Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, L. Barolli
{"title":"Design and Implementation of a Simulation System Based on Particle Swarm Optimization for Node Placement Problem in Wireless Mesh Networks","authors":"Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, L. Barolli","doi":"10.1109/INCoS.2015.18","DOIUrl":"https://doi.org/10.1109/INCoS.2015.18","url":null,"abstract":"With the fast development of wireless technologies, Wireless Mesh Networks (WMNs) are becoming an important networking infrastructure due to their low cost and increased high speed wireless Internet connectivity. In this paper, we propose and implement a simulation system based on Particle Swarm Optimization (PSO). We use Size of Giant Component (SGC) and Number of Covered Mesh Clients (NCMC) as metrics for optimization. From the simulation results, we found that all mesh routers are connected and all mesh clients in the area are covered. Therefore, WMN-PSO has a good performance.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"412 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120906762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A BGN-Type Multiuser Homomorphic Encryption Scheme","authors":"Zhang Wei","doi":"10.1109/INCOS.2015.45","DOIUrl":"https://doi.org/10.1109/INCOS.2015.45","url":null,"abstract":"Homomorphic encryption(HE) is a new cryptographic primitive that can operate on ciphertext without decryption. It has significant application in cloud computing. However, most of the existing HE schemes are single user, which means they could only evaluate on ciphertext encrypted by a single public key. Combining the idea of proxy re-encryption and homomorphic encryption, we provide a BGN-type multi-user HEscheme that can evaluate on ciphertexts come from different users. The scheme is based on bilinear pairing and subgroup decision problem, and is a somewhat homomorphic scheme that can do one multiplication and infinite additions. Security of the scheme is based on the subgroup decision assumption.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125859087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification with Extreme Learning Machine on GPU","authors":"Toma Jeowicz, P. Gajdoš, Vojtěch Uher, V. Snás̃el","doi":"10.1109/INCoS.2015.30","DOIUrl":"https://doi.org/10.1109/INCoS.2015.30","url":null,"abstract":"The general classification is a machine learning task that tries to assign the best class to a given unknown input vector based on past observations (training data). Most of developed algorithms are very time consuming for large datasets (Support Vector Machine, Deep Neural Networks, etc.). Extreme Learning Machine (ELM) is a high quality classification algorithm that gains much popularity in recent years. This paper shows that the speed of learning of this algorithm may be improved by using GPU platform. Experimental results showed that proposed approach is much faster and provides the same accuracy as the original ELM algorithm. The proposed approach runs completely on GPU platform and thus it may be effectively incorporated within other applications.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115253751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michal Prauzek, P. Musílek, P. Krömer, J. Rodway, Martin Stankus, Jakub Hlavica
{"title":"Energy Availability Forecasting for Harvesting-aware Wireless Sensor Networks: Analysis of Energy Demand of a Predictor Based on Evolutionary Fuzzy Rules","authors":"Michal Prauzek, P. Musílek, P. Krömer, J. Rodway, Martin Stankus, Jakub Hlavica","doi":"10.1109/INCoS.2015.54","DOIUrl":"https://doi.org/10.1109/INCoS.2015.54","url":null,"abstract":"Environmental monitoring sensor networks often operate in remote locations and thus must be designed for energy-efficiency and reliability. The first goal of energy efficiency can be achieved through low-power design of the monitoring hardware, often supplemented by energy management schemes of varying complexity and sophistication. In case of sensor nodes endowed with energy-harvesting capabilities, the energy management systems can take advantage of harvesting outlook that can take the form of prediction of energy available for harvest in the near future. When designing such sophisticated prediction and management schemes, it is important to consider the energy cost of gathering the predictor data and executing the forecasting algorithm. This contribution describes the results of experiments designed to assess the energy required to run a recently introduced energy-availability forecasting algorithm based on evolutionary fuzzy rules. In particular, it presents an analysis of experiments conducted using several hardware platforms typically used to implement the computational core of environmental sensor nodes. The results clearly show the advantages of using modern low-power, 32-bit hardware platforms. In addition, they demonstrate the advantages of support for floating point operations, as well the importance of embedded code optimization to maximize the benefits of the modern microcontroller units.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116008605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Guitart, J. Moré, Jordi Duran, J. Conesa, David Bañeres, D. Gañán
{"title":"A Semi-automatic System to Detect Relevant Learning Content for Each Subject","authors":"I. Guitart, J. Moré, Jordi Duran, J. Conesa, David Bañeres, D. Gañán","doi":"10.1109/INCoS.2015.62","DOIUrl":"https://doi.org/10.1109/INCoS.2015.62","url":null,"abstract":"Today, the crisis has worsened the panorama for Universities, placing new constraints that require being more sustainable economically. In addition, universities will also have to improve their research and teaching in order to obtain more research funds and attract more students. In this panorama, analytics can be a very useful tool since it allows academics (and university managers) to get a more thorough view of their context, to better understand the environment, and to identify potential improvements. Some analytics have been done under the names of Learning analytics, Academic analytics, Educational Data Mining and etcetera. However, these systems, under our humble opinion, only take into account the small part of data related to the problem, but not contextual data. In order to perform analytics efficiently and reproduce their results easily in other contexts, it is necessary to have as much information as possible about the context. For example, when communication forums are analyzed to see the concepts in which students have more doubts, it is important to analyze also what concepts are taught in the subject. Having access to both sources, more information can be obtained and may help to discover not only the problem (a concept is difficult for students) but also its cause (maybe it is not explained in the materials of the course). The work presented in the paper proposes a novel approach to work in that direction: gathering information from different aspects within subjects. In particular, the paper presents an approach that uses natural language processing techniques to analyze the subject's materials in order to discover which concepts are taught and their importance in the subject. The contribution of the paper is a system that allows obtaining a better understanding of subjects. The results can be used for analyzing the suitability of materials to subjects and to enrich and contextualize other analytical processes.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116431098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Road Map to Risk Management Framework for Successful Implementation of Cloud Computing in Oman","authors":"Fatma Al-Musawi, A. Al-Badi, Saqib Ali","doi":"10.1109/INCoS.2015.80","DOIUrl":"https://doi.org/10.1109/INCoS.2015.80","url":null,"abstract":"Cloud computing nowadays is adopted by many organizations around the world because of its potential benefits such as cost reduction, high availability and elastic scaling. In spite of all the claimed benefits and to deal with any potential risk and vulnerability of cloud computing, risk management is becoming a critical domain that requires a fundamental review in the business strategies and can be linked to cloud computing, in order to have a successful cloud implementation. Risk management can help in avoiding, transferring, mitigating or minimizing the risks associated with being on the cloud. The main objective of this research is to explore the existing risk management frameworks in order to recommend an appropriate risk management framework for cloud computing environment. Qualitative data were collected and analyzed based on interviews conducted amongst the information technology and risk management professionals in Omani organizations (public and private). The recommended framework can be used in conjunction with other risk management approaches for industries which already moved to cloud or in transition of moving towards cloud environment in Oman.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122357006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman","authors":"Amira M. AlZadjali, A. Al-Badi, Saqib Ali","doi":"10.1109/INCoS.2015.79","DOIUrl":"https://doi.org/10.1109/INCoS.2015.79","url":null,"abstract":"Cloud computing technology is known for its potential advantages which include cost reduction, enhanced flexibility, improved stability and the provision of a proven delivery platform for delivering IT services to its end users. In spite of the numerous benefits, cloud computing does attract security threats and therefore has vulnerabilities. Understanding and mitigating such threats and vulnerabilities are crucial to its continued existence. The main objective of this research is to explore the various threats and vulnerabilities associated with the cloud computing technologies that have been adopted by different organizations in Oman and hence propose solutions to mitigate them. To achieve the research objective of the study, a survey among the cloud computing users and providers was conducted. The main findings showed that data control and privacy, security risks and security threats present considerable barriers in the implementation of cloud computing.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117013716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving e-Assessment in Collaborative and Social Learning Settings","authors":"N. Mora, S. Caballé, T. Daradoumis","doi":"10.1109/INCoS.2015.76","DOIUrl":"https://doi.org/10.1109/INCoS.2015.76","url":null,"abstract":"Cognitive assessment in collaborative and social learning requires assessment processes that achieve significant effect on collaborative learning and engage learners through accountability and constructive feedback. In order to design a coherent and efficient assessment system for collaborative and social learning it is necessary to design an enriched learning experience that predisposes the feedback and awareness in the group. This research focuses on e-assessment of collaborative learning and extends it with Social Network Analysis (SNA) techniques that are able to analyze and represent social network interaction during the live collaborative sessions. The interaction data extracted from social and collaborative networking must be integrated into a general assessment system to produce an efficient and personalized awareness and feedback about the collaborative activity and the social behavior of the participants. In previous work we provided a conceptual and methodological research approach of e-assessment applications and tools that meet the mentioned requirements and goals. In this paper we provide empirical data and interpretation to validate the approach.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129151111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Management of Networking Systems Using Design Patterns","authors":"Viliam Malcher","doi":"10.1109/INCoS.2015.13","DOIUrl":"https://doi.org/10.1109/INCoS.2015.13","url":null,"abstract":"Recent advances in telecommunication technology, including wireless network and the Internet are putting increasing pressure for building telecommunication software systems. One of the costs of deploying a new service is the cost of integrating all necessary applications into an effective software solution. We provide a model and discussing that could be applied to other applications as a means to provide an effective solution for the management of telecommunication network systems. It is based on the design patterns for the development of effective and consistent interfaces.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129740589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
David Bañeres, Xavier Baró, Ana-Elena Guerrero-Roldán, M. E. Rodríguez
{"title":"Towards a General Adaptive e-Assessment System","authors":"David Bañeres, Xavier Baró, Ana-Elena Guerrero-Roldán, M. E. Rodríguez","doi":"10.1109/INCoS.2015.53","DOIUrl":"https://doi.org/10.1109/INCoS.2015.53","url":null,"abstract":"Assessment is an important part of the learning process. The instructor should be able to evaluate whether a learner has acquired the knowledge and competences provided in the course. Moreover, assessment activities also help a learner to check his level of expertise. Typically, the assessment model and assessment activities of subjects in official programmes are the same for all the learners, since they should be evaluated having the same opportunities and conditions. However, when the learner is evaluated by means of a continuous assessment model, he is proving on each activity his knowledge and proficiency level and, at the same time, his reputation could be also built based on the actions he is performing within the course. Therefore, the assessment model can be adapted based on this information. In this paper, we present a general system to adapt the assessment based on different evidences gathered from the learning process of the learner.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123382906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}