Proceedings of the 2018 VII International Conference on Network, Communication and Computing最新文献

筛选
英文 中文
Elicitation Techniques for Internet of Things Applications Requirements: A Systematic Review 物联网应用需求的引出技术:系统回顾
T. Lim, Fang-Fang Chua, B. Tajuddin
{"title":"Elicitation Techniques for Internet of Things Applications Requirements: A Systematic Review","authors":"T. Lim, Fang-Fang Chua, B. Tajuddin","doi":"10.1145/3301326.3301360","DOIUrl":"https://doi.org/10.1145/3301326.3301360","url":null,"abstract":"Requirements elicitation is one of the most essential activities in requirements engineering. The last twenty years have seen a growing trend towards Internet of Things and these new applications imposed a challenge for requirements engineers to elicit requirements. The aim of this paper is to identify and present the current trends of elicitation techniques that have been applied in Internet of Things application. To achieve this aim, an electronic search on two computing-related databases was included in this systematic review. After a thorough scanned independently done by the writers, 12 selected publications were examined. The findings of this systematic review revealed that (1) home and public spaces were prevalent domains for Internet of Things applications, (2) interviews and prototypes were most frequently used elicitation techniques, and (3) stakeholders were the common requirements sources.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114932536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Modified Approach of Blowfish Algorithm Based On S-Box Permutation using Shuffle Algorithm 基于s盒置换的河豚算法的Shuffle改进方法
Reynaldo R. Corpuz, B. Gerardo, Ruji P. Medina
{"title":"A Modified Approach of Blowfish Algorithm Based On S-Box Permutation using Shuffle Algorithm","authors":"Reynaldo R. Corpuz, B. Gerardo, Ruji P. Medina","doi":"10.1145/3301326.3301331","DOIUrl":"https://doi.org/10.1145/3301326.3301331","url":null,"abstract":"Blowfish Algorithm has been widely analyzed and gradually accepted as a good and powerful cryptographic algorithm offering several advantages among which is suitability and efficiency for implementing hardware and software; it satisfies the basic requirements in cryptography with high in attack immunity and relatively low in algorithm complexity. In spite of undeniable success in cryptography, Blowfish (BF) still has drawbacks in the substitution and permutation of values in the substitution box (S-box) that can affect the encryption and decryption of the algorithm. This study adopted Fisher-Yates Shuffle (FYS) also known as Knuth shuffle (KS) for the permutation of S-box, and a modified Function F was used to enhance the BF algorithm to address this issue. The results show that Modified approach in Blowfish Algorithm outperformed the Original Blowfish in the encryption, decryption, and throughput of the algorithm.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129982279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Real-Time Tracking IDs and Joints of Users 实时跟踪用户id和关节
Seongmin Baek, Myunggyu Kim
{"title":"Real-Time Tracking IDs and Joints of Users","authors":"Seongmin Baek, Myunggyu Kim","doi":"10.1145/3301326.3301365","DOIUrl":"https://doi.org/10.1145/3301326.3301365","url":null,"abstract":"This paper proposes a method of using multiple depth sensors vulnerable to joint occlusion and rotation to capture the dynamic motions of two users. The proposed method captures a series of multi-user motions by tracking user IDs, sorting out ID specific joints, and incorporating the joint movement data based on weighting. The ellipses accelerate the process of sorting out the depth data per user. Then, the sorted depth data add to the accuracy of joint positions for the adjustment of lower-limb joints. The proposed method enables an accurate restoration of 3D poses even in dynamic motions, and is applicable to experiential and training programs.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"os-48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127788723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Genetic Algorithm for Generating Counterexample in Stochastic Model Checking 随机模型检验中反例生成的遗传算法
Tingting Zheng, Yang Liu
{"title":"Genetic Algorithm for Generating Counterexample in Stochastic Model Checking","authors":"Tingting Zheng, Yang Liu","doi":"10.1145/3301326.3301348","DOIUrl":"https://doi.org/10.1145/3301326.3301348","url":null,"abstract":"Counterexamples are the most effective feature to convince system engineers about the value of formal verification. Generating the smallest counterexample in stochastic model checking has been proved to be NP-complete. In this paper, we apply the genetic algorithm to generate a counterexample for stochastic model checking. We use the diagnostic subgraph to represent a counterexample and employs indirect coding method to generate the more effective path. We implemented our method based on the stochastic model checker PRISM and applied it to some cases, in order to illustrate its applicability.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122341142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Predict the Best Graph Partitioning Strategy by Using Machine Learning Technology 利用机器学习技术预测最佳图划分策略
Jiayi Shen, F. Huet
{"title":"Predict the Best Graph Partitioning Strategy by Using Machine Learning Technology","authors":"Jiayi Shen, F. Huet","doi":"10.1145/3301326.3301354","DOIUrl":"https://doi.org/10.1145/3301326.3301354","url":null,"abstract":"In this paper, we explore applying machine learning techniques to find a best partitioner for a given graph. We use some metrics to describe the graph, and use these metrics as the input and the partitioner ranking of a graph execution algorithm as the label to train a model. Our experiment shows KNN and decision tree are good models for this problem.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128251816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Finding Impact Factors for Rejection of Pull Requests on GitHub 在GitHub上寻找拒绝拉取请求的影响因素
Panthip Pooput, P. Muenchaisri
{"title":"Finding Impact Factors for Rejection of Pull Requests on GitHub","authors":"Panthip Pooput, P. Muenchaisri","doi":"10.1145/3301326.3301380","DOIUrl":"https://doi.org/10.1145/3301326.3301380","url":null,"abstract":"A pull request is an important method for code contributions in GitHub that will be submitted when the developers would like to merge their code changes from their local machine to the main repository on which all source code in the project are stored. Before merging the code changes into the main repository, the developers have to request for a permission. If their source code is allowed to merge, the pull request status is accepted. On the other hand, if their source code is not allowed to merge, the pull request status is rejected. The pull request status may be rejected due to several factors, such as code complexity, code quality, the number of changed files, etc. Fixing the rejected pull requests will take some extra effort and time which may affect the project cost and timeline. This paper aims at finding the impact factors that are associated with the rejection of pull requests on GitHub and also discovering the relationships among impact factors by using the association rules in data mining.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130705490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Application of Insole Pressure Sensor to Assess Lower Extremity Compliance 鞋垫压力传感器在下肢顺应性评估中的应用
Chi-Heng Lu, Jhih-Jhong Jhuang, Chiu-Ching Tuan
{"title":"Application of Insole Pressure Sensor to Assess Lower Extremity Compliance","authors":"Chi-Heng Lu, Jhih-Jhong Jhuang, Chiu-Ching Tuan","doi":"10.1145/3301326.3301337","DOIUrl":"https://doi.org/10.1145/3301326.3301337","url":null,"abstract":"The most serious fracture in the hip is a hip fracture. There is a large chance of death within one year, often accompanied by serious complications, which indirectly lead to death. Therefore, the importance of postoperative rehabilitation can be seen. Rehabilitation therapy for patients with lower extremity fractures is often used partial weight bearing (PWB) clinically, but the traditional method of identification the appropriate weight-bearing lower limb weight is less objective and accurate, and it is impossible to know whether the patient accurately performs the rehabilitation of partial weight bearing. Therefore, this paper proposes a wearable instant insole pressure sensing system, which can provide complete foot pressure information instantly, and know the lower limb weight, for the therapist to refer to the configuration of the patient's lower limb burden weight and the patient's regular self-testing.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"22 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133818142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposal and Application of Security/Safety Evaluation Method for Medical Device System that Includes IoT 包含物联网的医疗器械系统安全/安全评估方法的提出与应用
Takuo Hayakawa, R. Sasaki, Hiroshi Hayashi, Yuji Takahashi, Tomoko Kaneko, T. Okubo
{"title":"Proposal and Application of Security/Safety Evaluation Method for Medical Device System that Includes IoT","authors":"Takuo Hayakawa, R. Sasaki, Hiroshi Hayashi, Yuji Takahashi, Tomoko Kaneko, T. Okubo","doi":"10.1145/3301326.3301330","DOIUrl":"https://doi.org/10.1145/3301326.3301330","url":null,"abstract":"A new risk analysis method for the Internet of Things (IoT) is required. IoT devices are exposed to both security and safety threats. Therefore, in the field of IoT, it is necessary to handle security and safety integrally, although these areas were treated as separate fields in the past. In the present paper, we propose a risk analysis method that can deal with both security and safety based on a safety analysis method called system-theoretic process analysis (STPA). In addition, we present a case in which the proposed method is applied to an insulin pump, which is a device for diabetic patients. In this case, using the proposed method, the occurrence of accidents due to security threats, which cannot be prevented by functional safety, could be identified. In addition, we showed a method of selecting countermeasures that can reduce the probability of the accident occurrence most among the limited budget.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115467753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Designing Packetc Programming Language for Reliable Network Apps 为可靠的网络应用程序设计数据包编程语言
R. Duncan
{"title":"Designing Packetc Programming Language for Reliable Network Apps","authors":"R. Duncan","doi":"10.1145/3301326.3301362","DOIUrl":"https://doi.org/10.1145/3301326.3301362","url":null,"abstract":"Domain-specific languages for network packet processing applications emphasize representing domain entities, such as packet protocol headers, and emphasize program speed, due to the relentless increase in packet transmission rates. In addition to these concerns, packetC makes app reliability a major aspect of its design, not least because in a single second a silent programming error can send a million packets into oblivion or send sensitive information to inappropriate destinations. Our contributions to constructing a reliable packet processing language are: (1) overhauling C-style structure bitfields to eliminate ambiguity, (2) constraining enumeration variables to guarantee type-safe properties, (3) providing novel reference variables for databases and regex sets and doing so in a way in which they cannot be dereferenced to inappropriate objects, and (4) offering a coercive try/catch exception handling scheme to ensure that system-thrown exceptions are wrapped within a try/catch structure for exception handling. In a broad sense our contribution is making reliability a central design criterion in designing a DSL for packet processing, an application domain in which performance has gotten much more attention.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121514132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using QFD as an Information Tool for Artistic Style Creation: A Case Study of Naturalism to Otaku Style Works 运用QFD作为艺术风格创作的信息工具——以自然主义对宅男风格作品的研究为例
J. Lee, Shuo-fang Liu
{"title":"Using QFD as an Information Tool for Artistic Style Creation: A Case Study of Naturalism to Otaku Style Works","authors":"J. Lee, Shuo-fang Liu","doi":"10.1145/3301326.3301328","DOIUrl":"https://doi.org/10.1145/3301326.3301328","url":null,"abstract":"Purpose:An art-studio was a good experimental place with an emphasis on implications to strategy and the nature of organizing covering strategic aspects and impacts of new dynamics and patterns of work. In this study, we used the vocabulary image method to analyze the works' characteristics. Design/methodology/approach: We invited an oil painter, and asked him to provide ten works for analysis. We Used the 500 adjectives to match the description of the works. Then we used semantic analysis method to analyze his works. From the semantic to the new pictures, we used the Semantic Differential Scale and the QFD (Quality Function Deployment) method to create a way to let the artist understand other ideas, especially the possibility of their works. At last, we put the new pictures on the position map to see how the skills, elements and colors affected how each painting had. Findings: From the semantic to the production processes, we used the Semantic Differential Scale and the QFD (Quality Function Deployment) method to create a way to let the artist understand other people's ideas, especially the designer and producer. Originality/value:As a reference, this study was expected to promote the required study staff to improve their products. The application of the proposed model is shown in design industry.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114798574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信