2015 International Conference on Computing, Communication and Security (ICCCS)最新文献

筛选
英文 中文
Full-half duplex mixed strategy for capacity maximisation in MIMO interference channels MIMO干扰信道中容量最大化的全半双工混合策略
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374175
Emmanuel M. Migabo, T. Olwal, Thato Phate
{"title":"Full-half duplex mixed strategy for capacity maximisation in MIMO interference channels","authors":"Emmanuel M. Migabo, T. Olwal, Thato Phate","doi":"10.1109/CCCS.2015.7374175","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374175","url":null,"abstract":"Existing wireless channel Multiple-Input Multiple-Output (MIMO) interference models demonstrate that full duplex communication in a k-link MIMO system suffers from both self-interference and inter-user interference [1]. However, the fact that nodes exchange information simultaneously (Transmission and reception activities) in a bi-directional manner on each of the k considered links; comes with considerable potential gain in terms of channel capacity. On the other hand, halfduplex communication between the k MIMO links comes with the advantage that it does not suffer from self interference. Half duplex MIMO communication however comes with the drawback that it only achieves single link channel capacity. It also can still result in inter-user interference. This paper proposes a mixed strategy which takes advantage of the Full-duplex MIMO capacity gain while reducing self-interference by tapping into the Half-duplex potential and also reducing inter-user interference by interleaving Full-duplex and Half-duplex communications on the k MIMO links. This is done by designing optimum transmitter and receive filters for Weighted Sum Rate (WSR) maximisation using the Rosen's gradient projection method. After proper modeling and MATLAB simulation, the obtained results show that the Full-Half duplex Mixed strategy enhances the overall channel capacity as compared to the k-link MIMO Full-duplex WSR maximisation approach.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115653371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new efficient algorithm for executing queries over encrypted data 对加密数据执行查询的一种新的高效算法
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374182
Rasha Refaie, A. A. Abd El-Aziz, Nermin Hamza, Mahmood A. Mahmood, H. Hefny
{"title":"A new efficient algorithm for executing queries over encrypted data","authors":"Rasha Refaie, A. A. Abd El-Aziz, Nermin Hamza, Mahmood A. Mahmood, H. Hefny","doi":"10.1109/CCCS.2015.7374182","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374182","url":null,"abstract":"Outsourcing databases into cloud increases the need of data security. The user of cloud must be sure that his data will be safe and will not be stolen or reused even if the datacenters were attacked. The service provider is not trustworthy so the data must be invisible to him. Executing queries over encrypted data preserves a certain degree of confidentiality. In this paper, we propose an efficient algorithm to run computations on data encrypted for different principals. The proposed algorithm allows users to run queries over encrypted columns directly without decrypting all records.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"374 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114880108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Teaching Climate Change through blended learning: A case study in a private secondary school in Mauritius 通过混合式学习教授气候变化:毛里求斯一所私立中学的案例研究
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374179
Teena Gomes, S. Panchoo
{"title":"Teaching Climate Change through blended learning: A case study in a private secondary school in Mauritius","authors":"Teena Gomes, S. Panchoo","doi":"10.1109/CCCS.2015.7374179","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374179","url":null,"abstract":"Teaching Climate Change's concepts are hard and challenging to impress in the minds of adolescent learners in a traditional classroom environment. Designing appropriate instructional strategies with the best visual experiences enable learners to grasp the complex principle behind the concept and stimulate their interest. Hence, technology can be seen as a panacea. In this regard, a study was conducted to explore Form II learners' view on learning Climate Change with blended learning approach. The theoretical context of this research is underpinned by socio-constructivism. As methodology, an action research was carried out by implementing an interactive educational software, designed based on learners' requirements. A questionnaire was administered to 30 mixed ability learners from a gender-mixed private secondary school with the aim of collecting their learning experience. An active participation of the learners during the face-to-face session demonstrated that through blended learning, they had a clearer understanding and they appreciated the concept with a larger improvement in learners performance. Hence, this active and constructive learning strategy encouraged collaboration and cooperation, and celebrated the autonomy of the learners. Moreover, learners were motivated to take action and address problems in the community, developing their civic responsibility for sustainable development.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117090829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Introducing FERPS: A framework for Enterprise Resource Planning selection 介绍FERPS:企业资源规划选择的框架
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374141
On Singh, Ug Singh
{"title":"Introducing FERPS: A framework for Enterprise Resource Planning selection","authors":"On Singh, Ug Singh","doi":"10.1109/CCCS.2015.7374141","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374141","url":null,"abstract":"Enterprise Resource Planning (ERP) systems, over the years, have evolved into integral business systems in both medium and large organizations. The strength of an ERP is that it is a computerized transactional information system, with a centralized data repository. This allows for significant data availability and seamless collaboration between business functions. Realizing associated benefits through an ERP implementation is challenging, as experienced by a South African water utility. On the establishment of the utility the failure to implement an ERP system successfully, forced the organization to critically review the position it found itself in. This study identifies some of the critical shortfalls in the initial ERP implementation, and introduces the process of the creation of an ERP evaluation framework, named FERPS, that assists in ERP evaluation and selection, prior to acquisition. Ultimately, FERPS assists in providing an organization with evaluation results of ERP systems to support the implementation of an optimal ERP system, based on organizational fit.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121046825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy challenges in proximity based social networking: Techniques & solutions 基于邻近的社交网络中的隐私挑战:技术和解决方案
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374160
Asslinah Mocktoolah, K. Khedo
{"title":"Privacy challenges in proximity based social networking: Techniques & solutions","authors":"Asslinah Mocktoolah, K. Khedo","doi":"10.1109/CCCS.2015.7374160","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374160","url":null,"abstract":"The development of the Proximity based Mobile Social Networking (PMSN) has been growing exponentially with the adoption of smartphones and introduction of Wi-Fi hotspots in public and remote areas. Users present in the vicinity can interact with each other using the embedded technologies in their mobile devices such as GPS, Wi-Fi and Bluetooth. Due to its growing momentum, this new social networking has also aroused the interest of business people and advertisers. However, due to a lack of security in these networks, several privacy concerns were reported. Users are more reluctant to share their locations and to address this issue, some initial solutions to preserve location privacy were implemented. The aim of this paper is to present a clear categorization of the different privacy threats in PMSN. Moreover, the location privacy enforcement policies and techniques used to ensure privacy are outlined and some solutions employed in existent systems are presented and discussed. To the best of our knowledge, this is the first study done outlining several categories of PMSN privacy challenges and their solutions in this new type of social networking services. Finally, some privacy research challenges and future perspectives are proposed.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124220216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An enhanced software tool to aid novices in learning Object Oriented Programming (OOP) 一个增强的软件工具,帮助新手学习面向对象编程(OOP)
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374197
Yeeshtdevisingh Hosanee, S. Panchoo
{"title":"An enhanced software tool to aid novices in learning Object Oriented Programming (OOP)","authors":"Yeeshtdevisingh Hosanee, S. Panchoo","doi":"10.1109/CCCS.2015.7374197","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374197","url":null,"abstract":"Because of the complexity of Object Oriented Programming (OOP), various applications have been implemented as a learning support. However, results show that the novice learners still face problems in learning OOP. This paper has undergone an empirical research, aiming at understanding the problems faced by the novice learners in grasping the OOP concepts. This research has therefore the aim of determining requirements for a software tool which caters for the needs of the students. As methodology, a survey was carried out to identify the learners' difficulties and the types of supports they require while interacting with the OOP supporting tool. The latter also takes into consideration valid features of prior OOP teaching software tools. A particular feature, in-built in the tool, also caters for e-assessment which will allow the user to know his proficiency level. Novice learners are thus able to monitor their progress and take relevant actions accordingly. Thus, this will encourage novice learners to engage and be motivated to learn OOP at their own pace.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115962422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Rough set theory based method for building knowledge for the rate of heat transfer on free convection over a vertical flat plate embedded in a porous medium 基于粗糙集理论的多孔介质中垂直平板自由对流换热速率知识的建立方法
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374174
H. Nabwey, M. Abdou
{"title":"Rough set theory based method for building knowledge for the rate of heat transfer on free convection over a vertical flat plate embedded in a porous medium","authors":"H. Nabwey, M. Abdou","doi":"10.1109/CCCS.2015.7374174","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374174","url":null,"abstract":"Thermal convection and fluid flow in porous media has gained increasing research interest in recent years due to the presence of porous media in many engineering applications. Rough set theory has been regarded as a powerful feasible and effective methodology in the performance of data mining and knowledge discovery activities. This paper introduce a method for building knowledge for the rate of heat transfer (Local Nusselt Number) considering the free convection flow over a vertical flat plate in a fluid-saturated porous medium in the presence of heat sources or sinks and with nonlinear density temperature variation. First, Solutions for a class of coupled nonlinear equations are obtained by using the fourth-order Runge-Kutta method with shooting technique; second, Numerical calculations of rate of heat transfer for different parameters such as; variable suction/blowing, variable wall temperature exponent, heat source/sink, nonlinear density temperature variation (NTD) for both uniform and variable permeability cases are made and presented in tabular form (decision table). Finally, a set of maximally generalized decision rules is generated by using rough sets methodology. The effectiveness of the obtained results will be illustrated by comparing it with previously published work and are found to be in excellent agreement. The proposed method effectively decreases the time and complexity of process to obtaining the rate of heat transfer.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131511915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Personal preferences analysis of user interaction based on social networks 基于社交网络的用户交互个人偏好分析
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374148
Cheng-Hung Tsai, Han-Wen Liu, Tsun Ku, Wu-Fan Chien
{"title":"Personal preferences analysis of user interaction based on social networks","authors":"Cheng-Hung Tsai, Han-Wen Liu, Tsun Ku, Wu-Fan Chien","doi":"10.1109/CCCS.2015.7374148","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374148","url":null,"abstract":"Under the current situation the booming social networks, users interact between people with the way of social networks platforms (such as: press like, join fans pages and groups), and for these interactive information on social platform can fully represent that oneself is interested in the content of information sources in different social group. Therefore, how to collect user behavior patterns (Users Behavior) generated by social interaction, and then analyze and understand user preferences by these interactive data would be the purpose to discuss and to do the research of the paper. Furthermore, for many brand enterprises, it is important to know how to understand individual preferences, because when you know the individual preference information, it can carry out personal preference for advertising, product recommendation, article recommended...and other diversified personal social service, which can increase the click rate and exposure of the products, better close to the needs of the user's life. Therefore, with the above through social science and technology development trend arising from current social phenomenon, research of this paper, mainly expectations for analysis by the data of user's personal interaction on the social network, such as: user clicked fan page, user press like article, user share data etc. three kinds of personal information for personal preference analysis, and from this huge amount of personal data to find out corresponding diverse group for personal preference category. We can by personal preference information for diversify personal advertising, product recommendation and other services. The paper at last through the actual business verification, the research can improve website browsing pages growth 8%, site bounce rate dropped 11%, commodities click through rate growth 36%, more fully represents the results of this research fit the use's preference.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"106 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132236415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Implementing Protocol to Access White-Space databases on smart set-top box 基于智能机顶盒的空白数据库访问协议实现
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374147
E. Ntuli, S. Ngwira, T. Zuva
{"title":"Implementing Protocol to Access White-Space databases on smart set-top box","authors":"E. Ntuli, S. Ngwira, T. Zuva","doi":"10.1109/CCCS.2015.7374147","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374147","url":null,"abstract":"In television white space networks, secondary users are mandatory to query an accredited geo-location spectrum database (GSDB) in order to determine the vacant channels or white spaces. The recent developments of the Protocol to Access White Spaces (PAWS) by the Internet Engineering Task Force (IETF) have proposed to standardize communication between the GSDB and white space devices. To enable efficient sharing of spectrum, white spaces devices (WSDs) and their related restrictions, the mechanism or channel selection remain open issues in research. In this paper, we proposed use of PAWS and JavaScript Object Notation (JSON) to address the communication between the GSDB and WSDs to enable optimal channel selection decisions in the settop box making it a smart set-top box.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126923602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing budget forecasting and revision system using optimization methods 运用最优化方法设计预算预测与修订系统
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374155
M. Tarokh, K. Koochakpour
{"title":"Designing budget forecasting and revision system using optimization methods","authors":"M. Tarokh, K. Koochakpour","doi":"10.1109/CCCS.2015.7374155","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374155","url":null,"abstract":"The sales procedures are the most important factors for keeping companies alive and profitable. So sales and budget sales are considered as important parameters influencing all other decision variables in an organization. Therefore, poor sales forecasting can lead to great losses in an organization caused by inaccurate and non-comprehensive production and human resource planning. Hence, in this research a coherent solution has been proposed for forecasting sales besides refining and revising it continuously by ANFIS1 model with consideration of time series relations. Data has been collected from the public and accessible annual financial reports related to a famous Iranian company. Moreover, for more accuracy in forecasting, the solution has been examined by BPN2 and PSO3 as optimization methods. The comparison between taken prediction and the real data shows that PSO method can optimize some parts of prediction in contrast to the rest which is more coincident to the output of BPN analysis. As a consequence, a hybrid integrated system including both has been designed. This system uses them depending on their abilities to optimize each part, so it can produce more precise results relatively.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"16 14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126165478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信