2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)最新文献

筛选
英文 中文
Use of Facial Expressions to Improve the Social Acceptance of Level 4 and 5 Automated Driving System Equipped Vehicles 使用面部表情来提高4级和5级自动驾驶系统车辆的社会接受度
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911303
A. C. Marceddu, J. Sini, B. Montrucchio, Massimo Violante
{"title":"Use of Facial Expressions to Improve the Social Acceptance of Level 4 and 5 Automated Driving System Equipped Vehicles","authors":"A. C. Marceddu, J. Sini, B. Montrucchio, Massimo Violante","doi":"10.23919/softcom55329.2022.9911303","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911303","url":null,"abstract":"According to the World Health Organization (WHO), more than one million people die yearly from car accidents. At the same time, between 20 and 50 million people suffer non-fatal injuries, which can also lead to permanent disabilities. Recently, vehicles equipped with SAE level 3, 4, and 5 Automated Driving System (ADS) have become one of the hottest topics in the automotive industry. In fact, their main expected benefit is that they could significantly reduce the number of road accidents. Their actual success will depend on how people react to their introduction: considering that the absence of the steering wheel and pedals is possible for levels 4 and 5, will people trust these advanced forms of driving automation? In this regard, the authors of this paper have proposed two different ideas. The first, which can be implemented during the proactive phase, consists in calibrating the driving algorithm of the vehicle based on the volunteers' reaction to simulations of common driving situations. The second, which can be implemented during the reactive phase, consists in dynamically adapting the driving style of the vehicle based on the average feeling inside the vehicle. Both of these ideas could help improve social acceptance and facilitate the transition to vehicles equipped with SAE level 4 and 5 ADS.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132807645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Least Action Principle in Electromagnetics: Part III: Applications 电磁学最小作用原理综述:第三部分:应用
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911470
D. Poljak
{"title":"Review of Least Action Principle in Electromagnetics: Part III: Applications","authors":"D. Poljak","doi":"10.23919/softcom55329.2022.9911470","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911470","url":null,"abstract":"This paper, being 3rd part of the study, deals with an application of variational principle to the solution of problems in electro magnetics. Some applications to canonical problems are given and some general aspects of numerical modeling stemming from variational approach are addressed. Finally, Ritz method of solution is presented with related simple example.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123875119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Weights-based Dynamic Resource Provisioning in Space Division Multiplexed-Elastic Optical Networks (SDM-EONs) 基于自适应权重的空分多路弹性光网络动态资源分配
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911494
Anjali Sharma, Baljinder Singh Heera, Varsha Lohani, Y. N. Singh
{"title":"Adaptive Weights-based Dynamic Resource Provisioning in Space Division Multiplexed-Elastic Optical Networks (SDM-EONs)","authors":"Anjali Sharma, Baljinder Singh Heera, Varsha Lohani, Y. N. Singh","doi":"10.23919/softcom55329.2022.9911494","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911494","url":null,"abstract":"One of the core research issues in Space Division Multiplexed-Elastic Optical Networks (SDM-EON) is the Routing, Space, and Spectrum assignment (RSSA) to support maximum possible traffic. Due to the addition of spatial di-mension, additional constraints and design issues crop up for the resource provisioning in SDM-EON. There could be severe fragmentation in the network spectrum along with the crosstalk impairment among cores leading to unavailability of the resources following RSSA constraints. It limits the efficient utilization of the available capacity in SDM-EON. We propose an Adaptive Weights-based Dynamic Resource Assignment (AW-DRA) technique using SDM-EON link cost parameters and their respective weights. Each link periodically adapts the weights, conforming with the link spectral state, using Teaching Learning-based Optimization (TLBO) approach. We compare the performance of the proposed technique with two other benchmark techniques using simulations. The results demonstrate that the proposed AW-DRA technique performs significantly better in connection blocking and spectrum utilization.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116032145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance of a Wireless OCDMA Network for Baby Bed Monitoring in a Nursery Context 无线OCDMA网络在婴儿床监控中的性能研究
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911342
Amina Bousssebt, S. Sahuguède, A. Julien-Vergonjanne, S. Reynaud
{"title":"Performance of a Wireless OCDMA Network for Baby Bed Monitoring in a Nursery Context","authors":"Amina Bousssebt, S. Sahuguède, A. Julien-Vergonjanne, S. Reynaud","doi":"10.23919/softcom55329.2022.9911342","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911342","url":null,"abstract":"In this article, the performance of optical wireless technology in a monitoring context within a nursery is studied. Eight baby beds communicating simultaneously using optical code division multiple access (OCDMA) technique are considered. The study allows optimizing the parameters of the transmitters placed on the feet of the beds to guarantee the best performances. Three scenarios are proposed and the most appropriate one is determined, taking into account the fact that the transmitters are removable but also the interchangeability of the beds in the room. The performance of the OCDMA-based transmission with optical orthogonal codes and for binary pulse position modulation is evaluated in terms of error probability, data rate, emitted power and considering the impact of the reflectivity of the bed material properties.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121925067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyses of Recent Advances on Machine Learning-based Trust Management for Mobile IoT Applications 基于机器学习的移动物联网应用信任管理最新进展分析
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911488
Hiba Souissi, Michaël Mahamat, Ghada Jaber, Hicham Lakhlef, A. Bouabdallah
{"title":"Analyses of Recent Advances on Machine Learning-based Trust Management for Mobile IoT Applications","authors":"Hiba Souissi, Michaël Mahamat, Ghada Jaber, Hicham Lakhlef, A. Bouabdallah","doi":"10.23919/softcom55329.2022.9911488","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911488","url":null,"abstract":"The Internet of Things (IoT) has attracted attention by projecting the vision of a global infrastructure on a network of physical objects, enabling connectivity at any time and place to anything and not just for anyone. IoT has grown significantly in a wide variety of applications, including health, smart cities, smart vehicles, etc. In this context, an important part of these applications requires the mobility of terminals that move frequently and change locations, which makes the network vulnerable to multiple attacks. To ensure the security of these networks, several requirements must be taken into consideration, such as privacy, authentication, and trust among users. A certain amount of research has been made to solve the various security-related problems. Machine learning (ML) has an essential role in creating a smarter and more secure IoT, as it has shown remarkable results in different domains. Hence, our survey focuses on classifying and evaluating the existing trust-based security solutions using ML schemes in mobile IoT environments.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121953292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Federated Identity Management Protocol For Heterogeneous Fog computing Architecture 异构雾计算体系结构中一种高效的联邦身份管理协议
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911414
Youcef Imine, A. Gallais, Y. Challal
{"title":"An Efficient Federated Identity Management Protocol For Heterogeneous Fog computing Architecture","authors":"Youcef Imine, A. Gallais, Y. Challal","doi":"10.23919/softcom55329.2022.9911414","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911414","url":null,"abstract":"With the emergence of new data externalization ar-chitectures, as fog computing, having access to external computing services will become much easier. Yet, these new architectures bring ahead many security concerns. Secure federated identity management (FidM) is a promising approach that facilitate fast and secure access to computing services. However, existing security mechanisms applied in the current FidM protocols does not efficiently support cross-collaboration in heterogeneous fog computing architecture where we have multiple security domains. In this paper, we propose a novel federated identity management protocol for secure identity mapping in heterogeneous fog computing architecture. Our protocol allows to create a federation among multiple heterogeneous security domains. Each domain is controlled by an autonomous authority that manages a set of service providers (fog nodes). The federation context is created in a completely decentralized manner. As a result, none of the authorities forming the federation will be in control of that context. Based on secure cryptographic token approach, our scheme allows any service provider to authenticate and map any end-user identity in the system. Regardless of where the token comes from, a service provider always uses the same key to verify the validity of that token. Moreover, the mapping process is fast and locally executed by the service provider. Finally, we present an evaluation of the performance of each phase in our protocol.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127688361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Impact of the Encoding Bitrate on the Quality of Streamed Video Presented on Screens of Different Resolutions 编码比特率对不同分辨率屏幕上呈现的流媒体视频质量的影响
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911338
J. Klink, S. Brachmański
{"title":"An Impact of the Encoding Bitrate on the Quality of Streamed Video Presented on Screens of Different Resolutions","authors":"J. Klink, S. Brachmański","doi":"10.23919/softcom55329.2022.9911338","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911338","url":null,"abstract":"The paper discusses the problem of video quality deterioration caused by watching low resolution videos on high resolution displays. The authors take into account three video codecs, i.e. H.264, H.265 and VP9. The tested video samples are encoded using different bitrates from 300 kbps to 6000 kbps and three spatial resolutions −360p, 480p and 720p. The authors show how the coding bitrates and resizing of the spatial resolution may influence the video quality perceived by the end user. The objective quality values are compared with the results of the previous subjective evaluations. The results showed high correlations between selected objective quality metrics like PSNR, SSIM and VMAF and the quality perceived by the users.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130224172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting Vulnerabilities in Web Applications Based on Website Security Model 基于网站安全模型的Web应用程序漏洞预测
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911436
Ivan Kovačević, M. Marović, S. Groš, Marin Vukovic
{"title":"Predicting Vulnerabilities in Web Applications Based on Website Security Model","authors":"Ivan Kovačević, M. Marović, S. Groš, Marin Vukovic","doi":"10.23919/softcom55329.2022.9911436","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911436","url":null,"abstract":"Web sites and services are probably the most used digital channels today, from ordinary web-sites to cloud services that enable many aspects of our digital lives. Due to the popularity of the web, it is also a very common target of cyber attacks that typically focus either on web application itself or on the underlying server infrastructure. Regarding the highest level of the stack - the web application - there are many available frameworks and content management systems (CMS) for rapid web development, from the ones more oriented to developers (e.g. Spring, Django) to the ones that focus on end users (e.g. Wordpress, Joomla). Typical problem with using a framework or a CMS is the need for constant care of its security, which is done by regular patching of the systems. When going a bit lower towards the web server, one can observe the security related features that might or might not be implemented on the server, such as header security (e.g. cookie related flags, force of encryption etc.). The state of all the mentioned parameters can well be obtained by web crawlers that can browse the web and collect specific information about web applications, sites and servers that run them. In this paper, we propose a model for estimating the possibility of web compromise based on the historical crawler collected data. Due to large amounts of data that can be gathered from the web sites and, especially, indication of compromise of particular web sites, we can determine what factors might lead to a compromise in near future. In this sense, we propose a method for analyzing web site data with respect to known compromises from historical data. We build a model that describes a web site's security state and use the method for estimating how secure the modeled web is and how likely it would become a victim of compromise.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125394557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identifying Low-Resource Languages in Speech Recordings through Deep Learning 通过深度学习识别语音记录中的低资源语言
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911376
Kleona Binjaku, Joan Janku, E. Meçe
{"title":"Identifying Low-Resource Languages in Speech Recordings through Deep Learning","authors":"Kleona Binjaku, Joan Janku, E. Meçe","doi":"10.23919/softcom55329.2022.9911376","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911376","url":null,"abstract":"The aim of this paper is to build a system that identifies a low resource language, like the Albanian language, in speech recordings. Our proposed system is based on the conversion of audio signals into spectrograms. We have built 2 models for the identification of spoken language based on spectrograms images using Artificial Neural Networks (ANN) and Convolutional Neural Networks (CNN). The dataset with spoken audio signals in the Albanian language, we have built manually. The results are taken based on two languages, but the system works if other languages are added. Both models have shown good capabilities to learn Albanian language patterns from spectrograms and the achieved accuracies are 85% (ANN) and 94% (CNN) respectively. We have studied different cases how spectrograms' color and size impact the performance of our models.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126497563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling Assessment Rubrics through Bayesian Networks: a Pragmatic Approach 通过贝叶斯网络建模评估规则:一个实用的方法
F. Mangili, Giorgia Adorni, Alberto Piatti, Claudio Bonesana, Alessandro Antonucci
{"title":"Modelling Assessment Rubrics through Bayesian Networks: a Pragmatic Approach","authors":"F. Mangili, Giorgia Adorni, Alberto Piatti, Claudio Bonesana, Alessandro Antonucci","doi":"10.48550/arXiv.2209.05467","DOIUrl":"https://doi.org/10.48550/arXiv.2209.05467","url":null,"abstract":"Automatic assessment of learner competencies is a fundamental task in intelligent tutoring systems. An assessment rubric typically and effectively describes relevant competencies and competence levels. This paper presents an approach to deriving a learner model directly from an assessment rubric defining some (partial) ordering of competence levels. The model is based on Bayesian networks and exploits logical gates with uncertainty (often referred to as noisy gates) to reduce the number of parameters of the model, so to simplify their elicitation by experts and allow real-time inference in intelligent tutoring systems. We illustrate how the approach can be applied to automatize the human assessment of an activity developed for testing computational thinking skills. The simple elicitation of the model starting from the assessment rubric opens up the possibility of quickly automating the assessment of several tasks, making them more easily exploitable in the context of adaptive assessment tools and intelligent tntorino systems.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130653786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信