Loading...

Proceedings of

3rd International Conference on Advances in Information Processing and Communication Technology IPCT 2015

Date
11-Dec-2015
Location
Rome , Italy
Authors
89
ISBN
978-1-63248-077-4

33 Articles Published

1. CAN SECURITY BE BUILT INTRINSICALLY INTO SDN? (A SURVEY OF EXISTING SCENARIO AND THE WAY FORWARD )

Authors: MANU SOOD , NAVEEN BINDRA

Abstract: In traditional networks, the threats owing to cyber-attacks, Trojans/ viruses, botnet based attacks, DoS/DDoS attacks etc. have posed challenges to the networks around the globe. In SDN scenario, decoupling of control and data planes along with the programmability of control plane have brought flexibility in contrast to existing ossified networks. Most of the limiting factors of traditional networks can effectively be addressed through a relatively new networking paradigm i.e. Software Defined Networks (SDN). The programmability feature of SDN presents opportunities to shape the future networking. However, while proposing new architecture for SDN, security aspects must be given due attention. In this paper, the authors present a snapshot of the existing status of security aspects of SDN and also highlight the issues that are yet to be addressed.

Keywords: SDN, DoS attack, network vulnerabilities, security, security threats, secure SDN architecture

Pages: 1 - 5 | DOI: 10.15224/978-1-63248-077-4-07

2. SMOOTHING WITH MEASUREMENT INFORMATION RETRODICTIONS IN CLUTTERED ENVIRONMENTS

Authors: HYUNG JUNE KIM , TAE HAN KIM , TAEK LYUL SONG

Abstract: This paper presents a smoothing data association algorithm for a single target tracking in clutter. The proposed algorithm fuses the forward estimates and all the available measurement information retrodictions (but not backward track estimates) within the smoothing window to obtain the smoothed estimates. The measurement information retrodictions are obtained using the one-step-backward information filter propagation for fast calculation. The simulation studies show that the proposed algorithm improves the false track discrimination performance with similar root mean squared errors as the existing smoothing integrated probabilistic data association algorithm.

Keywords: Smoothing data association, measurement information retrodictions, false track discrimination.

Pages: 6 - 11 | DOI: 10.15224/978-1-63248-077-4-08

3. IMPLEMENTATION OF A LOW LATENCY MOTION ESTIMATOR FOR HEVC ENCODER ON FPGA

Authors: ESTEFANIA ALCOCER , MANUEL P. MALUMBRES , OTONIEL LOPEZ-GRANADO , ROBERTO GUTIERREZ

Abstract: HEVC is the latest video coding standard aimed to compress double to that its predecessor standard H.264. Motion Estimation is one of the critical parts in the encoder due to the introduction of asymmetric motion partitioning and higher size of coding tree unit. In this paper, a design for an Integer Motion Estimator of HEVC is presented over specific hardware architecture for real time implementation. The implementation shows a new IME unit supporting asymmetric partitioning mode which significantly reduce the overall motion estimation processing time. The prototyped architecture has been designed in VHDL, synthesized and implemented using the Xilinx FPGA, Zynq-7000 xc7z020 clg484-1. The proposed design is able to process 30 fps at Full- HD and 15 fps at 2K resolution.

Keywords: HEVC, video coding, FPGA, motion estimation.

Pages: 12 - 15 | DOI: 10.15224/978-1-63248-077-4-09

4. STUDENTS’ ACADEMIC COUNSELING FROM ATTRIBUTE PRECEDENCE RELATIONS USING EDM

Authors: ARPANA RAWAL , JYOTI SINGH , MAMTA SINGH

Abstract: Educational Data Mining (EDM) techniques play an important role in understanding hidden students’ data patterns to improve the quality of teaching-learning professions. In machine learning, feature selection usually emerges as a preprocessing step to extract necessary and sufficiently small subset of features for predictive / decision-making type of learning tasks. In this study, authors decided to work only upon external (changeable) attributes of students by assigning weights that reflect their academic efforts put in for those attributes. The attribute precedence levels extracted student-wise by current FE model due to academic efforts put up by students in their ongoing course were compared with equivalently generated precedence relations from RELIEF method and it’s variant. The favorable model accuracies of these precedence relations when compared with RELIEF have given a new meaning to EDM objectives in the direction of individual student counseling encouraging them to appraise t

Keywords: EDM, Students’ Academic Performance, Attribute Precedence Relations, Near-Hit, Near-Miss, RELIEF weights.

Pages: 16 - 21 | DOI: 10.15224/978-1-63248-077-4-10

5. A COMPARATIVE ANALYSIS BETWEEN EUROCODE 7 AND CODE OF FORMER YUGOSLAVIA FOR RETAINING WALL DESIGN USING RELIABILITY THEORY

Authors: IVANA KLARIC

Abstract: The design and the analysis of retaining walls are different in different countries depending on the applied rulebooks for geotechnical design. Eurocode7 is the Rulebook which pays a lot of attention to durability, safety and usability of structures and is based on five limit states. The rulebook for the design of geotechnical structures (Official Gazette 1990) which is based on the old regulations of the former Yugoslavia is still in use in the design of geotechnical constructions in B&H. With this paper it is made a comparative analysis of the reliability of the calculation of reinforced –concrete retaining wall according to the EC7 and the old regulations. From the obtained results of reliability of design of capacity and stability, it is clear that EC7 gives a more extensive and more reliable design and it is necessary in B&H to adopt one of the project approaches that it recommends

Keywords: limit states, regulations, analysis of reliability, capacity, stability, project approach.

Pages: 22 - 26 | DOI: 10.15224/978-1-63248-077-4-11

6. COMPREHENSIVE STATE OF THE ART OF BIO-INSPIRED ROUTING IN MOBILE AD-HOC NETWORKS

Authors: AKRAM KOUT , SAID LABED , SALIM CHIKHI

Abstract: In this paper we discuss different biologically inspired routing protocols for Mobile Ad-hoc NETworks (MANETs) and the influence it has on the Quality of Service (QoS) in the system. Bio-inspired routing protocols have made the main focus of the contributions to the field of mobile ad-hoc NETworks. Routing problem in MANETs is due to their unpredictable and dynamic nature and also with few resources (speed and autonomy), that's why bio-inspired algorithms are widely used to design adaptive routing strategies for MANETs. In this article, we present a comprehensive state of the art of bio-inspired routing protocols for MANETs. Besides, we propose some future research directions in this area.

Keywords: Mobile Ad-hoc Networks, Bio-inspired routing, QoS.

Pages: 27 - 32 | DOI: 10.15224/978-1-63248-077-4-12

7. ENHANCING SOFTWARE PIRACY AND INTEGRITY PROTECTION IN CLOUD COMPUTING WITH TPM

Authors: ABOUELMEHDI KARIM , EL AMRANI FATIMA ZOHRA , EL FEZAZI SAID , HEDABOU MUSTAPHA

Abstract: Software as a Service (SaaS) is a kind of *aaS distribution and deployment model in which applications are provided to customers as a service. The applications can run on the user’s computing systems or the CSP’s Web servers. The solution may belong to a software company, which host it among a CSP and offer it as instances to customers. As mentioned [1] software piracy is the major concern of software’s publisher; lot of solution has been set up, but editors still suffer and lot of copies was made or the solution was cracked. Our proposed design demonstrate how software protection can be protected from redistribution and tampering. The aim is to secure instance access through the new specification of TPM 1.2[13] that is time stamping to have the exclusive access to an instance or result of software computation, so only one person can have the access. Besides the new design, combined to the TCCP design [12] protects side channel attacks and/or attacks from the sysadmin.

Keywords: SaaS, IaaS, TPM, Trust Computing

Pages: 33 - 37 | DOI: 10.15224/978-1-63248-077-4-13

8. DESIGNING AND PERFORMING OF SERUM FLOW RATE BY MICROCONTROLLER

Authors: FECIR DURAN , M. RAHMI CANAL , MERAL OZARSLAN YATAK , SABRI KOCER , SERDAL GUVENC

Abstract: Drug injection together with serum to vessel of patient is one of drug treatment (medication) methods. In this method it is necessary that drug must be given on the certain frequencies and within certain dosages during treatment to patient. Therefore serum should be injected to patient by very sensitive systems. In performed study control of serum flow rate was carried out by drop counting method without using another addition piece apart from standard serum sets. Because of control process of flow rate was performed the that way, automatically compressing and losing by engine of serum hose, any physical interference which would be made to serum system was blocked. Hereby more sterile treatment environment was created. Additionally there was provided possibility for more sensitive treatment while user inform is performed by LCD screen which is placed on it.

Keywords: Microcontroller, drug treatment, drop counting method, serum flow rate.

Pages: 38 - 42 | DOI: 10.15224/978-1-63248-077-4-14

9. AN ONLINE CHANGEPOINT DETECTION ALGORITHM FOR HIGHLY CORRELATED DATA

Authors: SEPEHR MALEKI , CHRIS BINGHAM , YU ZHANG

Abstract: An online 2-D changepoint detection algorithm for sensor-based fault detection, is proposed. The algorithm consists of a differential detector and a standard detector and can detect anomalies and meaningful changepoints while maintaining a low false-alarm rate. A new approach for determining a threshold is introduced and the efficiency of the algorithm is validated by an industrial example. It is thereby shown that the proposed algorithm can be used as an early warning indicator and prevent impending unit failures.

Keywords: Fault Detection, FDI, Changepoint Detection

Pages: 43 - 47 | DOI: 10.15224/978-1-63248-077-4-15

10. IMAGE PROCESSING-BASED NON-METALLIC INCLUSION DETECTION FRAMEWORK WITH EXTREME VALUE DISTRIBUTION

Authors: EDIZ POLAT , HUSEYIN AYDILEK

Abstract: Non-metallic inclusions are one of the main problems in steel industry. They are formed by chemical reactions during the steel production process. Non-metallic inclusions have negative effects on mechanical properties of steel. Thus, the detection and the classification of them are very important for the product quality. In this paper, we have developed a sulfide type non-metallic inclusion detection and classification system employing image processing algorithms according to internationally accepted standards. In addition, the system has been analyzed using Gumbel Extreme Value Distributions to predict the expected extreme valued length of inclusion. The system has been tested with AISI 1040 steel as an example, and successful results have been obtained.

Keywords: Image Processing, Non-metallic inclusions, Gumbel, Extreme Value Distribution.

Pages: 48 - 52 | DOI: 10.15224/978-1-63248-077-4-16

11. CELLULAR CROSS-LAYER INTRUSION DETECTION AND RESPONSE

Authors: MD. MOTAHARUL ISLAM , MOHAMMAD RAIHAN KABIR , RIFAT RAHMAN

Abstract: Usage of data through cellular devices are growing exponentially due to the growing popularity of smart phones and tablets. Because of their smaller sizes and reduced capabilities, it is sometimes hard to impose adequate security measures to these everyday used devices. Thus they become a popular target for data theft and misuse. Because of the nature of cellular network various kinds of attack on the cellular devices such as distributed denial-of-service (DDoS) are happening frequently. Conventional security measures for the layered architecture cannot cope with this ever evolving security issue. Thus we have proposed an enhancement of cross-layer design for security in wireless network entitled as Cellular Cross-layer Intrusion Detection and Response (CXIDR). We have utilized the cross-layer design which integrates features from various layers for detecting intrusions in wireless environment and our proposed system enhances performance up to 20%.

Keywords: cross-layer architecture, wireless network, cellular network, intrusion detection system, intrusion response system

Pages: 53 - 58 | DOI: 10.15224/978-1-63248-077-4-17

12. PERFORMANCE OF MOBILE BASE STATION USING GENETIC ALGORITHMS ON NETWORK LIFETIME IN DIFFERENT BASE STATION PATTERNS

Authors: N. M. ABDUL LATIFF , I.S, ISMAIL

Abstract: Wireless sensor network is basically composed of large number of sensor nodes and a base station. The sensor nodes usually are irreplaceable and powered by limited power supply. Taking the fact into consideration, a network should operate with minimum energy as possible to increase lifetime of network for improving the overall energy efficiency. In this work, we proposed a protocol for mobile base station using Genetic Algorithms to find optimal position for base station from predetermined location of base station. The predetermined locations of base station are from three mobility patterns for the base station; random, grid and circle mobility patterns. Simulation results have shown that the normalized network lifetime using grid mobility pattern are higher than random and circle mobility patterns.

Keywords: sensor node; mobile base station; Genetic Algorithms; network

Pages: 59 - 63 | DOI: .15224/978-1-63248-077-4-18

13. SAVING ENERGY BY CHOOSING FAST THE BEST SERVER IN CLOUD DATA CENTERS

Authors: ALBAN AFMETI , AVJOL SAKAJ , IGLI TAFA , VALMA PRIFTI

Abstract: Virtualization technology is being used more recently in order to improve the balance between the performance of a server and its energy consumption. The use of a virtual machine also has many benefits regarding distribution of the resources, and energy aware consolidation scalability, and powerful solutions for data backup and recovery. Server consolidation is one of the ways to reduce the energy consumed in data centers between hardware and software features. During consolidation we should consider some parameters of the servers such as performance, the relation between the CPU and I/O equipments etc. VM allocation and placement are the main issues in consolidation. The work that we have done is that we have rearranging the allocation in a way that saves energy. Finally the simulation and live demonstration results are conspired. The simulation results show the efficiency of this method.

Keywords: Virtualization, Server Consolidation, energy consumption, Data center

Pages: 64 - 67 | DOI: 10.15224/978-1-63248-077-4-19

14. BUILDING GOVERNMENT CONFIDENCE IN THE PUBLIC CLOUD THROUGH IMPROVED SLAS

Authors: FENG CHEN , WALEED ALGHANIM

Abstract: Increasingly governments are using cloud technology to host data and services. However, there is reluctance to place sensitive data in public clouds because of security and privacy concerns. These concerns are related to governance in the public cloud and compliance with laws. When sensitive data is stored in a public cloud, governments lose a certain amount of control. There are two suggested solutions to this problem. Firstly, the use of technology, e.g. encryption; however, this will cancel many benefits associated with the public cloud making it no longer a viable option. Secondly, through the relationship between the government as a customer and the cloud provider; this involves the service level agreements (SLA) which are often standard. Unfortunately, the standards, frameworks and certification schemes that include guidance on the governance of this relationship do not consider the specific needs of government in public cloud use and difficult to customize. Although there is wil

Keywords: e-government, public cloud, sensitive data, SLA

Pages: 68 - 71 | DOI: 10.15224/978-1-63248-077-4-20

15. TOWARDS AN APPROACH TO MEASURE HOW OPEN DATA IS REUSED VISUALIZATION OF OPEN DATA METRICS

Authors: IRENE GARRIGOS , JOSE VICENTE CARCEL , JOSE ZUBCOFF , JOSE-NORBERTO MAZON , LLORENC VAQUER

Abstract: Data economy drives us into a world in which reusing data has an important economical impact. However, data consumer has no enough mechanisms for developing apps that reuse data. A developer is willing to know which is the impact of the data to decide which is consumed within the envisioned smartphone application. One of the best ways of measuring impact comes from the research arena, in which metrics based on citations are provided (such as bibliometrics and altmetrics) to measure the impact of authors, articles and journals. Accordingly, to measure how open data is reused it must be cited. However, data citation is not a common practice and it is quite difficult to obtain metrics of reused data and apps. This paper describes first step of an approach to (i) extract information about used data in app catalogs with scraping and other techniques to compose a metadata database, (ii) compute some metrics to measure the impact of open data sets, and (iii) visualize results to help data con

Keywords: open data, bibliometrics, altmetrics, SOA

Pages: 72 - 74 | DOI: 10.15224/978-1-63248-077-4-21

16. LUMPED RF MODEL OF MOSFET GATE RESISTANCE FOR GHZ+ FREQUENCIES ENHANCEMENT OF COMPACT BSIM MOSFET MODEL

Authors: CHARLES HOGGATT , JAN DIVIN , JOSEF DOBES , STANISLAV BANAS , VACLAV PANKO

Abstract: This paper presents a lumped RF model of high voltage FET applicable for the frequency up to GHz range. Unlike the compact MOSFET model, the proposed solution contains not only parasitic capacitances and resistances but also parasitic inductance. The signal delay caused by relatively large device area including the parasitic resonance modeled by distributed RLC network is considered. The model is applicable in commercial SPICE simulators, e.g. Eldo, Spectre or HSpice.

Keywords: SPICE model, MOSFET, RF, parasitic, RLC network, high frequency, GHz, simulation

Pages: 75 - 79 | DOI: 10.15224/978-1-63248-077-4-22

17. MULTICHANNEL EEG SIGNAL ACQUISITION AND MULTIWAVELET BASED EMOTION RECOGNITION USING BCI

Authors: JOGESH MOTWANI , SHANTALA C P

Abstract: This paper aims to recognize emotion through EEG. The EEG signals are acquired from the wireless wearable 8- channel Enobio device for the emotions such as smile and anger. The acquired EEG signals are processed to recognize selected emotions. The features like mean, standard deviation, median, entropy, variance, minimum, maximum and skewness have been extracted from sub-signals obtained by multiwavelet decomposition of EEG signals. These features are used as an input to support vector machine (SVM) for classification of human emotions. The proposed method has provided classification accuracy of 87.5% using SVM.

Keywords: EEG, Multi-wavelet, SVM, BCI

Pages: 85 - 89 | DOI: 10.15224/978-1-63248-077-4-24

18. DBR-EC: A NEW ROUTING PROTOCOL BASED ON DBR APPLYING ENERGY CRITERIA

Authors: DALADIER JABBA , DANIEL CONTRERAS , PAUL SANMARTIN , PEDRO WIGHTMAN

Abstract: Routing protocols in underwater wireless sensor networks (UWSNs) require the consideration of several aspects such as energy consumption, amount of packets delivered successfully (packet delivery ratio), network topology and propagation delay during the data transmission process. Once a wireless sensor network is deployed under water, it will be really difficult and costly to recover them for later battery repositions, mainly due to the issue that their location may not be accessed. For this reason, it is important to have a routing protocol that guarantees a long life time of the UWSN and also optimizes the use of the network by improving not only the network energy consumption but also the packet delivery ratio. In this paper a new routing protocol named DBR applying Energy Criteria (DBR-EC) is presented. This protocol is an improvement of the DBR protocol [1] by applying criteria of energy saving in each node that belongs to the network. DBREC guarantees a longer life time than othe

Keywords: Propagation delay; packet delivery ratio; energy consumption; routing protocol; Underwater Wireless Sensor Networks; UWSN

Pages: 90 - 95 | DOI: 10.15224/978-1-63248-077-4-25

19. THREE-WAY DATA RECOMMENDATION METHOD AND APPLICATION

Authors: LINYAO TANG , DAVID CHAVES-DIEGUEZ

Abstract: Nonnegative Tensor Factorization has previously been used in many multi-way data analyses. We use NTF model to do personalized paper recommendation. For recommendation, we analyze four different multiplicative algorithms for NTF based on different decomposition models and different optimization functions. On one hand, one part of algorithms use CP decomposition, the other part use Tucker decomposition. On the other, half of algorithms minimize the least squares error while the others minimize the Kullback- Leibler divergence. Further, we also compare recommendation performance with different rank NTFs. From our experiments, nonnegative Tucker decomposition based on KL divergence has the better result, and to some extent, lower rank NTF can get most of information from dataset.

Keywords: personalized recommendation, sparsity, tensor factorization, multiplicative update

Pages: 96 - 100 | DOI: 10.15224/978-1-63248-077-4-26

20. DETAILED ESTIMATION OF BATTERY LIFE IN A WSN DEPLOYMENT IN THE FIELD

Authors: FELIPE GIL-CASTINEIRA , DAVID CHAVES-DIEGUEZ

Abstract: This document presents a detailed analytical and practical method for the estimation of battery life expectancy of a multi-hop mesh network. This network is composed by a set of MicaZ nodes using the XMesh routing protocol. The energy drawn for each of the tasks performed by the nodes is measured, and network topology and radio propagation are characterized in order to obtain accurate predictions of the lower bound for the battery duration of the nodes. This estimation is of paramount importance for field deployments, where energy is a scarce resource and replacing node batteries is a slow and costly process that can disable the network for relatively long periods of time.

Keywords: WSN, battery, power, MicaZ, XMesh

Pages: 101 - 109 | DOI: 10.15224/978-1-63248-077-4-27

21. URBAN REDEVELOPMENT AND ENERGY SAVING THE CASE OF THE INCENTIVES IN ITALY, BETWEEN RISKS AND OPPORTUNITIES

Authors: C.GARAU , G. BALLETTO , G. DESOGUS , G. MEI

Abstract: Building construction consumes energy and materials. Even if the scientific community has developed two main voluntary protocols of building construction evaluation (BREAM and LEED), the authors argue that one of the main factors that could be incisive for a better environmental sustainability is to stimulate all possible initiatives, including the reuse of recyclable building materials, that currently, is a modest application. Based on this, the paper is organized in two parts. The first is an analysis of the Italian situation with regard to urban redevelopment and energy saving, considering the number of intiatives and costs handed out for each region. The second evaluates and proposes new insights on the basis of the obtained results.

Keywords: urban development, energy saving, Italy, building construction evaluation

Pages: 110 - 114 | DOI: 10.15224/978-1-63248-077-4-63

22. PERFORMANCE OF CONVOLUTIONALLY CODED UNDERWATER ACOUSTIC AD-HOC NETWORKS

Authors: ANDREJ STEFANOV

Abstract: The paper considers the performance of underwater acoustic ad-hoc networks. A uniform distribution of nodes over a finite area is assumed. The node-to-node channel is modeled through the Ricean fading model. The paper adopts a communication theoretic approach and studies the impact of point-to-point convolutional channel coding on the sustainable number of hops through the network. Numerical examples are presented to illustrate the results of the analysis.

Keywords: underwater acoustic networks, fading

Pages: 115 - 118 | DOI: 10.15224/978-1-63248-077-4-75

23. ELECTROMYOGRAPHY BASED ANALYSIS ABOUT ERGONOMIC RISK FACTORS OF UPPER EXTREMITY DISORDERS

Authors: GULSAH KINALI , MUSTAFA SELMAN YILDIRIM , SADIK KARA

Abstract: Repeated movements of upper extremities cause to overuse injuries however, it is really challenging to determine which of them do so. Primary aim of the project is to determine the effect of different shoulder positions on gripping capability of hand and electro physiologic activity of upper extremity muscles. 23 case report data which have ages ranging between 18 and 30 are analyzed. According to our results, as the shoulder flexion increases, muscular activity and depending on this the muscular exhaustion also increases whereas the functional quality of hand decreases. The case is both a risk factor for an occupational disease and a situation that decreases skillful functioning of hands. For the next researches, advantages of exhaustion reducing apparatus and ergonomic systems, which can be used during works requiring over shoulder movements, are EMG results.

Keywords: Ergonomy, electromyography, musculo skeletal disorder, overhead work, signal processing

Pages: 119 - 121 | DOI: 10.15224/978-1-63248-077-4-94

24. DYNAMIC URBAN ROAD DETECTION AND VEHICLE VERIFICATION FOR VEHICLE DETECTION

Authors: INSU WON , JANGWOO KWON , OKMIN LEE, , SANGMIN LEE

Abstract: This paper presents a vehicle detection system for urban roads comprising dynamic road detection, moving object detection using background subtraction, and vehicle verification with vertical asymmetry measurement. The proposed system shows better performance than Gaussian mixture model at detecting vehicles on the road.

Keywords: vehicle detection, vehicle verification, dynamic road detection, perspective mapping, Gaussian mixture model

Pages: 122 - 125 | DOI: 10.15224/978-1-63248-077-4-95

25. BIG DATA MIGRATION FOR TELECOM BUSINESS SUPPORT SYSTEMS

Authors: IOAN DRAGAN , RAZVAN DANIEL ZOTA

Abstract: Migrating data in Business Support Systems is never an easy job even when changing only one component. Migrating to a cloud solution that has limited flexibility in data structure needs more than a simple data migration approach. Multiplying that several fold, since each customer has its own data source, it requires an automated data recognition and migration methodology. Machine learning is an answer to data recognition, but applying it on data structures still requires some future development.

Keywords: business support systems, bss, bigdata, Hadoop, machine learning, data migration

Pages: 126 - 129 | DOI: 10.15224/978-1-63248-077-4-96

26. ON TESTING SAFETY PROPERTIES OF SYNCHRONOUS FSM COMPOSITION

Authors: MAXIM GROMOV , NINA YEVTUSHENKO

Abstract: This paper studies the safety issues of the synchronous composition of Finite State Machines (FSMs). Synchronous FSM composition is widely used when designing and analyzing various aspects in hardware implementation including so-called Trojan subcircuits. When an external input sequence is applied and component FSMs cannot agree on matched internal actions or there are different matching options, the sequence can destruct or block a corresponding device and thus, should be clearly avoided. In this paper, we propose a formal approach for analyzing which external input sequence can induce such situations (if any) and then to derive a finite automaton that represents the set of all possible safe external input sequences

Keywords: Finite State Machines (FSMs), synchronous FSM composition, safety properties.

Pages: 130 - 133 | DOI: 10.15224/978-1-63248-077-4-97

27. WHAT THE WHITE GOODS SECTOR SHOULD UNDERSTAND IN ORDER TO JOIN THE INTERNET OF THINGS ECOSYSTEM IN THE CONNECTED HOME

Authors: CARLOS ALBERTO LOPEZ CASTANO , LUIS FERNANDO CASTILLO OSSA

Abstract: The implications of the Internet of Things (IoT) regarding business can be observed under multiple perspectives. Some of these perspectives involve the development of new products, innovation, inter-firm collaboration or competition. However, in this research, the problem is analysed from the perspective of the IoT ecosystems in the connected home, which tries to identify the element structure in order to maximize the information value creation for the white goods sector. This document explores the evolution of the Internet of Things in the home with a business focus point in terms of information value. This is based on an extensive review of literature while analysing the phenomena incidence of industry and organizations. Likewise the challenges and opportunities that the household appliance companies represent are visualized, the business model framework is used in order to contextualize the problem, find a knowledge gap and integrate the stakeholders conceptions about the Internet o

Keywords: Internet of Things, White, Goods

Pages: 134 - 140 | DOI: 10.15224/978-1-63248-077-4-98

28. NEW ANALYTICAL SOLUTIONS FOR A GENERALIZATION OF THE ITO EQUATIONS

Authors: AMNAH.S.AL-JOHANI

Abstract: ln this work, we take into consideration the Ito equations.Truncated Painleve expansion and the homogeneous balance method are extended to search for Backlund transformation for the Hirota-Satsuma equations.Moreover,the solutions obtained for these equations in this work are utilizing a new ap- proach.

Keywords: analytical, Solutions, generalization, equations

Pages: 140 - 153 | DOI: 10.15224/978-1-63248-077-4-99

29. ANALYSIS OF DEVELOPMENT PRODUCTIVITY IN INFORMATION SYSTEM ADAPTIVE AND PERFECTIVE MAINTENANCE

Authors: KAI HUANG, LI LIU , XIAOYING KONG

Abstract: This paper presents a development productivity model for Information System (IS) adaptive/perfective maintenance process. The modelling approach is from economic perspective. The productivity model considers the economic value of the maintenance activity, pre-committed fixed cost and variable cost consumed in adaptive/perfective maintenance. Factors that influence the productivity are analysed using simulation. The simulation provides a tool for IS project managers to tune the project parameters to obtain the optimal productivity in adaptive/perfective maintenance.

Keywords: economic model, maintenance, productivity, software maintenance management, simulation

Pages: 154 - 158 | DOI: 10.15224/978-1-63248-077-4-100

30. TRANSITIVE ASSOCIATIONS FOR DOMAIN TRANSFER PROBLEM ON OPINION MINING

Authors: YILMAZ AR

Abstract: Classification algorithms need labeled examples to train their model. However there are not enough labeled examples in some domains. There is an approach that training a classifier in one domain and use it to classify examples on different domains. This method is not always successful and this is called domain transfer problem. Spectral Feature Alignment is proposed as a solution to this problem [3]. In this study I investigate this algorithm with a demonstrative example and I do classification experiments on randomly created datasets. Support vector machines are used as a classification tool and the aim of the experiments is to find the impact of the spectral feature alignment on the classification accuracy. Based on the results of these experiments, I will discuss the possible research opportunities on this area.

Keywords: —opinion mining, spectral feature alignment

Pages: 159 - 165 | DOI: 10.15224/978-1-63248-077-4-101

31. COMPARING GRAPH AND RELATIONAL DATABASE MANAGEMENT SYSTEMS FOR QUERYING DATA WAREHOUSES

Authors: ANA PAJIC , ELENA MILOVANOVIC

Abstract: Businesses face the problem of processing extremely large amount of data every day. Finding and analyzing relationships between enormous set of connected data will be the key to successful business. Thus, our work discusses graph databases which are designed for dealing with densely connected data. The paper is focused on comparing Neo4j graph database and traditional Oracle relational database for querying data warehouses. The first results show that Neo4j graph database better deals with more complex questions when amount of data increases, which is very important for multidimensional analysis. Moreover, the query performance does not depend on graph dimensionality but only on size of subgraph covered by query.

Keywords: big data; data warehouse; graph database; query performance; multidimensional analysis

Pages: 166 - 171 | DOI: 10.15224/978-1-63248-077-4-120

32. DATA MINING METHODS FOR HEALTH MONITORING IN SYSTEMS BASED ON WEARABLE SENSORS

Authors: KRISTINA PODERIENE , LIEPA BIKULCIENE

Abstract: The ITEA2 project CareWare approach efficiently perform sensor data processing and data fusion in order to visualize the holistic view of user’s health status personalized, intuitively and trustworthy way and give feedback for user about individualized intensity and time of exercising control. The ranks of Hankel matrix and second order coherence matrices for describing complexity of ECG and relationship between parameters of ECG also is informative method for evaluation of the physiological state.

Keywords: wearable sensors, physiological state, complex systems.

Pages: 172 - 175 | DOI: 10.15224/978-1-63248-077-4-126

33. COMPARATIVE STUDY ON TECHNIQUES OF IPV6 HEADER COMPRESSION IN 6LOWPAN

Authors: RUCHI GARG , SANJAY SHARMA

Abstract: Low-power wireless personal area network (LoWPAN) consists of large number of resource constraint devices connected over a wireless link with the aim of gathering real time information and transmitting it to desired application and vice versa. This requires transmission of IPv6 packets over Low-power wireless personal area network and is called 6LoWPAN. The large sized headers like IPv6, TCP, and UDP consume most of the packet space leaving only 28 bytes for actual payload. MTU of 802.15.4(IEEE standard for wireless network) is only 127 bytes much less as compare to IPv6 packet which is of 1280 bytes. Hence Header compression and fragmentation becomes a necessity in 6LoWPAN so as to provide reasonable number of bits for payload. This paper depicts 6LoWPAN protocol stack and various header compression techniques for compressing IPv6 header. It also shows comparison among various techniques on the basis of total number of bits needed in compressed IPv6 header under various scenarios.

Keywords: 6LoWPAN, header compression, IPv6 header, adaptation layer, fragmentation

Pages: 34 - 38 | DOI: 10.15224/978-1-63248-099-6-33

Popular Proceedings

ICETM 2023

9th International E-Conference on Engineering, Technology and Management

ESSHBS 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ASET 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022

8th International E- conference on Engineering, Technology and Management

ACSEE 2019

8th International Conference on Advances in Civil, Structural and Environmental Engineering