International Conference on Computers and Their Applications最新文献

筛选
英文 中文
Software Engineering Principles and Security Vulnerabilities 软件工程原理与安全漏洞
International Conference on Computers and Their Applications Pub Date : 2019-03-13 DOI: 10.29007/4Q71
A. Rastogi, K. Nygard
{"title":"Software Engineering Principles and Security Vulnerabilities","authors":"A. Rastogi, K. Nygard","doi":"10.29007/4Q71","DOIUrl":"https://doi.org/10.29007/4Q71","url":null,"abstract":"Software Engineering principles have connections with design science, including cybersecurity concerns pertaining to vulnerabilities, trust and reputation. The work of this paper surveys, identifies, establishes and explores these connections. Identification and addressing of security issues and concerns during the early phases of software development life cycle, especially during the requirements analysis and design phases; and importance of inclusion of security requirements have also been illustrated. In addition to that, effective and efficient strategies and techniques to prevent, mitigate and remediate security vulnerabilities by the application of the principles of trust modelling and design science research methodology have also been presented.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117294603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving the Performance of 3D Printed Molds for Plastic Injection Molding 提高塑料注射成型3D打印模具的性能
International Conference on Computers and Their Applications Pub Date : 2019-03-13 DOI: 10.29007/9DK4
F. Etesami, Christopher Mullens, R. Sahli, T. Webb
{"title":"Improving the Performance of 3D Printed Molds for Plastic Injection Molding","authors":"F. Etesami, Christopher Mullens, R. Sahli, T. Webb","doi":"10.29007/9DK4","DOIUrl":"https://doi.org/10.29007/9DK4","url":null,"abstract":"","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"19 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120911651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Weighted Record Sample for Underwater Seismic Monitoring Application 水下地震监测加权记录样本
International Conference on Computers and Their Applications Pub Date : 2019-03-13 DOI: 10.29007/FLCK
Hussain Albarakati, R. Ammar, Raafat S. Elfouly
{"title":"Weighted Record Sample for Underwater Seismic Monitoring Application","authors":"Hussain Albarakati, R. Ammar, Raafat S. Elfouly","doi":"10.29007/FLCK","DOIUrl":"https://doi.org/10.29007/FLCK","url":null,"abstract":"Underwater acoustic sensor networks have been developed as a new technology for real-time underwater applications, including seismic monitoring, disaster prevention, and oil well inspection. Unfortunately, this new technology is constrained to data sensing, large-volume transmission, and forwarding. As a result, the transmission of large volumes of data is costly in terms of both time and power. We thus focused our research activities on the development of embedded underwater computing systems. In this advanced technology, information extraction is performed underwater using data mining techniques or compression algorithms. We previously presented a new set of real-time underwater embedded system architectures that can manage multiple network configurations. In this study, we extend our research to develop information extraction for seismic monitoring underwater application to meet real-time constraints. The system performance is measured in terms of the minimum end-to-end delay and power consumption. The simulation results are presented to measure the performance of our architecture based on the information extraction algorithm.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133016962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
User Behavior and Trust Evaluation in Cloud Computing 云计算中的用户行为与信任评估
International Conference on Computers and Their Applications Pub Date : 2019-03-13 DOI: 10.29007/Q5BD
Maryam Alruwaythi, Krishna Kambhampaty, K. Nygard
{"title":"User Behavior and Trust Evaluation in Cloud Computing","authors":"Maryam Alruwaythi, Krishna Kambhampaty, K. Nygard","doi":"10.29007/Q5BD","DOIUrl":"https://doi.org/10.29007/Q5BD","url":null,"abstract":"Cloud computing helps organizations to dynamically increase the resource needs as and when needed, without the need to purchase them. Security is a basic concern in cloud computing, and threats can occur both internally and externally. Users can access the cloud infrastructure for software, operating system and network infrastructure provided by the Cloud Service Providers (CSP). Evaluating the user behavior in the cloud computing infrastructure is becoming more and more important for both Cloud Users (CSs) as well as Cloud Service Providers The CSPs must ensure the safety of users accessing the cloud. Since user authentication alone is not enough to ensure the safety of users, user behavior trust plays a critical role in ensuring the authenticity of the user as well as safety. In this paper, we present the importance of user behavior in modeling trust, associated evaluation principles and comparison between different trust models.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124756848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
TDARMA Model Estimation Using the MLS and the TF Distribution 基于MLS和TF分布的TDARMA模型估计
International Conference on Computers and Their Applications Pub Date : 2019-03-13 DOI: 10.29007/64FL
A. Al-Shoshan
{"title":"TDARMA Model Estimation Using the MLS and the TF Distribution","authors":"A. Al-Shoshan","doi":"10.29007/64FL","DOIUrl":"https://doi.org/10.29007/64FL","url":null,"abstract":"An approach for modeling linear time-dependent auto-regressive moving-average (TDARMA) systems using the time-frequency (TF) distribution is presented. The proposed method leads to an extension of several well-known techniques of linear timeinvariant (LTI) systems to process the linear, time-varying (LTV) case. It can also be applied in the modeling of non-stationary signals. In this paper, the well-known modified least square (MLS) and the Durbin's approximation methods are adapted to this nonstationary context. A simple relationship between the generalized transfer function and the time-dependent parameters of the LTV system is derived and computer simulation illustrating the effectiveness of our method is presented, considering that the output of the LTV system is corrupted by additive noise.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132048983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ethnicity-Related Survival Analysis of Patients with Triple-Negative Breast Cancer 三阴性乳腺癌患者的种族相关生存分析
International Conference on Computers and Their Applications Pub Date : 2019-03-13 DOI: 10.29007/F7FQ
Mohammad Owrang Ojaboni, Yasmine Kanaan, R. Dewitty
{"title":"Ethnicity-Related Survival Analysis of Patients with Triple-Negative Breast Cancer","authors":"Mohammad Owrang Ojaboni, Yasmine Kanaan, R. Dewitty","doi":"10.29007/F7FQ","DOIUrl":"https://doi.org/10.29007/F7FQ","url":null,"abstract":"Breast cancer prognostication is a vital element for providing effective treatment for breast cancer patients. Different types of breast cancer can be identified based on the existence or lack of certain receptors (i.e., estrogen, progesterone, her2 receptors). Triple-negative breast cancer (TNBC) is characterized by a lack of estrogen receptor (ER), progesterone receptor (PR) and human epidermal growth factor receptor 2 (HER2) expression. Existing studies suggest that TNBC patients tend to have worse prognosis compared to non-TNBC counterparts. The incidence of breast cancer and prognosis in women differ according to ethnicity. Given the poor prognosis of TNBC, cancer-related outcomes must be estimated accurately. Several factors responsible for the poor clinical outcomes observed in TNBC, including age, race/ethnicity, grade, tumor size, lymph node status among others, have been studied extensively. Available research data are not conclusive enough to make a convincing argument for or against a biological or clinical difference in TNBC patients based on these factors. This study was designed to investigate the effects of the ethnicity on breast cancer survivability among TNBC patients utilizing population-based Surveillance, Epidemiology, and End Results (SEER) data to confirm whether ethnicity factor has prognostic significance.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132007262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification 基于动态模型生成和计算树逻辑规范的操作系统进程资源图死锁检测方法
International Conference on Computers and Their Applications Pub Date : 2019-03-13 DOI: 10.29007/FMRB
Thitivatr Patanasakpinyo
{"title":"Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification","authors":"Thitivatr Patanasakpinyo","doi":"10.29007/FMRB","DOIUrl":"https://doi.org/10.29007/FMRB","url":null,"abstract":"Deadlock between processes and resources is a serious problem in development of operating system. Multiple methods were invented to deal with deadlock issue. Deadlock detection is one method that allows a deadlock to take place then detects thereafter which processes and resources have caused it. In traditional process-resource graph, we propose an approach to detect a deadlock by implementing model checking technique and Computation Tree Logic (CTL) specification. In this paper, we modified traditional process-resource graph such that the outcome graph satisfied valid model of Kripke structure, which overcame limitations of traditional representation of process-resource graph and still preserved every proposition, correctness, and property of the system. With the modified graph, we designed a CTL specification that verified whether or not there existed a deadlock caused by one or more pairs of process and resource. A Java application was developed to implement the proposed approach such that it was capable of dynamically generating a valid model for any process-resource graph input, dynamically generating CTL formula for specification, and verifying the model with corresponding CTL formula.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126083186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Refining the Unrestricted Character Encoding for Japanese 改进日语的无限制字符编码
International Conference on Computers and Their Applications Pub Date : 2019-03-13 DOI: 10.29007/WSKT
A. Bossard, K. Kaneko
{"title":"Refining the Unrestricted Character Encoding for Japanese","authors":"A. Bossard, K. Kaneko","doi":"10.29007/WSKT","DOIUrl":"https://doi.org/10.29007/WSKT","url":null,"abstract":"We have proposed in a previous work an unrestricted character encoding for Japanese (UCEJ). This encoding features an advanced structure, relying on three dimensions, in order to enhance the code usability, easier character lookup being one application. This is in comparison of, for instance, Unicode. In this paper, we propose several important refinements to the UCEJ encoding: first, the addition of the Latin and kana character sets as ubiquitous in Japanese, and second, the inclusion of character stroke order and stroke types into the code and the corresponding binary representation. We estimate the average and worst-case memory complexity of the proposed encoding, and conduct an experiment to measure the required memory size in practice, each time comparing the proposal to conventional encodings.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125889928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Delivery Model to Expand E-commerce Customers Based on Telecom Data Mining 基于电信数据挖掘的电子商务客户扩展交付模型
International Conference on Computers and Their Applications Pub Date : 2019-03-13 DOI: 10.29007/VN4R
Giridhar Maji, Sharmistha Mandal, N. Debnath, S. Sen
{"title":"A Novel Delivery Model to Expand E-commerce Customers Based on Telecom Data Mining","authors":"Giridhar Maji, Sharmistha Mandal, N. Debnath, S. Sen","doi":"10.29007/VN4R","DOIUrl":"https://doi.org/10.29007/VN4R","url":null,"abstract":"A very important issue with the e-commerce delivery service in most of the emerging economies including India is the last mile connectivity. Delivering products, booked online to the remote tier-2 and tier-3 cities remained “costly”. It is observed from firsthand experience with some well-known e-commerce brands in India that their delivery service partners tend to cancel orders that are far away from their tier-2 logistics hubs with the reason shown as “address out of delivery range”. Due to low order density in the far flanges of tier-2 and tier-3 cities arranging vehicles and delivery personnel become costly. In this paper, we propose an innovative delivery model to serve the remote areas by opening edge-hubs at selected places and employing local daily commuters for last mile delivery. Identifying the edge-hubs for opening distribution centers is a costly business if done using traditional field surveys. Here we propose the use of telecom call detail record (CDR) location data as an alternate way of identifying the hubs in real time with much less cost and time.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121534008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Usage of the HMM-Based Speech Synthesis for Intelligent Arabic Voice 基于hmm的语音合成在智能阿拉伯语音中的应用
International Conference on Computers and Their Applications Pub Date : 2008-06-12 DOI: 10.1063/1.2953060
Tamer S. Fares, A. Khalil, A. Hegazy
{"title":"Usage of the HMM-Based Speech Synthesis for Intelligent Arabic Voice","authors":"Tamer S. Fares, A. Khalil, A. Hegazy","doi":"10.1063/1.2953060","DOIUrl":"https://doi.org/10.1063/1.2953060","url":null,"abstract":"The HMM as a suitable model for time sequence modeling is used for estimation of speech synthesis parameters, A speech parameter sequence is generated from HMMs themselves whose observation vectors consists of spectral parameter vector and its dynamic feature vectors. HMMs generate cepstral coefficients and pitch parameter which are then fed to speech synthesis filter named Mel Log Spectral Approximation (MLSA), this paper explains how this approach can be applied to the Arabic language to produce intelligent Arabic speech synthesis using the HMM‐Based Speech Synthesis and the influence of using of the dynamic features and the increasing of the number of mixture components on the quality enhancement of the Arabic speech synthesized.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124872935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信