{"title":"Detecting Vulnerabilities in Smart Contract within Blockchain: A Review and Comparative Analysis of Key Approaches","authors":"Yoganand Kissoon, Girish Bekaroo","doi":"10.1109/NextComp55567.2022.9932169","DOIUrl":"https://doi.org/10.1109/NextComp55567.2022.9932169","url":null,"abstract":"Blockchain technology was created with security in mind. However, in recent years, there has been various confirmed cases of breach, worth billions of dollars loss in Blockchain associated to smart contracts. In order to address this growing concern, it is crucial to investigate detection and mitigation of vulnerabilities in smart contract, and this paper critically reviews and analyses key approaches for detecting vulnerabilities in smart contract within Blockchain. In order to achieve the purpose of this paper, five key approaches, notably the application of OWASP Top 10, SCSVS, vulnerability detection tools, fuzz testing and the AI-driven approaches are critically reviewed and compared. As part of the comparison performed, a penetration testing quality model was applied to study six quality metrics, notably extensibility, maintainability, domain coverage, usability, availability and reliability. Results revealed limitations of the studied vulnerability detection approaches and findings are expected to help in decision making especially when selecting approaches to be used during security analysis and pen-testing.","PeriodicalId":422085,"journal":{"name":"2022 3rd International Conference on Next Generation Computing Applications (NextComp)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125873983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tracks and Themes","authors":"","doi":"10.1109/nextcomp55567.2022.9932186","DOIUrl":"https://doi.org/10.1109/nextcomp55567.2022.9932186","url":null,"abstract":"","PeriodicalId":422085,"journal":{"name":"2022 3rd International Conference on Next Generation Computing Applications (NextComp)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124066655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A bibliometric analysis of privacy concerns","authors":"Eric Di Benedetto, Alain Cucchi","doi":"10.1109/NextComp55567.2022.9932220","DOIUrl":"https://doi.org/10.1109/NextComp55567.2022.9932220","url":null,"abstract":"This paper is a bibliometric analysis of the research in management and information systems on the field of privacy concern. Using tools such as Iramuteq and VosViewer, we were able to identify recurrent themes in the field of privacy. Our iterative analysis, using major academic search engines, identifies major theories in the privacy field, and uncovers recurring themes in this research field, as no work of this magnitude has been done to date. However, it turns out that privacy incomes are regularly studied, but the tipping point of consent, as well as the consumer himself and his point of view, are rarely researched. From a managerial and academic point of view, it seems necessary to extend this research field to other territories and populations.","PeriodicalId":422085,"journal":{"name":"2022 3rd International Conference on Next Generation Computing Applications (NextComp)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127930491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimised Detection of Anredera Cordifolia (Madeira Vine) using a Mask-RCNN and Anredera Cordifolia’s prominent features as object classes","authors":"Malusi Sibiya, Sithembile Nkosi, Sifiso Xulu","doi":"10.1109/NextComp55567.2022.9932192","DOIUrl":"https://doi.org/10.1109/NextComp55567.2022.9932192","url":null,"abstract":"The research interest in plants using current technologies is growing, and with it is plant recognition using deep Convolutional Neural Networks (CNNs). The CNNs and its variants such as RCNN have recently become a popular method of plant feature recognition due to their superior ability to classify, detect, and label features with high fidelity. Anredera cordifolia, also known as Madeira Vine, is a plant species that unnecessarily invade environments, hence destroying the plants occupying those environments. Here, we develop a computer vision model for the detection of Anredera cordifolia with Mask-RCNN for use in environments that may need drones to detect the presence of this foreign plant species. To optimize the model’s confidence in detecting the presence of the Anredera cordifolia, a Mask-RCNN was trained with images of the Anredera cordifolia using three distinct features of this plant as object classes. These features that were used to build classes of the Mask-RCNN were leaves, flowers, and the tubers. This novel approach ensures the detection of the Anredera cordifolia as the prominent features were used as class objects of the Mask-RCNN. The results of the experiments showed that the Mask- RCNN was able to overlay masks and bounding boxes around the Anredera cordifolia features that were detected.","PeriodicalId":422085,"journal":{"name":"2022 3rd International Conference on Next Generation Computing Applications (NextComp)","volume":"31 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114039338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ogechi Ebere, V. Ramsurrun, Preetila Seeam, Panagiota Katsina, Sumit Anantwar, Mrinal Sharma, A. Seeam
{"title":"NFC tag-based mHealth Patient Healthcare Tracking System","authors":"Ogechi Ebere, V. Ramsurrun, Preetila Seeam, Panagiota Katsina, Sumit Anantwar, Mrinal Sharma, A. Seeam","doi":"10.1109/NextComp55567.2022.9932185","DOIUrl":"https://doi.org/10.1109/NextComp55567.2022.9932185","url":null,"abstract":"Patient misdiagnosis is quite a common occurrence in hospitals around the world. It is a mistake that can happen to anyone at any time, and especially during a pandemic crisis when hospital facilities are overwhelmed with increasing number of patients. This problem could stem from improper patient identification whereby patient files are mislabelled or placed in an incorrect patient dossier. It is the responsibility of a hospital and its employees to guarantee that such mistakes do not occur. With respect to this, near-field communication (NFC) technology, which is a short ranged wireless communication technology, has been identified to have great potential to help identify patients in hospitals.This paper demonstrates a solution by designing and developing a patient healthcare management information system that sees the seamless integration of the NFC technology along with and both web and mobile technologies,to provide a holistic solution to tackle the problem of patient misidentification in a hospital environment especially during pandemics such as COVID-19.The Technology Acceptance Model (TAM) was used as evaluation method in order to quantify the proposed systems’s usability and acceptance using 5 constructs. Results showed acceptance of the system with a mean score of 4, indicating that the NFC tag-based mHealth Patient Healthcare Tracking System was found to be useful and easy to use.","PeriodicalId":422085,"journal":{"name":"2022 3rd International Conference on Next Generation Computing Applications (NextComp)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134268262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NextComp 2022 Cover Page","authors":"","doi":"10.1109/nextcomp55567.2022.9932208","DOIUrl":"https://doi.org/10.1109/nextcomp55567.2022.9932208","url":null,"abstract":"","PeriodicalId":422085,"journal":{"name":"2022 3rd International Conference on Next Generation Computing Applications (NextComp)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121283282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gaming With OOP Learn: A Mobile Serious Game to Learn Object-Oriented Programming","authors":"Deekshita Bundhoo, L. Nagowah","doi":"10.1109/NextComp55567.2022.9932243","DOIUrl":"https://doi.org/10.1109/NextComp55567.2022.9932243","url":null,"abstract":"Information Technology has proved to be important in various sectors of the economy, one of them being the education sector. Sophisticated equipment and advanced software applications have contributed to enhancing learning techniques across many universities around the world. Nowadays, youngsters’ interest in playing games has been on the rise whether it is for entertainment or non-entertainment purposes. Serious games take this advantage and prove to be effective in improving the learning environment and efficiency of the learning process. Hence, learners’ ability to learn new skills and the capacity for retention through game-based learning has found great success as opposed to the traditional learning method that tends to be boring. Object-Oriented programming has always been quite challenging for IT students. This work focuses on the development of a mobile serious game ‘Gaming With OOP Learn’ to teach Object-Oriented Programming concepts to undergraduate students and to have their teachers assess their performance and provide feedback as a means of improving their performance. Thorough information was gathered through a review of existing similar systems and the ACM guidelines for Object-Oriented Programming concepts have been taken into account when implementing the different games proposed in Gaming With OOP Learn.","PeriodicalId":422085,"journal":{"name":"2022 3rd International Conference on Next Generation Computing Applications (NextComp)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117088253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Johannes Schering, Lukas Gerdes, J. Gómez, Federico Alfaro
{"title":"Citizen Reportings and its Application to Bike Infrastructure Quality Assessment","authors":"Johannes Schering, Lukas Gerdes, J. Gómez, Federico Alfaro","doi":"10.1109/NextComp55567.2022.9932249","DOIUrl":"https://doi.org/10.1109/NextComp55567.2022.9932249","url":null,"abstract":"Digitalization gives new opportunities for citizen involvement. Local people can provide new insights in infrastructure shortcomings to support decision making. In this contribution we discuss how user generated data from municipal reporting systems can be used to support bike infrastructure quality assessment. The open accessible web portal EMSOs (EreignisMeldeSystem der Stadt Osnabrueck, Incident Reporting System of the City of Osnabrueck) is the specific usecase of this work. The Key Performance Indicators (KPIs) show when (potential) cyclists tend to use the reporting system to inform the administration about infrastructure shortcomings. The categorization of the portal could be misleading to many users as reportings may fit to several categories. Therefore, we classified the EMSOs reportings from 2021 to specific key words and topics that seem to be relevant to the users. The visualization shows several hotspots in the city where people complaining about parking violators or mud on the road. The work is embedded in the research project INFRASense that works on the development of a holistic quality assessment for bike paths. Based on reverse geocoding addresses and road names were identified from the geo coordinates. The related KPIs (e.g. reportings per meter) reveal road segments and streets that may be problematic from the user perspective. The contribution ends with a discussion how this process can be extended to other fields of interest and how it can be automatized to decrease the work load in processing citizen reporting data.","PeriodicalId":422085,"journal":{"name":"2022 3rd International Conference on Next Generation Computing Applications (NextComp)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126627202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Xu, Mutian Li, Wenyan Kong, Yang Li, Yang Wang, Hongyu Yu, Jinglei Yang
{"title":"RFID with Multi-Sensing&Blockchain Empowered Digitalization of Chemical Inventory Management","authors":"N. Xu, Mutian Li, Wenyan Kong, Yang Li, Yang Wang, Hongyu Yu, Jinglei Yang","doi":"10.1109/NextComp55567.2022.9932171","DOIUrl":"https://doi.org/10.1109/NextComp55567.2022.9932171","url":null,"abstract":"The conventional labor-intensive chemical inventory management methods face great challenges due to the rapid increase and diverse demands of front-line researchers, lab managers, principal investigators, and authority-level central departments. This paper addresses the practical issues of chemical management and provides a new interdisciplinary and user-friendly innovative chemical inventory management system. Empowered by RFID, multi-sensing, and blockchain technologies, the digitalization of the chemicals, sensitive and dangerous substances are constructed. According to the field tests via the deployed prototype and evaluation elaborated in this paper, stakeholders can drastically reduce the amount of low-value, miscellaneous lab work, while improving the efficiencies of research activities, administration, management, and safety control in multiple specialized domains.","PeriodicalId":422085,"journal":{"name":"2022 3rd International Conference on Next Generation Computing Applications (NextComp)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114882157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multiclass classification model to estimate Agile user stories","authors":"Yuvna Ramchurreetoo, V. Hurbungs","doi":"10.1109/NextComp55567.2022.9932190","DOIUrl":"https://doi.org/10.1109/NextComp55567.2022.9932190","url":null,"abstract":"Effort estimation in Agile projects is extremely important in order to prevent schedule overrun, late product delivery and over-budgeting among others. These estimations are usually performed manually by making use of estimation techniques such as planning poker and expert judgment. However, there are several constraints associated with these techniques since estimation requires the presence of the whole project team and there might be divergence of opinions. The main objective of this study was to estimate Agile user stories using multiclass classification techniques. Three classifiers (Naïve Bayes, Decision Tree and Support Vector Machine) have been applied to user stories to estimate effort in terms of Story Points. Three machine learning models were generated and evaluated to determine the best algorithm by comparing metrics such as accuracy, error rate, precision, recall and f-measure. Using a single train:test sample in the ratio of 100:25, Naïve Bayes, Decision Tree and Support Vector Machine gave an accuracy of 64%, 80% and 100% respectively. Experiments performed showed that the accuracy of Support Vector Machine was better than the other two algorithms in estimating user stories.","PeriodicalId":422085,"journal":{"name":"2022 3rd International Conference on Next Generation Computing Applications (NextComp)","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124240482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}