{"title":"Spontaneous Service Provision in Cyber-Physical Interaction Environments","authors":"Byungseok Kang, Kijong Yoo","doi":"10.1145/3348445.3351306","DOIUrl":"https://doi.org/10.1145/3348445.3351306","url":null,"abstract":"In the advent of the future Internet environment, where many sensors, smart objects and personal devices are interconnected through high-bandwidth networks, we are envisioning a new service infrastructure where services from the physical world and cyber space are fused together to bring more proactive and sustainable features to the users. Under the infrastructure, a user's situation in the physical world is recognized via the rich contextual information gathered by using many sensors and by interpreting various social relationships. Value-added services then can be identified and composed in the cyber space and brought to the user spontaneously and proactively for the situation.","PeriodicalId":314854,"journal":{"name":"Proceedings of the 7th International Conference on Computer and Communications Management","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122311391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework for Website Security Assessment","authors":"N. D. Thai, N. H. Hieu","doi":"10.1145/3348445.3348456","DOIUrl":"https://doi.org/10.1145/3348445.3348456","url":null,"abstract":"Nowadays, the Internet plays a crucial role in our society. Among Internet services, web-based services are very popular that become the target of security attacks. Hence, securing websites and connection to the users is important. If we own or manage a website, we certainly concern about how secure it is. For assessing the security level of a website, we usually take some action, including testing the website using security scanning tools. Unfortunately, most of scanning tools have limitations and need to be updated frequently for new vulnerabilities. Using only one scanning tool is sometime not enough to determine security level of a website. In this paper we propose a framework supporting website security assessment. The idea of this framework is to integrate different scanning tools into the framework. We then write a program to implement this framework with a real website. We guide the users how to add a new scanning tool to this framework, manage it and generate a final report.","PeriodicalId":314854,"journal":{"name":"Proceedings of the 7th International Conference on Computer and Communications Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122860391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Suryani, R. A. Hendrawan, Arif Wibisono, Basuki Widodo, Philip F.E. Adipraja, L. P. Dewi
{"title":"Analysis of Urban Service Reliability and Its Effect on Traffic Congestion","authors":"E. Suryani, R. A. Hendrawan, Arif Wibisono, Basuki Widodo, Philip F.E. Adipraja, L. P. Dewi","doi":"10.1145/3348445.3348447","DOIUrl":"https://doi.org/10.1145/3348445.3348447","url":null,"abstract":"Urban service reliability represents the level of service in the aspects of travel time, arrival time, and seat availability from the user's perspective. Service reliability focuses on the demand and supply sides of transportation systems. The supply side consists of services provided by the operator, hence it affects the travel time. Meanwhile, demand side focuses on passenger side which includes passenger behavior and experience. The main objective of this research is to analyze urban service reliability and its impact on traffic congestion. Several main factors impacting the service reliability were evaluated using system dynamics simulation model. It has been used to test and evaluate the alternatives of future strategies to increase service reliability and to mitigate the traffic congestion. Simulation results show that service reliability is influenced by two factors, those are passenger's perception and public transportation agency performance. Travel time and waiting time are two important factors of passenger's perception. Meanwhile, some factors such as the ratio of public transportation supply and demand as well as the service effectiveness are the important factors of public transportation agency performance. Based on the existing condition, service reliability in public transportation sector is around 44%. This service reliability is projected could be increased to 76% by conducting a strategy such as the addition of public transportation facilities, which aims to decrease the passenger's waiting time and to increase the ratio of public transportation supply and demand. All of these efforts will increase the passenger's perception and public transportation agency performance. With the increased in service reliability, traffic congestion is projected could be reduced to 40% - 75%.","PeriodicalId":314854,"journal":{"name":"Proceedings of the 7th International Conference on Computer and Communications Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129590970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quadrotor Stabilization and Tracking using Sliding Mode Observer and Control","authors":"Hyukwoo Lee, Kyunghyun Lee, K. You","doi":"10.1145/3348445.3348476","DOIUrl":"https://doi.org/10.1145/3348445.3348476","url":null,"abstract":"We consider the stabilization and tracking of a quadrotor system. Recently, as the utilization for unmmaned aerial vehicle (UAV) has icreased, various approaches have been proposed for a quadrotor control system. Quadrotor, a type of UAV, is a sensitive system that is highly influenced by external environmental factors such as wind and humidity. For improving the performance of a quadrotor system, we propose a sliding mode observer (SMO) and sliding mode control (SMC) based quadrotor stabilization and tracking system. To minimize the measurement error of a quadrotor system, we apply SMO to the augmented model. Also, for robust control of quadrotor, we use SMC, a robust control methodology for the model uncertainty and disturbance, with Lyapunov function. In this paper our proposed method is applied to quadrotor stabilization and tracking control. We show the proposed control performance with some simulation results.","PeriodicalId":314854,"journal":{"name":"Proceedings of the 7th International Conference on Computer and Communications Management","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125289263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-Cooperative and Cooperative Game Approaches for Load Balancing in Distributed Systems","authors":"Ferdy Mulyadi, K. Akkarajitsakul","doi":"10.1145/3348445.3348477","DOIUrl":"https://doi.org/10.1145/3348445.3348477","url":null,"abstract":"Distributed system is a system consisting of groups of servers and clients where they are connected together to do specific tasks. In order to optimize the system, a load balancer can be used to mitigate the effect of imbalance of the number of clients and servers. Without the load balancer, the servers might be overwhelmed due to response many requests of clients. To implement a load balancer, several methods or algorithms, such as Round-Robin, Least Connection, and Response Time have been applied. In this paper, we focus on game-theoretic load balancing algorithms in a cloud system. We formulate non-cooperative and cooperative game-theoretic models to be used as load balancing algorithms. Clients are the players in each game and the players' strategies are based on the current status of resource utilization of the servers. To obtain the solution, iterative algorithms combined with Discrete-Time Markov Chain (DTMC) are presented. Moreover, the comparison between non-cooperative and cooperative approaches is presented. The evaluation results of both the games are compared with the ones from common techniques, such as round-robin, randomization method, and least connection for effectiveness in terms of request completion time and balancing time.","PeriodicalId":314854,"journal":{"name":"Proceedings of the 7th International Conference on Computer and Communications Management","volume":"1984 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125464081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual Machine Integration & Fault Recovery in Crowd-Resourcing Virtual Laboratory","authors":"Johannes Sianipar, Christian Willems, C. Meinel","doi":"10.1145/3348445.3348467","DOIUrl":"https://doi.org/10.1145/3348445.3348467","url":null,"abstract":"Crowd-Resourcing virtual laboratory (CRVL) uses some resources which were shared by the crowd as the contributors to run virtual laboratory exercises. The shared resource is in the form of a virtual machine (VM) that must be automatically integrated into the virtual laboratory system. In this paper, we propose a mechanism of integrating a VM into a CRVL system. It starts with verifying the VM integrity, followed by configuring the VM until the VM is ready to be used to run a Virtual Laboratory exercise. We use WebSocket for communication between the VM and the Virtual Laboratory Server, to be able to monitor the VM Integrity. We also propose a VM fault recovery approach that could automatically divert user connections to other VMs. For the fault recovery purpose, we use SSHFS to mount a remote file system on a file server to store the data of a VM. Our experiments showed that our approaches could work appropriately, and the time for Team Recovery is similar to the time for Team Creation.","PeriodicalId":314854,"journal":{"name":"Proceedings of the 7th International Conference on Computer and Communications Management","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121552645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maria Masood, F. Azam, Muhammad Waseem Anwar, Anam Amjad
{"title":"Defining Meta-Model for Value-Oriented Requirement Prioritization Technique","authors":"Maria Masood, F. Azam, Muhammad Waseem Anwar, Anam Amjad","doi":"10.1145/3348445.3352739","DOIUrl":"https://doi.org/10.1145/3348445.3352739","url":null,"abstract":"Software requirements prioritization is a well-known practice in Requirements Engineering (RE) that helps in managing the requirements as stated in their requirements listing. It helps to identify that which requirements should be dealt first. Quality of software to be developed depends on the ordering of requirements and assists the project team to find out the most important requirements. In order to perform efficient software requirement prioritization, decision making process to prioritize the requirements and eliminating complexities caused by unclear and incomplete requirements are two main challenges. It is also analyzed that existing techniques of requirements prioritization such as grouping, MoSCoW and validated learning are working well for functional requirements but insufficient to deal with non-functional requirements. In order to bridge this gap, meta-model for value oriented requirement prioritization technique is proposed in order to prioritize functional as well as non-functional requirements. Meta modeling technique is highly beneficial that helps to define things at an abstract level and helps in sorting out the associated problems by identifying major components and reducing complexity to requirement engineer.","PeriodicalId":314854,"journal":{"name":"Proceedings of the 7th International Conference on Computer and Communications Management","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131845062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation of Modern Tools and Techniques Provided by Modeling Editors: A Survey","authors":"Nazish Yousaf, Abrar Ahmad, Maryum Hamdani, Maryum Ashfaq, Hania Siddiqui","doi":"10.1145/3348445.3348468","DOIUrl":"https://doi.org/10.1145/3348445.3348468","url":null,"abstract":"The modern era of digital world has increased the multitude of defining various domain knowledge. Domain-specific-modeling-languages (DSMLs) propose an efficient manner to incorporate the knowledge of domain expert in software system development. The aim of this paper is to perform a survey in order to investigate the domains in which modeling editors are being used, the tools and techniques supported by specified modeling editors and lastly the features provided by specified modeling editors in the particular identified researches. Consequently, we have identified 5 categories, 28 tools/languages, 8 techniques and 4 features from selected 78 research studies published since 2011 to answer the research questions. This paper also focuses towards the detailed comparison between the identified techniques on the basis of features provided by modeling editors.","PeriodicalId":314854,"journal":{"name":"Proceedings of the 7th International Conference on Computer and Communications Management","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128647912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A BPM-based Emerald Factory Information System: Redesigning Emerald Crafting Process in Myanmar","authors":"C. Wongwatkit, Sai Won Mar","doi":"10.1145/3348445.3348484","DOIUrl":"https://doi.org/10.1145/3348445.3348484","url":null,"abstract":"In the emerald factory business, the crafting process plays a crucial role in driving the quality of products. However, such a process has limitations and difficulties in monitoring the working progress, determining the factory hours to complete the products, reporting the completed tasks, and reporting the defects. This causes cost and time inefficiency in managing this business. To reach this aim, this study, therefore, addresses such issues by employing business process management strategy to help analyze and redesign the existing crafting process for better performance, where the information system was developed to help improve the certain tasks. Hence, the swimlane diagram was used to visualize the business tasks and flows; moreover, the information system was developed and implemented for employees and managers accordingly. The overall structure and screenshots of the proposed system were presented in the paper. After being deployed on the cloud server, the system was used for weeks and evaluated by the users. The results show that both group of users highly accepted the system, while the managers had a significantly better attitude in analyzing and managing the emerald crafting process. Finally, the findings of this study shed light of the implications of understanding and redesigning the business process with the benefits of the information system to enhance business success.","PeriodicalId":314854,"journal":{"name":"Proceedings of the 7th International Conference on Computer and Communications Management","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116687415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physical Property Analysis of Sweet Potatoes Using Computer Vision","authors":"Panitnat Yimyam","doi":"10.1145/3348445.3348471","DOIUrl":"https://doi.org/10.1145/3348445.3348471","url":null,"abstract":"This paper demonstrates the performance of using computer vision for sweet potato grading. Different qualities of sweet potatoes can lead to different prices. Better-grade fruits can be sold at a higher price. Therefore, they should be graded before they are transferred to sell. 471 pictures of sweet potatoes are employed for the experiment. The experimental sweet potatoes are divided into four groups. The first group contains good quality with required shapes. The second group also includes good quality roots but undesired shapes. Experimental samples of the third group have no defects, but they are too small, short or thin shaped. Moreover, for the last group sweet potatoes have defects. The samples are inspected from their physical properties including shape, color and texture features. Top-view pictures are captured and used for feature extraction. Various 184 physical properties are extracted. As using a large number of features may cause high computational cost, so important extracted features are selected. The effective features are used for classification based on k-nearest neighbour and neural network theories. The experiments comprise of twenty sub-experiments. About half the numbers of samples are randomly chosen for training sets, the remaining samples being employed for test sets. The experimental results show that in the average of the k-nearest neighbor and neural network classifiers achieve 97.14% and 96.46% accuracy respectively. Nevertheless, the difference of the classifier performances is insignificant that is proved by the paired sample t-test.","PeriodicalId":314854,"journal":{"name":"Proceedings of the 7th International Conference on Computer and Communications Management","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114503472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}