2012 International Conference on Computer Systems and Industrial Informatics最新文献

筛选
英文 中文
Assessment metrics for intelligence level of human-computer interface 人机界面智能水平评估指标
2012 International Conference on Computer Systems and Industrial Informatics Pub Date : 2012-12-01 DOI: 10.1109/ICCSII.2012.6454413
Ahmed El Zarka, T. Ozkul
{"title":"Assessment metrics for intelligence level of human-computer interface","authors":"Ahmed El Zarka, T. Ozkul","doi":"10.1109/ICCSII.2012.6454413","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454413","url":null,"abstract":"The Quality of human computer interface is increasingly getting more important as embedded computers and mobile computing are becoming an important part of our lives. The user friendly human computer interface is what trumps the commercial success of the device. Machine intelligence quotient describes the intelligence level of machines, and this intelligence is complemented with the user interface level of intelligence. This relationship arises from the position of the interface that mediates the interaction between human and machines. The intelligent interface makes it easy for users to tell the device what they want to do. This communication between the user and the device provides insights into quantitatively assess the user interface intelligence quotient. This study investigates the user interface intelligence of several Smartphone interfaces by proposing a framework for assessing the intelligence quotient.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122541599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Can Android be used for real-time purposes? Android可以用于实时目的吗?
2012 International Conference on Computer Systems and Industrial Informatics Pub Date : 2012-12-01 DOI: 10.1109/ICCSII.2012.6454350
Luc Perneel, Hasan Fayyad-Kazan, M. Timmerman
{"title":"Can Android be used for real-time purposes?","authors":"Luc Perneel, Hasan Fayyad-Kazan, M. Timmerman","doi":"10.1109/ICCSII.2012.6454350","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454350","url":null,"abstract":"Android is thought as being yet another operating system! In reality, it is a software platform rather than just an OS; in practical terms, it is an application framework on top of Linux, which facilitates its rapid deployment in many domains. Android was originally designed to be used in mobile computing applications, from handsets to tablets to e-books. But developers are also looking to employ Android in a variety of other embedded systems that have traditionally relied on the benefits of true real-time operating systems performance, boot-up time, real-time response, reliability, and no hidden maintenance costs. In this paper, we present a preliminary conclusion about Android's real-time behavior and performance based on experimental measurements such as thread switch latency, interrupt latency, sustained interrupt frequency, and finally the behavior of mutex and semaphore. All these measurements were done on the same ARM platform (Beagleboard-XM). Our testing results showed that Android in its current state cannot be qualified to be used in real-time environments.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122843711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Concurrent monitoring environment for obtaining IPFIX flow and signature based IDS alert data 用于获取基于IPFIX流和签名的IDS警报数据的并发监控环境
2012 International Conference on Computer Systems and Industrial Informatics Pub Date : 2012-12-01 DOI: 10.1109/ICCSII.2012.6454305
Teemu Alapaholuoma, T. Seppala, J. Nieminen, J. Ylinen, P. Loula
{"title":"Concurrent monitoring environment for obtaining IPFIX flow and signature based IDS alert data","authors":"Teemu Alapaholuoma, T. Seppala, J. Nieminen, J. Ylinen, P. Loula","doi":"10.1109/ICCSII.2012.6454305","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454305","url":null,"abstract":"The aim of this paper is to introduce and untangle the operating model of a network monitoring environment that handles flow and signature based techniques side by side on a large-scale campus network. This paper introduces one approach for solving the problematic creation of standard-based flow information and signature alarms in tandem from large-scale network traffic. The operating model takes into account cost efficiency, trustworthy and privacy protection. Due to the Privacy Protection Act and local laws, data analysis is made after traffic anonymization.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126269755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An experimental analysis of energy consumption in milling strategies 铣削策略能耗的实验分析
2012 International Conference on Computer Systems and Industrial Informatics Pub Date : 2012-12-01 DOI: 10.1109/ICCSII.2012.6454527
S. Pervaiz, I. Deiab, A. Rashid, M. Nicolescu
{"title":"An experimental analysis of energy consumption in milling strategies","authors":"S. Pervaiz, I. Deiab, A. Rashid, M. Nicolescu","doi":"10.1109/ICCSII.2012.6454527","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454527","url":null,"abstract":"Pocket milling operation is one of the widely used milling operations. CAM packages offer different tool path strategies to execute a machining operation. In the presented work zigzag, constant overlap spiral, parallel spiral and oneway tool path strategies were compared in terms of power and energy consumption for pocket milling of Al 6061 aluminum alloy. All pocketing operations were conducted using 8 mm diameter High Speed Steel (HSS) end milling cutters. Energy utilization was analysed for all tool path strategies. This work aims to develop better understanding towards sustainability concept in core machining phase.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128045299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Portable web browser forensics: A forensic examination of the privacy benefits of portable web browsers 便携式web浏览器取证:对便携式web浏览器的隐私好处进行取证检查
2012 International Conference on Computer Systems and Industrial Informatics Pub Date : 2012-12-01 DOI: 10.1109/ICCSII.2012.6454516
A. Marrington, I. Baggili, T. Al Ismail, A. Al Kaf
{"title":"Portable web browser forensics: A forensic examination of the privacy benefits of portable web browsers","authors":"A. Marrington, I. Baggili, T. Al Ismail, A. Al Kaf","doi":"10.1109/ICCSII.2012.6454516","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454516","url":null,"abstract":"Portable web browsers are installed on removable storage devices which can be taken by a user from computer to computer. One of the claimed benefits of portable web browsers is enhanced privacy, through minimization of the traces of browsing activity left on the host's hard disk. On the basis of this claim, it would appear that portable web browsers pose a challenge to forensic examiners trying to reconstruct past web browsing activity in the context of a digital investigation. The research examines one popular portable web browser, Google Chrome in both normal and private browsing mode, and compares the forensic traces of its use to forensic traces of the installed version of the same browser. The results show that Google Chrome Portable leaves traces of web browsing activity on the host computer's hard disk, and demonstrate a need for forensic testing of the privacy claims made for the use of portable web browsers.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126893904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Virtual laser keyboards: A giant leap towards human-computer interaction 虚拟激光键盘:人机交互的巨大飞跃
2012 International Conference on Computer Systems and Industrial Informatics Pub Date : 2012-12-01 DOI: 10.1109/ICCSII.2012.6454614
Z. AlKassim
{"title":"Virtual laser keyboards: A giant leap towards human-computer interaction","authors":"Z. AlKassim","doi":"10.1109/ICCSII.2012.6454614","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454614","url":null,"abstract":"This paper provides an alternative solution to the traditional physical-button keyboards. With implementation of laser technology, this virtual keyboard solves many problems faced with traditional keyboards, making it more practical. The keyboard consists of three modules respectively; the illuminating, sensing, and projecting module. The projecting module projects an image of a keyboard onto any surface, then the sensing module senses the user's fingers in coordination with the illuminating module, after which typed keys are displayed on the screen.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133569737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Perception based adaptive haptic communication protocol (PAHCP) 基于感知的自适应触觉通信协议
2012 International Conference on Computer Systems and Industrial Informatics Pub Date : 2012-12-01 DOI: 10.1109/ICCSII.2012.6454426
Q. Nasir, Enas Khalil
{"title":"Perception based adaptive haptic communication protocol (PAHCP)","authors":"Q. Nasir, Enas Khalil","doi":"10.1109/ICCSII.2012.6454426","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454426","url":null,"abstract":"Packet-switched communication of haptic data telepresence systems is characterized by high packet rates on the communication channel. The quality of the internet-based telepresence systems depend on the quality of the communication channel between the operator and the remote site, and the delay jitter in the data exchange. Perceptual based data reduction for haptic data is used to reduce packet rate. It is proved and through experimental studies that the implementing the perception thresholds and additional buffering techniques can significantly reduce haptic data traffic with little or no influence on the quality of collaborative haptic-enabled (C-HE) or Tele-Operation/Tele-Presence, and Tele-Interaction (TPTA). In this paper, an adaptive size of the dead-band (Just Noticeable Difference - JND) technique for feedback forces received from remote side is presented, while keeping fixed JND for movements velocities for the transmitted haptic data from the operator side, to reduces the packet rate without perceptible disturbance.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132511108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Smart grid controller for optimizing HVAC energy consumption 优化暖通空调能耗的智能电网控制器
2012 International Conference on Computer Systems and Industrial Informatics Pub Date : 2012-12-01 DOI: 10.1109/ICCSII.2012.6454548
A. Al-Ali, N. A. Tubaiz, A. Al-Radaideh, J. Al-Dmour, L. Murugan
{"title":"Smart grid controller for optimizing HVAC energy consumption","authors":"A. Al-Ali, N. A. Tubaiz, A. Al-Radaideh, J. Al-Dmour, L. Murugan","doi":"10.1109/ICCSII.2012.6454548","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454548","url":null,"abstract":"As the smart grid emerges from concept to implementation, power utilities start to optimize power consumed by Heating, Ventilation and Air-Conditioning Systems (HVACs). Engineers started to design controllers that better manage the power consumption of the HVAC systems. HVACs consume more than 50% of generated power in many countries that have hot and/or cold weather. Such huge power loads may exceed the generated power. Due to this large power demands, some utilities have to resort to rationalize the available electricity to its consumers randomly. This paper presents a fuzzy logic based system that monitors and controls residential HVACs units, where demand exceeds the supplied electrical power. The proposed system reads the rooms temperature and turns ON/OFF the units alternatively to maintain the cooling/heating based on the available supplied power; i.e. shedding the load without compromising the residents comfort. The proposed fuzzy logic rule-based system was designed, simulated and tested.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124333161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A new traceable software requirements specification based on IEEE 830 一种新的基于IEEE 830的可跟踪软件需求规范
2012 International Conference on Computer Systems and Industrial Informatics Pub Date : 2012-12-01 DOI: 10.1109/ICCSII.2012.6454481
A. Chikh, M. Aldayel
{"title":"A new traceable software requirements specification based on IEEE 830","authors":"A. Chikh, M. Aldayel","doi":"10.1109/ICCSII.2012.6454481","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454481","url":null,"abstract":"This paper aims to enrich software requirements specification by integrating the concept of traceability. This integration, which will allow a more helpful reading of that specification, will provide a critical support to different requirements stakeholders. Indeed traceability will help for example designers in refining requirements into lower-level design components and analysts in understanding the implications of a proposed change, to ensure that no extraneous code exists and to minimize or eliminate the presence of faked or frivolous requirements that lack any justification. The main contribution of this paper is building a schema for software requirements specification that make it easily traceable by linking each requirement to real-world dimensions such as detail design deliverables, related system requirements and sources such as user requirement, analyst, regulation and standard.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123003961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A client privacy preserving discovery service scheme 一种客户端隐私保护发现服务方案
2012 International Conference on Computer Systems and Industrial Informatics Pub Date : 2012-12-01 DOI: 10.1109/ICCSII.2012.6454610
Zhipeng Wang, Hong Zhu
{"title":"A client privacy preserving discovery service scheme","authors":"Zhipeng Wang, Hong Zhu","doi":"10.1109/ICCSII.2012.6454610","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454610","url":null,"abstract":"The EPCglobal Network is a global information architecture for objects carrying RFID tags with Electronic Product Codes (EPC) in supply chains. Discovery Service (DS) is an important component storing large amounts of indices from EPCs to detailed information in EPCISes. However, to the client, DS is a third-party server which can easily get clients' privacy when they send queries. In this paper, using the policy of Private Information Retrieval (PIR), we propose a client privacy preserving DS scheme that can meet both basic functional requirement and client privacy requirement. Compared to existing privacy preserving DS schemes, our work is more concise in architecture and can completely guarantee the client privacy.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128638123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信