊名称】《美中外语》【年(卷),期】2021(8)3【摘要】Launched in August 2014, the journal Confucian Academy (Chinese Thought and Culture Review) [ISSN 2095-8536, CN 52-5035/C] is a leading Chinese-English bilingual scholarly journal dedicated to traditional Chinese thought and culture in prompting conversations among world civilizations. Confucian Academy cordially invites the submission of manuscripts for consideration for the next issue. Authors may submit manuscripts in Chinese or English while Chinese- English bilingual manuscripts are strongly preferred, in which case authors will receive a double payment upon publication. The corresponding author of an accepted manuscript will be noti ed and receive credit for payment. Confucian Academy additionally provides the corresponding author with two complimentary copies of the print issue in which the article appears.【总页数】2页(PI0116-I0117)【正文语种】中文【中图分类】G23【相关文献】1.Acta Geologica Sinica (English Edition) Calls For Submission of Review Papers2.Acta Geologica Sinica(English Edition) Calls for Submission of Review Papers3.Acta Geologica Sinica(English Edition) Calls for Open-dated Submission of Paleontological Papers4.First Announcement and Call for Papers --First Announcement and Call for Papers 7th International Workshop of Geographical Information System (IWGIS'07) August, 2007, Beijing, China5.Acta Geologica Sinica(English Edition) Calls for Submission of Review Papers因版权原因,仅展示原文概要,查看原文内容请购买。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

The 21st InternAssociation for Inte The 11th Biennual Intern Intercul Conference Theme: “Culture, C Conference Time: July 15-18Conference Venue: The Hong K Conference Goals:• To provide scholars, educato opportunities to interact, netw intercultural communication • To synthesize research perspe integrated approaches to com • To advance the methodology findings to facilitate understa • To foster global intercultural and other stakeholders world communication issues.Topic areas are broadly defined Advertising and marketing ac Bilingual and multilingual co Bilingual education Comparative literature Conflict, mediation and nego Cultures Corporate culture and manag Crisis/risk communication Cross-cultural adaptation Cross-cultural interaction Culture and diplomacy Digital communication acros Ethnic studies Gender issues and communic Glocalization Group/Organizational comm Health communication Intercultural communication Intercultural communication nternational Conference of the Intern or Intercultural Communication Stud cumInternational Conference of the China tercultural Communication (CAFIC)Call for Submissionsure, Communication, and Hybridity in an Age of G 8, 2015ong Kong Polytechnic University, Hong Kongucators and practitioners from different cultural co t, network and benefit from each other’s research a ation issues;perspectives and foster interdisciplinary scholarly d o complex problems of communication across cult ology for intercultural communication research an derstanding across cultures;ltural sensitivity and involve educators, business p worldwide in the discourse about diversity and tran efined as, but not limited to, the following:ing across cultures ual communication d negotiation across management ion on across cultures munication communication ation competence ation and politics Intercultural and multili Intercultural pragmatics Interethnic communicat Interpersonal communic Language and cultural h Language planning and Media and transcultural Multiple cultures and in Philosophy and human b Psychological communi Public opinions and pub Public relationsRhetorical communicati Second language educat Social media and comm Sustainability and globa Transculturality in globa Translation studiesVerbal and nonverbal coInternationalStudies (IAICS)China Association forAFIC)e of Globalization ” ral communities witharch and expertise related to larly dialogues for developing s cultures;ch and disseminate practical ness professionals, students nd transculturalmultilingual education maticsunication and relations munication and relations ural hybridityg and policyltural communication and interculturalityman behavior patterns mmunication studiesd public policynicationeducationcommunicationglobalizationglobal contextbal communicationCategories: Abstract, panel prop • Abstract, 150-250 words in E addresses for all authors. • Panel proposals reflecting the provide a 100-word rationale affiliation and email addresse • Workshop proposals relevan pages in length, single spacedDeadline : Please submit abstract roundtable discussion session Submission to : iaics-cafic.2015Conference Working Languag Conference host: Department o UniversityConference website : http://wwwThe DevelopmentThe present study developed Intercultural Sensitivity Scale (important for intercultural sensi sample of 414 college students instrument which contains five f indicated that the ISS was sign attentiveness, impression reward the predicted validity test from scored high in intercultural effe limitations and future directionGuidelines for Submissionsl proposals, and workshop proposals may be accep ds in English, including positions, affiliations, emang the conference theme may be submitted. All pa ionale and a 100-200 word abstract of each panelis dresses for each panelist.levant to the conference theme may be submitted. spaced.bstracts by January 11, 2015, and panel/workshop essions by February 1, 2015. 2015@.hknguages : English and Chinesement of Chinese and Bilingual Studies, The Hong K //.hk/2015iaics_cafic/; http://w Sample Abstractment and Validation of the Intercultural SensitiGuo-Ming Chen, Ph.D.Department of Communication StudiesUniversity of Rhode IslandKingston, RI 02881, USAEmail: gmchen@oped and assessed reliability and validity a cale (ISS). Based on a review of the literature, sensitivity were generated for the purpose an udents rated these items and generated a 24- five factors. An assessment of concurrent validit s significantly correlated with other related scale ewarding, self-esteem, self-monitoring, and perspe from 174 participants showed that individuals wi l effectiveness and intercultural communication ation for the study in this line of research were disc accepted., email addresses and mailing All panel proposals should anelist's paper; include itted. Proposals should be 3-5 kshop proposals andong Kong Polytechnic p:///iaics/ ensitivity Scaleof a new instrument, the ture, 44 items thought to be of analyses in this study. A -item final version of the alidity from 162 participants scales, including interaction erspective taking. In addition, als with high ISS scores also tion attitude scales. Potential e discussed as well.。

相关文档
最新文档