Proceedings of the 4th International Conference on Networking, Information Systems & Security最新文献

筛选
英文 中文
Real time driver's eye state recognition based on deep mobile learning 基于深度移动学习的驾驶员眼状态实时识别
Amina Guettas, Soheyb Ayad, O. Kazar
{"title":"Real time driver's eye state recognition based on deep mobile learning","authors":"Amina Guettas, Soheyb Ayad, O. Kazar","doi":"10.1145/3454127.3456625","DOIUrl":"https://doi.org/10.1145/3454127.3456625","url":null,"abstract":"Abstract. Eye state recognition has been the subject of many studies due to its importance in many fields especially drowsy driver detection, which is crucial task that must be done in real time and mostly using limited hardware. These restrictions make resource consuming learning techniques such as deep learning difficult to use. Deep mobile learning seems to be a viable solution to solving this issue. In this paper, we propose a real time system based on deep mobile learning to classify the eye state, and compare its performance with classical machine learning methods. The experimental results on the Closed Eyes in the Wild (CEW) and MRL Eye Datasets show that the proposed approach outperformed the other machine learning techniques in terms of accuracy and execution time. In addition, we evaluated our system on a video dataset to demonstrate its reliability and robustness.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122665039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparative analysis of SOAP and REST Web service composition based on performance in local and remote Cloud environments 基于本地和远程云环境中性能的SOAP和REST Web服务组合的比较分析
Yapo Jesus Ekie, Bassirou Gueye, I. Niang
{"title":"A comparative analysis of SOAP and REST Web service composition based on performance in local and remote Cloud environments","authors":"Yapo Jesus Ekie, Bassirou Gueye, I. Niang","doi":"10.1145/3454127.3457621","DOIUrl":"https://doi.org/10.1145/3454127.3457621","url":null,"abstract":"Web services are an attracting area that interest many researchers and industrial organizations. Given the convenience and reusability, web services have become a main mode of cloud application. Web services can be developed based on two interaction styles such as Simple Object Access Protocol (SOAP) and Representational State Transfer Protocol (REST). Nevertheless, the function of single web service is usually too simple to satisfy the user’s complex demand. Therefore, it is necessary to combine a set of basic web services in order to create a composite web services. However, most existing work on the comparison of SOAP and REST focuses on a single micro-service and fails to outline the performance of those two approaches in a real-case situation where, most of the time, multiple micro-services are bound together to provide a more holistic answer to user requests. In this paper, we try to tackle this issue from a more business-centered perspective. We use a case study involving multiple services both in local and remote Cloud environments with SOAP Web services composition and REST Web services composition. The first environment will help us find out the behavior in a more controlled situation compared to the latter where multiple service providers are involved.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133628636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Frequency Reconfigurable Antenna Design for RFID Tag: A Study 射频识别标签的频率可重构天线设计研究
Assiya Amri, T. Mazri
{"title":"Frequency Reconfigurable Antenna Design for RFID Tag: A Study","authors":"Assiya Amri, T. Mazri","doi":"10.1145/3454127.3458772","DOIUrl":"https://doi.org/10.1145/3454127.3458772","url":null,"abstract":"Nowadays, wireless communication systems require antennas able to operate in multiple frequency bands. Frequency reconfigurable antennas have been meet this need and become more advantageous and appreciated compared to conventional antennas. This paper presents the process of designing a frequency reconfigurable antenna for RFID tag, and discusses the interest of using this type of antennas in RFID technology applications, namely identification and localization of vehicles in a given area.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134018923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposal for a platform for the continuity of distance learning in African schools and universities at the end of the politico-military crisis in the face of covid-19: case of the Central African Republic 针对2019冠状病毒病的政治军事危机结束后,关于在非洲中小学和大学继续远程学习平台的建议:中非共和国的案例
G. M. Kossingou, Bessan Melckior Dégboé, Nadege Gladys Ndassimba, S. Ouya, G. Mendy
{"title":"Proposal for a platform for the continuity of distance learning in African schools and universities at the end of the politico-military crisis in the face of covid-19: case of the Central African Republic","authors":"G. M. Kossingou, Bessan Melckior Dégboé, Nadege Gladys Ndassimba, S. Ouya, G. Mendy","doi":"10.1145/3454127.3456603","DOIUrl":"https://doi.org/10.1145/3454127.3456603","url":null,"abstract":"Following the perpetual political-military crises, most of the rural areas of the Central African Republic (CAR) are occupied by armed groups. This leads to human insecurity in these areas. Children, adolescents, and youth are out of school. Primary and secondary school teachers are unable to travel to unsafe areas. Due to the problem of human insecurity in rural areas and especially poverty in several rural areas of CAR, parents are unable to finance the education of their children who have taken the baccalaureate exams to travel to the capital Bangui to study at Bangui University alone. In this article, we propose a platform for the continuity of educational activities in the Central African Republic. Our initially proposed platform solution allows the creation of a distance primary and secondary school in bimodal mode in the rural areas of the CAR. In a second step, it allows the creation of a complete distance university training coupled with traditional education for young people from all rural areas of the Central African Republic. This platform has been tested at the Higher Institute of Technology (Department of Computer Science and Telecommunications) and the Faculty of Science of the University of Bangui and has enabled the partial resumption of pedagogical activities in these institutions. It has been applied in the field of STEM (science, technology, engineering and mathematics) and can be extended to other disciplines. Access to resources is efficient thanks to the coupling of the WireGuard VPN server and the Apache Guacamole server which is a gateway using standard protocols via a browser. It also uses VXLAN technology which moves the WireGuard VPN server subnet from OSI Layer 3 to Layer 2 and allows the organization of practical work that requires being in the same local subnet. Access to this platform provides learners in the Central African Republic with a complete and secure distance learning environment for courses, assignments and tutorials.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114338397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of the use of gamification elements in e-learning applications 在电子学习应用中使用游戏化元素的研究
Ezzoubair Zecri, M. Ouzzif, Ismail El Haddioui
{"title":"Study of the use of gamification elements in e-learning applications","authors":"Ezzoubair Zecri, M. Ouzzif, Ismail El Haddioui","doi":"10.1145/3454127.3456591","DOIUrl":"https://doi.org/10.1145/3454127.3456591","url":null,"abstract":"The absence of human interaction in e-learning platforms leads to rapid loss of motivation of learners. As an effective way to motivate them in online learning applications, e-learning designers opt for the use of gamification elements in their applications. This study aims to compare five gamification e-learning applications by an existing Gamification taxonomy in order to propose a modification to improve it. The five applications we used are Duolingo, Socrative, Kahoot, Khan Academy and Classcraft. The objective is to compare the use of each element in these applications to know its usefulness and to propose a new gamification elements model.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123532702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study and comparison of the different elements of handover execution: a case of the LTE network 切换执行中不同要素的研究与比较:以LTE网络为例
Samia Hakkou, T. Mazri, N. Hmina
{"title":"Study and comparison of the different elements of handover execution: a case of the LTE network","authors":"Samia Hakkou, T. Mazri, N. Hmina","doi":"10.1145/3454127.3456611","DOIUrl":"https://doi.org/10.1145/3454127.3456611","url":null,"abstract":"Mobile networks have experienced the rapid development of several successive generations of networks. Handover is an essential element in mobile networks. Its principle is to guarantee continuity of communication even when changing location. In this document, we present a study on the different elements of LTE handover execution. Also, we compare the existing different algorithms of the LTE handover.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124147756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A framework towards more accurate and explanatory student performance model 一个更准确和解释学生表现模型的框架
Hayat Sahlaoui, E. A. Alaoui, S. Agoujil
{"title":"A framework towards more accurate and explanatory student performance model","authors":"Hayat Sahlaoui, E. A. Alaoui, S. Agoujil","doi":"10.1145/3454127.3457634","DOIUrl":"https://doi.org/10.1145/3454127.3457634","url":null,"abstract":"The ability to predict students academic performance in a timely manner is very important in learning institutions [18]. Student performance prediction is an important area as it can help teachers identify students who need additional academic support [14]. Predicting student academic performance helps teachers develop a good understanding of how well or how badly students are doing in their classes so that teachers can take proactive steps to improve student learning. Accurately predicting students future performance based on their ongoing academic records is critical to effectively conducting the educational interventions required to ensure students complete the course on time and in a satisfactory manner [4]. To achieve these goals, however, a large amount of student data must be analyzed and predicted using various machine learning models. Having a wealth of options is good, but deciding which model to implement in production is critical. While we have a number of performance metrics to evaluate a model, it is not advisable to implement every algorithm for every problem. This takes a lot of time and effort. Additionally, machine learning (ML) models are amazingly good at making predictions, but often cannot provide explanations for their predictions that humans can easily understand. Most machine learning-based projects focused primarily on results, on updating the accuracy of student grade models without considering mechanisms for their interpretability. Therefore it is important to know how to choose the right algorithm for a given task and how to choose the ”right” interpretability tool. To that end, we provide a guide for machine learning practitioners and researchers that shows the thought process that they might find useful in improving the performance and interpretability of their models, and they can even get great results on their prediction problems. The study concludes that machine learning practitioners can improve the performance of predictive models with data tactics such as getting more data, cleaning data, resampling data and rescaling data. And with algorithms optimization tactics by searching for the best hyper-parameters by using random search of algorithm hyper parameters to expose configurations that never thought of. And learning to combine by using a new model to learn how to best combine the predictions from multiple well-performing models. And can also improve the interpretability of the model by choosing the “right” interpretability tool. As machine learning becomes more ubiquitous, understanding how these models find answers is critical to improve their performance and reliability. When deciding to implement a machine learning model, choosing the right model mean analyzing your needs and expected results. Finally, developing the right solution to a problem in real life is rarely just an applied math problem. It requires awareness of business needs, rules and regulations, and stakeholder concerns, as well as consider","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127689951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EE-FTR: An Energy-Efficient Fault-Tolerant Routing Protocol for Wireless Sensor Networks ieee - ftr:一种高效的无线传感器网络容错路由协议
Khadidja Belkadi, M. Lehsaini
{"title":"EE-FTR: An Energy-Efficient Fault-Tolerant Routing Protocol for Wireless Sensor Networks","authors":"Khadidja Belkadi, M. Lehsaini","doi":"10.1145/3454127.3456613","DOIUrl":"https://doi.org/10.1145/3454127.3456613","url":null,"abstract":"In addition to the nature of the sensor nodes and hostile environments in which are deployed and due to its tasks of cluster management and data routing to base station (BS), the clusterhead node (CH) is prone to failure. In order to achieve fault-tolerance and not lose network connectivity, it would be more appropriate to find a faulty CH alternative. In this paper, we propose a fault-tolerant routing protocol based on the clustering method used in EADC (energy-aware clustering algorithm) protocol and on a proactive routing protocol. Simulation results show that our proposal provides better performance in terms of average delivery time, data delivery rate, dissipated energy and network lifetime compared to the EFT-PMD protocol.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126232666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of security attacks in WBAN for medical healthcare 医疗卫生无线宽带网络安全攻击分类
A. Bengag, Amina Bengag, O. Moussaoui
{"title":"Classification of security attacks in WBAN for medical healthcare","authors":"A. Bengag, Amina Bengag, O. Moussaoui","doi":"10.1145/3454127.3456605","DOIUrl":"https://doi.org/10.1145/3454127.3456605","url":null,"abstract":"Wireless Body Area Network (WBAN) system is one of the most important elements of the internet of things (IoT) concept. Actually, the major objective of this technology is to improve the healthcare industry including remote medical surveillance and emergency medical response systems. However, because of the presence of wireless communication support, this technology is very vulnerable to several types of attacks. Thence, the security has become one of the most important main challenges to take up. In this paper, we start to give the main concepts of the WBAN system, its communication architecture and an overview of security problem in WBAN system. Moreover, our work covers the description of a new classification of the different attacks in WBAN network. This classification allows us, and interested researcher to ameliorate or create a robust attack detection mechanism corresponding to each attack.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131772254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DTN gateway For an Interoperable IoT architecture DTN网关用于可互操作的物联网架构
Rajae Tamri, S. Rakrak
{"title":"DTN gateway For an Interoperable IoT architecture","authors":"Rajae Tamri, S. Rakrak","doi":"10.1145/3454127.3456623","DOIUrl":"https://doi.org/10.1145/3454127.3456623","url":null,"abstract":"Internet of Things (IoT) applications use a huge number of smart objects, which are connected through various heterogeneous technologies. Moreover, they are characterized by their mobility and unreliability. The main goal of this paper is to present an alternative solution for the intermittently connected IoT network by considering the Delay Tolerant Network (DTN) approach. Through the integration of the functionality of the DTN and Bundle Protocol (BP) in the IoT network layer, the wireless IoT devices exploit the features of DTN in routing and mobility, to transmit data to destination efficiently and to ensure interoperability in the network.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121180087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信