2020 5th International Conference on Computer and Communication Systems (ICCCS)最新文献

筛选
英文 中文
Code Smell Detection Tool for Java Script Programs Java脚本程序的代码气味检测工具
2020 5th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118465
Nabil Almashfi, Lunjin Lu
{"title":"Code Smell Detection Tool for Java Script Programs","authors":"Nabil Almashfi, Lunjin Lu","doi":"10.1109/ICCCS49078.2020.9118465","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118465","url":null,"abstract":"JavaScript is a client-side scripting language that is widely used in web applications. It is dynamic, loosely-typed and prototype-based with first-class functions. The dynamic nature of JavaScript makes it powerful and highly flexible in almost every way. However, this flexibility may result in what is known as code smells. Code smells are characteristics in the source code of a program that usually correspond to a deeper problem. They can lead to a variety of comprehension and maintenance issues and they may impact fault- and change-proneness of the application in the future. We present TAJSlint, an automated code smell detection tool for JavaScript programs that is based on static analysis. TAJSlint includes a set of 14 code smells, 9 of which are collected from various sources and 5 new smells we propose. We conduct an empirical evaluation of TAJSlint on a number of JavaScript projects and show that TAJSlint achieves an overall precision of 98% with a small number of false positives. We also study the prevalence of code smells in these projects.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126367949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Internet Traffic Categories Demand Prediction to Support Dynamic QoS 支持动态QoS的互联网流量分类需求预测
2020 5th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118431
Si Thu Aung, T. Thein
{"title":"Internet Traffic Categories Demand Prediction to Support Dynamic QoS","authors":"Si Thu Aung, T. Thein","doi":"10.1109/ICCCS49078.2020.9118431","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118431","url":null,"abstract":"Categorized Internet protocol, and demand prediction based on usage behavior can offer substantial benefits to dynamic Quality of Service (QoS) for internet service providers (ISPs). The critical requirement for dynamic QoS is to classify and predict network traffic in the next control time interval. Traffic prediction, with the aid of traffic categories can utilize the network resources more efficiently and support Dynamic QoS to function appropriately. This paper proposes an internet traffic categories demand prediction framework using machine learning techniques to support dynamic QoS. In this framework, three algorithms are implemented at transformation stage to feed into machine learning algorithms and develops efficient prediction model to predict internet network traffic demand. Experimental results show that prediction accuracy of the model is 98.97% and is efficient and suitable to support real-world network traffic prediction.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"657 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113996421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Master-slave Blockchain Based Cross-domain Trust Access Mechanism for UPIOT 基于主从区块链的UPIOT跨域信任访问机制
2020 5th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118552
Chenguang Wu, Jizhao Lu, Wencui Li, Huiping Meng, Yinlin Ren
{"title":"Master-slave Blockchain Based Cross-domain Trust Access Mechanism for UPIOT","authors":"Chenguang Wu, Jizhao Lu, Wencui Li, Huiping Meng, Yinlin Ren","doi":"10.1109/ICCCS49078.2020.9118552","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118552","url":null,"abstract":"In order to solve the problem that the power terminal cross-domain authentication system is not compatible with the existing authentication system, this paper designs a cross-domain authentication model for power terminals based on master-slave Blockchain, including ubiquitous sensing module, cross-domain authentication module and grid application system module, original authentication system module. Secondly, based on the authentication model, the Blockchain-based registration process of the power terminal, the intra-domain authentication process based on the Blockchain, and the cross-domain authentication process based on the Blockchain are designed. Finally, from the two aspects of the registration process of the power terminal and the authentication process of the power terminal, it is verified that the authentication mechanism proposed in this paper can not only achieve cross-domain authentication of the power terminal, but also be compatible with the original identity authentication system.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123923346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improvement of Disaster Situation Visualization System Using Truck-mounted Camera 车载摄像机灾害态势可视化系统的改进
2020 5th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118437
T. Matsuo, Masafumi Kosugi, O. Uchida
{"title":"Improvement of Disaster Situation Visualization System Using Truck-mounted Camera","authors":"T. Matsuo, Masafumi Kosugi, O. Uchida","doi":"10.1109/ICCCS49078.2020.9118437","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118437","url":null,"abstract":"To minimize damage during disasters, the rapid collection and delivery of accurate information are essential. Then, we proposed an automatic disaster situation visualization system and implemented a prototype of it in the previous study. The system collects images taken by the car-mounted camera of a truck running in areas where a disaster occurs and displays them on a web-based map. By using the system, we can grasp the situation in the target area quickly and comprehensively. In this study, we improve the system from two perspectives. The first one is to add a function to post images to Twitter, and the second one is the improvement of the image mapping function.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124364020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fusion Method of Multivariate Measurement Data Based on Principal Component Estimation 基于主成分估计的多变量测量数据融合方法
2020 5th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118460
Kechang Qian, Youchen Fan, Dapeng Xiong, Jie Qiang
{"title":"A Fusion Method of Multivariate Measurement Data Based on Principal Component Estimation","authors":"Kechang Qian, Youchen Fan, Dapeng Xiong, Jie Qiang","doi":"10.1109/ICCCS49078.2020.9118460","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118460","url":null,"abstract":"For the acquired multivariate measurement data, a reasonable multivariate measurement data fusion algorithm needs to be designed to improve the outer ballistic measurement accuracy. Based on the theory of the classic EMBET method, this paper proposes a method of multivariate measurement data fusion based on principal component estimation. By optimizing the characteristic root screening method, the ill-conditioned phenomenon of the Jacobian matrix of the classic EMBET method is weakened, and the accuracy of measurement is effectively improved. Simulation experiments and measured data have confirmed the effectiveness of this method.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122071675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Novel Four-Layered Software Defined 5G Architecture for AI-based Load Balancing and QoS Provisioning 基于人工智能的负载均衡和QoS提供的新型四层软件定义5G架构
2020 5th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118463
Sisamouth Hongvanthong
{"title":"Novel Four-Layered Software Defined 5G Architecture for AI-based Load Balancing and QoS Provisioning","authors":"Sisamouth Hongvanthong","doi":"10.1109/ICCCS49078.2020.9118463","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118463","url":null,"abstract":"Software defined 5G network (SD-5G) is an evolving networking technology. The integration of SDN and 5G brings scalability, and efficiency. However, Quality of Service (QoS) provision is still challenging in SD-5G due to improper load balancing, traffic unawareness and so on. To overwhelm these issues this paper designs a novel load balancing scheme using Artificial Intelligence (AI) techniques. Firstly, novel four-layered SD-5G network is designed with user plane, smart data plane, load balancing plane, and distributed control plane. In the context to 5G, the data transmission rate must satisfy the QoS constraints based on the traffic type such as text, audio, video etc. Thus, the data from the user plane is classified by Smart Traffic Analyzer in the data plane. For traffic analysis, Enriched Neuro-Fuzzy (ENF) classifier is proposed. In the load balancing plane, Primary Load balancer and Secondary Load Balancer are deployed. This plane is responsible for balancing the load among controllers. For controller load balancing, switch migration is presented. Overloaded controller is predicted by Entropy function. Then decision for migration is made by Fitness-based Reinforcement Learning (F-RL) algorithm. Finally, the four-layered SD-5G network is modeled in the NS-3.26. The observations shows that the proposed work improves the SD-5G network in terms of Loss Rate, Packet Delivery Rate, Delay, and round trip time.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123625932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Applying Stacked Generalization with the Difference of Truth and Falsity Data to Predict Student’s Performance 运用真假数据差异的叠加泛化预测学生成绩
2020 5th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118567
Atchara Mahaweerawa, Chatree Nilnumpetch, P. Kraipeerapun
{"title":"Applying Stacked Generalization with the Difference of Truth and Falsity Data to Predict Student’s Performance","authors":"Atchara Mahaweerawa, Chatree Nilnumpetch, P. Kraipeerapun","doi":"10.1109/ICCCS49078.2020.9118567","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118567","url":null,"abstract":"In this paper, the difference of truth and falsity data is applied to stacked generalization. The truth and falsity data are created in level 0 of stacked generalization. In level 1, the truth data produced from level 0 together with the difference of truth and falsity data are trained. This proposed approach is used to predict performance of undergraduate students in the Department of Computer Science, Ramkhamhaeng University, Thailand. It is found that the proposed technique provides better accuracy result than the existing stacked generalization techniques for the prediction of student’s performance.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129191878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic Signal Timings optimization Based on Genetic Algorithm and Gradient Descent 基于遗传算法和梯度下降的交通信号配时优化
2020 5th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118450
Alok Yadav, C. Nuthong
{"title":"Traffic Signal Timings optimization Based on Genetic Algorithm and Gradient Descent","authors":"Alok Yadav, C. Nuthong","doi":"10.1109/ICCCS49078.2020.9118450","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118450","url":null,"abstract":"Traffic congestions are a recurring problem that results in significant losses both financially and environmentally. optimizing traffic signal timings is one of the most cost-effective ways to mitigate such effects. optimization of traffic signal timings capable of minimizing congestion is, however, computationally expensive. Research needs to be conducted to develop algorithms capable of better optimization using fewer computational resources. This paper presents a novel approach to traffic signal optimization that combines genetic algorithms and a gradient descent like algorithm to obtain optimized traffic signal timings. The genetic algorithm is used to arrive at a starting point for gradient descent; gradient descent is then used to obtain further improvement.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121050314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving Cellular IoT Security with Identity Federation and Anomaly Detection 通过身份联合和异常检测提高蜂窝物联网安全性
2020 5th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118438
Bernardo Santos, Bruno Dzogovic, Boning Feng, Niels Jacot, V. T. Do, T. V. Do
{"title":"Improving Cellular IoT Security with Identity Federation and Anomaly Detection","authors":"Bernardo Santos, Bruno Dzogovic, Boning Feng, Niels Jacot, V. T. Do, T. V. Do","doi":"10.1109/ICCCS49078.2020.9118438","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118438","url":null,"abstract":"As we notice the increasing adoption of Cellular IoT solutions (smart-home, e-health, among others), there are still some security aspects that can be improved as these devices can suffer various types of attacks that can have a high-impact over our daily lives. In order to avoid this, we present a multi-front security solution that consists on a federated cross-layered authentication mechanism, as well as a machine learning platform with anomaly detection techniques for data traffic analysis as a way to study devices’ behavior so it can preemptively detect attacks and minimize their impact. In this paper, we also present a proof-of-concept to illustrate the proposed solution and showcase its feasibility, as well as the discussion of future iterations that will occur for this work.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116336851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
[ICCCS 2020 Copyright notice] [ICCCS 2020版权声明]
2020 5th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2020-05-01 DOI: 10.1109/icccs49078.2020.9118503
{"title":"[ICCCS 2020 Copyright notice]","authors":"","doi":"10.1109/icccs49078.2020.9118503","DOIUrl":"https://doi.org/10.1109/icccs49078.2020.9118503","url":null,"abstract":"","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122424848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信