Proceedings of the International Conference on Internet of things and Cloud Computing最新文献

筛选
英文 中文
Evergreen Software Preservation: The Anti-Ageing Model 常青软件保存:抗衰老模型
J. Yahaya, A. Deraman, Zuriani Hayati Abdullah
{"title":"Evergreen Software Preservation: The Anti-Ageing Model","authors":"J. Yahaya, A. Deraman, Zuriani Hayati Abdullah","doi":"10.1145/2896387.2896436","DOIUrl":"https://doi.org/10.1145/2896387.2896436","url":null,"abstract":"Ageing is an unpreventable manifestation in all living creators on earth. In human being, the process of delaying the ageing progression is known as an anti-ageing process. We try to study the similar approach and phenomenon of ageing and anti-ageing in software environment and behaviour. The symptom of degradation in term of quality is observed as the indicator of ageing phenomenon in software system. Like human ageing, software ageing can be delayed by identifying factors that stimulus the ageing process. Ageing in software specifically for application software occurs when the software is degraded in term of its quality, user's satisfaction and dynamic. Previous studies indicated that software ageing factors possibly could be classified into some categorization such as functional, human, product and environment. With these factors, an anti-ageing model is developed which may help in preventing software from aged prematurely. This paper presents the empirical study conducted in Malaysia involving software practitioners on issues in software ageing and related. Furthermore, we propose a software anti-ageing model and a guideline on the ageing prevention. The proposed model is applied and validated through a case study.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127041080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Framework for Collaborative Multi-Institution MOOC Environment 协作式多机构MOOC环境框架
M. Azhan, M. Saman, M. Man
{"title":"A Framework for Collaborative Multi-Institution MOOC Environment","authors":"M. Azhan, M. Saman, M. Man","doi":"10.1145/2896387.2896421","DOIUrl":"https://doi.org/10.1145/2896387.2896421","url":null,"abstract":"In e-Learning web applications, users interact directly via the web platforms with other users. The learning management system (LMS) is one web platform that has been used to manage the online teaching and learning (T&L). Moodle is an open-sourced LMS that has a widespread adoption in several universities as a virtual learning environment. However, each university does not have any connection with another. Thus, it is difficult for students in one university to enroll in any readily available courses from another. The Malaysian Government has taken the lead to embark on the Massive Open Online Courseware (MOOC) for the Malaysian Public Universities (MPU). This will enable any student from any university to enroll in any courses available in any university. This paper describes a framework called ArmadaNet for a multi-institution collaborative MOOC platform. It covers technical and non-technical issues related to the MOOC implementation. The Moodle LMS has been chosen as the web platform to support this multi-institution MOOC collaboration. The development of ArmadaNet as the model for the collaboration will be given. It is a hub that connects and displays courses hosted in the MOOC. The progress of the implementation is given.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129061762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Political Sentiment Analysis Using Twitter Data 利用推特数据进行政治情绪分析
T. Elghazaly, Amal Mahmoud, H. Hefny
{"title":"Political Sentiment Analysis Using Twitter Data","authors":"T. Elghazaly, Amal Mahmoud, H. Hefny","doi":"10.1145/2896387.2896396","DOIUrl":"https://doi.org/10.1145/2896387.2896396","url":null,"abstract":"There is a remarkable growth in the usage of social networks, such as Facebook and Twitter. Users from different cultures and backgrounds post large volumes of textual comments reflecting their opinion in different aspect of life and make them available to everyone. In particular we study the case of Twitter and focus on presidential elections in Egypt 2012. This paper compares between two techniques for Arabic text classification using WEKA application. These techniques are Support Vector Machine (SVM) and Naïve Bayesian (NB), we investigate the use of TF-IDF to obtain document vector. The main objective of this paper is to measure the accuracy and time to get the result for each classifier and to determine which classifier is more accurate for Arabic text classification. Comparison reported in this paper shows that the Naïve Bayesian method is the highest accuracy and the lowest error rate.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116599319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Detection Of URL In Image Steganography 图像隐写中URL的检测
Moudhi M. Aljamea, C. Iliopoulos, M. Samiruzzaman
{"title":"Detection Of URL In Image Steganography","authors":"Moudhi M. Aljamea, C. Iliopoulos, M. Samiruzzaman","doi":"10.1145/2896387.2896408","DOIUrl":"https://doi.org/10.1145/2896387.2896408","url":null,"abstract":"Steganography is the science of hiding data within data. Either for the good purpose of secret communication or for the bad intention of leaking sensitive confidential data or embedding malicious code or URL. However, many different carrier file formats can be used to hide these data (network, audio, image..etc) but the most common steganography carrier is embedding secret data within images as it is considered to be the best and easiest way to hide all types of files (secret files) within an image using different formats (another image, text, video, virus, URL..etc). To the human eye, the changes in the image appearance with the hidden data can be imperceptible. In fact, images can be more than what we see with our eyes. Therefore, many solutions where proposed to help in detecting these hidden data but each solution have their own strong and weak points either by the limitation of resolving one type of image along with specific hiding technique and or most likely without extracting the hidden data. This paper intends to propose a novel detection approach that will concentrate on detecting any kind of hidden URL in all types of images and extract the hidden URL from the carrier image that used the LSB least significant bit hiding technique.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134347786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Requirement Engineering Technique for Smart Spaces 智能空间需求工程技术
M. W. Aziz, A. Sheikh, Emad A. Felemban
{"title":"Requirement Engineering Technique for Smart Spaces","authors":"M. W. Aziz, A. Sheikh, Emad A. Felemban","doi":"10.1145/2896387.2896439","DOIUrl":"https://doi.org/10.1145/2896387.2896439","url":null,"abstract":"A smart space is an increasingly important application of Internet of Things (IoT), which is being developed throughout the world for different purposes ranging from home automation to smart grids. However, a common approach for requirement capture and specification at an abstract level is needed in smart space development that is independent of the continuously changing technology. To provide a systematic process, the standard software engineering practices can be used in the smart space development, and hence take advantages of. In this context, this paper contributes in the field of requirement engineering for smart spaces by introducing the requirement specification technique based on software engineering Use Case concept. The conventional Use Case structure and the way it is described are modified to suit the requirements of smart spaces. The case of a hypothetical smart space development is considered, where the proposed requirement specification technique is applied and a Use Case repository is developed that can be used as a canonical resource for other researchers to draw upon. The implementation provides profound descriptions on how to use the proposed requirement specification technique during the development of smart spaces and in other application areas of IoT. This work can be used as a first step towards defining the smart space development framework, of which the proposed technique would be a key element.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124564029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Token-oriented based for Internet of Things and Clouding computing services 基于令牌的物联网和云计算服务
Shih-Hsiung Lee, Chih-Nan Hu, Chu-Sing Yang
{"title":"Token-oriented based for Internet of Things and Clouding computing services","authors":"Shih-Hsiung Lee, Chih-Nan Hu, Chu-Sing Yang","doi":"10.1145/2896387.2896437","DOIUrl":"https://doi.org/10.1145/2896387.2896437","url":null,"abstract":"With the advanced in communications technology and the popularization of cloud computing, the IoT developments, designs and applications will be widely used in our life to make it easier and more convenient. Currently, the development of IoT is an open issue, integrating its horizontal and vertical applications into our daily life via the ubiquitous wireless sensors and integrated cloud computing services, thus making the communication between humans and the world of things more intelligent. These applications could be highly diversified, covering such issues as Healthcare, Smart City, Smart Home, Smart metering, Smart mobility and Smart Energy and designed to meet the needs of different services. This will be a technological paradigm and ideal human life scenario in the future. This huge variety of applications thus calls for a reasonable and efficient framework for its management platform to provide the services corresponding to each application. This paper proposes a token-oriented based framework for the management platform featuring the classification of services and authority management, namely a token-oriented based structure for the various applications to facilitate the coordination between IoT and cloud computing, so that their services could be more elastic and reliable.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128734448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multiple-Clouds Computing Security Approaches: A Comparative Study 多云计算安全方法:比较研究
H. Alqahtani, P. Sant
{"title":"Multiple-Clouds Computing Security Approaches: A Comparative Study","authors":"H. Alqahtani, P. Sant","doi":"10.1145/2896387.2896411","DOIUrl":"https://doi.org/10.1145/2896387.2896411","url":null,"abstract":"Relying on a single cloud as a storage service is not a proper solution for a number of reasons; for instance, the data could be captured while being uploaded to the cloud, and the data could be stolen from the cloud using a stolen ID. There are a number of approaches that have been developed in order to provide a secure data storage relying on the multiple-cloud paradigms. Through this paper we will study, and evaluate the existing approaches that have been proposed as a solution for multiple cloud storage systems in terms of security, privacy, and integrity. In addition, we will provide a brief overview of the concept of information dispersal strategies and provide an overview of state-of-the-art multiple cloud storage approaches. After that, all these approaches will be analysed with respect to pre-defined criteria/properties. Finally, we identify and highlight the obstacles/limitation in terms of usability, operational cost, and the lack of security, privacy, integrity, and access features for these approaches, which are very critical direction for future research on multiple cloud storage.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115266456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Open Innovation in ICT Services for Quadruple Helix Model: The Cloud Proposition 面向四螺旋模式的ICT服务开放式创新:云命题
S. Birudavolu, B. Nag, O. Wali
{"title":"Open Innovation in ICT Services for Quadruple Helix Model: The Cloud Proposition","authors":"S. Birudavolu, B. Nag, O. Wali","doi":"10.1145/2896387.2896418","DOIUrl":"https://doi.org/10.1145/2896387.2896418","url":null,"abstract":"How do we implement Open Innovation in ICT? This question was the main motivation for this study. This paper builds a strong case for extensive adoption of Cloud Computing for Open Innovation in the ICT (Information and Communications Technology) Services industry, with a view to possibly help Telcos (Telecommunication Service Providers) in finding the right areas to invest in. Globally, the ICT/Telecom industry stands severely challenged owing to rapid and radical transformation on practically every front, wherein its survival and growth depend on an ever increasing capability of providing rich, complex, and innovative services. In the context of a Quadruple Helix (QH) model of Innovation, this paper explores how regional adoption of Open Innovation (OI) has a salutary effect on the performance of ICT/Telecom Service Providers. It is examined how the Cloud Computing is a good model to implement Open Innovation for ICT in the Quadruple Helix framework. It also explores how it addresses the critical issues and how Cloud serves as an enabler and catalyst for OI in ICT Services in the QH framework. The over-arching approach is to examine how the Telecom Firm's performance is predicated upon by Open Innovation factors in the firm. The OI factors were derived from OI indicators, which map to the Quadruple Helix model. It is then seen how Cloud Computing as a platform can fulfill the needs of the model, and resolve the key challenges thereof.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122437693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cloud-based Graphical Simulation Tool of ECG for Educational Purpose 基于云的心电图形仿真教学工具
Mabrook S. Al-Rakhami, Ahmad Alhamed
{"title":"Cloud-based Graphical Simulation Tool of ECG for Educational Purpose","authors":"Mabrook S. Al-Rakhami, Ahmad Alhamed","doi":"10.1145/2896387.2896410","DOIUrl":"https://doi.org/10.1145/2896387.2896410","url":null,"abstract":"One of the most significant techniques for determining the prevalence of cardiovascular diseases involves the use of the Electrocardiogram (ECG). However, education on ECG has often been provided in a manner that can be described to be old-fashioned. The old-fashioned style involves the use of didactic teaching techniques as well as the incorpofiguration of ECG model strips available in the literature or textbooks. Nevertheless, the current explosion in the utilization of the Internet has made multimedia educational websites as well as knowledge sharing platforms popular. This paper proposes a novel cloud-based simulation tool that can help healthcare students to learn and interpret ECG signals as well as cases. This simulation tool works by constructing an interactive 2D simulator of ECG signals. Even though it is regarded to be a mere simulation tool, it has the capacity to provide teachers and students in the healthcare industry with the experiences derived from the real ECG signals. From this study, it is evident that the simulation tool enhances the educational process of ECG signals. The results and discussions in this study aim at complementing the traditional tools used in the learning process and deploying the new simulation tool in various educational organizations such as e-learning sites, medical colleges, and healthcare institutes.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126344284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Part: Performance Analysis of Routing Techniques in Delay Tolerant Network 第一部分:容延迟网络中路由技术的性能分析
A. Fatimah, R. Johari
{"title":"Part: Performance Analysis of Routing Techniques in Delay Tolerant Network","authors":"A. Fatimah, R. Johari","doi":"10.1145/2896387.2900328","DOIUrl":"https://doi.org/10.1145/2896387.2900328","url":null,"abstract":"Delay Tolerant networks (DTNs) find their application in very long distance data communications for instance in interplanetary networks (IPNs). For this purpose, various routing schemes have been proposed and conceived. But there has not been a significant amount of work that depicts their comparisons. So, in this paper we aim at doing a performance analysis of some of the major and widely used routing algorithms under parametric constraints and simultaneously showing their comparisons. Eventually this analysis would help in picking up the most efficient routing scheme amongst all the algorithms.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122212510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信