2018 4th International Conference on Computer and Information Sciences (ICCOINS)最新文献

筛选
英文 中文
Proposing A Data Privacy Aware Protocol for Roadside Accident Video Reporting Service Using 5G In Vehicular Cloud Networks Environment 基于5G的车联网环境下道路交通事故视频报告服务数据隐私感知协议
2018 4th International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2018-08-01 DOI: 10.1109/ICCOINS.2018.8510588
Zahrah A. Almusaylim, Noor Zaman Jhanjhi, L. T. Jung
{"title":"Proposing A Data Privacy Aware Protocol for Roadside Accident Video Reporting Service Using 5G In Vehicular Cloud Networks Environment","authors":"Zahrah A. Almusaylim, Noor Zaman Jhanjhi, L. T. Jung","doi":"10.1109/ICCOINS.2018.8510588","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510588","url":null,"abstract":"The bandwidth hungry applications are growing drastically and soon exceeding the bandwidth limits of existing wireless communication network systems. The current increasing demand for higher capacity and data rates are therefore leading to the 5G technology thus changing the norm of communications in providing the high-speed data rate and lower latency. One of the promising technologies that avail from the 5G would be the vehicular cloud networks (VCN). A prominent service out of this 5G VCN is the roadside accident video reporting by using 5G over the cloud. This service may contain private data/information that can be compromised at any channel (from vehicles to 5G and cloud storage) due to many reasons. This service is vulnerable to security attacks due to its availability for a long time at different channels. Moreover, multiple video reporting can cause huge storage and computation issues leading to inefficient computation and storage management. Consequently, data privacy, security, data management and computing efficiency of data storage become the main challenges in roadside accident vehicular cloud network video reporting services. This research is proposing a solution based on a new protocol to address the stated issues by extending the recent research presented by Lewis protocol et al. The proposed protocol is aimed to provide good data privacy, reduces the data security attacks, improving data management and the computation efficiency at all channels.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114203551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Mobile Learning and Software as a Service: The Effect on Knowledge Sharing 移动学习与软件即服务:对知识共享的影响
2018 4th International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2018-08-01 DOI: 10.1109/ICCOINS.2018.8510616
Deemah Al-Arabiat, W. Ahmad, A. Sarlan
{"title":"Mobile Learning and Software as a Service: The Effect on Knowledge Sharing","authors":"Deemah Al-Arabiat, W. Ahmad, A. Sarlan","doi":"10.1109/ICCOINS.2018.8510616","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510616","url":null,"abstract":"Higher education institutions (HEIs) are knowledge intensive environments where students play a vital and critical role in leveraging knowledge resources. Recently, HEIs have made significant investments in information technology for example Mobile learning and Cloud Computing to establish effective knowledge-sharing (KS) practices and to support knowledge sharing among students. Yet little is known about how cloud computing affects the development of M-learning and how M-learning affect knowledge sharing. This study aims to explore the impact of M-learning and cloud computing on knowledge sharing among students in HEIs. In this study, self-administered questionnaire which involved 418 students from seven public and private universities in Malaysia were gathered. The analysis results revealed that the technical barriers of M-learning have a negative impact on M-learning. While, cloud computing will increase the opportunities to meet the technical problems of M-learning. It is also found that M-learning has a positive impact on knowledge sharing.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123587267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Impact Of Cultural Familiarity On Choosing Images For Recognition-Based Graphical Passwords 文化熟悉度对基于识别的图形密码选择图像的影响
2018 4th International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2018-08-01 DOI: 10.1109/ICCOINS.2018.8510598
Abdullah Ibrahim Shaban, Nur Haryani Zakaria
{"title":"The Impact Of Cultural Familiarity On Choosing Images For Recognition-Based Graphical Passwords","authors":"Abdullah Ibrahim Shaban, Nur Haryani Zakaria","doi":"10.1109/ICCOINS.2018.8510598","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510598","url":null,"abstract":"The current movement to graphical passwords for securing users’ personal information has led to the needs for more efforts to advance the security characteristics of such passwords. In this paper, we described the process for constructing graphical password based on the users’ cultural familiarity with images within the Malaysian context. A control-laboratory experiment was conducted involving 30 participants whom were requested to identify the familiarity aspect with regards to cultural-background. The obtained results showed that slightly more than half of the participants include at least one familiar images in their graphical password choices. The results could suggest that cultural background is highly considered as one of the factor that influences password choices among users.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128809943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Chaos Based Spatial Domain Robust Image Watermarking Scheme 基于混沌的空域鲁棒图像水印方案
2018 4th International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2018-08-01 DOI: 10.1109/ICCOINS.2018.8510572
M. A. Khan, U. Khan, Asim Ali
{"title":"Chaos Based Spatial Domain Robust Image Watermarking Scheme","authors":"M. A. Khan, U. Khan, Asim Ali","doi":"10.1109/ICCOINS.2018.8510572","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510572","url":null,"abstract":"The choice of watermark and embedding scheme can produce highly imperceptible and robust watermarking scheme for copyright protection. Therefore, a symmetric image-watermarking scheme is presented in this paper. The nonlinear watermark is generated using chaos that further improved under proposed optimization assumptions. The two least significant bits (LSBs) of host image are chosen for watermark embedding. Multiple copies of chaotic watermark is scattered into different blocks of the plain image. The proposed work is compared with recently published related work. The results show that proposed method achieves near optimal values of watermarked image analysis. Further, good imperceptibility and strong robustness against various image processing attacks.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133548798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Possible Conditions of FTE and FTA in Fingerprint Recognition System and Countermeasures 指纹识别系统中FTE和FTA的可能条件及对策
2018 4th International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2018-08-01 DOI: 10.1109/ICCOINS.2018.8510582
Nur Iylia Roslan, Norahana Salimin, Nur Sharifah Idayu Mat Roh, Noraziah Anini Mohd Rashid
{"title":"Possible Conditions of FTE and FTA in Fingerprint Recognition System and Countermeasures","authors":"Nur Iylia Roslan, Norahana Salimin, Nur Sharifah Idayu Mat Roh, Noraziah Anini Mohd Rashid","doi":"10.1109/ICCOINS.2018.8510582","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510582","url":null,"abstract":"Biometric fingerprint recognition has been used since the 18th century to identify and verify a person’s identity. One of the most important factors in the success of a biometric system implementation is its capabilities of performing identification and verification process with accuracy (biometric accuracy) and meeting user expectation. Over the years, it still remains as a focal point of discussion in several research papers. Measurements of biometric accuracy validations such as Failure to Enroll (FTE) and Failure to Acquire (FTA) play a vital role in determining the final success of the system. It is impossible to achieve hundred percent accuracy or zero percent error rate due to the nature of the uniqueness of biometric template. Although the percentage is small, it might cause a huge impact on the relevant biometric deployment parties. Therefore, this paper aims to provide a collection of the possible reasons for high FTE and FTA. Ongoing countermeasures used to mitigate the effects are also described in this paper. The focus is on the touch-based fingerprint-based system as it is widely used in a large-scale identification system. At the end of this paper, the data collection gathered from journals, standards and best practices will be useful as a guide for relevant parties.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116610276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Human Object Detection in Forest with Deep Learning based on Drone’s Vision 基于无人机视觉的深度学习森林人体目标检测
2018 4th International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2018-08-01 DOI: 10.1109/ICCOINS.2018.8510564
S. Yong, Y. Yeong
{"title":"Human Object Detection in Forest with Deep Learning based on Drone’s Vision","authors":"S. Yong, Y. Yeong","doi":"10.1109/ICCOINS.2018.8510564","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510564","url":null,"abstract":"In the past decade, various new and impressive applications have been developed and implemented on drones, for instance search and rescue, surveillance, traffic monitoring, weather monitoring and so on. The current advances in drone technology provoked significant changes in enabling drones to perform a wide range of missions with increasing level of complexity. Missions such as search and rescue or forest surveillance require a large camera coverage and thus making drone a suitable tool to perform advanced tasks. Meanwhile, the increasing trend of deep learning applications in computer vision provides a remarkable insight into the initiative of this project. This paper presents a technique which allows detecting the existence of human in forestry environment with human object detection algorithm using deep learning framework. The purpose of detecting human existence in forestry area is to reduce illegal forestry activities such as illegal entry into prohibited area and illegal logging activities. Also, the outcome of this project is expected to aggrandize the usage of drone for forest surveillance purpose to save time and cost.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116889397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A Traffic Load Aware Approach for Optimum Throughput in 5G Heterogeneous Cellular Networks 5G异构蜂窝网络中最优吞吐量的流量负载感知方法
2018 4th International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2018-08-01 DOI: 10.1109/ICCOINS.2018.8510566
A. Shabbir, H. Khan, Syed Abbas Ali
{"title":"A Traffic Load Aware Approach for Optimum Throughput in 5G Heterogeneous Cellular Networks","authors":"A. Shabbir, H. Khan, Syed Abbas Ali","doi":"10.1109/ICCOINS.2018.8510566","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510566","url":null,"abstract":"The ever-increasing demands of current wireless devices for high data throughput and frequent mobility forces network operators to provide seamless connectivity with guaranteed QoS to all wireless users. This situation creates a big concern in design and development of cost-effective and energy efficient solution for 5G cellular networks. small cells (Femtocells) deployment provides low cost and energy efficient solution if equipped with smart and efficient power saving techniques. In this paper, we have proposed a data traffic demands aware approach for optimum throughput and maximum energy utilization while maintaining the desired QoS required by users. The results and analysis confirm that the proposed approach will not only provide better energy utilization and optimum data throughput but will also contribute towards energy efficient aspect of 5G cellular networks.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132152036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adoption of E-Commerce Online to Offline with Technology Acceptance Model (TAM) Approach 采用技术接受模型(TAM)方法实现线上到线下的电子商务
2018 4th International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2018-08-01 DOI: 10.1109/ICCOINS.2018.8510613
Regina Eka Riantini, Vional, Aries
{"title":"Adoption of E-Commerce Online to Offline with Technology Acceptance Model (TAM) Approach","authors":"Regina Eka Riantini, Vional, Aries","doi":"10.1109/ICCOINS.2018.8510613","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510613","url":null,"abstract":"One application of technology in business activities is E-Commerce and the number of E-Commerce users led to the emergence of various types of E-Commerce. One type of E-Commerce that is currently a concern is E-Commerce Online to Offline (O2O). O2O services can be an alternative solution in the distribution of goods for retail companies in Indonesia that implement e-commerce services. Research in the field of E-Commerce adoption has done a lot of previous researchers with model Technology Acceptance Model (TAM). This research will discuss how the adoption of Jakarta Retailer Customer in using E-Commerce Online to Offline service. The purpose of this research is to know the characteristics of customers of shopping online retail sites in Jakarta and to know what variables of Technology Acceptance Model (TAM) affect the adoption of O2O E-Commerce customers in Jakarta. Hypothesis testing proposed in the study using SEM or Stuctural Equation Modeling analysis operated through AMOS program to 111 Respondents.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124087644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards Better Knowledge Management in Global Software Engineering 面向全球软件工程的知识管理
2018 4th International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2018-08-01 DOI: 10.1109/ICCOINS.2018.8510567
Maham Noor, Z. Rana
{"title":"Towards Better Knowledge Management in Global Software Engineering","authors":"Maham Noor, Z. Rana","doi":"10.1109/ICCOINS.2018.8510567","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510567","url":null,"abstract":"Many organizations employ distributed teams for development of enterprise information systems. The trend of distributed teams or Global Software Engineering (GSE) has been on the rise for the last decade or so. Improved resource allocation, cost savings and learning of best practices are some of the benefits that cause this increase. When dealing with distributed teams these organizations face several project management challenges such as communication and coordination issues, cultural differences, knowledge management. Lack of knowledge sharing is one of the most critical issue that needs to be addressed. It is difficult to ensure availability of right knowledge at the right time to the right person. The knowledge needs to be shared across the organization but limitations of knowledge sharing tools or dispersed knowledge sharing media makes it more challenging to share knowledge. In addition, lack of tool support for knowledge sharing further aggravates the problem. This paper presents a unified knowledge sharing framework to facilitate knowledge management in global software engineering environment. The framework aims to mitigate the shortcomings of knowledge sharing tools and dispersed availability of knowledge sharing media by providing communication, collaboration, organizational memory and project management aspects on one platform. The proposed framework is based on the existing knowledge sharing frameworks and will be validated using the criteria formulated on the set of activities which are required or beneficial for knowledge sharing.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128638901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ICCOINS 2018 Committees
2018 4th International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2018-08-01 DOI: 10.1109/iccoins.2018.8510573
{"title":"ICCOINS 2018 Committees","authors":"","doi":"10.1109/iccoins.2018.8510573","DOIUrl":"https://doi.org/10.1109/iccoins.2018.8510573","url":null,"abstract":"","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115427623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信