Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing最新文献

筛选
英文 中文
Students' performance tracking in distributed open education using big data analytics 基于大数据分析的分布式开放教育学生绩效跟踪
A. S. Hussein, Hamayun A. Khan
{"title":"Students' performance tracking in distributed open education using big data analytics","authors":"A. S. Hussein, Hamayun A. Khan","doi":"10.1145/3018896.3018975","DOIUrl":"https://doi.org/10.1145/3018896.3018975","url":null,"abstract":"The field of Big Data Analytics (BDA) is advancing rapidly, and it is finding adoption in diverse areas such as Health, Commerce, Logistics, Retail and Manufacturing to name a few. Adoption of BDA techniques in the field of Higher Education is new, and it is steadily increasing. In this work, BDA techniques have been applied to track the Key Academic Performance Indicators (KAPIs) related to students at the Arab Open University (AOU) and to support the corresponding decisions in this regard. Since the AOU is a Pan Arab multi-campus distributed institution operating in 8 countries and makes extensive use of a wide range of cloud based applications to manage the students' life cycle, hence it is an ideal candidate for adoption of BDA techniques to track students' KAPIs across the AOU multiple country campuses. In order to achieve this objective, we have used IBM Watson Analytics (WA) platform to track the students' KAPIs. As a pilot project, we have focused in this work on the Information Technology and Computing (ITC) academic programme across the AOU. The Exploration and Business Intelligence BDA capabilities of WA have enabled us to analyze and track the academic KAPIs of the ITC students across AOU country campuses while the Predictive Analytics (PA) has led to identifying the dominant factors behind some of our problems such as students drop out rates. One of the most promising outcomes is the decision support dashboards such as the one related to the Student Risk Factor (SRF). By identifying At Risk Students, such dashboard can act as an \"Early Alert System\" to enable the AOU management to take corrective action to provide needed support to such students.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114537000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image splicing detection using singular value decomposition 基于奇异值分解的图像拼接检测
Z. Moghaddasi, H. Jalab, R. M. Noor
{"title":"Image splicing detection using singular value decomposition","authors":"Z. Moghaddasi, H. Jalab, R. M. Noor","doi":"10.1145/3018896.3036383","DOIUrl":"https://doi.org/10.1145/3018896.3036383","url":null,"abstract":"The use of digital images in criminal activities is common because they can be easily manipulated with the application of various available software tools. Image splicing is a common operation for image forgery. In order to detect the spliced images, several methods utilizing the statistical features of the digital images were proposed. In this study, an efficient, singular value, decomposition-based feature extraction method for image splicing detection is presented. Kernel Principal Component Analysis is also applied as classifier feature preprocessor to improve the classification process; and finally, support vector machine is used to distinguish the authenticated and spliced images. The results show a detection accuracy of 98.78% for the proposed method with only 50-dimensional feature vector.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134289783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ENAGS: energy and network-aware genetic scheduling algorithm on cloud data centers ENAGS:云数据中心的能源和网络感知遗传调度算法
Soha Rawas, W. Itani, A. Zekri, A. Zaart
{"title":"ENAGS: energy and network-aware genetic scheduling algorithm on cloud data centers","authors":"Soha Rawas, W. Itani, A. Zekri, A. Zaart","doi":"10.1145/3018896.3018944","DOIUrl":"https://doi.org/10.1145/3018896.3018944","url":null,"abstract":"Cloud computing plays a significant role in today's network computing by delivering virtualized resources as pay-as-you-go services over the Internet. However, the growing demand drastically increases the energy consumption of data centers, which has become a prominent problem. Hence, energy efficient solutions are required to minimize system power consumption and increase the availability of computational resources and obviously reduce the operational expenses. In this paper we present ENAGS (Energy and Network-Aware Genetic Scheduling algorithm) to minimize the energy consumption of servers and reduce the network traffic. The proposed algorithm takes into account communication dependencies among VMs and computational requirements of tasks to improve communication performance and minimize the energy consumption by maximizing the resource utilization. Our experimental results show that the proposed ENAGS algorithm can reduce data center energy consumption as well as network traffic by approximately 38% compared to other placement algorithms.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131570041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Correlated SNR and double threshold based energy conservation in cognitive radio wireless sensor networks 认知无线电无线传感器网络中基于相关信噪比和双阈值的能量保护
Mir Lodro, Muhammad Younis Lodro, Nahdia Majeed Lodro, T. J. Khanzada, S. Greedy
{"title":"Correlated SNR and double threshold based energy conservation in cognitive radio wireless sensor networks","authors":"Mir Lodro, Muhammad Younis Lodro, Nahdia Majeed Lodro, T. J. Khanzada, S. Greedy","doi":"10.1145/3018896.3056781","DOIUrl":"https://doi.org/10.1145/3018896.3056781","url":null,"abstract":"In this work various techniques are proposed to reduce the energy consumption in Cognitive Radio Wireless Sensor Networks (CRWSNs) and hence enhance the network life-time of CRWSNs. We propose CRWSNs network life-time can be improved by using concept of correlated signal-to-noise ratio (SNR) and on-demand spectrum sensing with double threshold based energy-detector. It is analytical and intuitively explained that energy in densely deployed CRWSNs can be conserved by using double threshold energy-detector and limiting sensing activity to few sensors which participate in spectrum sensing and pass the decision to neighboring sensors with little compromise in performance degradation. The sensing decision of current sensing node can be used because of the correlated SNR values hence little difference in probability of detection and probability of false alarm values.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127633751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A comprehensive analytical model for QoS-based routing protocols evaluation in WBANs 基于qos的无线局域网路由协议评估综合分析模型
Nawel Yessad, Farah-Sarah Ouada, Mawloud Omar
{"title":"A comprehensive analytical model for QoS-based routing protocols evaluation in WBANs","authors":"Nawel Yessad, Farah-Sarah Ouada, Mawloud Omar","doi":"10.1145/3018896.3036369","DOIUrl":"https://doi.org/10.1145/3018896.3036369","url":null,"abstract":"WBANs (Wireless Body Area Networks) emerge as a promising solution for monitoring human's physiological activities and actions and overcoming a lot of promising application scenarios. The increasing demand on real time applications in WBANs anticipates efficient quality of service (QoS) based routing protocols for data delivery. In this paper, we develop an analytical model for the framework of QoS-based routing protocols taking in charge important metrics in order to estimate the success and failure of routing process. The proposed analytical model is based on Markov chain, in which an absorbing chain is constructed to characterize the packet delivery process which take into consideration priorities of traffics, single-hop and multi-hop strategies. An extensive numerical results are presented to illustrate the effectiveness of the proposed model.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132268332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Selectivity estimation in web query optimization 网页查询优化中的选择性估计
Shashidhar H R, G T Raju, V. Murthy
{"title":"Selectivity estimation in web query optimization","authors":"Shashidhar H R, G T Raju, V. Murthy","doi":"10.1145/3018896.3152305","DOIUrl":"https://doi.org/10.1145/3018896.3152305","url":null,"abstract":"Web Query optimization techniques have not scaled up to the quality of classical database optimizers. The main reason is the lack of availability of meta data statistics from local data sources. This leads to enormous errors in the calculation of optimization parameters such as selectivity of an operator which can degrade the query execution performance and result in bloated response time. In this work, the problem of selectivity estimation is addressed through Histogram construction and Probabilistic selectivity estimation. Both these techniques are robust and scalable to any kind of Web Query Engine. Empirical results also demonstrate the superior quality of these techniques.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124178903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
From smart-city and IoT simulation to big data generation 从智慧城市和物联网模拟到大数据生成
A. Bounceur
{"title":"From smart-city and IoT simulation to big data generation","authors":"A. Bounceur","doi":"10.1145/3018896.3066908","DOIUrl":"https://doi.org/10.1145/3018896.3066908","url":null,"abstract":"Our world is digitized everyday and increasingly. In 2020, it is expected that over 70% of the population will live in or around cities. To guarantee a good quality of life, it is necessary to ensure fast and reliable services in all areas, in particular those which are mainly based on the use of connected objects. This is one of the cornerstones of a smart city project. It will make possible to provide close to real-time the remote monitoring of sick patients, the monitoring of the environment in order to know its evolution over time and to anticipate developments that can be harmful to health and the environment itself, and to accurately analyze the signals transmitted by the on-board sensors. To further develop domains such as eHealth or the monitoring of other networks in the context of Smart Cities, fast and reliable design tools are needed. Their objectives are to study the realizability of such networks, their behavior in terms of energy consumption, safety, cost and other reliability parameters. This keynote aims to present a new platform called CupCarbon that allows to design systems of connected objects mainly representing sensors and to prepare future deployments of large-scale IoT infrastructures for Smart cities in optimal conditions. This kind of platforms will be a part of systems in the world that will participate in the generation of Big Data.1","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"23 14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114849157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A deep relation learning method for IoT interoperability enhancement within semantic formalization framework 语义形式化框架下物联网互操作性增强的深度关系学习方法
Bin Xiao, R. Rahmani
{"title":"A deep relation learning method for IoT interoperability enhancement within semantic formalization framework","authors":"Bin Xiao, R. Rahmani","doi":"10.1145/3018896.3036392","DOIUrl":"https://doi.org/10.1145/3018896.3036392","url":null,"abstract":"Internet of Things (IoT) is facing with the interoperability issue due to the massive amount of heterogeneous entities (both physical and virtual entities) constantly generating heterogeneous data objects; semantic formalization has been widely recognized as a basis for the IoT interoperability, by which IoT can acquire the ability to comprehend data and further recognize the logic relations among heterogeneous IoT entities and heterogeneous data objects, thus to establish mutual understanding between each other to support with interoperability. Even semantic-driven track has emphasizes a lot on the logic relations in connection to the service rules and policies for interoperability, it is important that the quantity-driven relations should be also explored with adhering to the framework of semantic formalization. This paper explores a Deep Recursive Auto-encoders formed data relation learner in line with the semantic framework, which supports the data interoperability enhancement in a quantity-driven way based on the logic-driven framework. The learner starts with representing the virtual IoT entities via feature extraction; based on that, learner is trained in a manner of considering the surrounding relations of the targeted entity. As a baseline, a contrast learner with \"regular\" structure has been proposed which cannot functionally support semantic framework, even though the semantic formalization is indispensable; regardless the limitations in lab environment, the conducted experiments show that the proposed learner performs a bit better than the contrast learner under the same conditions. So that, the proposed method can synergistically enhances the interoperability within a semantic formalization framework.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116975279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A cloud computing network and an optimization algorithm for IaaS providers 面向IaaS提供商的云计算网络和优化算法
G. Colajanni, P. Daniele
{"title":"A cloud computing network and an optimization algorithm for IaaS providers","authors":"G. Colajanni, P. Daniele","doi":"10.1145/3018896.3065838","DOIUrl":"https://doi.org/10.1145/3018896.3065838","url":null,"abstract":"Cloud Computing is a type of Internet-based computing, much used in recent years, that relies on sharing computer processing resources and data to computers and other devices on demand, from any location and at any time rather than having local servers or personal devices to handle applications. This shared IT infrastructure contains large pools of systems that are linked together. Often, virtualization techniques are used to maximize the power of cloud computing. In this paper we describe the network of a cloud computing environment with five different layers, represented by hardware/datacenter, infrastructure, platform, application and end-users. Then, we present the mathematical model of the network and study the behavior of the typical IaaS provider in order to find the optimization problem. A computational procedure for the calculus of the optimal solutions is proposed and is applied to a numerical example.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123616634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Risk tolerance and trust issues in cloud-based E-learning 基于云的电子学习中的风险容忍度和信任问题
Siti Salmah Md. Kassim, M. Salleh, A. Zainal, Abdul Razak Che Husin
{"title":"Risk tolerance and trust issues in cloud-based E-learning","authors":"Siti Salmah Md. Kassim, M. Salleh, A. Zainal, Abdul Razak Che Husin","doi":"10.1145/3018896.3018973","DOIUrl":"https://doi.org/10.1145/3018896.3018973","url":null,"abstract":"Moving in tandem with internet services nowadays, education institutions should leverage cloud computing which is considered as ready-made platform. One of the key performance index (KPI) for educational institutions progress in teaching and learning process is the level of enhancement in e-learning applications such as adopting the cloud computing. However, trust and risk issues obstruct the adoption process, whereas many questions arise regarding the reliability of cloud as a public platform for running and storing important and confidential data. This paper aims to identify the factors that affect the risk tolerance and user trust in cloud-based e-learning and proposes a method to deal with users and providers requirements. In particular, this paper identify risk tolerance and trust factors in cloud-based e-learning through surveying previous studies the users perspective. Moreover, a case study is included that conducts a survey regarding user trust factors in cloud-based e-learning system in Malaysian Higher Education institutes, which reflects the factors influencing the Malaysian real educational environment. Multi-criteria Decision Making (MCDM) method is used to confirm the most significant user trust factors through Analytical Hierarchical Process (AHP) technique. The outcomes from result analysis show that the identified factors affect user trust in cloud-based e-learning environment significantly.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121899710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信