A. C. Marceddu, J. Sini, B. Montrucchio, Massimo Violante
{"title":"Use of Facial Expressions to Improve the Social Acceptance of Level 4 and 5 Automated Driving System Equipped Vehicles","authors":"A. C. Marceddu, J. Sini, B. Montrucchio, Massimo Violante","doi":"10.23919/softcom55329.2022.9911303","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911303","url":null,"abstract":"According to the World Health Organization (WHO), more than one million people die yearly from car accidents. At the same time, between 20 and 50 million people suffer non-fatal injuries, which can also lead to permanent disabilities. Recently, vehicles equipped with SAE level 3, 4, and 5 Automated Driving System (ADS) have become one of the hottest topics in the automotive industry. In fact, their main expected benefit is that they could significantly reduce the number of road accidents. Their actual success will depend on how people react to their introduction: considering that the absence of the steering wheel and pedals is possible for levels 4 and 5, will people trust these advanced forms of driving automation? In this regard, the authors of this paper have proposed two different ideas. The first, which can be implemented during the proactive phase, consists in calibrating the driving algorithm of the vehicle based on the volunteers' reaction to simulations of common driving situations. The second, which can be implemented during the reactive phase, consists in dynamically adapting the driving style of the vehicle based on the average feeling inside the vehicle. Both of these ideas could help improve social acceptance and facilitate the transition to vehicles equipped with SAE level 4 and 5 ADS.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132807645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of Least Action Principle in Electromagnetics: Part III: Applications","authors":"D. Poljak","doi":"10.23919/softcom55329.2022.9911470","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911470","url":null,"abstract":"This paper, being 3rd part of the study, deals with an application of variational principle to the solution of problems in electro magnetics. Some applications to canonical problems are given and some general aspects of numerical modeling stemming from variational approach are addressed. Finally, Ritz method of solution is presented with related simple example.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123875119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anjali Sharma, Baljinder Singh Heera, Varsha Lohani, Y. N. Singh
{"title":"Adaptive Weights-based Dynamic Resource Provisioning in Space Division Multiplexed-Elastic Optical Networks (SDM-EONs)","authors":"Anjali Sharma, Baljinder Singh Heera, Varsha Lohani, Y. N. Singh","doi":"10.23919/softcom55329.2022.9911494","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911494","url":null,"abstract":"One of the core research issues in Space Division Multiplexed-Elastic Optical Networks (SDM-EON) is the Routing, Space, and Spectrum assignment (RSSA) to support maximum possible traffic. Due to the addition of spatial di-mension, additional constraints and design issues crop up for the resource provisioning in SDM-EON. There could be severe fragmentation in the network spectrum along with the crosstalk impairment among cores leading to unavailability of the resources following RSSA constraints. It limits the efficient utilization of the available capacity in SDM-EON. We propose an Adaptive Weights-based Dynamic Resource Assignment (AW-DRA) technique using SDM-EON link cost parameters and their respective weights. Each link periodically adapts the weights, conforming with the link spectral state, using Teaching Learning-based Optimization (TLBO) approach. We compare the performance of the proposed technique with two other benchmark techniques using simulations. The results demonstrate that the proposed AW-DRA technique performs significantly better in connection blocking and spectrum utilization.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116032145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amina Bousssebt, S. Sahuguède, A. Julien-Vergonjanne, S. Reynaud
{"title":"Performance of a Wireless OCDMA Network for Baby Bed Monitoring in a Nursery Context","authors":"Amina Bousssebt, S. Sahuguède, A. Julien-Vergonjanne, S. Reynaud","doi":"10.23919/softcom55329.2022.9911342","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911342","url":null,"abstract":"In this article, the performance of optical wireless technology in a monitoring context within a nursery is studied. Eight baby beds communicating simultaneously using optical code division multiple access (OCDMA) technique are considered. The study allows optimizing the parameters of the transmitters placed on the feet of the beds to guarantee the best performances. Three scenarios are proposed and the most appropriate one is determined, taking into account the fact that the transmitters are removable but also the interchangeability of the beds in the room. The performance of the OCDMA-based transmission with optical orthogonal codes and for binary pulse position modulation is evaluated in terms of error probability, data rate, emitted power and considering the impact of the reflectivity of the bed material properties.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121925067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hiba Souissi, Michaël Mahamat, Ghada Jaber, Hicham Lakhlef, A. Bouabdallah
{"title":"Analyses of Recent Advances on Machine Learning-based Trust Management for Mobile IoT Applications","authors":"Hiba Souissi, Michaël Mahamat, Ghada Jaber, Hicham Lakhlef, A. Bouabdallah","doi":"10.23919/softcom55329.2022.9911488","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911488","url":null,"abstract":"The Internet of Things (IoT) has attracted attention by projecting the vision of a global infrastructure on a network of physical objects, enabling connectivity at any time and place to anything and not just for anyone. IoT has grown significantly in a wide variety of applications, including health, smart cities, smart vehicles, etc. In this context, an important part of these applications requires the mobility of terminals that move frequently and change locations, which makes the network vulnerable to multiple attacks. To ensure the security of these networks, several requirements must be taken into consideration, such as privacy, authentication, and trust among users. A certain amount of research has been made to solve the various security-related problems. Machine learning (ML) has an essential role in creating a smarter and more secure IoT, as it has shown remarkable results in different domains. Hence, our survey focuses on classifying and evaluating the existing trust-based security solutions using ML schemes in mobile IoT environments.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121953292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Federated Identity Management Protocol For Heterogeneous Fog computing Architecture","authors":"Youcef Imine, A. Gallais, Y. Challal","doi":"10.23919/softcom55329.2022.9911414","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911414","url":null,"abstract":"With the emergence of new data externalization ar-chitectures, as fog computing, having access to external computing services will become much easier. Yet, these new architectures bring ahead many security concerns. Secure federated identity management (FidM) is a promising approach that facilitate fast and secure access to computing services. However, existing security mechanisms applied in the current FidM protocols does not efficiently support cross-collaboration in heterogeneous fog computing architecture where we have multiple security domains. In this paper, we propose a novel federated identity management protocol for secure identity mapping in heterogeneous fog computing architecture. Our protocol allows to create a federation among multiple heterogeneous security domains. Each domain is controlled by an autonomous authority that manages a set of service providers (fog nodes). The federation context is created in a completely decentralized manner. As a result, none of the authorities forming the federation will be in control of that context. Based on secure cryptographic token approach, our scheme allows any service provider to authenticate and map any end-user identity in the system. Regardless of where the token comes from, a service provider always uses the same key to verify the validity of that token. Moreover, the mapping process is fast and locally executed by the service provider. Finally, we present an evaluation of the performance of each phase in our protocol.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127688361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Impact of the Encoding Bitrate on the Quality of Streamed Video Presented on Screens of Different Resolutions","authors":"J. Klink, S. Brachmański","doi":"10.23919/softcom55329.2022.9911338","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911338","url":null,"abstract":"The paper discusses the problem of video quality deterioration caused by watching low resolution videos on high resolution displays. The authors take into account three video codecs, i.e. H.264, H.265 and VP9. The tested video samples are encoded using different bitrates from 300 kbps to 6000 kbps and three spatial resolutions −360p, 480p and 720p. The authors show how the coding bitrates and resizing of the spatial resolution may influence the video quality perceived by the end user. The objective quality values are compared with the results of the previous subjective evaluations. The results showed high correlations between selected objective quality metrics like PSNR, SSIM and VMAF and the quality perceived by the users.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130224172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ivan Kovačević, M. Marović, S. Groš, Marin Vukovic
{"title":"Predicting Vulnerabilities in Web Applications Based on Website Security Model","authors":"Ivan Kovačević, M. Marović, S. Groš, Marin Vukovic","doi":"10.23919/softcom55329.2022.9911436","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911436","url":null,"abstract":"Web sites and services are probably the most used digital channels today, from ordinary web-sites to cloud services that enable many aspects of our digital lives. Due to the popularity of the web, it is also a very common target of cyber attacks that typically focus either on web application itself or on the underlying server infrastructure. Regarding the highest level of the stack - the web application - there are many available frameworks and content management systems (CMS) for rapid web development, from the ones more oriented to developers (e.g. Spring, Django) to the ones that focus on end users (e.g. Wordpress, Joomla). Typical problem with using a framework or a CMS is the need for constant care of its security, which is done by regular patching of the systems. When going a bit lower towards the web server, one can observe the security related features that might or might not be implemented on the server, such as header security (e.g. cookie related flags, force of encryption etc.). The state of all the mentioned parameters can well be obtained by web crawlers that can browse the web and collect specific information about web applications, sites and servers that run them. In this paper, we propose a model for estimating the possibility of web compromise based on the historical crawler collected data. Due to large amounts of data that can be gathered from the web sites and, especially, indication of compromise of particular web sites, we can determine what factors might lead to a compromise in near future. In this sense, we propose a method for analyzing web site data with respect to known compromises from historical data. We build a model that describes a web site's security state and use the method for estimating how secure the modeled web is and how likely it would become a victim of compromise.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125394557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identifying Low-Resource Languages in Speech Recordings through Deep Learning","authors":"Kleona Binjaku, Joan Janku, E. Meçe","doi":"10.23919/softcom55329.2022.9911376","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911376","url":null,"abstract":"The aim of this paper is to build a system that identifies a low resource language, like the Albanian language, in speech recordings. Our proposed system is based on the conversion of audio signals into spectrograms. We have built 2 models for the identification of spoken language based on spectrograms images using Artificial Neural Networks (ANN) and Convolutional Neural Networks (CNN). The dataset with spoken audio signals in the Albanian language, we have built manually. The results are taken based on two languages, but the system works if other languages are added. Both models have shown good capabilities to learn Albanian language patterns from spectrograms and the achieved accuracies are 85% (ANN) and 94% (CNN) respectively. We have studied different cases how spectrograms' color and size impact the performance of our models.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126497563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Mangili, Giorgia Adorni, Alberto Piatti, Claudio Bonesana, Alessandro Antonucci
{"title":"Modelling Assessment Rubrics through Bayesian Networks: a Pragmatic Approach","authors":"F. Mangili, Giorgia Adorni, Alberto Piatti, Claudio Bonesana, Alessandro Antonucci","doi":"10.48550/arXiv.2209.05467","DOIUrl":"https://doi.org/10.48550/arXiv.2209.05467","url":null,"abstract":"Automatic assessment of learner competencies is a fundamental task in intelligent tutoring systems. An assessment rubric typically and effectively describes relevant competencies and competence levels. This paper presents an approach to deriving a learner model directly from an assessment rubric defining some (partial) ordering of competence levels. The model is based on Bayesian networks and exploits logical gates with uncertainty (often referred to as noisy gates) to reduce the number of parameters of the model, so to simplify their elicitation by experts and allow real-time inference in intelligent tutoring systems. We illustrate how the approach can be applied to automatize the human assessment of an activity developed for testing computational thinking skills. The simple elicitation of the model starting from the assessment rubric opens up the possibility of quickly automating the assessment of several tasks, making them more easily exploitable in the context of adaptive assessment tools and intelligent tntorino systems.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130653786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}