2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)最新文献

筛选
英文 中文
Experimental verification of the effectiveness of learning and teaching using intelligent tutoring system in secondary school education 在中学教育中应用智能辅导系统进行学与教的有效性实验验证
Petra Ognjenovic
{"title":"Experimental verification of the effectiveness of learning and teaching using intelligent tutoring system in secondary school education","authors":"Petra Ognjenovic","doi":"10.23919/SOFTCOM.2017.8115537","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115537","url":null,"abstract":"In this research study we investigate whether AC-ware Tutor supported education, along with traditional learning and teaching of high school students, contributes more to the student acquisition of knowledge. AC-ware Tutor is intelligent tutoring system, focused on automatic and dynamic generation of adaptive courseware which takes into account the current level of student's knowledge and cognitive characteristics that determine the complexity and level of presented courseware. The experiment was conducted at the High school of Economics, Split with 108 second-class students, during the Business Psychology class in January, 2017.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127790694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient lossless compression of CAN traffic logs 高效无损压缩CAN流量日志
András Gazdag, L. Buttyán, Z. Szalay
{"title":"Efficient lossless compression of CAN traffic logs","authors":"András Gazdag, L. Buttyán, Z. Szalay","doi":"10.23919/SOFTCOM.2017.8115527","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115527","url":null,"abstract":"In this paper, we propose a compression method that allows for the efficient storage of large amounts of CAN traffic data, which is needed for the forensic investigations of accidents caused by cyber attacks on vehicles. Compression of recorded CAN traffic also reduces the time (or bandwidth) needed to off-load that data from the vehicle. In addition, our compression method allows analysts to perform log analysis on the compressed data, therefore, it contributes to reduced analysis time and effort. We achieve this by performing semantic compression on the CAN traffic logs, rather than simple syntactic compression. Our compression method is lossless, thus preserving all information for later analysis. Besides all the above advantages, the compression ratio that we achieve is better than the compression ratio of state-of-the-art syntactic compression methods, such as gzip.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133235465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Smart probabilistic approach with RSSI fingerprinting for indoor localization 基于RSSI指纹识别的室内定位智能概率方法
Wafa Njima, Iness Ahriz, R. Zayani, M. Terré, R. Bouallègue
{"title":"Smart probabilistic approach with RSSI fingerprinting for indoor localization","authors":"Wafa Njima, Iness Ahriz, R. Zayani, M. Terré, R. Bouallègue","doi":"10.23919/SOFTCOM.2017.8115509","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115509","url":null,"abstract":"This paper introduces an efficient probabilistic approach with RSSI fingerprinting for Indoor Localization. A Shannon's Entropy based access points (APs) selection is considered. Once the APs selection is performed, a probability is assigned to each training fingerprint based on RSSI measurements. Then, the user's location is estimated as a combination of training positions weighted with their corresponding probabilities. The proposed approach is performed on the UJIndoorLoc database. It shows good performances with lower computing complexity compared to others studied in literature.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133681214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A novel application of temperature monitoring using an optical fiber sensor based on time offset 基于时间偏移的光纤传感器在温度监测中的新应用
A. Zrelli, Tahar Ezzeddine
{"title":"A novel application of temperature monitoring using an optical fiber sensor based on time offset","authors":"A. Zrelli, Tahar Ezzeddine","doi":"10.23919/SOFTCOM.2017.8115506","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115506","url":null,"abstract":"High response rate and sensitivity are the crucial performance parameters for optical fiber temperature sensors and are fundamental in the study of optical fiber sensing. Considering that the traditional optical fiber sensing system cannot meet high response rate and sensitivity simultaneously, in this paper we present the design of an optical fiber temperature measurement method to achieve real-time temperature sensing with high resolution. The measurement system is made up of single-mode optical fiber and a picosecond laser. A combination of time offset measurement and the differential calculation method is used to extract the temperature information in the optical fiber, and the relationship between temperature changes and the time offset in the optical fiber is established. The novel optical fiber temperature measurement system based on time offset has been proved to provide an effective way to measure temperature. Experimental results show that the nonlinearity of the optical fiber temperature sensor can reach 99.5%, the response time was in the range of picoseconds, and the resolution of the sensor was approximately 0.05mT, thus the output of the sensor is accurate enough to meet the requirement for real-time measurement of temperature around the optical fiber. The proposed idea of the optical fiber temperature sensing system based on time offset and differential technology is new. The results of this paper prove that the kind of optical fiber sensor based on time offset has effective features and is precise enough for temperature monitoring in real situations.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130393039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An innovative approach for elderly behavioral analysis by adopting enabling IoT technologies 通过启用物联网技术,为老年人行为分析提供创新方法
L. Patrono, Piercosimo Rametta, Ilaria Sergi, Rubén Mulero, Aitor Almeida
{"title":"An innovative approach for elderly behavioral analysis by adopting enabling IoT technologies","authors":"L. Patrono, Piercosimo Rametta, Ilaria Sergi, Rubén Mulero, Aitor Almeida","doi":"10.23919/SOFTCOM.2017.8115548","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115548","url":null,"abstract":"As the average age of the citizens increases, cities must provide new services for the emerging problem. The City4Age project aims to provide meaningful interventions to address the problems related to Mild Cognitive Impairment and Frailty in elderly citizens. As part of the City4Age project we have developed a flexible and scalable data capturing and management infrastructure which combines both the Internet of Things and Linked Open Data paradigms. A proof-of-concept validation illustrates how data are collected, managed and computed by the proposed system to make them available for MCI and frailty risk detection algorithms and for third parties.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114288491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance analysis of up-link and down-link mixed RF/FSO links with multiple relays 多中继上、下混合RF/FSO链路性能分析
C. Abou-Rjeily
{"title":"Performance analysis of up-link and down-link mixed RF/FSO links with multiple relays","authors":"C. Abou-Rjeily","doi":"10.23919/SOFTCOM.2017.8115572","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115572","url":null,"abstract":"This paper targets the bit error rate (BER) performance analysis of mixed radio-frequency free-space optical (RF/FSO) communication systems with a single source, single destination and multiple relays operating in the decode-and-forward (DF) mode. Several relaying scenarios are analyzed and compared for both the up-link (RF hop followed by an FSO hop) and the down-link (FSO hop followed by an RF hop). The RF links are subject to Nakagami fading and corrupted by additive Gaussian noise while the FSO links are subject to gamma-gamma scintillation where the photons generated by the background noise and dark currents follow the Poisson distribution.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126167065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
UWB channel measurements for short range radar applications UWB信道测量短距离雷达应用
David Veit, E. Leitgeb, F. Teschl, T. Gigl
{"title":"UWB channel measurements for short range radar applications","authors":"David Veit, E. Leitgeb, F. Teschl, T. Gigl","doi":"10.23919/SOFTCOM.2017.8115594","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115594","url":null,"abstract":"This paper presents channel measurements for short range radar applications in a frequency range from 5 GHz up to 7.5 GHz. For these measurements antennas with a half power beam width of 80° and circular polarization were provided by Maxim Integrated. The measured scenarios included a 28 mm copper pipe, a 26 cm × 28 cm aluminium plate, a bicycle and a 75 mm polokal plastic pipe. All measurements were conducted on flat concrete and grass. Through comparison with the radar equation and radar cross section calculations for the far field, it could be shown, that the size of the reflecting objects has to be used for the calculation of the near field (Fraunhofer Region) to far field transition. The measurements show that the radar cross section of an object declines the farther it comes into the near field.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125912510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learner and course dashboards for intelligent learning management systems 智能学习管理系统的学习者和课程仪表板
Tomislav Volarić, Hrvoje Ljubić
{"title":"Learner and course dashboards for intelligent learning management systems","authors":"Tomislav Volarić, Hrvoje Ljubić","doi":"10.23919/SOFTCOM.2017.8115555","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115555","url":null,"abstract":"Visualization of data in learning management systems became essential for easier analysis of learner's behavior and interpretation of results on such system. In this paper, we presented design and development process of dashboard for the prototype of program support-CM Tutor. After analysis of various approaches of designing a learning analytics dashboard, we selected most important items for display on the dashboard, and we created our own. We have designed and built a dashboard for intelligent learning management systems. The dashboard is intended for both students and teachers. The teacher has access to all the functionalities of dashboard, while student approach is limited.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127908804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cross-layer anomaly detection in industrial cyber-physical systems 工业信息物理系统中的跨层异常检测
Hunor Sándor, B. Genge, P. Haller, A. Duka, Bogdan Crainicu
{"title":"Cross-layer anomaly detection in industrial cyber-physical systems","authors":"Hunor Sándor, B. Genge, P. Haller, A. Duka, Bogdan Crainicu","doi":"10.23919/SOFTCOM.2017.8115523","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115523","url":null,"abstract":"Within the frame of the fourth industrial revolution, also known as Industry 4.0, industrial cyber-physical production systems (ICPS) have experienced a significant progress. To this end, Industry 4.0 has brought upon an improved, flexible, and cost-efficient system architecture that can sustain the development of innovative applications and services. Nonetheless, this technological advancement also exposed ICPS to significant cyber threats. This paper contributes to the development of a cross-layer anomaly detection system (ADS) for ICPS by defining a lightweight detection methodology that leverages Dempster-Shafer's \"Theory of Evidence\" in order to: infer the system's state; fuse evidence from a wide range of monitored parameters; and deliver a comprehensive and scalable detection system. The proposed approach is validated in the context of a real natural gas transportation installation.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127509304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Searchable symmetric encryption: Sequential scan can be practical 可搜索对称加密:顺序扫描可以是实用的
Máté Horváth, I. Vajda
{"title":"Searchable symmetric encryption: Sequential scan can be practical","authors":"Máté Horváth, I. Vajda","doi":"10.23919/SOFTCOM.2017.8115532","DOIUrl":"https://doi.org/10.23919/SOFTCOM.2017.8115532","url":null,"abstract":"The proliferation of cloud computing highlights the importance of techniques that allow both securing sensitive data and flexible data management at the same time. One line of research with this double motivation is the study of Searchable Symmetric Encryption (SSE) that has provided several outstanding results in the recent years. These solutions allow sublinear keyword search in huge databases by using various data structures to store keywords and document identifiers. In this work, we focus on certain scenarios in which search over the whole database is not necessary and show that the otherwise inefficient sequential scan (in linear time) can be very practical. This is due to the fact that adding new entries to the database comes for free in this case while updating a complex data structure without information leakage is rather complicated. To demonstrate the practicality of our approach we build a simple SSE scheme based on bilinear pairings and prove its security against adaptive chosen-keyword attacks in the standard model under the widely used Symmetric eXternal Diffie-Hellman (SXDH) assumption.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116791674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信