2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)最新文献

筛选
英文 中文
Addressing self-disclosure in social media: An instructional awareness approach 解决社交媒体中的自我表露:一种教学意识方法
N. E. D. Ferreyra, Johanna Schäwel, M. Heisel, Christian Meske
{"title":"Addressing self-disclosure in social media: An instructional awareness approach","authors":"N. E. D. Ferreyra, Johanna Schäwel, M. Heisel, Christian Meske","doi":"10.1109/AICCSA.2016.7945815","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945815","url":null,"abstract":"Nowadays the information flowing across the different Social Network Sites (SNSs) like Facebook is highly diverse and rich in its content. It is precisely the diversity of the users' contributions to SNSs that makes these platforms attractive and interesting to engage with. Nevertheless, there is a high amount of private and sensitive information being disclosed permanently by these users in order to take full advantage of the services offered by such sites. Current privacy-protection approaches (like the one provided by Facebook) allow users to restrict the audience of their contributions and hide particular pieces of information; however, they are still far from being widely adopted and put proactively into practice. For this reason, we propose to analyze and address different aspects of online self-disclosure in Social Media from a pedagogical and self-adaptive perspective. In this work we introduce the architecture of an Instructional Awareness System (IAS) based on the MAPE-K blueprint for autonomic systems, and provide a definition of its feedback mechanism using principles of Constraint-Based Modeling (CBM).","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125697659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
QLAR: A Q-learning based adaptive routing for MANETs 基于q学习的自适应路由
Abdellatif Serhani, N. Naja, A. Jamali
{"title":"QLAR: A Q-learning based adaptive routing for MANETs","authors":"Abdellatif Serhani, N. Naja, A. Jamali","doi":"10.1109/AICCSA.2016.7945679","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945679","url":null,"abstract":"Mobile Ad-hoc Networks are highly reconfigurable networks of mobile nodes which communicate by wireless links. The main issues in MANETs include the mobility of the network nodes, energy limitations and bandwidth. Thus, routing protocols should explicitly consider network changes into the algorithm design. In order to support service requirements of multimedia and real-time applications, the routing protocol must provide Quality of Service (QoS) in terms of packets loss and average End-to-End Delay (ETED). This work proposes a Q-Learning based Adaptive Routing model (QLAR), developed via Reinforcement Learning (RL) techniques, which has the ability to detect the level of mobility at different points of time so that each individual node can update routing metric accordingly. The proposed protocol introduces: (i) new model, developed via Q-Learning technique, to detect the level of mobility at each node in the network; (ii) a new metric, called Qmetric, which account for the static and dynamic routing metrics, and which are combined and updated to the changing network topologies. The proposed metric and routing model in this paper are deployed on the Optimized Link State Routing (OLSR) protocol. Extensive simulations validate the effectiveness of the proposed model, through comparisons with the standard OLSR protocols.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114866942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
On the road to the Internet of Biometric Things: A survey of fingerprint acquisition technologies and fingerprint databases 在通往生物识别物联网的道路上:指纹采集技术和指纹数据库综述
Fatimah A. Al-alem, M. Alsmirat, M. Al-Ayyoub
{"title":"On the road to the Internet of Biometric Things: A survey of fingerprint acquisition technologies and fingerprint databases","authors":"Fatimah A. Al-alem, M. Alsmirat, M. Al-Ayyoub","doi":"10.1109/AICCSA.2016.7945810","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945810","url":null,"abstract":"Since security vulnerabilities represent one of the grand challenges of the Internet of Things (IoT), researchers have proposed what is known as the Internet of Biometric Things (IoBT), which mixes traditional biometric technologies with context-aware authentication techniques. One of the most famous biometric technologies is electronic fingerprint recognition, which acquire fingerprints using different technologies, some of which are more suitable for IoBT than others. Moreover, different fingerprint databases have been built to study the impact of different factors on the accuracy of different fingerprint recognition algorithms and systems. In this paper, we survey the available fingerprint acquisition technologies and the available fingerprint databases. We also identify the advantages and disadvantages of each technology and database.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114782104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Metamodeling approach for creating an abstract representation of simulation tools concepts 元建模方法,用于创建仿真工具概念的抽象表示
Bassim Chabibi, A. Anwar, M. Nassar
{"title":"Metamodeling approach for creating an abstract representation of simulation tools concepts","authors":"Bassim Chabibi, A. Anwar, M. Nassar","doi":"10.1109/AICCSA.2016.7945702","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945702","url":null,"abstract":"Models have always been adopted in trades implemented in Systems Engineering (SE). Those models go from concrete representations, such as reduced plans or models, to abstract ones like equations systems. In this context, SysML became an SE standard because of its capabilities of supporting the specification, analysis, design, verification and validation of a broad range of systems and systems-of-systems. However, SysML descriptive models are insufficient to perform system behavior verifications. This lack can be handled by simulation process that allows performing experiments on models to eliminate poor design alternatives, and ensures that a preferred alternative meets the stakeholders' objectives. As design process efficiency is considerably reduced by the fact that both system modeling and simulation tools are often used separately, several research works aim combining and integrating both approaches in a common framework. This paper proposes a study of common constructs, semantics and modeling methodologies of simulation tools on the basis of whom we define a modeling language that we name: Simulation Modeling Language. This latter is aimed to bridge the gap between SysML modeling and various simulation tools.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128457525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hidden Markov Models for feature-level fusion of biometrics on mobile devices 移动设备生物特征融合的隐马尔可夫模型
M. Gofman, S. Mitra, Nicholas Smith
{"title":"Hidden Markov Models for feature-level fusion of biometrics on mobile devices","authors":"M. Gofman, S. Mitra, Nicholas Smith","doi":"10.1109/AICCSA.2016.7945755","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945755","url":null,"abstract":"Although biometrics have forayed into the mobile world, most current approaches rely on a single biometric modality. This limits their recognition accuracy in uncontrolled conditions. For example, performance of face and voice recognition systems may suffer in poorly lit and noisy settings, respectively. Integration of identifying information from multiple biometric modalities can help solve this problem; high-quality identifying information in one modality can compensate for the absence of such information in a modality affected by uncontrolled conditions. In this paper, we present a novel multimodal biometric scheme that uses Hidden Markov Models to consolidate data from face and voice biometrics at the feature level. An implementation on the Samsung Galaxy S5 (SG5) phone using a dataset of face and voice samples captured using SG5 in real-world operating conditions, yielded 4.18% and 9.71% higher recognition accuracy than face and voice single-modality systems, respectively.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128487898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Developing Turkish sentiment lexicon for sentiment analysis using online news media 开发土耳其语情感词典,用于在线新闻媒体的情感分析
Fatih Saglam, H. Sever, Burkay Genç
{"title":"Developing Turkish sentiment lexicon for sentiment analysis using online news media","authors":"Fatih Saglam, H. Sever, Burkay Genç","doi":"10.1109/AICCSA.2016.7945670","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945670","url":null,"abstract":"Internet is a very rich resource of documents that need to be analysed to extract their sentimental values. Sentiment Analysis which is a subfield of Natural Language Processing discipline focuses on this issue. The existence of sentiment lexicons in their own language is a very important resource for scientists studying in sentiment analysis field. Since many studies of sentiment analysis have been conducted on text written in English language, developed methods and resources for English may not produce the desired results in other languages. In Turkish, a rich sentiment lexicon does not exists, such as SentiWordNet for English. In this study, we aimed to develop Turkish sentiment lexicon, and we enhanced an existing lexicon which has 27K Turkish words to 37K words. For quantifying the performance of this enhanced lexicon, we tested both lexicons on domain independent news texts. The accuracy of determining the polarity of news written in Turkish has been increased from 60.6% to 72.2%.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134100552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A classification methodology for security patterns to help fix software weaknesses 用于帮助修复软件弱点的安全模式的分类方法
Loukmen Regainia, S. Salva, Cedric Ecuhcurs
{"title":"A classification methodology for security patterns to help fix software weaknesses","authors":"Loukmen Regainia, S. Salva, Cedric Ecuhcurs","doi":"10.1109/AICCSA.2016.7945693","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945693","url":null,"abstract":"Security patterns are generic solutions that can be applied since early stages of software life to overcome recurrent security weaknesses. Their generic nature and growing number make their choice difficult, even for experts in system design. To help them on the pattern choice, this paper proposes a semi-automatic methodology of classification and the classification itself, which exposes relationships among software weaknesses, security principles and security patterns. It expresses which patterns remove a given weakness with respect to the security principles that have to be addressed to fix the weakness. The methodology is based on seven steps, which anatomize patterns and weaknesses into set of more precise sub-properties that are associated through a hierarchical organization of security principles. These steps provide the detailed justifications of the resulting classification and allow its upgrade. Without loss of generality, this classification has been established for Web applications and covers 185 software weaknesses, 26 security patterns and 66 security principles. Research supported by the industrial chair on Digital Confidence (http://confiance-numerique.clermont-universite.fr/index-en.html).","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130513259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An efficient hybrid prediction approach for predicting cloud consumer resource needs 一种用于预测云消费者资源需求的高效混合预测方法
A. Erradi, H. Kholidy
{"title":"An efficient hybrid prediction approach for predicting cloud consumer resource needs","authors":"A. Erradi, H. Kholidy","doi":"10.1109/AICCSA.2016.7945639","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945639","url":null,"abstract":"The prediction of cloud consumer resource needs is a vital step for several cloud deployment applications such as capacity planning, workload management, and dynamic allocation of cloud resources. In this paper, we develop a new prediction model for predicting cloud consumer resource needs. The new model uses a new hybrid prediction approach that combines the Multiple Support Vector Regression (MSVR) model and the Autoregressive Integrated Moving Average (ARIMA) model to predict with higher accuracy the resource needs of a cloud consumer in terms of CPU, memory, and disk storage utilization. The new model is also able to predict the response time and throughput which in turn enable the cloud consumers to make a better scaling decision. The new model elucidated a better prediction accuracy than the current prediction models. In terms of CPU utilization prediction, it outperforms the accuracy of the existing cloud consumer prediction models that uses Linear Regression, Neural Network, and Support Vector Machines approaches by 72.66%, 44.24%, and 56.78% respectively according to MAPE and 56.95%, 80.42%, and 63.86% according to RMSE. The analysis, architecture, and experiment results of the new model are discussed in details in this paper.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121766949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Integrated sensors system based on IoT and mobile cloud computing 基于物联网和移动云计算的集成传感器系统
Majed AlOtaibi, L. Tawalbeh, Y. Jararweh
{"title":"Integrated sensors system based on IoT and mobile cloud computing","authors":"Majed AlOtaibi, L. Tawalbeh, Y. Jararweh","doi":"10.1109/AICCSA.2016.7945812","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945812","url":null,"abstract":"The advances in IT sector, cloud computing, the wide usage of sensors and mobile devices, and the Internet-of-Things (IoT) made our world looks like a small town. These rapid developments keep us connected all the day and seven days a week. Also, the IoT enables the connection of the devices around us (including different sensors) to the internet via different wireless and wired communication technologies. These networked sensors can be used to collect different types of data from different applications (healthcare, agriculture, civil and social life) and send it for processing and extraction of appropriate decisions. The mobile cloud computing technology is an efficient solution to process different types of collected data and respond with the required answer in real time situations where the quick response is very important. In this paper, we build a multipurpose integrated sensors system. This integrated system consists of networked sensors for different purposes and applications. For example, the sensors can be health sensors to measure the pulse and blood pressure of patients, or it can be sensors to measure the temperature to indicate a fire accident. The networked sensors will transfer the sensed data through wireless technologies to a Cloud for processing and notifying the listed users to take the proper action.","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121773117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Mobility support over RPL using sensor nodes speed classification 使用传感器节点速度分类的RPL移动支持
Fatma Somaa, I. Korbi, L. Saïdane
{"title":"Mobility support over RPL using sensor nodes speed classification","authors":"Fatma Somaa, I. Korbi, L. Saïdane","doi":"10.1109/AICCSA.2016.7945688","DOIUrl":"https://doi.org/10.1109/AICCSA.2016.7945688","url":null,"abstract":"The interest for wireless sensor networks (WSNs) is continuously growing especially with the emergence of applications such as smart grids, smart cities, e-health, etc. where billions of objets (sensors) will be permanently connected to the Internet. In this context, the IPv6 Routing Protocol for Low power and Lossy Networks (RPL) is placed as the routing standard for the next generation multi-hop WSNs. The RPL scheme fits the sensor nodes characteristics since the protocol was originally designed for energy efficiency. Nevertheless, in the case of sensor nodes' movement, RPL poorly adapts to such scenarios which rapidly alters the network performance. In this paper, we investigate the problem of mobility support over RPL. Therefore, we propose a new Sensor Nodes' Speed Classifier (SNSC) to predict the sensor nodes' movement in the network. Then, we exploit the speed values-predicted by the SNSC model-to enhance the behavior of the native RPL in the mobility context. Our modified RPL scheme is called Mobility Prediction based RPL (MP-RPL). To evaluate the performance of MP-RPL, we first validate the SNSC model using the Cooja/Contiki simulation environment. Then, we compare MP-RPL to the native RPL in terms of Packet Loss Rate (PLR) and Packet Delivery Delay (PDD).","PeriodicalId":448329,"journal":{"name":"2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127766485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信