{"title":"Software Engineering Principles and Security Vulnerabilities","authors":"A. Rastogi, K. Nygard","doi":"10.29007/4Q71","DOIUrl":"https://doi.org/10.29007/4Q71","url":null,"abstract":"Software Engineering principles have connections with design science, including cybersecurity concerns pertaining to vulnerabilities, trust and reputation. The work of this paper surveys, identifies, establishes and explores these connections. Identification and addressing of security issues and concerns during the early phases of software development life cycle, especially during the requirements analysis and design phases; and importance of inclusion of security requirements have also been illustrated. In addition to that, effective and efficient strategies and techniques to prevent, mitigate and remediate security vulnerabilities by the application of the principles of trust modelling and design science research methodology have also been presented.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117294603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Etesami, Christopher Mullens, R. Sahli, T. Webb
{"title":"Improving the Performance of 3D Printed Molds for Plastic Injection Molding","authors":"F. Etesami, Christopher Mullens, R. Sahli, T. Webb","doi":"10.29007/9DK4","DOIUrl":"https://doi.org/10.29007/9DK4","url":null,"abstract":"","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"19 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120911651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Weighted Record Sample for Underwater Seismic Monitoring Application","authors":"Hussain Albarakati, R. Ammar, Raafat S. Elfouly","doi":"10.29007/FLCK","DOIUrl":"https://doi.org/10.29007/FLCK","url":null,"abstract":"Underwater acoustic sensor networks have been developed as a new technology for real-time underwater applications, including seismic monitoring, disaster prevention, and oil well inspection. Unfortunately, this new technology is constrained to data sensing, large-volume transmission, and forwarding. As a result, the transmission of large volumes of data is costly in terms of both time and power. We thus focused our research activities on the development of embedded underwater computing systems. In this advanced technology, information extraction is performed underwater using data mining techniques or compression algorithms. We previously presented a new set of real-time underwater embedded system architectures that can manage multiple network configurations. In this study, we extend our research to develop information extraction for seismic monitoring underwater application to meet real-time constraints. The system performance is measured in terms of the minimum end-to-end delay and power consumption. The simulation results are presented to measure the performance of our architecture based on the information extraction algorithm.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133016962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User Behavior and Trust Evaluation in Cloud Computing","authors":"Maryam Alruwaythi, Krishna Kambhampaty, K. Nygard","doi":"10.29007/Q5BD","DOIUrl":"https://doi.org/10.29007/Q5BD","url":null,"abstract":"Cloud computing helps organizations to dynamically increase the resource needs as and when needed, without the need to purchase them. Security is a basic concern in cloud computing, and threats can occur both internally and externally. Users can access the cloud infrastructure for software, operating system and network infrastructure provided by the Cloud Service Providers (CSP). Evaluating the user behavior in the cloud computing infrastructure is becoming more and more important for both Cloud Users (CSs) as well as Cloud Service Providers The CSPs must ensure the safety of users accessing the cloud. Since user authentication alone is not enough to ensure the safety of users, user behavior trust plays a critical role in ensuring the authenticity of the user as well as safety. In this paper, we present the importance of user behavior in modeling trust, associated evaluation principles and comparison between different trust models.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124756848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TDARMA Model Estimation Using the MLS and the TF Distribution","authors":"A. Al-Shoshan","doi":"10.29007/64FL","DOIUrl":"https://doi.org/10.29007/64FL","url":null,"abstract":"An approach for modeling linear time-dependent auto-regressive moving-average (TDARMA) systems using the time-frequency (TF) distribution is presented. The proposed method leads to an extension of several well-known techniques of linear timeinvariant (LTI) systems to process the linear, time-varying (LTV) case. It can also be applied in the modeling of non-stationary signals. In this paper, the well-known modified least square (MLS) and the Durbin's approximation methods are adapted to this nonstationary context. A simple relationship between the generalized transfer function and the time-dependent parameters of the LTV system is derived and computer simulation illustrating the effectiveness of our method is presented, considering that the output of the LTV system is corrupted by additive noise.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132048983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Owrang Ojaboni, Yasmine Kanaan, R. Dewitty
{"title":"Ethnicity-Related Survival Analysis of Patients with Triple-Negative Breast Cancer","authors":"Mohammad Owrang Ojaboni, Yasmine Kanaan, R. Dewitty","doi":"10.29007/F7FQ","DOIUrl":"https://doi.org/10.29007/F7FQ","url":null,"abstract":"Breast cancer prognostication is a vital element for providing effective treatment for breast cancer patients. Different types of breast cancer can be identified based on the existence or lack of certain receptors (i.e., estrogen, progesterone, her2 receptors). Triple-negative breast cancer (TNBC) is characterized by a lack of estrogen receptor (ER), progesterone receptor (PR) and human epidermal growth factor receptor 2 (HER2) expression. Existing studies suggest that TNBC patients tend to have worse prognosis compared to non-TNBC counterparts. The incidence of breast cancer and prognosis in women differ according to ethnicity. Given the poor prognosis of TNBC, cancer-related outcomes must be estimated accurately. Several factors responsible for the poor clinical outcomes observed in TNBC, including age, race/ethnicity, grade, tumor size, lymph node status among others, have been studied extensively. Available research data are not conclusive enough to make a convincing argument for or against a biological or clinical difference in TNBC patients based on these factors. This study was designed to investigate the effects of the ethnicity on breast cancer survivability among TNBC patients utilizing population-based Surveillance, Epidemiology, and End Results (SEER) data to confirm whether ethnicity factor has prognostic significance.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132007262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model Checking Approach for Deadlock Detection in an Operating System Process-Resource Graph Using Dynamic Model Generating and Computation Tree Logic Specification","authors":"Thitivatr Patanasakpinyo","doi":"10.29007/FMRB","DOIUrl":"https://doi.org/10.29007/FMRB","url":null,"abstract":"Deadlock between processes and resources is a serious problem in development of operating system. Multiple methods were invented to deal with deadlock issue. Deadlock detection is one method that allows a deadlock to take place then detects thereafter which processes and resources have caused it. In traditional process-resource graph, we propose an approach to detect a deadlock by implementing model checking technique and Computation Tree Logic (CTL) specification. In this paper, we modified traditional process-resource graph such that the outcome graph satisfied valid model of Kripke structure, which overcame limitations of traditional representation of process-resource graph and still preserved every proposition, correctness, and property of the system. With the modified graph, we designed a CTL specification that verified whether or not there existed a deadlock caused by one or more pairs of process and resource. A Java application was developed to implement the proposed approach such that it was capable of dynamically generating a valid model for any process-resource graph input, dynamically generating CTL formula for specification, and verifying the model with corresponding CTL formula.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126083186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Refining the Unrestricted Character Encoding for Japanese","authors":"A. Bossard, K. Kaneko","doi":"10.29007/WSKT","DOIUrl":"https://doi.org/10.29007/WSKT","url":null,"abstract":"We have proposed in a previous work an unrestricted character encoding for Japanese (UCEJ). This encoding features an advanced structure, relying on three dimensions, in order to enhance the code usability, easier character lookup being one application. This is in comparison of, for instance, Unicode. In this paper, we propose several important refinements to the UCEJ encoding: first, the addition of the Latin and kana character sets as ubiquitous in Japanese, and second, the inclusion of character stroke order and stroke types into the code and the corresponding binary representation. We estimate the average and worst-case memory complexity of the proposed encoding, and conduct an experiment to measure the required memory size in practice, each time comparing the proposal to conventional encodings.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125889928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Giridhar Maji, Sharmistha Mandal, N. Debnath, S. Sen
{"title":"A Novel Delivery Model to Expand E-commerce Customers Based on Telecom Data Mining","authors":"Giridhar Maji, Sharmistha Mandal, N. Debnath, S. Sen","doi":"10.29007/VN4R","DOIUrl":"https://doi.org/10.29007/VN4R","url":null,"abstract":"A very important issue with the e-commerce delivery service in most of the emerging economies including India is the last mile connectivity. Delivering products, booked online to the remote tier-2 and tier-3 cities remained “costly”. It is observed from firsthand experience with some well-known e-commerce brands in India that their delivery service partners tend to cancel orders that are far away from their tier-2 logistics hubs with the reason shown as “address out of delivery range”. Due to low order density in the far flanges of tier-2 and tier-3 cities arranging vehicles and delivery personnel become costly. In this paper, we propose an innovative delivery model to serve the remote areas by opening edge-hubs at selected places and employing local daily commuters for last mile delivery. Identifying the edge-hubs for opening distribution centers is a costly business if done using traditional field surveys. Here we propose the use of telecom call detail record (CDR) location data as an alternate way of identifying the hubs in real time with much less cost and time.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121534008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Usage of the HMM-Based Speech Synthesis for Intelligent Arabic Voice","authors":"Tamer S. Fares, A. Khalil, A. Hegazy","doi":"10.1063/1.2953060","DOIUrl":"https://doi.org/10.1063/1.2953060","url":null,"abstract":"The HMM as a suitable model for time sequence modeling is used for estimation of speech synthesis parameters, A speech parameter sequence is generated from HMMs themselves whose observation vectors consists of spectral parameter vector and its dynamic feature vectors. HMMs generate cepstral coefficients and pitch parameter which are then fed to speech synthesis filter named Mel Log Spectral Approximation (MLSA), this paper explains how this approach can be applied to the Arabic language to produce intelligent Arabic speech synthesis using the HMM‐Based Speech Synthesis and the influence of using of the dynamic features and the increasing of the number of mixture components on the quality enhancement of the Arabic speech synthesized.","PeriodicalId":264035,"journal":{"name":"International Conference on Computers and Their Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124872935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}