{"title":"SNS-MEBN Based Method for Situational Awareness of Ship Navigation","authors":"Wanqi Wei, Shu Gao, X. Chu, Abdoulaye Sidibé","doi":"10.1109/ICISE.2018.00021","DOIUrl":"https://doi.org/10.1109/ICISE.2018.00021","url":null,"abstract":"Situational Awareness of Ship Navigation plays an important role in the safety and security of waterway transport. However, the current ship navigation safety assessment method cannot effectively express the uncertain knowledge. In this paper we propose a method for Ship Navigation Safety based on Multi-Entity Bayesian Networks (SNS-MEBN) in order to evaluate the ship navigation safety. This could reduce the factors of ship navigation safety based on Rough Set Condition Information Entropy (RSCIE). SNS-MEBN is constructed by combining Multi-Entity Bayesian Networks (MEBN) with the reduction result, thus the expression of uncertain knowledge in the process of ship navigation safety assessment is realized. Inference of ship navigation safety is made by combining SNS-MEBN and Bayesian Network Joint Tree Reasoning (BNJTR) algorithms. Finally, to validate the proposed method, experiments are conducted over the navigation data of ships navigating from Hejiangmen to Wangyemiao, collected by the Changjiang Waterway Bureau were validated. The experimental results showed that proposed method has the better accuracy.","PeriodicalId":207897,"journal":{"name":"2018 3rd International Conference on Information Systems Engineering (ICISE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122478824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Methodology for Aligning Usability and Security in Systems and Services","authors":"Bilal Naqvi, A. Seffah","doi":"10.1109/ICISE.2018.00019","DOIUrl":"https://doi.org/10.1109/ICISE.2018.00019","url":null,"abstract":"Conflict between usability and security is a widely recognized research problem in industry and academia. Failure to design systems, which are simultaneously usable and secure, may cause incidents where human errors lead to security breaches. Academic research identifies that usability versus security conflict can be best handled at the requirement and design stage of system development. However, there exist no practical solutions to incorporate usability and security during requirements and design stage of system development specifically in case of information systems. This paper is an attempt in this regard i.e. to incorporate the human factors (usability) while designing security features of the system. The main contribution of this paper is a novel methodology to handle usability versus security conflict during the early stages of system development, and documenting them in form of design patterns for reuse. We also present an instance of usable security design pattern.","PeriodicalId":207897,"journal":{"name":"2018 3rd International Conference on Information Systems Engineering (ICISE)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124805532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Personalized Book Recommendation Model for New Readers","authors":"Ji Qi, Shi Liu, Yannan Song, Xiang Liu","doi":"10.1109/ICISE.2018.00022","DOIUrl":"https://doi.org/10.1109/ICISE.2018.00022","url":null,"abstract":"In recent years, with the improvement of computing level, it is possible to provide personalized recommendation lists for users based on user behavior. Increasing number of books in library in university has an urgent demand for personalized book recommendation. A model is established by author using collaborative filtering algorithm, and targeting students who have never borrowed books from the library. The model generates the book recommendation lists for the target users by using their course selection records and existing borrowing data of known users. Finally, the paper compares the effects of different parameters setting in the algorithm.","PeriodicalId":207897,"journal":{"name":"2018 3rd International Conference on Information Systems Engineering (ICISE)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125494085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bibliometrics Analysis of Research Literatures on Smart Library in Academic Journals of China","authors":"Kunyuan Huang, Shi Liu, Zhiqiang Zhou","doi":"10.1109/ICISE.2018.00020","DOIUrl":"https://doi.org/10.1109/ICISE.2018.00020","url":null,"abstract":"In this paper, we used the knowledge of bibliometrics to make a summary and analysis to the time distribution, journal distribution, author distribution,cooperation situation, key word frequency distribution, subject distribution and organization distribution of research literatures on smart library in China CNKI database from 2010 to October 2017, which revealed the overall research situation in the field of smart library in recent years,and came to some conclusions.","PeriodicalId":207897,"journal":{"name":"2018 3rd International Conference on Information Systems Engineering (ICISE)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126341877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Usability Evaluation of Nutrition Fact Label","authors":"Patama Juntakoon, A. Jiamsanguanwong","doi":"10.1109/ICISE.2018.00011","DOIUrl":"https://doi.org/10.1109/ICISE.2018.00011","url":null,"abstract":"The nutritional fact label (NFL) is the medium used to communicate nutritional information that help people having a balance-dietary, while there were evidences claimed that current format of NFL had an interface issues. Thus, the purpose of this study was to evaluate usability of nutrition fact label concerning people's health literacy. This study conducted a quantitative usability testing together with an in-depth interview in order to understand how people accessed the nutrition information in current design. Forty participants with 10 people that are high health literacy and 30 people that are low health literacy participated in the usability testing. The individual differences of health literacy were found and the major interface issues were illustrated and discussed.","PeriodicalId":207897,"journal":{"name":"2018 3rd International Conference on Information Systems Engineering (ICISE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134022242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach for Picking T-Shape Workpiece Based on Monocular Vision","authors":"Mo Jinqiu, Zhu Tongshuai, Zhou Zhiyu","doi":"10.1109/ICISE.2018.00008","DOIUrl":"https://doi.org/10.1109/ICISE.2018.00008","url":null,"abstract":"An approach for acquiring the distribution of top workpieces of T-shape workpiece based on monocular vision is proposed in this article. Monocular vision is awfully sensitive to the variation of profile caused by factors such as shelter, reflection and shade when it is applied to sort T-shape workpieces. The real integrated distribution of top workpieces can not be detected efficiently by using the whole profile as template. Using face feature of T-shape workpiece as recognition template is introduced to improve recognition rate and robustness of top workpiece recognition. In addition, we introduce a method to sort authenticity of recognized workpieces based on degree of aggregation and representativeness of face feature, which provides priority reference for eliminating repeated recognition and misrecognition generated by recognition. Then unreal workpieces can be eliminated by volume overlap ratio according to rank of authenticity. Finally, a test is performed on 50 groups randomly stacked T-shape workpieces, which shows that the designed top workpiece recognition method is superior to the traditional integrated profile recognition method.","PeriodicalId":207897,"journal":{"name":"2018 3rd International Conference on Information Systems Engineering (ICISE)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130202104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-authority Attribute-Based Encryption Access Control Scheme in Wireless Body Area Network","authors":"Min Xiao, Xiao-chun Hu","doi":"10.1109/ICISE.2018.00015","DOIUrl":"https://doi.org/10.1109/ICISE.2018.00015","url":null,"abstract":"How to effectively protect the security of the shared data is a key problem to be solved urgently in wireless body area network (WBAN). Considering of the limitation on resources of sensor nodes and the diversity of potential data requestor in WBAN, we propose a multi-authority ciphertext-policy attribute-based encryption (CP-ABE) access control scheme in cloud storage environment which is provably secure against chosen plaintext attack (CPA) under the standard model. The scheme adopts the idea of hybrid encryption to reduce the computational overhead of data encryption, that is, use symmetric key to encrypt data to ensure efficiency, and use the CP-ABE mechanism to encrypt symmetric key to ensure security. And use of disjunctive normal form structure instead of AND/OR structure of traditional CP-ABE algorithm, effectively improve the system's decryption efficiency. By analyzing the efficiency of encryption and decryption, that shows the scheme is suitable for WBAN.","PeriodicalId":207897,"journal":{"name":"2018 3rd International Conference on Information Systems Engineering (ICISE)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127207955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Lou, Zhewen Xu, Junwei Yan, Xiaomei Zhang, Jiwei Hu
{"title":"The Effect of Relationship Structures on Cooperative Behaviors in a Cloud Manufacturing Environment","authors":"P. Lou, Zhewen Xu, Junwei Yan, Xiaomei Zhang, Jiwei Hu","doi":"10.1109/ICISE.2018.00034","DOIUrl":"https://doi.org/10.1109/ICISE.2018.00034","url":null,"abstract":"With the advent and swift development of advanced network and information technology, various advanced manufacturing paradigms are rapidly emerged. A new kind of service-oriented network manufacturing paradigm, named Cloud Manufacturing (CMfg) is paid attraction by industries and academia. In this CMfg environment, the different kinds of manufacturing resources are encapsulated as manufacturing services (MSs), which are able to provide users with various machining/producing services and also can independently make decisions by themselves. Hence users can select different manufacturing services to help them finish their tasks together. In this paper, two different preferential selection mechanisms are used to select MSs, namely the local preferential and the global preferential selection. Therefore, there are two different relationship structures between tasks and MSs to be formed and a bipartite network is used to describe this relationship structures. For exploring the effect of the relationship structures on cooperative behaviors, the Stag Hunt game is used to describe their behavioral strategies in the processing of their repeated interactions. Lastly the agent-based modeling and simulating are used to analyze the cooperative behaviors of MSs in the process of repeated game with Repast. The simulating and analyzing result shows that different relationship structures are influenced on the emergence of cooperative behaviors in the CMfg environment.","PeriodicalId":207897,"journal":{"name":"2018 3rd International Conference on Information Systems Engineering (ICISE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124708854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reversible Data Hiding Based on Medical Image Systems by Means of Histogram Strategy","authors":"Min-Hao Wu, Jianyang Zhao, Bolun Chen, Yongjun Zhang, Yongtao Yu, Jianhong Cheng","doi":"10.1109/ICISE.2018.00009","DOIUrl":"https://doi.org/10.1109/ICISE.2018.00009","url":null,"abstract":"The privacy issue in health care application is more important. This paper presents an application in medical image for protecting patient information (called as a medical record). The reversible image-hiding scheme based on histogram shifting is mainly used for protecting medical record. In addition, we applied two parameters, linear predictor with non-uniform weight and threshold, to improve the performance in terms of medical image quality and embedding record ratio. The weight is adapted to improve the prediction accuracy, thus increasing confidential information embedded capacity. A threshold is used to determine image characteristics and avoid overflow or underflow problems. For image characteristic decisions, we choose a peak point and then, shifted right one unit for data concealing. Before the data hiding, our method will be also pre-process the underflow and overflow problems for the image in which the embedded medical record overflow occurred in the image and for the image generation has no salt and pepper effect. Experimental results show that our method is capable of providing a great embedding capacity without making noticeable distortion. In our method, using weight and threshold values can indeed increase the embedding capacity from histogram-based data hiding while retaining the image quality.","PeriodicalId":207897,"journal":{"name":"2018 3rd International Conference on Information Systems Engineering (ICISE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130623262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Source Code Review Using Machine Learning","authors":"Wang Xiaomeng, Zhang Tao, Xin Wei, Hou Changyu","doi":"10.1109/ICISE.2018.00018","DOIUrl":"https://doi.org/10.1109/ICISE.2018.00018","url":null,"abstract":"Source code review constrains software system security sufficiently. Scalability and precision are of importance for the deployment of code review tools. However, traditional tools can only detect some security flaws automatically with high false positive and false negative by tedious reviewing large-scale source code. Various flaws and vulnerabilities show specific characteristic in source code. Machine learning systems founded feature matrixes of source code as input, including variables, functions and files, generating ad-hoc label by distinguish or generation methodologies to review source code automatically and intelligently. Source code, whatever the programming language, is text information in nature. Both secure and vulnerable feature can be curved from source code. Fortunately, a variety of machine learning approaches have been developed to learn and detect flaws and vulnerabilities in intelligent source code security review. Combination of code semantic and syntactic feature contribute to the optimation of false positive and false negative during source code review. In this paper, we give the review of literature related to intelligent source code security review using machine learning methods. It illustrate the primary evidence of approaching ML in source code security review. We believe machine learning and its branches will become out-standing in source code review.","PeriodicalId":207897,"journal":{"name":"2018 3rd International Conference on Information Systems Engineering (ICISE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132060849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}