{"title":"Elicitation Techniques for Internet of Things Applications Requirements: A Systematic Review","authors":"T. Lim, Fang-Fang Chua, B. Tajuddin","doi":"10.1145/3301326.3301360","DOIUrl":"https://doi.org/10.1145/3301326.3301360","url":null,"abstract":"Requirements elicitation is one of the most essential activities in requirements engineering. The last twenty years have seen a growing trend towards Internet of Things and these new applications imposed a challenge for requirements engineers to elicit requirements. The aim of this paper is to identify and present the current trends of elicitation techniques that have been applied in Internet of Things application. To achieve this aim, an electronic search on two computing-related databases was included in this systematic review. After a thorough scanned independently done by the writers, 12 selected publications were examined. The findings of this systematic review revealed that (1) home and public spaces were prevalent domains for Internet of Things applications, (2) interviews and prototypes were most frequently used elicitation techniques, and (3) stakeholders were the common requirements sources.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114932536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Modified Approach of Blowfish Algorithm Based On S-Box Permutation using Shuffle Algorithm","authors":"Reynaldo R. Corpuz, B. Gerardo, Ruji P. Medina","doi":"10.1145/3301326.3301331","DOIUrl":"https://doi.org/10.1145/3301326.3301331","url":null,"abstract":"Blowfish Algorithm has been widely analyzed and gradually accepted as a good and powerful cryptographic algorithm offering several advantages among which is suitability and efficiency for implementing hardware and software; it satisfies the basic requirements in cryptography with high in attack immunity and relatively low in algorithm complexity. In spite of undeniable success in cryptography, Blowfish (BF) still has drawbacks in the substitution and permutation of values in the substitution box (S-box) that can affect the encryption and decryption of the algorithm. This study adopted Fisher-Yates Shuffle (FYS) also known as Knuth shuffle (KS) for the permutation of S-box, and a modified Function F was used to enhance the BF algorithm to address this issue. The results show that Modified approach in Blowfish Algorithm outperformed the Original Blowfish in the encryption, decryption, and throughput of the algorithm.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129982279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-Time Tracking IDs and Joints of Users","authors":"Seongmin Baek, Myunggyu Kim","doi":"10.1145/3301326.3301365","DOIUrl":"https://doi.org/10.1145/3301326.3301365","url":null,"abstract":"This paper proposes a method of using multiple depth sensors vulnerable to joint occlusion and rotation to capture the dynamic motions of two users. The proposed method captures a series of multi-user motions by tracking user IDs, sorting out ID specific joints, and incorporating the joint movement data based on weighting. The ellipses accelerate the process of sorting out the depth data per user. Then, the sorted depth data add to the accuracy of joint positions for the adjustment of lower-limb joints. The proposed method enables an accurate restoration of 3D poses even in dynamic motions, and is applicable to experiential and training programs.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"os-48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127788723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Genetic Algorithm for Generating Counterexample in Stochastic Model Checking","authors":"Tingting Zheng, Yang Liu","doi":"10.1145/3301326.3301348","DOIUrl":"https://doi.org/10.1145/3301326.3301348","url":null,"abstract":"Counterexamples are the most effective feature to convince system engineers about the value of formal verification. Generating the smallest counterexample in stochastic model checking has been proved to be NP-complete. In this paper, we apply the genetic algorithm to generate a counterexample for stochastic model checking. We use the diagnostic subgraph to represent a counterexample and employs indirect coding method to generate the more effective path. We implemented our method based on the stochastic model checker PRISM and applied it to some cases, in order to illustrate its applicability.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122341142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predict the Best Graph Partitioning Strategy by Using Machine Learning Technology","authors":"Jiayi Shen, F. Huet","doi":"10.1145/3301326.3301354","DOIUrl":"https://doi.org/10.1145/3301326.3301354","url":null,"abstract":"In this paper, we explore applying machine learning techniques to find a best partitioner for a given graph. We use some metrics to describe the graph, and use these metrics as the input and the partitioner ranking of a graph execution algorithm as the label to train a model. Our experiment shows KNN and decision tree are good models for this problem.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128251816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finding Impact Factors for Rejection of Pull Requests on GitHub","authors":"Panthip Pooput, P. Muenchaisri","doi":"10.1145/3301326.3301380","DOIUrl":"https://doi.org/10.1145/3301326.3301380","url":null,"abstract":"A pull request is an important method for code contributions in GitHub that will be submitted when the developers would like to merge their code changes from their local machine to the main repository on which all source code in the project are stored. Before merging the code changes into the main repository, the developers have to request for a permission. If their source code is allowed to merge, the pull request status is accepted. On the other hand, if their source code is not allowed to merge, the pull request status is rejected. The pull request status may be rejected due to several factors, such as code complexity, code quality, the number of changed files, etc. Fixing the rejected pull requests will take some extra effort and time which may affect the project cost and timeline. This paper aims at finding the impact factors that are associated with the rejection of pull requests on GitHub and also discovering the relationships among impact factors by using the association rules in data mining.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130705490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Insole Pressure Sensor to Assess Lower Extremity Compliance","authors":"Chi-Heng Lu, Jhih-Jhong Jhuang, Chiu-Ching Tuan","doi":"10.1145/3301326.3301337","DOIUrl":"https://doi.org/10.1145/3301326.3301337","url":null,"abstract":"The most serious fracture in the hip is a hip fracture. There is a large chance of death within one year, often accompanied by serious complications, which indirectly lead to death. Therefore, the importance of postoperative rehabilitation can be seen. Rehabilitation therapy for patients with lower extremity fractures is often used partial weight bearing (PWB) clinically, but the traditional method of identification the appropriate weight-bearing lower limb weight is less objective and accurate, and it is impossible to know whether the patient accurately performs the rehabilitation of partial weight bearing. Therefore, this paper proposes a wearable instant insole pressure sensing system, which can provide complete foot pressure information instantly, and know the lower limb weight, for the therapist to refer to the configuration of the patient's lower limb burden weight and the patient's regular self-testing.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"22 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133818142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Takuo Hayakawa, R. Sasaki, Hiroshi Hayashi, Yuji Takahashi, Tomoko Kaneko, T. Okubo
{"title":"Proposal and Application of Security/Safety Evaluation Method for Medical Device System that Includes IoT","authors":"Takuo Hayakawa, R. Sasaki, Hiroshi Hayashi, Yuji Takahashi, Tomoko Kaneko, T. Okubo","doi":"10.1145/3301326.3301330","DOIUrl":"https://doi.org/10.1145/3301326.3301330","url":null,"abstract":"A new risk analysis method for the Internet of Things (IoT) is required. IoT devices are exposed to both security and safety threats. Therefore, in the field of IoT, it is necessary to handle security and safety integrally, although these areas were treated as separate fields in the past. In the present paper, we propose a risk analysis method that can deal with both security and safety based on a safety analysis method called system-theoretic process analysis (STPA). In addition, we present a case in which the proposed method is applied to an insulin pump, which is a device for diabetic patients. In this case, using the proposed method, the occurrence of accidents due to security threats, which cannot be prevented by functional safety, could be identified. In addition, we showed a method of selecting countermeasures that can reduce the probability of the accident occurrence most among the limited budget.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115467753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing Packetc Programming Language for Reliable Network Apps","authors":"R. Duncan","doi":"10.1145/3301326.3301362","DOIUrl":"https://doi.org/10.1145/3301326.3301362","url":null,"abstract":"Domain-specific languages for network packet processing applications emphasize representing domain entities, such as packet protocol headers, and emphasize program speed, due to the relentless increase in packet transmission rates. In addition to these concerns, packetC makes app reliability a major aspect of its design, not least because in a single second a silent programming error can send a million packets into oblivion or send sensitive information to inappropriate destinations. Our contributions to constructing a reliable packet processing language are: (1) overhauling C-style structure bitfields to eliminate ambiguity, (2) constraining enumeration variables to guarantee type-safe properties, (3) providing novel reference variables for databases and regex sets and doing so in a way in which they cannot be dereferenced to inappropriate objects, and (4) offering a coercive try/catch exception handling scheme to ensure that system-thrown exceptions are wrapped within a try/catch structure for exception handling. In a broad sense our contribution is making reliability a central design criterion in designing a DSL for packet processing, an application domain in which performance has gotten much more attention.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121514132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using QFD as an Information Tool for Artistic Style Creation: A Case Study of Naturalism to Otaku Style Works","authors":"J. Lee, Shuo-fang Liu","doi":"10.1145/3301326.3301328","DOIUrl":"https://doi.org/10.1145/3301326.3301328","url":null,"abstract":"Purpose:An art-studio was a good experimental place with an emphasis on implications to strategy and the nature of organizing covering strategic aspects and impacts of new dynamics and patterns of work. In this study, we used the vocabulary image method to analyze the works' characteristics. Design/methodology/approach: We invited an oil painter, and asked him to provide ten works for analysis. We Used the 500 adjectives to match the description of the works. Then we used semantic analysis method to analyze his works. From the semantic to the new pictures, we used the Semantic Differential Scale and the QFD (Quality Function Deployment) method to create a way to let the artist understand other ideas, especially the possibility of their works. At last, we put the new pictures on the position map to see how the skills, elements and colors affected how each painting had. Findings: From the semantic to the production processes, we used the Semantic Differential Scale and the QFD (Quality Function Deployment) method to create a way to let the artist understand other people's ideas, especially the designer and producer. Originality/value:As a reference, this study was expected to promote the required study staff to improve their products. The application of the proposed model is shown in design industry.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114798574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}