{"title":"Learning through the Design of Interactive Storie: Exploring the Concept of Storyworld","authors":"G. Dettori","doi":"10.1109/INCoS.2016.75","DOIUrl":"https://doi.org/10.1109/INCoS.2016.75","url":null,"abstract":"Storytelling is widely recognized as a powerful tool to enhance learning, because of its support to meaning making and to the development of expressive (possibly multimodal) skills. An interesting variant to storytelling-based learning activities is the construction of storyworlds apt to support the development of interactive stories. This differs from the design of traditional story plots in that storyworlds represent collections of possibilities to be combined in various ways, rather then pre-defined sequences of events, from which different plots can emerge, at every use of the story, from the interaction between user and story-environment. This contribution aims to reflect on the process of constructing a story world, highlighting how this type of construction implies a different mental activity and skill development than traditional storytelling.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126519644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Related-Key Impossible Differential Attack on MIBS-80","authors":"Lu Cheng, Peng Xu, Yuechuan Wei","doi":"10.1109/INCoS.2016.41","DOIUrl":"https://doi.org/10.1109/INCoS.2016.41","url":null,"abstract":"MIBS is a lightweight block cipher designed by M. Izadi et al in 2009 for tiny computing devices, such as RFID tags and sensor network nodes. The cipher algorithm iterates a Feistel structure with SP type round function by 32 rounds. It with 64-bit block size and supports 64/80-bit key size. In this paper, a new related-key impossible differential attacks to reduced-round MIBS with 80 bit keys is presented. By carefully choosing the relations of keys, a new 8 rounds related-key differential trials is constructed, by using which we first break 15-round MIBS with 80 bit keys. This result improves the known impossible differential attack on MIBS-80 by one round.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125644535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retail Commodity Sale Forecast Model Based on Data Mining","authors":"Jing Zhang, Juan Li","doi":"10.1109/INCoS.2016.42","DOIUrl":"https://doi.org/10.1109/INCoS.2016.42","url":null,"abstract":"In terms of the retail commodity sale forecast, people did more in particular aspect with commodity's single sale attribute such as the sale volume, the sale money, the season factor, but all has not considered the most important factor-profit, the profit is the key factor of retail enterprises winning the survival and development. However, such a one-sided analysis is not conducive to assist the managers understand the overall situation of retail sales, and make the decision the sale and the inventory. So this paper firstly selected the profit ratio which was on behalf of commodity profit element and several other key sale attributes including the season ratio and the sale volume to establish the SPV Model, secondly done commodity sale state segmentation based on the SPV Model with ID3 decision tree algorithm, And on this basis we predicted the sale state of the commodity at some future time, Finally, we compared and analysis the results of the SPV Model, the Season Model and the Markov Model through experiments, and get the conclusion that the SPV Model can reach higher correctness than the other two.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132708245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abir Awad, Sara Kadry, Guraraj Maddodi, Saul Gill, Brian A. Lee
{"title":"Data Leakage Detection Using System Call Provenance","authors":"Abir Awad, Sara Kadry, Guraraj Maddodi, Saul Gill, Brian A. Lee","doi":"10.1109/INCoS.2016.95","DOIUrl":"https://doi.org/10.1109/INCoS.2016.95","url":null,"abstract":"Data leakage has become a problem of epidemic proportions with very serious consequences for businesses and their customers. Experts warn that it is very difficult for organisations to avoid infiltration and that they should be prepared for such events. Proactive detection of ongoing attacks is therefore critically important. In this paper we describe the design and implementation of Peeper, a policy based system for data leakage detection that utilizes operating system call provenance. The implementation of our scheme shows that it enables real-time data detection of data leakage. It tracks the operations performed on sensitive files and issues alerts if suspicious activities are detected.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131453690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Benefits and Risks of Enterprise Social Networks","authors":"M. Drahosová, P. Balco","doi":"10.1109/INCoS.2016.76","DOIUrl":"https://doi.org/10.1109/INCoS.2016.76","url":null,"abstract":"The topic of traditional social media such as Facebook, Twitter or LinkedIn, is for all common and talked over. We all know them and we use them every day. They include all digital systems that enable people to mutually connect and communicate together. But the issue of corporate social networks such as Skype for Business, Yammer or Tibbr is not so often and in detail communicated. They allow employees of one or more organizations communicate with each other. This provides the opportunity to benefit with similar characteristics which are offered by traditional social media. This article aims to explain the issue of enterprise social networks that are used in organizations. At the outset of the article, we will describe the principle and specifics of enterprise social networks. Then we will talk about the benefits and risks associated with their use.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123826810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Infrared and Visible Light Image Fusion Based on the Non-subsample Shearlet Transform and Heat Source Concentration Ratio","authors":"Jie Luo, W. Kong","doi":"10.1109/INCoS.2016.39","DOIUrl":"https://doi.org/10.1109/INCoS.2016.39","url":null,"abstract":"Image fusion is the technology that use image processing algorithm to integrate different and complementary information form two or more images to create a new collection which is more accurate and convenient for the further use. As one significant component of the Image Processing, Image fusion is widely employed in many aspects, such as medical diagnose, military reconnaissance and remote sensing survey. To get a fused image which combines the target information and features of infrared and visible light image, a fusion method based on the Non-subsample Shearlet Transform (NSST) and heat source concentration ratio is presented in this paper. Compared with the traditional contourlet transform, NSST can overcome the limitation in directional decomposition and has excellent shift invariance. The input is decomposed to two parts by the transform, a new fusion rule which adopts the heat source concentration ratio and space frequency to retain as more important information as possible is presented in the low-frequency part and information entropy serves as the measurement in the high-frequent part. Simulation shows that the new fusion scheme can obviously improve the quality of fusion image and makes the heat source information prominent.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122971848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Numerical Investigation of Initial Condition and Singular Perturbation Parameter Value Influence on the Dynamical System Oscillatory Behaviour","authors":"Zuzana Sutova, R. Vrabel","doi":"10.1109/INCoS.2016.28","DOIUrl":"https://doi.org/10.1109/INCoS.2016.28","url":null,"abstract":"The paper deals with a nonlinear dynamical system described by a singularly perturbed second-order differential equation and its sensitivity both on changing values of a singular perturbation parameter placed at the highest derivative of the equation and on the initial conditions. The results of the change are numerically modelled using the MATLAB built-in ode45 solver.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":" 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120826008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review of the Research Literature on Civil-Military Integration Equipment Support Reform in the United States and Its Enlightenment","authors":"Yanfen Zhang, Jun-Yan Wu, Jie Li, Wan-Yi Liu","doi":"10.1109/INCoS.2016.58","DOIUrl":"https://doi.org/10.1109/INCoS.2016.58","url":null,"abstract":"CMI equipment support is the overall trend in the United States. This paper will summarize the development history of the U. S. military CMI equipment support, discuss the basic model of U. S. CMI equipment support, compare the series of reform measures conducted by the United States from five distinctive aspects with that of China. Based on China's military reform and institutional adjustment of equipment support under new circumstances, this paper will propose a practical mode for China's CMI equipment support.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123387599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Point-Based Scan Matching by Differential Evolution","authors":"P. Krömer, Jaromír Konecny, Michal Prauzek","doi":"10.1109/INCoS.2016.62","DOIUrl":"https://doi.org/10.1109/INCoS.2016.62","url":null,"abstract":"Nature -- inspired metaheuristics have been applied in many different areas and have shown good results in comparisonwith traditional domain -- specific optimization methods. In thiswork, we investigate the ability of a simple variant of differentialevolution to solve 2D scan matching problem. It consists in findingan optimum affine transformation (rotation and translation) between two laser scans (2D pointclouds). Parameters of the affine transformation are in this approach determined by differential evolution. All steps of the proposed algorithm are data parallel and can be efficiently accelerated by massively parallel platforms including mobile graphical processing units. The proposed method was implemented and experimentally evaluated on a test data set. The obtained results show that it achieves a good accuracy and is a promising technique for real -- world applications in mobile robotics.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117252421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Allocation of Public Parking Slots Using Evolutionary Algorithms","authors":"Javier Arellano-Verdejo, E. Alba","doi":"10.1109/INCoS.2016.21","DOIUrl":"https://doi.org/10.1109/INCoS.2016.21","url":null,"abstract":"This article presents an innovative approach based on an evolutionary algorithm to calculate the best allocation of available parking slots in a city according to the driver's preferences. We have worked with an urban scenario created with the SUMO traffic simulator, in which cars follow a pattern of real movements to go from a start position to the parking slot assigned by the algorithm. The results of the SUMO analysis of a potential solution are used for calculating its fitness value. Additionally, we have used different amounts of cars and parking slots to consider diverse loads of the system and therefore diverse algorithm behaviors. As a sanity check, we have compared the results versus other techniques, like random search and simulated annealing, obtaining a significant improvement in the results.","PeriodicalId":102056,"journal":{"name":"2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129142644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}