2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)最新文献

筛选
英文 中文
Impact of Web 2.0 Technology on Students with Learning Difficulties: A State-of-the-Art and Future Challenges Web 2.0技术对学习困难学生的影响:现状和未来的挑战
Mohammad Alhabashneh, Bilal Abu-Salih, S. Knight
{"title":"Impact of Web 2.0 Technology on Students with Learning Difficulties: A State-of-the-Art and Future Challenges","authors":"Mohammad Alhabashneh, Bilal Abu-Salih, S. Knight","doi":"10.1109/WAINA.2018.00169","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00169","url":null,"abstract":"Learning difficulties are one of the significant barriers to the children's educational process. Learning difficulties include several aspects of life, not just learning at school and can affect how basic skills such as reading, writing and math are learned. Further, this problem affects how to learn high-level skills such as organization, time planning, abstract thinking, and long or short-term memory development. Hence, there is an imperative need to address this problem and to provide theoretical and practical solutions to untangle it. This paper proposes a methodology toward helping children to encounter learning difficulties through incorporating Web 2.0 technology. Through six designed phases, the proposed methodology is promising to enhance the learning quality of students with learning difficulties, and aims to improve their personal, mental and social development skills.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121300610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing QoE Based on Machine Learning and DASH in SDN Networks SDN网络中基于机器学习和DASH的QoE增强
T. Abar, Asma BEN LETAIFA, S. E. Asmi
{"title":"Enhancing QoE Based on Machine Learning and DASH in SDN Networks","authors":"T. Abar, Asma BEN LETAIFA, S. E. Asmi","doi":"10.1109/WAINA.2018.00095","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00095","url":null,"abstract":"In recent years, networks have become an important channel for the distribution of multimedia data, mainly via the HTTP protocol. Several intelligent streaming protocols have been based on the HTTP protocol to achieve smooth, high-quality streaming and a better Quality of Experience (QoE). Among these protocols, there is the latest and the newest international standard MPEG DASH. This technique introduces an additional level of complexity for measuring perceived video quality, as it varies the video bit rate. This work adopts an SDN-based architecture framework that aims to optimize the QoE for video streaming in SDN networks using DASH protocol whilst also taking into account the variety of devices, video parameters and the network requirements. We try to model the optimization problem of QoE based on several parameters that effect the user perception such as stall number, bitrates ... Our module is composed of two phases: estimation phase of available resources based on Machine Learning, adaptation and selection phase based on the results of the first one.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114335139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Recovery Method for Reducing Storage Usage Considering Number of Neighboring Nodes in VANETs 一种考虑vanet中相邻节点数量的减少存储使用的恢复方法
Shogo Nakasaki, Y. Yoshino, Makoto Ikeda, L. Barolli
{"title":"A Recovery Method for Reducing Storage Usage Considering Number of Neighboring Nodes in VANETs","authors":"Shogo Nakasaki, Y. Yoshino, Makoto Ikeda, L. Barolli","doi":"10.1109/WAINA.2018.00075","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00075","url":null,"abstract":"In Vehicular Ad-hoc NETworks (VANETs), end-to-end communication becomes difficult because of dynamic change of network topology caused by high mobility of vehicles in the network. In order to deal with this problem, Delay/Disconnection/Disruption Tolerant Networking (DTN) can be a good approach. However, consumption of network resources and storage usage of each vehicle is a critical problem in VANETs. In this paper, we propose a recovery method for reducing storage usage of each vehicle for VANETs without additional message exchanges. We evaluate the proposed method by simulations. In this paper, we found that the proposed recovery method can manage the storage efficiently for a limited density of vehicles.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128155633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
How Cloud Computing, IoT and Multicore Systems Affect Software Engineering Principles 云计算、物联网和多核系统如何影响软件工程原理
Lutz Schubert, Athanasios Tsitsipas, K. Jeffery
{"title":"How Cloud Computing, IoT and Multicore Systems Affect Software Engineering Principles","authors":"Lutz Schubert, Athanasios Tsitsipas, K. Jeffery","doi":"10.1109/WAINA.2018.00108","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00108","url":null,"abstract":"The world has moved from a single core, local application execution to distributed, parallel, social, heterogeneous etc. Standard ways of programming thus do not hold anymore and all software engineers struggle with the growing complexity that equally affects performance, maintainability and, worst of all, cost. The paper presents a concept arising from the EC Cloud Computing expert group between 2012 and 2016 as a means to move away from the hazards of traditional, Turing based computing concepts to an abstract and more natural way of programming. The concept builds up on three major building blocks, namely \"Information\", \"Intention\" and \"Incentive\" to define the behaviour of an application in a fashion that can abstract away from the actual way of executing an algorithm, thus allowing for a larger degree of adaptation, distribution and scale.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"7 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130850990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experimental Study of Characterizing Frequent Itemsets Using Representation Learning 用表征学习表征频繁项集的实验研究
S. Kawanobe, Tomonobu Ozaki
{"title":"Experimental Study of Characterizing Frequent Itemsets Using Representation Learning","authors":"S. Kawanobe, Tomonobu Ozaki","doi":"10.1109/WAINA.2018.00082","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00082","url":null,"abstract":"Frequent itemset mining is the most fundamental problem in data mining. In this task, a set of items is adopted as a pattern, and all patterns frequently appearing in a database must be enumerated. While extensive research has been conducted over a long period, including proposals of sophisticated patterns for capturing interesting and meaningful information as well as developments of fast and scalable algorithms, low comprehensibility of obtained patterns is widely recognized as an unsolved essential drawback in frequent itemset mining. In this paper, to cope with this drawback, we propose to use representation learning to characterize each frequent pattern from various perspectives. Concretely speaking, we perform cluster analysis in the obtained vector space to identify representative and outlier patterns because we believe that these representatives and outliers must play important roles to understand the whole patterns. Furthermore, in order to obtain significant patterns having various roles to understand the pattern sets, we utilize the degree of centrality in a pattern network built by drawing edges among similar patterns. Experiments are conducted using a real dataset in Japanese video-sharing site Nicovideo (nicovideo.jp). The results show the effectiveness of the proposed framework for identifying characteristic patterns having various roles.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130982199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ameliorating the Web QoE Using SPA 利用SPA改进Web QoE
Nawres Abdelwahed, Asma BEN LETAIFA, S. E. Asmi
{"title":"Ameliorating the Web QoE Using SPA","authors":"Nawres Abdelwahed, Asma BEN LETAIFA, S. E. Asmi","doi":"10.1109/WAINA.2018.00081","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00081","url":null,"abstract":"Web Quality of Experience QoE is a measure of whether or not the customer's experience is satisfied with a service. QoE is interested in the whole service experience. QoE is a concept that resembles the user experience but in the telecommunications field. For a long time web QoE was mesured only in an objective way. Nowadays, subjective metrics are perceived as the best way to evaluate the QoE because humans have changing moods according to many parameters that we can't take them all into consideration, that's why we recure to subjective metrics. Mesuring the web QoE helps us ameliorate it. For that there are different ways of ameliorating the web QoE (network, content...). In this work we focus on ameliorating the web QoE through Software-Defined Networking (SDN) by displaying the appropriate web page quality to the user according to his wishes and the availability of the bandwidth in that specific moment and this among the different web pages of different qualities implemented at the SDN RYU Controller.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132107679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Integrated Message Suppression Controller with Epidemic and MaxProp Protocols: Performance Evaluation for VDTNs 带有Epidemic和MaxProp协议的集成消息抑制控制器:VDTNs的性能评估
Y. Yoshino, Shogo Nakasaki, Makoto Ikeda, L. Barolli
{"title":"An Integrated Message Suppression Controller with Epidemic and MaxProp Protocols: Performance Evaluation for VDTNs","authors":"Y. Yoshino, Shogo Nakasaki, Makoto Ikeda, L. Barolli","doi":"10.1109/WAINA.2018.00080","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00080","url":null,"abstract":"Delay/Disruption/Disconnection Tolerant Networking (DTN) has the potential to interconnect vehicles for inter-vehicle communications. In our previous work, we evaluated the performance of our proposed message suppression controller considering priority for inter-vehicle communications. In this paper, we integrate the Enhanced Message Suppression Controller (EMSC) with Epidemic and MaxProp protocols and present the performance evaluation for Vehicular DTN (VDTN). We develop a simulation platform based on Scenargie network simulator considering IEEE 802.11p. From the simulation results, we found that our integrated EMSCs decreases the storage usages.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123978874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cloud Services Categories Identification from Requirements Specifications 从需求规范中识别云服务类别
B. D. Martino, Jessica Pascarella, Stefania Nacchia, Salvatore Augusto Maisto, P. Iannucci, Fabio Cerri
{"title":"Cloud Services Categories Identification from Requirements Specifications","authors":"B. D. Martino, Jessica Pascarella, Stefania Nacchia, Salvatore Augusto Maisto, P. Iannucci, Fabio Cerri","doi":"10.1109/WAINA.2018.00125","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00125","url":null,"abstract":"In the Cloud Computing field, with the increasing number of Cloud Services available thanks to several cloud providers, looking for a particular service has become very difficult, especially with the evolution of the stakeholders' needs. At the same time requirements specifications have become more and more complex to define in a formal representation and to analyse, since the stakeholders' goals are typically high-level, abstract, and hard-to-measure. For these reasons it would be useful to automate, as much as possible, requirements analysis. In this work we propose an automatic classification and modelling of requirements that are expressed in a natural language form, and an automatic identification of cloud services categories from requirements in order to support the development of a cloud application. Automated requirements analysis is not an easy subject, due to the natural languages variability and ambiguity, that's why different machine/deep learning and natural language processing approaches are used and compared. The target data set is provided by the Open-Security tera-PROMISE repository.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129685101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Early Detection of Network Incident Using Open Security Information 利用开放的安全信息早期检测网络事件
Hiroki Kuzuno, S. Otsuka
{"title":"Early Detection of Network Incident Using Open Security Information","authors":"Hiroki Kuzuno, S. Otsuka","doi":"10.1109/WAINA.2018.00057","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00057","url":null,"abstract":"Network security incident (network incident) is an important topic in the around world. Network operators and security vendors tackle these network incidents consist of many cyber crimes. The types of threats are DDoS, phishing, malware, vulnerability attacks to take control a device, and extortion case. Network operators consider protecting their environment from threats. They have to observe a trend of threat, then could trace suspicious network traffic flows on what network. Some organization and individual persons publish open security information related to past a network incident. In order to identify which network covers on suspicious activity, we collect open security information as the dataset to analyze these for providing a summary of network operators' IP addresses lead to network incident. The result is not only useful information to get a trend of threat pattern, but also we quickly handle a countermeasure to it when real network incident has happened in their environment. In the evaluation, we verify the result of proposed framework could handle the trend of network incident cases. We determine the result whether provides security threat or not based on security vendors reports. The evaluation result shows the proposed framework could identify the SSH brute force attack and other attacks before the security vendor discloses it. It is useful for supporting of network operators and community to observe the latest network incident when it occurs in their environment.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129343340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Analysis of Open Source Network Access Control in Virtual Networks 虚拟网络中开源网络访问控制的安全性分析
Mohammed Suhel Inamdar, Ali Tekeoglu
{"title":"Security Analysis of Open Source Network Access Control in Virtual Networks","authors":"Mohammed Suhel Inamdar, Ali Tekeoglu","doi":"10.1109/WAINA.2018.00131","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00131","url":null,"abstract":"Enterprise networks depend on Network Access Control software to restrict access to valuable resources. Significant number of attacks come from internal threats, such as disgruntled employees and infected personal devices brought into the company network. Network Access Control software plays an important role in detecting and protecting against these kind of threats. Most companies maintain huge and complex internal networks that form the backbone of their business and the safe harbor for their intellectual property. Thus, its essential to make sure each machine and user has only the right amount of access to the corporate network. With the widespread use of mobile and IoT devices integrating dynamically to corporate networks, this task gets even more complicated. Virtual Local Area Networks (VLANs) are heavily employed to securely partition the intranet because of the suitability for a corporate setting. In this paper, we have evaluated the security of PacketFence Network Access Control server, installed within GNS3 network emulator. Using an open-source tool named Yersinia to carry out experiments, we proved that attacks are viable and realistic. We showed different possible ways to attack the PacketFence network along with how to prevent.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128907707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信