{"title":"No One Acts like You: AI based Behavioral Biometric Identification","authors":"Matthias Rüb, Jan Herbst, C. Lipps, H. Schotten","doi":"10.1109/NextComp55567.2022.9932247","DOIUrl":"https://doi.org/10.1109/NextComp55567.2022.9932247","url":null,"abstract":"There has already been a significant increase in Mobile Broadband (MBB) subscribers over the past few years, which is expected to increase further as a result of the current trend towards the Sixth Generation (6G) wireless systems. This is accompanied by a growing need for confidentiality, integrity and undoubtedly authentication of the communication units involved (human and machine). In particular, authentication is challenging with respect to human participants, as often only possession of a token or knowledge of a code/password is requested, which validates the underlying claim: who is the person. Furthermore, as knowledge-based passwords and object-based keys can be lost or stolen, biometric-based approaches rely on traits, which are intrinsically connected to one person. Therefore this work demonstrates the feasibility of Long Short-Term Memories (LSTMs) - a type of Neural Network (NN)-, to identify and authenticate people by their characteristic arm movements during specific everyday tasks. For measurements of the arm movement a wrist-band wearable has been developed. The focus of the evaluation with Deep Neural Networks (DNN) is on different high level structures of NNs and data. Multiple NNs are allocated to either different test subjects and user-activities. In a first task 1 out of n people had to be identified with a maximum average precision of 92.0 %. In a second evaluation the Networks performed in a n out of m authentication with an maximum average precision of 81.4 %. With those results the potential of NNs for biometric authentication with behavioral sensors is demonstrated. Additionally in view of the necessary personal biometric data, ethical and legal aspects are highlighted.","PeriodicalId":422085,"journal":{"name":"2022 3rd International Conference on Next Generation Computing Applications (NextComp)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125900170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Architecture for a Smart Fourth Party in an Online Dispute Resolution Platform","authors":"L. Butgereit","doi":"10.1109/NextComp55567.2022.9932177","DOIUrl":"https://doi.org/10.1109/NextComp55567.2022.9932177","url":null,"abstract":"Disputes involve two different people or parties. Because of cost or time constraints, the two parties may wish to avoid a lengthy court case and, instead, involve a mediator or arbitrator to help them resolve the dispute. This mediator or arbitrator is often called the third party with the two original participants being called the first and second parties. As this mediation or arbitration process becomes an online process (as in the case of Online Depute Resolution - ODR), the platform used for the ODR has been called the Fourth Party. This paper looks at a technology architecture for creating such a Fourth Party. This paper looks at different types of Alternate Dispute Resolution systems. The paper then progresses to ODR systems. Different facilities of various ODR systems are itemised and a few examples of ODR systems which have already been used or developed are described. A brief disussion of a pilot program is provided including comments about the data which was collected during this pilot. Finally, a proposed IT architecture is provided for an ODR system including a fully fledged Fourth Party as defined by Katsh and Rifkin – including algorithmic support.","PeriodicalId":422085,"journal":{"name":"2022 3rd International Conference on Next Generation Computing Applications (NextComp)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134355812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dyan Tannoo, A. Chiniah, Meekshi Jaunkeepersad, Humaïra Bibi Baichoo
{"title":"Touchless Advertising Mobile Application - TaMa","authors":"Dyan Tannoo, A. Chiniah, Meekshi Jaunkeepersad, Humaïra Bibi Baichoo","doi":"10.1109/NextComp55567.2022.9932223","DOIUrl":"https://doi.org/10.1109/NextComp55567.2022.9932223","url":null,"abstract":"Hand gesture recognition has been a promising area of research in the past decades, especially with breakthroughs in the field of computer vision, but the COVID-19 pandemic has brought much attention to this field. The emphasis on a higher sanitary standard has pushed for more touchless interactions to help mitigate viral contagion. This technology could prove to be highly beneficial for interactive devices located in public spaces, such as self-serving information kiosks and self-service check-outs. This paper proposes a touchless advertising mobile application as a proof of concept, to display and interact with advertisements, as a proof of concept. The application uses an implementation of the TensorFlow library to detect, extract, and classify hand gestures. This system is tested and verified to show its robustness. The results obtained show favourable performance and accuracy. The application is designed to offer a smoother learning curve, making it easy to use.","PeriodicalId":422085,"journal":{"name":"2022 3rd International Conference on Next Generation Computing Applications (NextComp)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131313351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Deception against DDoS attack using Moving Target Defence Framework in SDN IOT-EDGE Networks","authors":"Haula Galadima, A. Seeam, V. Ramsurrun","doi":"10.1109/NextComp55567.2022.9932172","DOIUrl":"https://doi.org/10.1109/NextComp55567.2022.9932172","url":null,"abstract":"Software Defined Networking (SDN) networking paradigm advancements are advantageous, but they have also brought new security concerns. The Internet of Things (IoT) Edge Computing servers provide closer access to cloud services and is also a point of target for availability attacks. The Distributed Denial of Service (DDoS) attacks on SDN IoT-Edge Computing caused by botnet of IoT hosts has compromised major services and is still an impending concern due to the Work From Home virtual office shift attributed by Covid19 pandemic. The effectiveness of a Moving Target Defense (MTD) technique based on SDN for combating DDoS attacks in IoT-Edge networks was investigated in this study with a test scenario based on a smart building. An MTD Reactive and Proactive Network Address Shuffling Mechanism was developed, tested, and evaluated with results showing successful defence against UDP, TCP SYN, and LAND DDoS attacks; preventing IoT devices from being botnet compromised due to the short-lived network address; and ensuring reliable system performance.","PeriodicalId":422085,"journal":{"name":"2022 3rd International Conference on Next Generation Computing Applications (NextComp)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117137449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review and Comparative Analysis of Vulnerability Scanning Tools for Wireless LANs","authors":"Abheenesh Kejiou, Girish Bekaroo","doi":"10.1109/NextComp55567.2022.9932245","DOIUrl":"https://doi.org/10.1109/NextComp55567.2022.9932245","url":null,"abstract":"The 21st century has been characterized by the widespread proliferation and use of wireless networks, notably, Wireless LANs, that enhanced access to information and resources to businesses and the society at large. However, WLANs are vulnerable to a range of security issues such as replay and KRACK attacks. In addition, the underlying security protocols used within WLANs, including Wired-Equivalent Privacy and the different versions of the Wi-Fi Protected Access have had security vulnerabilities that led to deprecation of few previous versions. As such, in the process of hardening security of such networks, vulnerability assessment is important and for this, various vulnerability scanners are available on the market. This paper critically reviews and analyses key vulnerability scanners for the context of WLANs. As part of the investigation, four tools, notably Nessus Vulnerability Scanner, OpenVAS, Nexpose and GFI LanGuard are reviewed, and insights are provided following practical utilization. As key findings, different vulnerability scanners were found to address different kinds and number of vulnerabilities, where some of them can be more granular than others, even in terms of output provided to the user. Moreover, the scan duration was not consistent across tools and does not corelate with the number of vulnerabilities detected.","PeriodicalId":422085,"journal":{"name":"2022 3rd International Conference on Next Generation Computing Applications (NextComp)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129608124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Theoretical Classification of Organizational Success Factors for Workplace Learning Analytics","authors":"A. Whale, B. Scholtz","doi":"10.1109/NextComp55567.2022.9932207","DOIUrl":"https://doi.org/10.1109/NextComp55567.2022.9932207","url":null,"abstract":"When training is conducted in the workplace and data are stored based on training interactions, the data often remain unexploited. These data need to be analyzed, visualized and interpreted by various stakeholders to make better business decisions, which can be achieved by Workplace Learning Analytics (WLA). However, it is not clear what factors influence the success of WLA projects. There is a noticeable gap in WLA research, specifically for success factors of WLA. This paper reports on a Systematic Literature Review that was conducted to identify key organizational success factors that can be used to plan and measure the success of WLA. The findings show that stakeholder commitment and strategy alignment; data, information and knowledge quality; and skills are three of the most highly cited organizational success factors for WLA. The contribution of the paper is the set of success factors classified according to the constructs of the DeLone & McLean Information Systems (IS) Success Model. This classification assisted with understanding the factors and their relationship with the success of WLA, which is one type of IS. The comprehensive set of nine organizational success factors can be used by companies in the workplace to plan and/or measure the success of WLA.","PeriodicalId":422085,"journal":{"name":"2022 3rd International Conference on Next Generation Computing Applications (NextComp)","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127523428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RaspiMonitor: A Raspberry Pi Based Smart Home Monitoring System","authors":"Mrinal Sharma, Ameerah Assotally, Girish Bekaroo","doi":"10.1109/NextComp55567.2022.9932198","DOIUrl":"https://doi.org/10.1109/NextComp55567.2022.9932198","url":null,"abstract":"Novel technological infrastructure such as smart homes have undergone major developments during recent years. Owing to the numerous benefits brought about by smart homes, research on the topic has been increasing at an exponential rate, bringing quality properties such as security, usability, reliability, and others. Despite their various advantages, smart homes have not been in a positive spotlight regarding security and reliability. The main reason that people are hesitant towards adopting an implemented intelligent system at their domicile is due to the lack of trust they allocate to the electronics. As such, this paper provides insights on an innovative and low-cost smart home monitoring system named RaspiMonitor. While the central aim of the system is to offer a robust smart home architecture which discreetly caters for the safety and security of its environment, it also helps in reducing energy wastage. The RaspiMonitor was carefully designed using dynamic web-based services in addition to an evaluation which quantified its usability and acceptance through the Technology Acceptance Model (TAM) with 6 constructs. Results in principle portray acceptance of the system with a mean score of 4.47. This indicates that a robust hardware and software architecture such as the RaspiMonitor is useful, convenient, and easy to use.","PeriodicalId":422085,"journal":{"name":"2022 3rd International Conference on Next Generation Computing Applications (NextComp)","volume":"2020 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126383933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rapid Prototyping of the SmartAR Augmented Reality Control Platform for multiple use cases","authors":"Jannish Purmaissur, A. Seeam, V. Ramsurrun","doi":"10.1109/NextComp55567.2022.9932206","DOIUrl":"https://doi.org/10.1109/NextComp55567.2022.9932206","url":null,"abstract":"The technology of augmented reality (AR) is still in its infancy, but given the significant influence of mobile devices like smartphones and tablets, it can be said to be the next big thing for the next generation. The goal of this study is to create, utilizing fast application development approaches, a low-cost platform that can be applied to a variety of Smart City and Smart Building use cases. The many AR use cases discussed in this paper are all implemented using the same methodology. The Node-Red platform, which is perfectly suited to the Internet of Things and online applications, was used to swiftly construct a number of augmented reality use cases for the platform.","PeriodicalId":422085,"journal":{"name":"2022 3rd International Conference on Next Generation Computing Applications (NextComp)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131882493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Digital Game-based Learning to Engage the Net Generation of Students in Higher Education: Lecturers9 perceptions in South Africa","authors":"Caitlin Armstrong, S. Roodt, S. Mulaji","doi":"10.1109/NextComp55567.2022.9932253","DOIUrl":"https://doi.org/10.1109/NextComp55567.2022.9932253","url":null,"abstract":"The Net Generation exhibits distinguishing characteristics, making them fundamentally different from their predecessors. These perceived changes in the Net Generation have implications in Higher Education, as traditional teaching methods were not designed with modern learners in mind. This research examines lecturers’ perceptions of using digital game-based learning (DGBL) to support the teaching of the Net Generation of students in higher education. DGBL may potentially provide a stimulating educational tool aligned with Net Generation learning style and preferences. The research used structured and unstructured questionnaires to survey 22 lecturers in Information Systems departments in seven of the 11 traditional Higher Education institutions in South Africa. The findings showed a tendency of lecturers to resist DGBL and limited knowledge and understanding of what DGBL is and how it can be used within higher education. These findings led to a revised Model of Digital Game-Based Learning called MoDGBL, adding elements’ of ‘Institutional Support’ and ‘Producer Motivation’ as the cornerstones of DGBL implementation.","PeriodicalId":422085,"journal":{"name":"2022 3rd International Conference on Next Generation Computing Applications (NextComp)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121835605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating Data Repair steps for EHR Big Data","authors":"Suraj Juddoo","doi":"10.1109/NextComp55567.2022.9932167","DOIUrl":"https://doi.org/10.1109/NextComp55567.2022.9932167","url":null,"abstract":"This paper builds on previous research with the aim of optimizing data quality methodologies for Big Data systems, with a focus on Electronic Health Records. This optimization is performed for organisations aiming to follow a data-centric data quality strategy. One of the most important stages of a data quality lifecycle is involved with correcting dirty data detected. There is a lack of knowledge relative to the performance of existing data repair algorithms and tools in a Big Data context. This study performs a systemic review of data repair algorithms and tools, subsequently undertaking an experiment-based approach to evaluate those algorithms and tools while comparing it with a prototype built based on the results of a previous study. While some algorithms and tools could be seen to be marginally better than others, there was no algorithm or tool which was seen to be extremely adequate in the Big Data context. Thus, recommendations of improvements needed for data repair algorithms and tools for Big Data are given.","PeriodicalId":422085,"journal":{"name":"2022 3rd International Conference on Next Generation Computing Applications (NextComp)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122866575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}