{"title":"Clustering-Based Spatio-Temporal Analysis of Big Atmospheric Data","authors":"A. Cuzzocrea, M. Gaber, Staci Lattimer, G. Grasso","doi":"10.1145/2896387.2900326","DOIUrl":"https://doi.org/10.1145/2896387.2900326","url":null,"abstract":"This paper proposes a comprehensive approach for supporting clustering-based spatio-temporal analysis of big atmospheric data via specializing on the interesting applicative setting represented by Greenhouse Gas Emissions (GGEs), a relevant instance of Big Data that empathize the Variety aspect of the well-known 3V Big Data axioms. In particular, in our research we consider GGEs from three EU countries, namely UK, France and Italy. The deriving Big Data Mining model turns to be useful for decision support processes in both the governmental and industrial contexts.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"13 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120824496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed Fihri, Youssef El Fatimi, Abdelhalim Hnini, Abdellah Ezzati
{"title":"Investigating the impact of black-hole attack on hierarchical protocols and direct transmission in WSN","authors":"Mohammed Fihri, Youssef El Fatimi, Abdelhalim Hnini, Abdellah Ezzati","doi":"10.1145/2896387.2900330","DOIUrl":"https://doi.org/10.1145/2896387.2900330","url":null,"abstract":"In this paper, we describe the impact of black-hole attack on LEACH protocol and direct transmission using C++ language and some tools from ns3. The results are showed in the number of packet received by the base station; and we try to protect the network from this type of network using the minimum energy and less modification in the original algorithm.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"74 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121134052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure and Efficient Big Data Gathering in Heterogeneous Wireless Sensor Networks","authors":"D. E. Boubiche","doi":"10.1145/2896387.2900334","DOIUrl":"https://doi.org/10.1145/2896387.2900334","url":null,"abstract":"The emergence of heterogeneous wireless sensor networks in recent years has helped to address the limitations of conventional WSNs resources and has opened new research areas. When more than one type of node is integrated in a WSN, it is called heterogeneous. Placing heterogeneous nodes in a WSN is an effective way to increase the life of the network. While most of the existing civil and military applications of the heterogeneous WSNs are not materially different from their homogeneous counterparts, there are compelling reasons of incorporating the heterogeneity in the network. These reasons include: improving scalability of wireless sensor networks, reducing energy requirements without sacrificing performance, the equilibration of the cost and the network functionality, improving the security mechanisms using more complex protocols and supporting new broadband applications and big data. Recently, and because of the growth of the amount of data transmitted in the heterogeneous sensor networks, the term big data has emerged as a widely recognized trend. The term Big Data does not only concern the volume of data but also the high-speed transmission and the variety of information which are difficult to collect, store, and process using available technologies. Although the data generated by the individual sensors may not appear to be significant, all the data generated through the many sensors are capable of producing large volumes of data. The management of big data imposes additional constraints on WSNs. Effectively manage and secure big data gathering is a challenge in heterogeneous WSNs. Therefore, it represents an interesting research area. In this talk, I will address the emerging big data concept in heterogeneous wireless sensor networks and point out its main research issues.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115606234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of routing protocols on the quality of transmission for video streaming","authors":"S. Maamar, H. Taleb","doi":"10.1145/2896387.2906359","DOIUrl":"https://doi.org/10.1145/2896387.2906359","url":null,"abstract":"Mobile ad hoc networks are characterized by infrastructure less, dynamic topology, without any centralized administration, and limited resources witch make more difficult the stream of multimedia applications over wireless networks. Providing Quality of Service for video streaming is an important challenge. In this paper, firstly, we have reviewed many issues and different coding techniques for video streaming over MANET and secondly we propose to study two routing protocols (AODV and DSDV) to evaluate witch of them can improve QoS for real-time multimedia applications. Results show that AODV protocol performs better than DSDV in terms of throughput and network load with high mobility, but roles are reversed in terms of bit rate, loss rate and network load for large-scale networks.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131077699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aman: Spatial Cloaking for Privacy-Aware Location-Based Queries in the Cloud","authors":"Hiba Jadallah, Z. Aghbari","doi":"10.1145/2896387.2896445","DOIUrl":"https://doi.org/10.1145/2896387.2896445","url":null,"abstract":"People nowadays rely heavily on technology and prefer being provided with personalized services. Location Based Services (LBS) are one of those highly popular services. Users provide their location information in some query to the LBS server, which in turn processes the query and returns personalized results. The major concern when dealing with these services is the privacy issue. Mainly, there are two privacy issues, the user's identity and the user's location. Not securing such information could result in some threats to the user. To preserve the user's privacy, researchers have proposed spatial cloaking to blur the user's location by a trusted location anonymizer server. Existing methods suffer from high communication cost due to the large number of communication rounds between the user's device and the cloud server to answer the query. In this paper, we propose an efficient k-anonymity algorithm, called Aman, to compute the cloaked area with minimal number of communication rounds between the user and the cloud server. Unlike existing methods in which the server starts the search from the root, or the leafs, of the indexing structure, Aman algorithm reduces the search time by starting the search at an intermediate estimated level of the indexing structure that is as close as possible to the queried location. To preserve the user's privacy, Aman uses k-anonymity cloaking to hide the user's location. The experimental results using synthetic and real datasets show that Aman outperforms other state-of-the-art approaches.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127213952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MeNDARIN: Mobile Education Network Using DTN Approach in North IRAQ","authors":"R. Johari, Dhari Ali Mahmood","doi":"10.1145/2896387.2900329","DOIUrl":"https://doi.org/10.1145/2896387.2900329","url":null,"abstract":"Developing countries suffer from a lack of fixed and reliable infrastructure resulting in lack of Internet connectivity, particularly in the rural areas. In this paper we have addressed the challenge of providing the free education to millions of illiterate children living in remote hamlets of poverty stricken villages in the north of Iraq. The basic fundamental right of humanity is education, so different organization cooperates with governments to deliver the education for everyone in world that would lead to literacy for all. We hope that proposed work would help children in different place(s) of the world to get education especially in places where the communication service is not available either due to the environmental factors like the poor connectivity due to fading or attenuation or poor topographical terrain like in hilly area. In order to overcome these obstacles a DTN based education system is proposed which consumes less resource but delivers high throughput. This mobile based efficient education system comes with new approach of delay tolerant network that possess the capability to operate in different environments. Our proposed Mobile Education System adopts a new protocol LTPCL \"The Licklider Transmission Protocol convergence layer\" that operate with DTN approach to solve education problems implemented by MANET in earlier time. When the internet cannot operate in heterogeneous environments, Delay Tolerant Networking (DTN) is promising network architecture for heterogeneous Environments if any disconnection occurring between the source and the destination the in-between nodes cannot store the packet and forward it after reconnecting. The DTN approach can provide the (store-carry-forward) network because in DTN approaches there are nodes which have memory buffer.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127352883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Moudhi M. Aljamea, L. Brankovic, Jia Gao, C. Iliopoulos, M. Samiruzzaman
{"title":"Smart Meter Data Analysis","authors":"Moudhi M. Aljamea, L. Brankovic, Jia Gao, C. Iliopoulos, M. Samiruzzaman","doi":"10.1145/2896387.2896407","DOIUrl":"https://doi.org/10.1145/2896387.2896407","url":null,"abstract":"Providing a global understanding of privacy is crucial, because everything is connected. Nowadays companies are providing their customers with more services that will give them more access to their data and daily activity; electricity companies are marketing the new smart meters as a new service with great benefit to reduce the electricity usage by monitoring the electricity reading in real time. Although the users might benefit from this extra service, it will compromise the privacy of the users by having constant access to the readings. Since the smart meters will provide the users with real electricity readings, they will be able to decide and identify which devices are consuming energy in that specific moment and how much it will cost. This kind of information can be exploited by numerous types of people. Unauthorized use of this information is an invasion of privacy and may lead to much more severe consequences. This paper will propose an algorithm approach for the comparison and analysis of Smart Meter data readings, considering the time and temperature factors at each second to identify the use patterns at each house by identifying the appliances activities at each second in time complexity O(log(m)).","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"318 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123685327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comprehensive Study for Software Testing and Test Cases Generation Paradigms","authors":"Roaa Elghondakly, Sherin M. Moussa, N. Badr","doi":"10.1145/2896387.2896435","DOIUrl":"https://doi.org/10.1145/2896387.2896435","url":null,"abstract":"Software testing is accounted to be an essential part in software development life cycle in terms of cost and manpower, where its total cost is considerable high. Consequently, many studies [48] have been conducted to minimize the associated cost and human effort to fix bugs and errors, and to improve the quality of testing process by automatically generating test cases. Test cases can be generated from different phases (requirement phase, design phase and after development phase). Though, test case generation at early stages is more effective rather than that after development, where time and effort used for finding and fixing errors and bugs is less than that after development. At later stage, fixing errors results in enormous code correction, consuming a lot of time and effort. In this paper, we study the different paradigms of testing techniques for generating test cases, where we investigate their coverage and associated capabilities. We finally propose a preliminary model for a generic automated test cases generation.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115436821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seyoung Park, Jae-Gil Lee, So-jeong Kim, Donghee Don Shin
{"title":"The Effect of Visual Cueing in 3D Animations for Learning Procedural-manipulative Tasks: From the Perspective of Cognitive Load Theory","authors":"Seyoung Park, Jae-Gil Lee, So-jeong Kim, Donghee Don Shin","doi":"10.1145/2896387.2896419","DOIUrl":"https://doi.org/10.1145/2896387.2896419","url":null,"abstract":"Applying 3D virtual environment to educational field has great possibilities. Especially, 3D instructions could be very helpful when learning procedural-manipulative tasks with high-risk of accidents (e.g., brain surgery). To find the most effective way to present information in 3D virtual environment, this study examined the effect of visual cueing in 3D instructional animation, from the perspective of cognitive load theory. In this study, a between subjects experiment was conducted. The results showed that the two different types of visual cueing (both anticipatory and trajectory) have marginally significant effect on learning performance (accuracy score). Finally, this study suggested some design strategies to improve the effectiveness of 3D instructional animations.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128811414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-Similarity in Voice over Internet Traffic","authors":"H. Toral-Cruz","doi":"10.1145/2896387.2900337","DOIUrl":"https://doi.org/10.1145/2896387.2900337","url":null,"abstract":"Real-time applications, such as Voice over Internet Protocol (VoIP) are now available on many IP networks carriers in the world with lower cost compared to the Public Switched Telephone Network (PSTN). However, current IP networks are based on best-effort service, and do not guarantee the Quality of Service (QoS) of real-time multimedia applications. Time-dependent statistics (e.g., correlation) are important for performance evaluation of IP networks. These statistics can be used to measure the impact of specific impairments. Several studies have found that self-similarity and long-range dependence can have a negative impact in IP traffic, because they give rise to great losses and/or delays. For this reason, it is important to analyze the correlation structures (Short-Range Dependence-SRD and Long-Range Dependence-LRD) of real time applications, such as VoIP. In this talk, it is presented a detailed study of self-similarity behavior in VoIP traffic and its impact in the quality of service.","PeriodicalId":342210,"journal":{"name":"Proceedings of the International Conference on Internet of things and Cloud Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127650329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}