{"title":"A recommender system for telecom users: Experimental evaluation of recommendation algorithms","authors":"P. Falcarin, A. Vetrò, Jian Yu, Shareeful Islam","doi":"10.1109/CIS.2011.6169139","DOIUrl":"https://doi.org/10.1109/CIS.2011.6169139","url":null,"abstract":"The increasing flourish of available services in telecom domain offers more choices to the end user. On the other hand, such wide offer cannot be completely evaluated by the user, and some services may pass unobserved even if useful. To face this issue, the usage of recommendation systems in telecom domain is growing, to directly notify the user about the presence of services which may meet user interests. Recommendation can be seen as an advanced form of personalization, because user preferences are used to predict the interests of users for a new service. In this paper we propose a recommender system for users of telecom services, based on different collaborative filtering algorithms applied to a complex data-set of telecom users. Experiments on the recommendation performance and accuracy are conducted to test the different effects of different algorithms on a data set coming from the telecom domain.","PeriodicalId":286889,"journal":{"name":"2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131375704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring security requirements for software security","authors":"Shareeful Islam, P. Falcarin","doi":"10.1109/CIS.2011.6169137","DOIUrl":"https://doi.org/10.1109/CIS.2011.6169137","url":null,"abstract":"For the last decade's software security has gained attention by industries, experts and all other communities. Secure software is about mitigating risks from assets to achieve business goals. Security is highly depending on the context where software is deployed. But measuring software security even within a specific context is still not mature. This is because properties and metrics for measuring security are not properly defined and methods are lacking to provide a complete picture for measuring software security. Here we identify security requirements through asset based risk management process to describe soft ware security goal. Then based on the Goal-Question-Metric approach the identified security requirements are evaluated for measuring software security.","PeriodicalId":286889,"journal":{"name":"2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116252034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combination of Taylor and Chan method in mobile positioning","authors":"Hao Li, M. Oussalah","doi":"10.1109/CIS.2011.6169143","DOIUrl":"https://doi.org/10.1109/CIS.2011.6169143","url":null,"abstract":"Due to increase in location based services, the need for efficient network based location methods has been made of paramount of importance. Among the mobile positioning techniques Time of Arrival (TOA) and Time Difference of Arrival (TDOA) arisen as promising techniques. In order to deal with such technology some theoretical approaches have been put forward to draw the estimation under the technological constraints. Among such approaches, one distinguish the Taylor based approximation and Chan's based approach which provide an approximate solution of the underlying hyperbolic equations. This paper reviews the above approaches and suggests a linear combination of the two estimators that minimize the variance. Simulation platform has been developed to test and compare the performances of these estimators. The result of simulation and actual measurement indicated that the method has high positioning accuracy both in ideal environment and actual measurement.","PeriodicalId":286889,"journal":{"name":"2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126514302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methods of sensory augmentation through electro-tactile stimulation of the tongue","authors":"A. Jeffs, K. Warwick","doi":"10.1109/CIS.2011.6169145","DOIUrl":"https://doi.org/10.1109/CIS.2011.6169145","url":null,"abstract":"A device has been constructed and a series of trials have been performed in order to demonstrate the efficacy and further advantages of an electro-tactile array mounted onto the tongue surface for the purpose of sensory augmentation. Tests have shown that by using a low resolution array a computer-human feedback loop can be successfully implemented in order to complete tasks such as object tracking, surface shape identification and shape recognition with no training or prior experience with the device. Comparisons of this technique have been made with visual alternatives and show that the tongue based tactile array can match such methods in convenience and accuracy in performing simple tasks.","PeriodicalId":286889,"journal":{"name":"2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130290975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A critical evaluation of datasets for investigating IDSs and IPSs researches","authors":"J. Nehinbe","doi":"10.1109/CIS.2011.6169141","DOIUrl":"https://doi.org/10.1109/CIS.2011.6169141","url":null,"abstract":"Complex and new cases of intrusions, new bugs, security issues and vulnerabilities are evolving everyday for a number of reasons. Consequently, researchers in the domains of Intrusion Detection Systems and Intrusion Prevention Systems constantly design new methods to lessen the aforementioned security issues. However, getting suitable datasets for evaluating various research designs in these domains is a major challenge for the research community, vendors and data donors over the years. As a result, most intrusion detection and prevention methodologies are evaluated using wrong categories of datasets because the limitations of each category of evaluative datasets are unknown. Therefore, this paper presents a critique of the challenges associated with evaluative datasets for investigating intrusion detection and prevention methodologies and how these challenges can be lessened. Finally, these analyses will effective guide researchers and vendors in securing evaluative datasets for validating the intrusion detection and prevention systems.","PeriodicalId":286889,"journal":{"name":"2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128811981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent channel access technique in Cognitive Radio networks","authors":"M. Pirmoradian, C. Politis","doi":"10.1109/CIS.2011.6169142","DOIUrl":"https://doi.org/10.1109/CIS.2011.6169142","url":null,"abstract":"Future networks, especially in the framework of smart cities will be populated with various kinds of equipment accessing wireless communication channels. A much higher device variety will arise, ranging from identifiable objects to notebooks and smart phones. These aspects require high-level intelligent wireless access network. In order to cope with the vast number of technologies (machine-to-machine communications and sensor networks), cognitive radio network will be a key enabling technology. Cognitive Radio (CR) significantly utilizes current static radio frequency bands in an opportunistic manner. In this paper, we propose two intelligent channel access methods; Minimum Collision Technique (MCT) and Maximum Residual Lifetime Technique (MRLT) in CR networks. The proposed techniques are evaluated by average channel utilization and average channel collision on four dedicated channels in a specific period of time (3000ms). The numerical results confirm that the MRLT technique on cognitive radio side approaches more channel utilization and less data transmission collision among users, compared with MCT.","PeriodicalId":286889,"journal":{"name":"2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123894160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-organization for scheduling in agile manufacturing","authors":"A. Madureira, I. Pereira, N. Sousa","doi":"10.1109/CIS.2011.6169132","DOIUrl":"https://doi.org/10.1109/CIS.2011.6169132","url":null,"abstract":"Agility refers to the manufacturing system ability to rapidly adapt to market and environmental changes in efficient and cost-effective ways. This paper addresses the development of self-organization methods to enhance the operations of a scheduling system, by integrating scheduling system, configuration and optimization into a single autonomic process requiring minimal manual intervention to increase productivity and effectiveness while minimizing complexity for users. We intend to conceptualize real manufacturing systems as interacting autonomous entities in order to build future Decision Support Systems (DSS) for Scheduling in agile manufacturing environments.","PeriodicalId":286889,"journal":{"name":"2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124845022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Increasing completion of neural networks coursework","authors":"R. Mitchell","doi":"10.1109/CIS.2011.6169131","DOIUrl":"https://doi.org/10.1109/CIS.2011.6169131","url":null,"abstract":"The assessment of the author's second year module on neural networks requires students to write a program to implement a neural network and to then apply it to a real world problem of their choice. In recent years, significant numbers of students failed to complete the work. Some did not apply their network and some even failed to implement the network. This paper describes a series of refinements to the coursework, its support and its assessment, as a result of which only two students failed to complete the work this year.","PeriodicalId":286889,"journal":{"name":"2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128022141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A software system for data mining with twitter","authors":"F. Bhat, M. Oussalah, K. Challis, T. Schnier","doi":"10.1109/CIS.2011.6169149","DOIUrl":"https://doi.org/10.1109/CIS.2011.6169149","url":null,"abstract":"The rise of social network usage through mobile devices makes the rigorous analysis of these systems of paramount importance for intelligence gathering and decision making. This paper describes the outcome of a multidisciplinary project carried out for the purpose of Twitter data collection and analysis. In particular, a proposal for enabling the discovery of spatial patterns within geo-located Twitter content has been investigated and implemented.","PeriodicalId":286889,"journal":{"name":"2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS)","volume":"461 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113967156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A provisioning model towards OAuth 2.0 performance optimization","authors":"M. Noureddine, R. Bashroush","doi":"10.1109/CIS.2011.6169138","DOIUrl":"https://doi.org/10.1109/CIS.2011.6169138","url":null,"abstract":"A major hurdle of formal adoption of OAuth protocol for enterprise applications is performance. Enterprise applications (e.g. SAP, SharePoint, Exchange Server, etc.) require a mechanism to predict and manage performance expectations. As these applications become more and more ubiquitous in the Cloud, the scale and performance expectations become an important factor impacting architectural decisions for security protocol adoption. This paper proposes an optimization to OAuth 2.0 for enterprise adoption. This optimization is achieved by introducing provisioning steps to pre-establish trust amongst enterprise applications' Resource Servers, its associated Authorization Server and the clients interested in access to protected resources. In this model, trust is provisioned and synchronized as a pre-requisite step to authentication and authorization amongst all communicating entities in OAuth protocol, namely, the client requesting a protected resource, the resource server, and the authorization server. For a case study, we analyze SAP authenticating with SharePoint using our optimization versus existing OAuth protocol. We believe such optimization will further facilitate the adoption of OAuth in the enterprise where scale and performance are critical factors.","PeriodicalId":286889,"journal":{"name":"2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128745377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}