IISA 2013最新文献

筛选
英文 中文
An innovative augmented reality educational platform using Gamification to enhance lifelong learning and cultural education 一个创新的增强现实教育平台,利用游戏化来加强终身学习和文化教育
IISA 2013 Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623724
Chantzi Athanasia Eleftheria, Plessa Charikleia, Chatziparadeisis Gkanas Iason, Tsakalidis Athanasios, Tsolis Dimitrios
{"title":"An innovative augmented reality educational platform using Gamification to enhance lifelong learning and cultural education","authors":"Chantzi Athanasia Eleftheria, Plessa Charikleia, Chatziparadeisis Gkanas Iason, Tsakalidis Athanasios, Tsolis Dimitrios","doi":"10.1109/IISA.2013.6623724","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623724","url":null,"abstract":"This paper proves that Life-long learning and Cultural Education can be supported through the use of technological advances and techniques which so far were extensively used in Games and immersive applications. In order to promote learning, this research proposal focuses on Augmented Reality (AR) and on Gamification for the creation of an educational AR book. The suggested learning subject is Science aimed at children between the ages of 10-12 years old, although the platform can be easily applied also to Culture, Arts and History. In our project, users interact with a virtual laboratory and are able to perform experiments and complete challenges through gaming so as to expand and test their knowledge. Using AR and gamification techniques, the aim is to deliver a more comprehensive understanding of the subject matter while at the same time engage learners and increase their enjoyment during the learning process. By engaging learners in cultural subjects, the cultural heritage is delivered to next generations and remains alive.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115621691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Enacted virtual partnerships: Imbrications of representations of boundary artifacts and cloud services 制定的虚拟伙伴关系:边界工件和云服务表示的砖块
IISA 2013 Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623696
D. Akoumianakis, Giorgos Ktistakis, Giannis Milolidakis, K. Michailidis
{"title":"Enacted virtual partnerships: Imbrications of representations of boundary artifacts and cloud services","authors":"D. Akoumianakis, Giorgos Ktistakis, Giannis Milolidakis, K. Michailidis","doi":"10.1109/IISA.2013.6623696","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623696","url":null,"abstract":"This paper examines the mechanics and the implications of remediated practices in the context of virtual cross-organizational collaboration. Our treatment of the issue is informed by a case study aiming to assess how imbrications of representations hosted by different social media enable or constrain peer co-engagement of members in a virtual partnership. To this effect, we draw upon theories of agency and artifacts to anchor the concept of imbrication of representations and then we describe a prototypical platform intended to facilitate distributed organizing in an organic farming virtual partnership. Key property of this platform is the improved capability for coordinated virtual work attained through the blending of computer-mediated boundary artifacts and generic cloud services.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123319730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secure communication platform for distributed city-wide surveillance systems 用于全市分布式监控系统的安全通信平台
IISA 2013 Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623684
Markku Kylänpää, A. Rantala, Janne Merilinna, M. Nieminen
{"title":"Secure communication platform for distributed city-wide surveillance systems","authors":"Markku Kylänpää, A. Rantala, Janne Merilinna, M. Nieminen","doi":"10.1109/IISA.2013.6623684","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623684","url":null,"abstract":"Managing a modern IP-based city-wide surveillance system requires that sensors and actuators in the system are visible to multiple computation and co-ordination nodes deployed in the surveillance network. As current and future surveillance systems can often consist of multiple independently managed local-area networks utilizing network address translation, it is not guaranteed that the nodes can communicate with each other. One approach for overcoming this challenge is to utilize a dedicated proxy visible to all parties to mediate all communication between the nodes. The mediated data must be secure from end-to-end particularly in the context of surveillance systems due to the confidentiality of the data. In this paper a secure communication platform called dROS is presented. The platform enables secure end-to-end communication between nodes deployed in multiple networks.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125118907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic misconception diagnosis in multiple language learning over social networks 基于社交网络的多语言学习误区自动诊断
IISA 2013 Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623715
C. Troussas, M. Virvou, Anna Vougiouklidou, K. Espinosa
{"title":"Automatic misconception diagnosis in multiple language learning over social networks","authors":"C. Troussas, M. Virvou, Anna Vougiouklidou, K. Espinosa","doi":"10.1109/IISA.2013.6623715","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623715","url":null,"abstract":"This paper describes the misconception diagnosis mechanism incorporated in a multilingual learning Facebook application. In order to achieve misconception diagnosis, the authors of this paper have incorporated machine learning techniques in the aforementioned Facebook application. The confusion of Facebook users between multiple language learning is extensively examined. Misconception handling within the application renders the users capable of being aware of their misconceptions and prevents them from re-conducting them. Furthermore, the collaboration between users in language confusion conditions is ameliorated by the user clustering through the Facebook platform.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127742701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A trusted computing architecture for critical infrastructure protection 用于关键基础设施保护的可信计算体系结构
IISA 2013 Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623706
M. Burmester
{"title":"A trusted computing architecture for critical infrastructure protection","authors":"M. Burmester","doi":"10.1109/IISA.2013.6623706","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623706","url":null,"abstract":"Most critical infrastructures can be modeled as cyber-physical systems whose cyber components control underlying physical processes so as to optimize system objectives based on physical properties/constraints and the current and estimated state of the system. Such systems usually require performance guarantees and support for security: wrongly received or missed commands can render the entire system unstable. Yet, securing cyber-physical systems with heterogeneous components is still an open and challenging problem. In this paper we propose a trusted computing architecture for critical infrastructure protection based on the trusted computing paradigm. We discuss the threat model, the vulnerabilities, real-time availability, run-time integrity and show how to get resilience against intentional and unintentional faults by using trusted computing enabled components and an access control structure that enforces need-to-get-now (availability) policies. We conclude by showing how this approach can be used to secure substation automation systems of an IEC/TR 61850-90-5-compliant electricity grid.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133946748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A synergistic security method for control-flow hijacking detection using SPNs 基于SPNs的控制流劫持检测协同安全方法
IISA 2013 Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623730
Anna Trikalinou, N. Bourbakis
{"title":"A synergistic security method for control-flow hijacking detection using SPNs","authors":"Anna Trikalinou, N. Bourbakis","doi":"10.1109/IISA.2013.6623730","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623730","url":null,"abstract":"In this paper we present a security methodology which can efficiently and deterministically detect a control-flow hijacking attack against real-world vulnerable applications and visually illustrate its functionality by using Stochastic Petri Nets (SPNs). We then discuss two possible implementation scenarios of this methodology, one that requires no hardware or OS modification and one that utilizes a special hardware component but is able to deliver no runtime performance degradation. Finally, we quantifiably show that, even in the worst possible scenario, the proposed security technique can be applied in real-world, real-time security systems with no significant performance overhead.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122203807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Intelligent Tutoring System over a social network for mathematics learning 基于社交网络的数学学习智能辅导系统
IISA 2013 Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623723
M. Virvou, S. Sidiropoulos
{"title":"An Intelligent Tutoring System over a social network for mathematics learning","authors":"M. Virvou, S. Sidiropoulos","doi":"10.1109/IISA.2013.6623723","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623723","url":null,"abstract":"Nowadays, children are becoming familiar with the computer technology at a very early age. Moreover the wide availability of the internet gives a new perspective in distance education making e-learning environments crucial to the future of education. Intelligent Tutoring Systems (ITSs) provide sophisticated tutoring systems using artificial intelligence techniques in computer programs to facilitate instruction. An ITS is able to provide personalized suggestions and adapt to each individual student's knowledge and skills. Furthermore social networking is becoming a part of everyday life for almost every student. Students can benefit from collaboration in e-learning environments especially when this is combined with an ITS. In this paper we describe a novel e-learning system that uses an open-source social network platform for mathematics tutoring.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124833537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multiple parameter cluster analysis in a multiple language learning system 多语言学习系统中的多参数聚类分析
IISA 2013 Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623714
C. Troussas, M. Virvou, Efthymios Alepis
{"title":"Multiple parameter cluster analysis in a multiple language learning system","authors":"C. Troussas, M. Virvou, Efthymios Alepis","doi":"10.1109/IISA.2013.6623714","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623714","url":null,"abstract":"In this paper, we present our multiple parameter cluster analysis in our multiple language learning system. Towards this direction, we have used algorithmic approaches residing in the field of machine learning. Multiple parameter cluster analysis is conducted by the k-means clustering algorithm which takes as input seven important users' characteristics in order to initialize the process. The clustering is conducted by k-means clustering algorithm, which takes as input multiple user characteristics. The incorporation of k-means clustering is used to address several barriers posed by the heterogeneous learning audience of educational systems. After determining in which cluster each new student belongs, the system can reason about this specific student, adapting its behavior to the student's needs, performance and preferences.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125214115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A comparison between continuous categorical emotion responses and Stimulus loudness parameters 连续分类情绪反应与刺激响度参数的比较
IISA 2013 Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623697
Sam Ferguson, Emery Schubert, Doheon Lee, D. Cabrera, G. McPherson
{"title":"A comparison between continuous categorical emotion responses and Stimulus loudness parameters","authors":"Sam Ferguson, Emery Schubert, Doheon Lee, D. Cabrera, G. McPherson","doi":"10.1109/IISA.2013.6623697","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623697","url":null,"abstract":"This paper investigates the use of psychoacoustic loudness analysis as a method for determining the likely emotional responses of listeners to musical excerpts. 19 excerpts of music were presented to 86 participants (7 randomly chosen excerpts per participant) who were asked to rate the emotion category using the emotion-clock-face continuous response interface. The same excerpts were analysed with a loudness model, and time series results were summarised as both loudness median and standard deviation. Comparisons indicate that the median and standard deviation of loudness plays an important role in determining the emotion category responses.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127733449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Sphinx enigma in critical VoIP infrastructures: Human or botnet? 关键VoIP基础设施中的狮身人面像之谜:人类还是僵尸网络?
IISA 2013 Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623704
D. Gritzalis, Yannis Soupionis, Vasilios Katos, Ioannis Psaroudakis, P. Katsaros, Anakreon Mentis
{"title":"The Sphinx enigma in critical VoIP infrastructures: Human or botnet?","authors":"D. Gritzalis, Yannis Soupionis, Vasilios Katos, Ioannis Psaroudakis, P. Katsaros, Anakreon Mentis","doi":"10.1109/IISA.2013.6623704","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623704","url":null,"abstract":"Sphinx was a monster in Greek mythology devouring those who could not solve her riddle. In VoIP, a new service in the role of Sphinx provides protection against SPIT (Spam over Internet Telephony) by discriminating human callers from botnets. The VoIP Sphinx tool uses audio CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) that are controlled by an anti-SPIT policy mechanism. The design of the Sphinx service has been formally verified for the absence of side-effects in the VoIP services (robustness), as well as for its DoS-resistance. We describe the principles and innovations of Sphinx, together with experimental results from pilot use cases.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121205864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信