Real-time embedded systems, Real-time operating system, Rate monotonic task, Round robin task, Event driven task handling, and Satellite simulations 1
recipe recommendation, data mining, personalization, recommender systems, similarity measurement
Indexing, Natural Language Processing, Parse Trees, Part-of-Speech Tagging, WordNet, n-grams, k-skip-grams
YouTube platform, Recommendation system, Scientific knowledge gaps, Ontology, Ontology web
College of Computer Science and Engineering (CCSE), University of Hai’l (UoH), Ha’il, Saudi Arabia
Mobile computing is fast replacing the traditional computing paradigms by offering its users to exploit portable computations and context-aware communications. Despite the benefits of mobile computing such as portability and context-sensitivity, there are some critical challenges such as resource poverty of mobile devices and security of mobile user’s data that must be addressed. Implementing the security mechanisms to execute on mobile devices can be challenging as mobile devices lack the required processor, memory and battery resources to support continuous and long-term execution of computation intensive tasks. Cloud computing model can provide virtually unlimited hardware, software, and service resources to compensate for the resource poverty of mobile devices. In recent years, there is a lot of research and development of solutions and frameworks that preserve the security and privacy of mobile devices and their data. However, there has been little effort to secure mobile devices while also supporting an efficient utilization of the limited resources available on mobile devices. In this paper, we propose Security as a Service for mobile devices (SeaaS for mobile) that integrates mobile computing and cloud computing technologies to secure the critical resources of mobile devices. The proposed solution aims to support (i) security for the data critical resources of mobile devices, and (ii) security as a service by cloud servers for an efficient utilization of the mobile device resources. We demonstrate the security as a service based on a practical scenario for the security of mobile devices. The evaluation results show that the proposed solution is (a) accurate to detect the potential security threats and is (ii) computationally efficient for mobile devices. The proposed solution as part of ongoing research provides the foundations to develop a framework to address SeaaS for mobile. The proposed solution aims to advance the research state-of-the-art on mobile cloud computing, while it specifically focuses exploiting cloud-based services to secure mobile devices.
Software Engineering, Mobile Computing, Cloud Computing, Computer Security, Mobile Cloud Computing., Security as a Service.
TBFV-M: Testing-Based Formal Verication for SysML Activity Diagrams
Yufei Yin1,Shaoying Liu 1
Hosei University Tokyo, Japan.
SysML activity diagrams are often used as models for software systems and its correct-ness is likely to signicantly aect the reliability of the implementation. However, how to eectively verify the correctness of SysML diagrams still remains a challenge. In this paper, we propose a testing-based formal verication (TBFV) approach to the verication of SysML diagrams, called TBFV-M, by creatively applying the existing TBFV approach for code verication. We describe the principle of TBFV-M and present a case study to demonstrate its feasibility and usability. Finally, we conclude the paper and point out future research directions.
SysML activity diagrams, TBFV, test path generation, formal verification of SysML diagram;
A Multi-Factor Authentication Method For Security of Online
Abrar Ullah,1 Hannan Xiao 2and Trevor Barker2
1School of Computing and Management, Cardiff Metropolitan University
2Department of Computer Science, University of Hertfordshire
Security of online examinations is the key to success of remote online learning. However, it faces many conventional and non-conventional security threats. Impersonation and abetting are rising non-conventional security threats, when a student invites a third party to impersonate or abet in a remote exam. This work proposed dynamic profile questions authentication to identify that the person taking an online test is the same who completed the course work. This is combined with remote proctoring to prevent students from taking help from a third party during exam. This research simulated impersonation and abetting attacks in remote online course and laboratory based control simulation to analyse the impact of dynamic profile questions and proctoring. The study also evaluated effectiveness of the proposed method. The findings indicate that dynamic profile questions are highly effective. The security analysis shows that impersonation attack was not successful.
Security, Usability, Authentication, Online Examination
Automated Visualization of Input / Output for Processes in SOFL Formal Specifications
Yu Chen1 and Shaoying Liu2
1Graduate School of Computer and Information Science, Hosei University, Tokyo, Japan
2Faculty of Computer and Information Science, Hosei University, Tokyo, Japan
While formal specification is regarded as an effective means to capture accurate requirements and design, validation of the specifications remains a challenge. Specification animation has been proposed to tackle the challenge, but lacking an effective representation of the input/output data in the animation can considerably limit the understanding of the animation by clients. In this paper, we put forward a tool supported technique for visualization of the input/output data of processes in SOFL formal specifications. After discussing the motives of our work, we describe how data of each kind of data type available in the SOFL language can be visualized to facilitate the representation and understanding of input/output data. We also present a supporting tool for the technique and a case study to demonstrate the usability and effectiveness of our proposed technique. Finally, we conclude the paper and point out the future research directions.
Visualization, SOFL, Formal specification, Data type, Formal methods
A content-based communication solution to avoid discontinuity in VANET
Mohamed Anis MASTOURI 1 Salem Hasnaoui1
1Communication systems – Sys’Com Laboratory National school of engineers of Tunis - ENIT Tunis, Tunisia
The goal of Vehicular Ad Hoc Network (VANET) is to contribute to safer and more efficient roads in the future by providing timely information to drivers and interested authorities.In the last few years, VANETs have been quite a hot research area and attract so much attention of both academia and industry, due to their particular characteristics, such as high dynamic topology and intermittent connectivity. In this context VANET have great challenges in terms of data exchange and routing in order to avoid the discontinuity.In this article, a proposal of a content-based communication approach is presented as a solution to bypass non predictable mobility and loss of connectivity.
VANET, publish-subscribe, MANET, opportunistic, routing.
A Web-based Solution for Power Quality Data Management
Claudiu Popirlan1, Gabriel Stoian1, Leonardo Geo Manescu2, Denisa Rusinaru2, Marian Ciontu2, Gabriel Cosmin Buzatu2, Miron Alba3, Adrian Cojoaca3
1Computer Science Department & INCESA Research Hub for Applied Sciences
University of Craiova, Romania
2Faculty of Electrical Engineering & INCESA Research Hub for Applied Sciences
University of Craiova, Romania
3Oltenia Distribution SA, Craiova, Romania
In this paper we present a web-based solution designed to convert (integrating an appropriate plugin) heterogeneous information provided by any type of power acquisition equipment into standard formats as PQDIF (Power Quality Data Interchange Format - IEEE® Std 1159.3-2003 standard). The power grid operators are interested for this kind of applications capable to convert huge volume of heterogeneous information into standard formats in order to be easily processed.
Web-Based Solution, Java Enterprise Application, Power Quality, Data Conversion
Using Supervised And Unsupervised Machine Learning Algorithms For Business Process Modeling
1Department of Computer Science, Umm Al-Qura University, Makkah Al Mukarramah,
Kingdom of Saudi Arabia
Business process modeling is a challenging task for every organization because of the data complexity used in the organization. Nowadays, every business industry wants to have a digital business process which is generated automatically from any business transaction from the recorded data. This data is recorded in any database event log or inside any data warehouse. To generate the digital business process automatically in any business environment from such type of data is a challenging task, because it requires deep knowledge of the data and process. Moreover, it takes a long time, sometime weeks and even months. To overcome these issues and to model a quick business process, I proposed a model which used the machine learning techniques to generate the business process automatically from the recorded data. In my approach, I used supervised and unsupervised machine learning techniques to model business process from aggregated and sequence data. Moreover, a limited number of notations were used that made it easy to understand and analyze.
Business Process Management, Knowledge discovery, Data Mining, Supervised, Unsupervised
BROADBAND DOA ESTIMATION BASED ON NESTED ARRAYS
Li Yan1, Wang Dan2, Han Bo2
1Academy of opto-electronics,Chinese Academy of Sciences, Beijing, China
2Science and Technology on Underwater Acoustic Laboratory, Harbin Engineering University, Harbin, China
Using the structure of nested arrays, a broadband direction of arrival (DOA) estimation algorithm is presented. The algorithm combines different sensors data to construct a covariance matrix, which is equivalent to that of the uniform linear array whose aperture is same as the nested arrays, and then the DOAs of broadband sources can be estimated by the incoherent MUSIC algorithm. Compared to the traditional coherent subspace algorithms, the proposed algorithm does not need to pre-estimate the azimuths of sources. When the number of sources is greater than the number of sensors, it can still perform well. Under the condition of same array aperture, the number of the sensors is reduced considerably by using nested arrays, and the good localizing performance and spatial resolution can be obtained. Finally, computer simulations show the performance of the proposed algorithm
Array processing, DOA estimation, broadband signal, nested arrays
A Semantic Collaborative Clustering Approach Based on Confusing Matrix
Damien E. ZOMAHOUN
University of Burgundy Dijon, France
In this paper we discuss about a new images retrieval technique based on clustering. We argue that images don’t have an intrinsic meaning, but they can receive different interpretation. These images can complicate documents retrieval. However, users need a quick and direct access to documents. To answer this requirement, we propose a retrieval approach which use a collaborative clustering technique based on confusing matrix.
Borative Clustering, Retrieval, Confusing matrix, Mapping Function
An Approach of Semantic Retrieval of Information Based on Local Granularity and Similarity Measures
Damien E. ZOMAHOUN
University of Burgundy Dijon, France
The success of the information retrieval system hinges on being able to allow an efficient access to information in a way that is cost-effective and consistent with adopted retrieval technics based on similarity measures. This work focuses on an intelligent approach to semantic retrieval of information. We propose an architecture, in which the textual information extracted from the query is mapped to semantically meaningful keywords of documents. Our key contribution is the use of local granularity and similarity measures to retrieve information. Both at metadata and visual levels is used to speed up the retrieval of subsequent documents within the same domain as well as to improve future query and retrieval of information.
Information, Semantic, Retrieval, Similarity Measure, Local Granularity
STUDY OF INHIBITION OF THE END EFFECT BASED ON AR MODEL PREDICT OF COMBINED DATA EXTENSION AND WINDOW FUNCTION
Pan Hongxia1, Pan Mingzhi2, and Xu Xin1
1School of Mechanical Engineering, North University of China, Taiyuan, China
2 School of Mechanical Engineering, Jinzhong University, Jinzhong, China
According to endpoint effect problem in the EMD decomposition process, a new method of inhibiting endpoint effect is put forward in this paper. The method of data extension and window function predicted based on AR model was used to suppress the problem effectively. Proven by simulation of the simulation signal obtained the ideal effect, then, apply this method to the gearbox test data is also achieved good effect in the process, for the analysis of the subsequent data processing to improve the calculation accuracy. Finally, it lays a good foundation for fault diagnosis of gearbox under various working conditions.
AR Model, Data Extension, Window Function, Empirical Mode Decomposition(EMD), Non-stationary Signal
A STUDY ON THE STANDARD FOR MANAGEMENT OF SEGREGATED BIOMETRIC INFORMATION
Korea Polytechnic University, Prof. ph.D. Republic of Korea
Recently, the entry of the domestic financial institutions is brisk into the Southeast Asian markets and the progress is also being made for export of the financial services and systems by the domestic financial institutions. The demand for biometric authentication service is on a trend of significant increase owing to the advances in new technology such as the Internet of Things (IoT), artificial intelligence and others as well as the expanded use of fin-tech and electronic financing arrangements.The global market size of biometric authentication service is expected to grow to USD 15.1 billion in 2025 from USD 2.4 billion in 2016 (a growth by 6 times, Tractica, “Biometrics Market Forecast”, Feb. 6, 2017). By way of the enactment and propagation of the standard for the authentication method to verify the customers in non-face-to-face transactions by utilizing the biometric data registered by the customers and split to and stored at multiple institutions for distributed management, the contributions can be made to the proactive response to the leakage of biometric data, prevention of the infringement of customer privacy and the activation of the biometric authentication service and its related industries.The purpose of paper is to propose to standardize the international standard such as ISO and IEC for the distributed management technology of biometric data.
Biometric, Registration, Authentication , Certification, Pin-Tech, Financial transactions