2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)最新文献

筛选
英文 中文
Development of an Ad-hoc Smart Room Based on User-oriented Context-aware System Architecture 基于面向用户的上下文感知系统架构的自组织智能房间的开发
2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST) Pub Date : 2019-10-01 DOI: 10.1109/ICAwST.2019.8923296
Kohei Suzuki, Haruki Igarashi, Y. Manabe, K. Sugawara
{"title":"Development of an Ad-hoc Smart Room Based on User-oriented Context-aware System Architecture","authors":"Kohei Suzuki, Haruki Igarashi, Y. Manabe, K. Sugawara","doi":"10.1109/ICAwST.2019.8923296","DOIUrl":"https://doi.org/10.1109/ICAwST.2019.8923296","url":null,"abstract":"Context is defined as information that represents the environment surrounding us. A system to provide services to users using context is called a context-aware system (CAS), and it has been widely studied. However, many conventional CASs are not flexible. As conventional CASs cannot be freely customized by end-users, they lack adaptability to environments, making them difficult to use in various environments. To solve this problem, we propose a user-oriented context-aware system architecture (U-CASA) for building ad-hoc smart rooms. This architecture allows end-users to install various IoT sensor devices to the target environment and to make it a smart room. The end-user can also freely customize the system settings and can link various contexts to a variety of services. In order to evaluate the proposed architecture, we built two ad-hoc smart rooms based on U-CASA. As a result of the demonstration experiment with behavior scenarios, we confirmed that two smart rooms can perform properly and can provide services despite their different environments.","PeriodicalId":156538,"journal":{"name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134539194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Privacy Awareness: for Software Creators and Users 安全和隐私意识:软件开发者和用户
2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST) Pub Date : 2019-10-01 DOI: 10.1109/ICAwST.2019.8923148
G. Keeni, H. Tsunoda
{"title":"Security and Privacy Awareness: for Software Creators and Users","authors":"G. Keeni, H. Tsunoda","doi":"10.1109/ICAwST.2019.8923148","DOIUrl":"https://doi.org/10.1109/ICAwST.2019.8923148","url":null,"abstract":"Information technology (IT) has far-reaching impact on society. Its security and privacy aspects are now under intense scrutiny. In this work we examine how we got where we are today. We focus on the Internet and related applications and review its evolution. We show that there was lack of security awareness among the innovators. The technology and its applications grew with minimal regulations, unfettered. When technical security awareness dawned for engineers and knowledgeable folks, users at large either remained unaware or they could not be weaned from the attractive and easy to use insecure applications. Without enough social awareness of the implications of the Internet based tools and systems, the Networked Society now has gigantic pools of information most of it without much protection for security and privacy. We discuss the importance of social checks and balances to ameliorate the situation.","PeriodicalId":156538,"journal":{"name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126532570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Awareness of Emotional Meaning of Emoticon by Representing as Numerical Vectors 用数字向量表示提高对表情符号情感意义的认识
2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST) Pub Date : 2019-10-01 DOI: 10.1109/ICAwST.2019.8923207
Yuki Okude, Masafumi Matsuhara, G. Chakraborty, H. Mabuchi
{"title":"Improving Awareness of Emotional Meaning of Emoticon by Representing as Numerical Vectors","authors":"Yuki Okude, Masafumi Matsuhara, G. Chakraborty, H. Mabuchi","doi":"10.1109/ICAwST.2019.8923207","DOIUrl":"https://doi.org/10.1109/ICAwST.2019.8923207","url":null,"abstract":"In recent years, the internet has spread exponentially. The message exchange using texts prevails in SNS such as Twitter or LINE using a smartphone. In SNS, we can not see the other person’s face or gesture. We have to read all the information from the text only such as the other person’s emotions and the meaning hidden in sentences. Japanese language and culture is highly context sensitive with many abstract expressions. If we use only text, it may transmit a different meaning from the true intention. In SNS, emoticons are frequently used as means to express emotions that can not be transmitted by text alone. Emotions of sentences can be better understood by analyzing emotions of emoticons. Types of emoticons have increased with the spread of SNS. Therefore, it is difficult to list and grasp the meaning of all currently confirmed emoticons. In this research, emoticon vectors are acquired by learning SNS contents using word2vec. The purpose is to analyze the emotions of unknown emoticons using emoticon vectors. Word2vec can learn the relationship between words from a text corpus, and convert the meaning of a word into a vector. In this reseach, classification experiments are performed using the semantic vectors of emoticons calculated by word2vec. The effectiveness of clustering is described from the result of experiments.","PeriodicalId":156538,"journal":{"name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133738845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Influence Of Illiteracy On Maternal and Child Health Among Women In India 文盲对印度妇女母婴健康的影响
2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST) Pub Date : 2019-10-01 DOI: 10.1109/ICAwST.2019.8923585
S. N. Shivappriya, M. Shanthi, G. Kesavkrishna, R. Sathyanarayanan, R. Marimuthu
{"title":"Influence Of Illiteracy On Maternal and Child Health Among Women In India","authors":"S. N. Shivappriya, M. Shanthi, G. Kesavkrishna, R. Sathyanarayanan, R. Marimuthu","doi":"10.1109/ICAwST.2019.8923585","DOIUrl":"https://doi.org/10.1109/ICAwST.2019.8923585","url":null,"abstract":"Women education is important for the purpose of educating the next generation. This is something realized by the society and governments long back. But even to create the next generation women literacy plays a very strong role, according to the data. Illiteracy leads to less knowledge in healthcare, which causes complication in the pregnancy, leading in some cases to still birth. This study mainly focuses on the relationship between the Literacy rate, Anaemia (poor nutrition causes low red blood cell) prevalent in the pregnant women, how these factors influence the complications during labor and how it affects the health of the new born. The results show that there is a strong correlation between education for women and health care, especially in keeping up with the pregnancy related requirements.","PeriodicalId":156538,"journal":{"name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130878001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Productivity-based Features from Article Metadata for Fuzzy Rules to Classify Academic Expert 基于生产率特征的文章元数据模糊规则学术专家分类
2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST) Pub Date : 2019-10-01 DOI: 10.1109/ICAwST.2019.8923316
D. Purwitasari, C. Fatichah, A. G. Sooai, S. Sumpeno, M. Purnomo
{"title":"Productivity-based Features from Article Metadata for Fuzzy Rules to Classify Academic Expert","authors":"D. Purwitasari, C. Fatichah, A. G. Sooai, S. Sumpeno, M. Purnomo","doi":"10.1109/ICAwST.2019.8923316","DOIUrl":"https://doi.org/10.1109/ICAwST.2019.8923316","url":null,"abstract":"Since modeling expertise is necessary in an expert recommendation system, this paper addressed the issue to obtain researcher expertise in the academic field on certain topic interest. The profile considers productivity and dynamicity of an expert. The productivity of research activities through published articles as research output determine expertise that changes over time to indicate the dynamicity aspect. Here, the resulted expertise status on certain topic interest augments the expert profile. However, the expertise status is unavailable in the expert finder dataset. This paper discussed on approaches to classify the status from features of productivity and dynamicity in the form of fuzzy rules, which can be applied later in the expert recommendation system. Then, the approaches include of determining topics, mapping expertise candidates, extracting features, and labeling expertise status for training to generate fuzzy rules. Because of unavailable expertise status, to get better labels, the results of linear model and clustering were compared. Based on the empirical experiments, rules trained from scaled data with expertise labels from fuzzy clustering gave better results. After simplifying the rules, if-then forms with two features were representable enough for identifying the status of specialist or thriving experts on a topic interest.","PeriodicalId":156538,"journal":{"name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114322426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Method to Present Situation Aware Suitable Reply Candidate on Mobile Terminal 在移动端呈现态势感知的合适回复候选的方法
2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST) Pub Date : 2019-10-01 DOI: 10.1109/ICAwST.2019.8923371
Norifumi Watanabe, Masafumi Matsuhara, G. Chakraborty, H. Mabuchi
{"title":"Method to Present Situation Aware Suitable Reply Candidate on Mobile Terminal","authors":"Norifumi Watanabe, Masafumi Matsuhara, G. Chakraborty, H. Mabuchi","doi":"10.1109/ICAwST.2019.8923371","DOIUrl":"https://doi.org/10.1109/ICAwST.2019.8923371","url":null,"abstract":"In recent years, the number of users using a mobile terminal such as a smart phone and a small mobile terminal such as a smart watch is increasing. In addition, SNS users are increasing year by year. Therefore, necessity for creating messages on a mobile terminal through SNS is increasing. Since the operation screen is small on a mobile terminal, keys for character input are small. Therefore, creating a message on a mobile terminal takes time and typos are common. In particular, when creating a reply after receiving a message via SNS on a small mobile terminal, it may be difficult to respond quickly. Smooth communication between users may not be possible.We have proposed a method to present multiple relevant situation-aware reply candidates to the user corresponding to different situations according to the topic of the received sentence. By the proposed method, the user can select an appropriate reply without performing character input and message revision. The purpose of our proposed method is to support smooth communication between users. The system collects tweets to present a reply candidate. The collected tweets are divided into sentences. Tweets are often written in spoken language on variety of topics. Since the collected tweets may contain noise that is not appropriate as a reply, only suitable tweets are presented to the user as reply candidates by clustering and scoring them. The sentences are divided into different situations by clustering. The sentences with the highest score from each class is presented as a candidate reply. Since the proposed reply indicates different situations, it is expected that most of the time a suitable reply candidate will be presented to the user.","PeriodicalId":156538,"journal":{"name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123217631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Static Analysis Method on Portable Executable Files for REMNUX based Malware Identification 基于 REMNUX 的便携式可执行文件静态分析方法,用于识别恶意软件
2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST) Pub Date : 2019-10-01 DOI: 10.1109/ICAwST.2019.8923331
Muhammad Salman, Diyanatul Husna, Nindya Viani
{"title":"Static Analysis Method on Portable Executable Files for REMNUX based Malware Identification","authors":"Muhammad Salman, Diyanatul Husna, Nindya Viani","doi":"10.1109/ICAwST.2019.8923331","DOIUrl":"https://doi.org/10.1109/ICAwST.2019.8923331","url":null,"abstract":"Malware is one of the most dangerous threats in the digital world today and in the future. Today, technological developments do not only give benefits but also reap serious challenges. One of the threats is the breach of computer network security system. Malware can be inserted anywhere, especially on various types of files that can be downloaded from the internet. It is important to analyze malware for of its complex development. This research projects our work on testing and analyzing executable files by utilizing various tools on REMnux operating system. It is aimed to recognize whether a file is safe or contains malware. The results of this study indicated that REMnux can be an appropriate tool to check a file’s characteristics in the form of malware or not based on anomalous data check, metadata of file integrity, section entropy, and function that will be executed by that executable file. In addition, the results can also estimate the impact of malware performance if the file execution is not intentionally done by reverse engineering.","PeriodicalId":156538,"journal":{"name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132561951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Selection of Effective Features for BGP Anomaly Detection BGP异常检测的有效特征选择
2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST) Pub Date : 2019-10-01 DOI: 10.1109/ICAwST.2019.8923583
Tatsuya Arai, Kotaro Nakano, B. Chakraborty
{"title":"Selection of Effective Features for BGP Anomaly Detection","authors":"Tatsuya Arai, Kotaro Nakano, B. Chakraborty","doi":"10.1109/ICAwST.2019.8923583","DOIUrl":"https://doi.org/10.1109/ICAwST.2019.8923583","url":null,"abstract":"order Gateway Protocol (BGP) is the internet’s default protocol for managing connectivity between Autonomous Systems (AS). Anomalies happen to occur time to time and it is a threat to cyber security. There are various types of BGP anomalies and over the years researches have been done for their detection. Here machine learning techniques are used for detection of BGP anomaly from BGP update messages by considering the problem as a two class classification problem. A set of 35 features are extracted from BGP update messages for Slammer, Nimda and Code Red I attacks. The main objective of this study is to find out important features for detection of BGP anomaly. Popular feature selection algorithms, wrapper as well as several filter based algorithms are used for feature ranking. It is found that at most top 10 features are sufficient for the best classification accuracy which is verified by several classifiers.","PeriodicalId":156538,"journal":{"name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117346701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementation of a Quality Measurement Software for Virtual Reality Content on a head mount display 头戴式显示器上虚拟现实内容质量测量软件的实现
2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST) Pub Date : 2019-10-01 DOI: 10.1109/ICAwST.2019.8923127
Ko Takayama, Yushi Machidori, Kaoru Sugita
{"title":"Implementation of a Quality Measurement Software for Virtual Reality Content on a head mount display","authors":"Ko Takayama, Yushi Machidori, Kaoru Sugita","doi":"10.1109/ICAwST.2019.8923127","DOIUrl":"https://doi.org/10.1109/ICAwST.2019.8923127","url":null,"abstract":"In a VR streaming content, an application software is necessary to control both a content quality on a streaming service and a display quality on a head mount display (HMD) according to loads for head mount display, computer facilities and network considering a user’s requests. In this paper, we focus about a quality measurement software for Virtual Reality (VR) content to control display quality on a HMD and discussabout its implementation.","PeriodicalId":156538,"journal":{"name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125334551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Engineering for psychiatry: a case study 精神病学工程:一个案例研究
2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST) Pub Date : 2019-10-01 DOI: 10.1109/ICAwST.2019.8923154
Cédric Bornand, A. Stantzos, A. Güsewell, Emilie Bovet, G. Bangerter, M. Thomas
{"title":"Engineering for psychiatry: a case study","authors":"Cédric Bornand, A. Stantzos, A. Güsewell, Emilie Bovet, G. Bangerter, M. Thomas","doi":"10.1109/ICAwST.2019.8923154","DOIUrl":"https://doi.org/10.1109/ICAwST.2019.8923154","url":null,"abstract":"To what extent can engineering be put to the use of psychiatry? Can a smart musical device help relieve patients with serious psychiatric pathologies during seclusion? With a view to answering these questions, a musical device called AMENHOTEP was developed in 2014 in line with the safety standards of seclusion rooms in the intensive care units (ICUs) of psychiatric hospitals [1] and validated in Switzerland and France by the Patient Safety Officers. The device is designed to withstand the physical outbursts of patients, which can be extremely violent. It consists of two interactive platforms, one placed in an ICU, the other in the caregivers’ room. It allows the patient to choose to play one of four categories of music, each associated with a particular emotion: joyful activation, calm, nostalgia, tension. A first study, with qualitative results presented in [4], involved 12 weeks of interviews with the six caregivers [N1-6] of the five patients [P1-5] who were placed in an ICU equipped with the music installation. With the aim of highlighting the first, a second study was conducted in 2017 on eleven patients [A111] exclusively on the basis of measurements related to the use of the device. Since this is not the same sample of patients, this perspective should be interpreted with the utmost caution. The device has a simple and ergonomic interface, which allows patients to make choices and take decisions, a mechanism that naturally helps them regain control of themselves. It is also a tool to promote the patient-caregiver relationship, through the interest generated in listening, the musical choices of the patient and the reasons underlying those choices.","PeriodicalId":156538,"journal":{"name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123254641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信