{"title":"Experimental verification of the effectiveness of learning and teaching using intelligent tutoring system in secondary school education","authors":"Petra Ognjenovic","doi":"10.23919/SOFTCOM.2017.8115537","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115537","url":null,"abstract":"In this research study we investigate whether AC-ware Tutor supported education, along with traditional learning and teaching of high school students, contributes more to the student acquisition of knowledge. AC-ware Tutor is intelligent tutoring system, focused on automatic and dynamic generation of adaptive courseware which takes into account the current level of student's knowledge and cognitive characteristics that determine the complexity and level of presented courseware. The experiment was conducted at the High school of Economics, Split with 108 second-class students, during the Business Psychology class in January, 2017.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127790694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient lossless compression of CAN traffic logs","authors":"András Gazdag, L. Buttyán, Z. Szalay","doi":"10.23919/SOFTCOM.2017.8115527","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115527","url":null,"abstract":"In this paper, we propose a compression method that allows for the efficient storage of large amounts of CAN traffic data, which is needed for the forensic investigations of accidents caused by cyber attacks on vehicles. Compression of recorded CAN traffic also reduces the time (or bandwidth) needed to off-load that data from the vehicle. In addition, our compression method allows analysts to perform log analysis on the compressed data, therefore, it contributes to reduced analysis time and effort. We achieve this by performing semantic compression on the CAN traffic logs, rather than simple syntactic compression. Our compression method is lossless, thus preserving all information for later analysis. Besides all the above advantages, the compression ratio that we achieve is better than the compression ratio of state-of-the-art syntactic compression methods, such as gzip.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133235465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wafa Njima, Iness Ahriz, R. Zayani, M. Terré, R. Bouallègue
{"title":"Smart probabilistic approach with RSSI fingerprinting for indoor localization","authors":"Wafa Njima, Iness Ahriz, R. Zayani, M. Terré, R. Bouallègue","doi":"10.23919/SOFTCOM.2017.8115509","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115509","url":null,"abstract":"This paper introduces an efficient probabilistic approach with RSSI fingerprinting for Indoor Localization. A Shannon's Entropy based access points (APs) selection is considered. Once the APs selection is performed, a probability is assigned to each training fingerprint based on RSSI measurements. Then, the user's location is estimated as a combination of training positions weighted with their corresponding probabilities. The proposed approach is performed on the UJIndoorLoc database. It shows good performances with lower computing complexity compared to others studied in literature.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133681214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel application of temperature monitoring using an optical fiber sensor based on time offset","authors":"A. Zrelli, Tahar Ezzeddine","doi":"10.23919/SOFTCOM.2017.8115506","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115506","url":null,"abstract":"High response rate and sensitivity are the crucial performance parameters for optical fiber temperature sensors and are fundamental in the study of optical fiber sensing. Considering that the traditional optical fiber sensing system cannot meet high response rate and sensitivity simultaneously, in this paper we present the design of an optical fiber temperature measurement method to achieve real-time temperature sensing with high resolution. The measurement system is made up of single-mode optical fiber and a picosecond laser. A combination of time offset measurement and the differential calculation method is used to extract the temperature information in the optical fiber, and the relationship between temperature changes and the time offset in the optical fiber is established. The novel optical fiber temperature measurement system based on time offset has been proved to provide an effective way to measure temperature. Experimental results show that the nonlinearity of the optical fiber temperature sensor can reach 99.5%, the response time was in the range of picoseconds, and the resolution of the sensor was approximately 0.05mT, thus the output of the sensor is accurate enough to meet the requirement for real-time measurement of temperature around the optical fiber. The proposed idea of the optical fiber temperature sensing system based on time offset and differential technology is new. The results of this paper prove that the kind of optical fiber sensor based on time offset has effective features and is precise enough for temperature monitoring in real situations.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130393039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Patrono, Piercosimo Rametta, Ilaria Sergi, Rubén Mulero, Aitor Almeida
{"title":"An innovative approach for elderly behavioral analysis by adopting enabling IoT technologies","authors":"L. Patrono, Piercosimo Rametta, Ilaria Sergi, Rubén Mulero, Aitor Almeida","doi":"10.23919/SOFTCOM.2017.8115548","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115548","url":null,"abstract":"As the average age of the citizens increases, cities must provide new services for the emerging problem. The City4Age project aims to provide meaningful interventions to address the problems related to Mild Cognitive Impairment and Frailty in elderly citizens. As part of the City4Age project we have developed a flexible and scalable data capturing and management infrastructure which combines both the Internet of Things and Linked Open Data paradigms. A proof-of-concept validation illustrates how data are collected, managed and computed by the proposed system to make them available for MCI and frailty risk detection algorithms and for third parties.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114288491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of up-link and down-link mixed RF/FSO links with multiple relays","authors":"C. Abou-Rjeily","doi":"10.23919/SOFTCOM.2017.8115572","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115572","url":null,"abstract":"This paper targets the bit error rate (BER) performance analysis of mixed radio-frequency free-space optical (RF/FSO) communication systems with a single source, single destination and multiple relays operating in the decode-and-forward (DF) mode. Several relaying scenarios are analyzed and compared for both the up-link (RF hop followed by an FSO hop) and the down-link (FSO hop followed by an RF hop). The RF links are subject to Nakagami fading and corrupted by additive Gaussian noise while the FSO links are subject to gamma-gamma scintillation where the photons generated by the background noise and dark currents follow the Poisson distribution.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126167065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UWB channel measurements for short range radar applications","authors":"David Veit, E. Leitgeb, F. Teschl, T. Gigl","doi":"10.23919/SOFTCOM.2017.8115594","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115594","url":null,"abstract":"This paper presents channel measurements for short range radar applications in a frequency range from 5 GHz up to 7.5 GHz. For these measurements antennas with a half power beam width of 80° and circular polarization were provided by Maxim Integrated. The measured scenarios included a 28 mm copper pipe, a 26 cm × 28 cm aluminium plate, a bicycle and a 75 mm polokal plastic pipe. All measurements were conducted on flat concrete and grass. Through comparison with the radar equation and radar cross section calculations for the far field, it could be shown, that the size of the reflecting objects has to be used for the calculation of the near field (Fraunhofer Region) to far field transition. The measurements show that the radar cross section of an object declines the farther it comes into the near field.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125912510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learner and course dashboards for intelligent learning management systems","authors":"Tomislav Volarić, Hrvoje Ljubić","doi":"10.23919/SOFTCOM.2017.8115555","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115555","url":null,"abstract":"Visualization of data in learning management systems became essential for easier analysis of learner's behavior and interpretation of results on such system. In this paper, we presented design and development process of dashboard for the prototype of program support-CM Tutor. After analysis of various approaches of designing a learning analytics dashboard, we selected most important items for display on the dashboard, and we created our own. We have designed and built a dashboard for intelligent learning management systems. The dashboard is intended for both students and teachers. The teacher has access to all the functionalities of dashboard, while student approach is limited.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127908804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hunor Sándor, B. Genge, P. Haller, A. Duka, Bogdan Crainicu
{"title":"Cross-layer anomaly detection in industrial cyber-physical systems","authors":"Hunor Sándor, B. Genge, P. Haller, A. Duka, Bogdan Crainicu","doi":"10.23919/SOFTCOM.2017.8115523","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115523","url":null,"abstract":"Within the frame of the fourth industrial revolution, also known as Industry 4.0, industrial cyber-physical production systems (ICPS) have experienced a significant progress. To this end, Industry 4.0 has brought upon an improved, flexible, and cost-efficient system architecture that can sustain the development of innovative applications and services. Nonetheless, this technological advancement also exposed ICPS to significant cyber threats. This paper contributes to the development of a cross-layer anomaly detection system (ADS) for ICPS by defining a lightweight detection methodology that leverages Dempster-Shafer's \"Theory of Evidence\" in order to: infer the system's state; fuse evidence from a wide range of monitored parameters; and deliver a comprehensive and scalable detection system. The proposed approach is validated in the context of a real natural gas transportation installation.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127509304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Searchable symmetric encryption: Sequential scan can be practical","authors":"Máté Horváth, I. Vajda","doi":"10.23919/SOFTCOM.2017.8115532","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115532","url":null,"abstract":"The proliferation of cloud computing highlights the importance of techniques that allow both securing sensitive data and flexible data management at the same time. One line of research with this double motivation is the study of Searchable Symmetric Encryption (SSE) that has provided several outstanding results in the recent years. These solutions allow sublinear keyword search in huge databases by using various data structures to store keywords and document identifiers. In this work, we focus on certain scenarios in which search over the whole database is not necessary and show that the otherwise inefficient sequential scan (in linear time) can be very practical. This is due to the fact that adding new entries to the database comes for free in this case while updating a complex data structure without information leakage is rather complicated. To demonstrate the practicality of our approach we build a simple SSE scheme based on bilinear pairings and prove its security against adaptive chosen-keyword attacks in the standard model under the widely used Symmetric eXternal Diffie-Hellman (SXDH) assumption.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116791674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}