A Case Study: Incorporating Parallel and Distributed Computing into Computer Science Curriculum
Abu-El Humos, A.; Hong, S.; Pei, T.; Aljawfi, O. (United States)
ABSTRACT:
Recent technology advances in parallel computing such as multicore CPUs,
GPUs, and their driving software require a well-prepared workforce to
support this demanding and fast changing industry. Parallel and Distributed
Computing (PDC) education for computer science and computer engineering
majors will play a major role in preparing well trained graduates to
join this workforce. In this work, we share past and future plans to
update the computer science curriculum at Jackson State University (JSU)
with PDC modules. As part of this effort, some of the NSF/IEEE-TCPP
curriculum initiative on PDC modules were integrated into department-wide
core and elective courses offered in both fall and spring semesters.
These courses were: CSC 119 Object Oriented Programming (core) [2, 4,
6, 9], CSC 216 Computer Architecture and Organization (core) [3, 5,
9], CSC 312 Advanced Computer Architecture (core) [3,5], CSC 325 Operating
Systems (core) [6, 9], CSC 350 Organization of Programming Languages
(core) [9], CSC 425 Parallel Computing (elective) [1, 2, 6] , CSC 499
Special Topics: Data Mining (elective) and UNIV 100 University Success
course, which is a university-wide class offered for all JSU majors.
In an effort to update the contents of the UNIV 100 course, some contemporary
PDC topics and their essence in higher education were incorporated into
this course. The inclusion of the PDC modules was gradual and light
weighted in the lower level courses and more aggressive in the higher-level
courses to let the students easily grasp PDC concepts. Specific test
questions, homework assignments and projects were developed to assess
students’ performance.
A Simple Sparse Representation-Based Method for Improving the Boundaries Definition among Segmented Regions from Grey Level Digital Images
Leal, Nallig; Zurek, Eduardo (Colombia)
ABSTRACT:
Segmentation is an important intermediate task in digital image processing,
which tries to isolate the objects of interest in an image, to extract
invariant descriptors to orientation, location, and size for classifying
or recognizing such objects from these descriptors. However, this is
a non-trivial task because normally the limits between regions may be
neither clear or well defined. This paper presents a novel method for
improving the boundaries definition among segmented regions from a digital
image. Our method, from a label matrix of segmented regions and the
original image, yields a new improved label matrix in which the limits
among regions are better defined according to the ground truth segmentation.
To determine if a pixel belongs to its assigned region, we build a patch
around the pixel and build dictionaries from the patches of the regions
that border such a pixel; then, we run sparse coding on each dictionary
to find the sparse representation of the patch that contains the pixel.
The pixel is assigned to the region whose dictionary best represents
the patch that contains the pixel. Processing of patches instead of
pixels makes our method robust to noise, outliers, and blurring. Numerical
results validate our method.
A Technique for Program and Project Portfolio Prioritization: RAB2/E Matrix
Moraes, Altino José Mentzingen de (Brazil)
ABSTRACT:
The propose of this paper is to present some Techniques those can be
use as tool for Program and Project Portfolio Prioritization according
the aspects of the solution to be build and external facts that can
be perceived. After that, any Project Management Methodology – such
as PMBoK© [1], PRINCE2® [2] and ZOPP [3] – can be applied to control
the tasks which have to be done. Beyond this propose, also this article
introduces a new Technique as an extended version of Matriz RAB
- Rapidez, Autonomia e Benefício (RAB Matrix - Rapidity, Autonomy
and Benefit) [4] which will be called as “Matriz RAB2/E
- Rapidez, Autonomia e Benefício / Estendida” (“RAB2/E
Matrix - Rapidity, Autonomy and Benefit / Extended”).
An Artificial Intelligence Tool for Accessible Science Education
Watters, Jacob; Liu, Chao; Hill, April; Jiang, Feng (United States)
ABSTRACT:
One of the leading issues in accessible science education is creating
a laboratory workspace accessible to blind students or students with
visual impairments (VI). Although such students can be involved in the
science lectures, they are rarely active in the laboratory where more
hands-on work and spatial awareness are needed. This marginalization
of Students with VI in science laboratory work prevents them from being
active learners in the laboratory. Current approaches to solve this
problem focus on providing different accommodations such as relying
on sighted lab partners to complete the hands-on work. However, while
the accessibility of the laboratory work is improved, students with
VI remain passive learners. In this paper, we propose a new artificial
intelligence (AI) tool developed with natural language processing (NLP)
techniques and the Amazon Alexa Skills Kit (ASK). This AI tool can be
used as a “virtual assistant” in the lab. In combination with other
access technologies and tools, the VLA will allow students with VI to
perform the lab tasks by themselves. A demo software called the “Virtual
Laboratory Assistant (VLA)” has been released, which can be launched
by a smartphone or computer in the laboratory workspace to assist the
lab process and control other electronic devices, thereby creating a
more accessible lab environment. We believe that such an AI tool promotes
the inclusion of learners with VI and has the potential to be helpful
for any accessible science education work.
An Exploration of the Concept of Tradition in Relation to Complexity, Informatics, and Cybernetics
Nugent, Paul D. (United States)
ABSTRACT:
As our world becomes more secular, rational, and bureaucratic, tradition,
as a means to pass knowledge, skills, norms, and beliefs, etc. from
one generation to the next seems to be losing its power. Indeed, as
management fads embrace continuous improvement and change, and political
philosophies seek secular equality, authenticity and freedom, tradition
is often framed as an impediment or obstacle to these goals. But a closer
examination of tradition and its cybernetic and informational dynamics
shows us that these perspectives miss some of the more fundamental roles
of tradition in modern institutions and in society.
While there are many definitions of tradition, its etymology reminds
us that at its core it involves “trans” some kind of transmission
in conjunction with “dare” or a kind of giving [1]. It is,
therefore, a giving across and is typically associated with
giving across time, especially from one generation or group to another.
In a sense, it means that at any given time a group or individual is
not starting from scratch with their own isolated biographies and experiences
but are being handed down, in various ways, valuable beliefs,
practices, skills, and knowledge.
This provides a context within which to think about tradition’s role
in modern life and in modern institutions.
[1] etymonline.com/word/tradition, retrieved December 12, 2019.
An Optimal Deep Learning Approach for Classification of Age Groups in Social Network
Swain, Anil Kumar; Balabantaray, Bunil Kumar; Rout, Jitendra Kumar; Satpathy, Suneeta (India)
ABSTRACT:
There is huge amount of data in social networks, where people post their
opinion on a topic, or share their information. But people often don’t
provide their personal data, like gender, age and other demographics.
Research can be done on this data to develop applications of sentiment
analysis, but the success rate is restricted by the number of words
in the dictionaries as they do not consider all the words which reflect
the sentiment in our messages as most of the communication on social
networks is non-standard language with small messages. Moreover, with
contemporary technology it is quite easy to create profile with false
age, gender and location which provides criminals an easy way to deceive.
Thus we can analyze the text messages posted by the user on social network
platform. As per the research done so far, age is one of the important
parameter in the user profile which reveals the important information
about the typical behavior among same age group users. An analysis is
done with more than 4000 tuples which contains relevant parameters like
number of friends, length of message, number of likes, number of hash
tags and comments are considered for the classification. In this study,
we use the user profile information for the prediction of age group,
which we collected using Facebook API. In this project we classified
the users into two age groups teenagers and adults using different Machine
learning algorithms like deep convolutional neural networks, Multilayer
perceptron, Random forest, SVM and Decision trees. Among all these algorithms
deep convolutional neural network stands out to be the best among all
of them reaching the best performance with an accuracy of 94%.
Artificial and Natural Development Systems
Korzhova, Valentina N.; Ivanova, Natalya V. (United States)
ABSTRACT:
The paper presents the main notions, mathematical models, and applications
of the novel branch of mathematics and its applications of Artificial
and Natural development systems.
Automated Compliance Analysis of Digital Building Models to Brazilian BIM Regulatory Framework
Soares, Bruno Cesarino; Baracho, Renata Maria Abrantes; Porto, Marcelo Franco (Brazil)
ABSTRACT:
Building Information modeling (BIM) can be used in a variety of ways
to support real estate management. BIM models are the product of a comprehensive
digital design process, serving as the basis for representing and storing
a large amount of data and information about a real estate investment
project, which can be new construction, renovation, expansion, acquisition
or even the renting of a building. These digital building models are,
therefore, excellent sources of information for performing analysis
and simulations, such as the one proposed in this article. Recently,
technical standards have been created in Brazil to guide Architecture,
Engineering and Construction (AEC) representatives, as well as public
officials, regarding the use of BIM in new projects. An information
portal on the Brazilian dissemination strategy for BIM has been created,
as well as a national BIM library, which contains digital components
uploaded by qualified suppliers and vendors, available for entrepreneurs
to download and use in their projects. The analysis proposed here uses
an automatic evaluation of real estate projects, represented as BIM
models. These models are verified in relation to the Brazilian regulatory
framework on BIM. This process aims to conduct a compliance assessment
of digital building models based on the appropriate use of BIM components
in accordance with the construction information classification system
prescribed by the Brazilian technical standards. An evolutionary prototype
was then implemented as an extension application to run within a BIM
platform. This application is designed to perform a rule checking process.
Rules are defined from Brazilian BIM regulations, and their compliance
is are verified from information retrieved from BIM models, which range
from generic components to families of objects supplied by the manufacturers
themselves, including the stages of execution of the work. Thus, the
various levels of detail of the information obtained from the assessment
of BIM models are very useful for real estate management, and from them
it is also possible to generate some indicators to be used, for example,
in the context of smart buildings and smart cities.
Cloud Security Threats, Statics and Mitigation Plans
Al Hammoshi, Mayyada; Khan, Farhana (United States)
ABSTRACT:
Cloud computing is a fast-growing technology that will continue to grow
up due to its impact on every life joint. Cloud computing threats, attacks
and vulnerabilities paralyzes and equals this fast-growing. Big companies
allocated high portions of their budged on securing their confidential
data as it will be shown later in the paper. In this paper we will present
a classification on the cloud security attacks by showing the most vulnerable
threats in numerical values and statistics with naming the most serious
cloud security threats. We then offered defense lines and layers to
protect cloud assets from these vulnerabilities. Finally, we showed
the human contribution in the cloud security threats and how can we
educate the user to reduce these attacks.
Concept Design of Estimation Scheme for Social Graph Based on Occupancy Time in Space
Ushiyama, Akari; Miwa, Yukina; Osaki, Shotaro; Yamada, Yuki; Naito, Katsuhiro (Japan)
ABSTRACT:
Recently, education institutes have to take care of students to avoid
repeating a year or dropping out. For these purposes, human relations
among students is an important factor. Since human relations dynamically
changes, continuous recognition of students is required. Indoor positioning
methods are candi- date technology to track students with cheap wireless
devices. Bluetooth, WiFi, and IEEE 802.1.5.4 are usually used for the
service because of the decreasing costs of the devices. Bluetooth Low
Energy (BLE) is the low energy standard of Bluetooth and is suitable
for long operation with a battery. This paper proposes a concept design
of an estimation scheme for social graph based on occupancy time in
space. The proposed scheme uses a BLE beacon to track each student and
recognizes a student share time in the same space. It also estimates
social relations among students. The main target of the scheme is to
find lonely students who do not have any relations with other students
and to take care of them. We have developed a prototype system for tracking
BLE beacon and estimating a location according to Received Signal Strength
(RSS) value from the BLE beacon.
Construction Quality Control of Dams: Software Modeling for Geotechnical Data Visualization
Buitrago Frainz, Gabriela; Franco Porto, Marcelo; Matos de Almeida, Vinícius; Ananias de Mendonça, Antônio; Abrantes Baracho, Renata Maria (Brazil)
ABSTRACT:
The hereby paper aims to present the modeling of a data visualization
module of construction quality control applied to dams, in a geotechnical
information management software. The types of dams studied are presented,
as well as the importance of monitoring the construction of compacted
embankments, which occurs, within the scope of geotechnics, from the
execution of tests – field and laboratory – in soils, object of analysis
of this work. The tests result in geotechnical parameters, studied from
the visualization of the data on maps, result of modeling and subsequent
prototyping of the model using Visual Basic for Applications (VBA),
in Excel software, based on the definition of the software requirements
and the idealization of the solution. The algorithms developed are then
applied to a set of data from a dam under construction. The information
obtained from Geolabor, geotechnical data management software, results
in: maps that illustrate the distribution of the tests performed, indicating
the representativeness of the technological control; and specific chloropletic
maps for each geotechnical parameter, indicating by color the intervals
of occurrence of the values.
Cybersecurity and Risk Assessment
Blair, Risa (United States)
ABSTRACT:
Weebly is the cloud-based website building tool that will serve as the
basis of this evaluation of a software system and the cybersecurity
risks associated with it. Weebly is a free tool with a professional
version option. The tool is based on Linux, and although it is quite
stable, some security breaches have been reported over time. This paper
will explore known security breaches as well as potential breaches based
on current research available in the information technology and computer
security realms. The database behind the scenes is the most likely to
be attacked by hackers, as there is quite a bit of confidential customer
and business data available. Users and website builders are storing
their business information, personal data, and perhaps even their clients’
data on the cloud. Much is entrusted to Weebly to maintain strong security.
When using software in the cloud, the end user needs to have shared
responsibility for maintaining security best practices.
Detection of Ascorbic Acid, Acetaminophen and Caffeine - Can It Occur Simultaneously Using Electrochemistry Techniques and Bare Electrodes?
Lunsford, Suzanne K.; Richardson, Marlee; Muran, Kai (United States)
ABSTRACT:
The electrocatalytic oxidation of ascorbic acid, acetaminophen and caffeine
will be detected by differential pulse voltammetry (DPV) but not simultaneously.
There will be comparison of the different bare electrode materials carbon,
platinum and gold response to the various organic compounds. This study
has engaged undergraduate students into problem solving the organic
structure of various compounds integrated with redox chemistry to analyze
by electrochemistry techniques that are selective and highly sensitive.
Electronic Cane Supported with Artificial Vision
Molina, Cristian; Condo, Jonathan; Saeteros, Morelva; Caiza, Gustavo (Ecuador)
ABSTRACT:
Visually impaired people often use a white cane to improve their mobility.
The electronic cane was created with the aim to increase the capabilities
of traditional canes and thus enhance the people´s move and safety.
This device features the following characteristics: (i) an obstacle
detection system that vibrates to indicate the distance of the object,
(ii) a location system using a Global Positioning System (GPS) and a
Global System for Mobile Communication (GSM) that sends a message with
the location of the person in real time. When opening the message, the
contact receives the link that binds with Google Maps. The system also
includes an artificial vision system for identifying the information
and signage set in the surrounding places to improve orientation with
audio indications that guide people in safe places. The tests were applied
on students with visual impairments of the UNESCO Chair at the Salesian
Polytechnic University where a total validation percentage of 89% was
obtained for the use of the electronic cane compared to the traditional
cane.
I Don't Always Spread Disinformation on the Web, but When I Do I Like to Use Memes: An Examination of Memes in the Spread of Disinformation
Williams, Andrew; Dupuis, Marc (United States)
ABSTRACT:
Social media has become a potent vector for the spread of disinformation.
Content initially posted by bots, trolls, or malicious actors is often
picked up and magnified by ordinary users, greatly extending its influence
and reach. In order to combat disinformation online, it is important
to understand how users interact with and spread this type of content,
unwittingly or not. We studied patterns in the sharing of propaganda
and disinformation on social media through political image-based memes.
We chose a selection of six memes, and conducted a survey in order to
better understand the behavior of ordinary users as they interact with
propaganda and disinformation on social media. Particular attention
was paid to differences based on political affiliation and psychological
factors, including personality and trait affect. Negative types of affect
appear to dominate the level of engagement Republicans and Independents
have with memes, while positive types of affect and extraversion do
the same for Democrats.
Integrating Semantic Web Technologies into Undergraduate AI Curriculum
Zlatareva, Neli (United States)
ABSTRACT:
Semantic Web is one of the most inspirational and exciting successes
of Artificial Intelligence in the last decade. It redefines our understanding
of how to represent and process knowledge, and how to maximize its role
in our everyday lives. Beyond its commercial success, Semantic Web is
a fertile domain for AI education allowing us to revisit some of the
core topics in an undergraduate AI course such as knowledge engineering,
representation and reasoning.
This paper describes our experience with introducing a hands-on project
utilizing the latest Semantic Web technologies to teach Ontological
Engineering and Description Logics to computer science majors at undergraduate
level. Our motivation was not to replace established AI curriculum,
but to illustrate the evolving understanding of AI from a stand-alone
problem solver into a network of intelligent agents working in cooperation
and serving as equal partners to humans in a variety of applications
built on the top of the Semantic Web. Initial assessment of the pedagogical
value of this project suggests that it enhances students’ understanding
of the core AI topics, boosts their engagement and interest in the course,
but more importantly introduces them to the most prominent field of
applied AI for the years to come.
Integration of Information to Support Projects Decision Making
Baracho, Rodrigo; Baracho, Renata Maria; Mattos, Max (Brazil)
ABSTRACT:
This article is a partial result of ongoing research in the Postgraduate
Program in Knowledge Management & Organization of UFMG (Federal University
of Minas Gerais - Brazil), which requests a model of integrating project
management information for decision making in projects of engineering.
Projects involve software such as ERP, MS Project, Solid Works / AutoCAD
/ Inventor / E-Plan and Outlook, and engineering companies have problems
achieving interoperability between them. Up-to-date, accurate information
available to everyone involved in an engineering project is crucial
to its success. To propose the construction of the model needs to identify
the variables of cultural and technical barriers that may interfere
with the integration of this information. In this first stage, a bibliographic
study to evaluate the cultural and technical aspects is performed to
propose a model overcoming these barriers. The main objective of this
paper is to identify technical and cultural barriers to the integration
of information in project management. This paper presents the literature
review to identify related works and state of the art on this subject.
The literature review will describe the variables that compromise the
integration of this information. Research is conducted on the Web of
Science to identify barriers such as misinformation, delays in finding
information, dissemination of information, integration of information,
and use of information by project staff in companies using software
mentioned above. This research is expected to optimize the engineering
project management.
Interactive Effect of Information Systems and Instructional Systems Design on Digital Leadership Training Development
McKay, Elspeth *; Jamaludin, Rozinah ** (* Australia, ** Malaysia)
ABSTRACT:
This paper explores the relationship between information systems (IS)
and instructional systems design (ISD) to innovate an extended Baldridge
Performance Indicator (BPI) model for developing massive open online
courses (MOOCs). The project is part of an ongoing collaborative research
project between the Universiti Sains Malaysia, Penang and RMIT University,
Melbourne, Australia, to design and implement online digital leadership
training modules for the Malaysian higher education leadership academy
(AKEPT). To date, the education sector has been slow to adopt the BPI
for academic performance recognition. This paper presents a work in
progress that highlights the importance of designing effective training
ePedagogies, which promote good digital leadership skills based on four
MOOCs modules: vision, mission and values; digital workforce environment;
digital workforce engagement; and ethical digital leadership behavior.
The extended BPI model will enable accurate measurement of visionary
academic digital leadership, such as: (1) definition and application
of key knowledge and concepts; (2) independence, self-determination,
self-teaching and self-motivation; (3) problem-solving, thinking and
computing skills; (4) strong ethical characteristics and values; (5)
awareness of societal, health, safety, legal and cultural issues; and
(6) recognition of the need to undertake life-long learning.
International Cybercrime Law Comparison
Blair, Risa (United States)
ABSTRACT:
Cybercrime laws vary from country to country. However, based on the
research, the United States appears to be well ahead of India and Nigeria
in terms of managing the cybercrime and cybersecurity ecosystems. India
and Nigeria have developed laws which appear to evolve from cybersecurity
law developed by the United States. Although cybersecurity laws in India
and Nigeria are in place, they were developed far later in the game
than what was provided by the United States. Additionally, the United
States has HIPAA and SOX, and there do not appear to be clear laws in
place in India or Nigeria that align with these specific laws. What
is particularly impressive about India is its futuristic National Cyber
Security Policy 2013, which presented guidelines about future cybersecurity
development, research, and protection. Neither the United States nor
Nigeria had what appeared to be an equitable document. However, it does
seem that the United States has the most in the way of resources to
resolve cybercrime and cybersecurity issues. Additionally, the United
States has been involved in developing laws to manage cybersecurity
far longer than either India or Nigeria. As time moves forward, one
can only hope that the world will catch up with the international law
and technology aspects concerning cybersecurity and cybercrime.
Monitoring Network for Nuclear Research Laboratory Using WSN and IOT Devices
Rocha, Kaio; Costa, Matheus; Savoine, Marcia (Brazil)
ABSTRACT:
This work presents a proposal of implementation of an automatic monitoring
system for environments who does experimentation and manipulation of
ionizing radioactive particles, having as a base scenario the structures
off nuclear energy research laboratories through sensors coupled to
integrated microprocessor circuit boards, to carry out the communication
between the sensors a Wireless Sensor Network with star topology was
raised by resorting in the Internet of Things paradigm. For the network
security, the concept of layered access level was applied, specifically,
access level according to the criticality off the process and environment
whose the sensors are exposed to.
Overview of Basic Network Services Using IPv6-IPv4 Translation as Transition Mechanism
Ospina Bedoya, Daniel; Santiago Cely, Claudia Patricia (Colombia)
ABSTRACT:
Transitioning from a perfectly working network to IPv6 can be an intimidating
challenge. This paper aims to evaluate, describe and present the current
technologies used for IPv6-IPv4 translation, as it is one of the most
mature, simple and reliable mechanisms to implement IPv6 in a network.
This paper is focused on standard network services like DHCP, DNS and
NAT, the challenges that can be faced when implementing these technologies,
and their differences between IPv4 and IPv6. Considering already deployed
IPv4 infrastructure, how can both protocols coexist and implications
on end user systems and experience.
Overview of Industrial Applications with Fog Computing
Riofrio, Adriana; Caiza, Gustavo (Ecuador)
ABSTRACT:
The technological advance in industrial automation systems and device
communication towards the Internet has developed new technologies such
as the Industrial Internet of Things (IIoT). For the optimal functioning
of the IIoT with the cloud, real-time communications and security protocols
are required to guarantee data protection and privacy, which does not
comply with the traditional architecture of cloud computing used for
the Internet of Things (IoT). In order to overcome the existing challenges,
Fog Computing appeared, which has a decentralized architecture that
allows information to be managed on devices that are closer to the user,
reducing latency and the amount of data transmitted to the cloud. There
architecture allows apply security protocols. This paper provides an
overview of the applications that have been developed in recent years
at the industrial level with the use of fog computing, providing a description
of the advantages and challenges that currently exist. The research
showed the development of new architectures with different protocols
and intelligent control techniques, whose results confirmed the advantages
of using fog computing over traditional cloud computing.
Project Based Teaching Was the Answer. But What Is the Question?
Killi, Steinar (Norway)
ABSTRACT:
Project based learning (PBL) has been praised as a teaching method.
Lecture based teaching has, on the other hand, been regarded as old
fashioned, boring, de-motivating and a waste of time[1] . “Tell me and
I will forget it, show me, and I may remember, involve me and I will
understand”, a proverb attributed to Aristotle (394 – 322 BC), has served
as a beacon for project based learning.
This paper reflects on different teaching models, on learning motivations
and on the questions that need to be asked when deciding which teaching
models to use. Do we sometimes abandon good methods for the wrong reasons,
or stick to methods that may not be the correct ones?
Real-Time, On-Site, Machine Learning Identification Methodology of Intrinsic Human Cancers Based on Infra-Red Spectral Analysis – Clinical Results
Cohen, Yaniv *; Zilberman, Arkadi **; Dekel, Ben Zion **; Krouk, Evgenii * (* Russian Federation, ** Israel)
ABSTRACT:
In this work we present a real-time (RT), on-site, machine-learning
based methodology for identifying intrinsic human cancers. The presented
approach is reliable, effective, cost-effective and non-invasive and
based on the Fourier transform infrared (FTIR) spectroscopy - a vibrational
method with the ability to detect changes as a result of molecular vibration
bonds using infrared (IR) radiation in human tissues and cells.
Medical IR optical system (IROS) is a table-top device for real-time
tissue diagnosis that utilizes FTIR spectroscopy and the attenuated
total reflectance (ATR) principle to accurately diagnose the tissue.
The ATR measurement principle is performed utilizing a radiation source
and a Fourier transform (FT) spectrometer. Information acquired and
analyzed in accordance with this method provides accurate details of
biochemical composition and pathologic condition of the tissue.
The combined device and method were used for RT diagnosis and characterization
of normal and pathological tissues ex-vivo/ in-vitro. Therefore, the
presented device can be used in close conjunction with a surgical procedure.
The solution methodology is to select a set of "features" that can be
used to differentiate between cancer, normal and other pathologies using
an appropriate classifier. These features serve as spectral signatures
(intensity levels) at specific values of measured FTIR-ATR spectral
responses.
Excellent results were achieved by applying the following three machine
learning (ML) based classification methods to 76 wet samples: Partial
least square regression (PLSR) and Principal component regression (PCR).
Both of the methods (PCR & PLSR) show a high performance to classify
"Cancer" or "non-Cancer"; Correct Classification: 100 %; Incorrect Classification:
0.0 %.
Naive Bayesian classifier (NBC); Shows a high performance to classify
"Cancer" or "non-Cancer" (benign); Correct Classification: 100 %; Incorrect
Classification: 0.0 %.
Research on Coverage Holes Detection in Sensor Networks Based on Voronoi Diagrams
Duan, Chaofan; Feng, Jing; Chang, Haotian; Zhang, Zhizheng; Li, Yi (China)
ABSTRACT:
Sensor networks have been widely used in environmental surveillance
and battlefield detection. Coverage is an important requirement for
resource allocation and tasks completion. Based on an in-depth study
of the Voronoi diagrams and related theory of the sensor network coverage,
a position-based coverage holes detection (PCHD) algorithm in sensor
networks is proposed. We first construct the sensor nodes’ neighbor
sets and the vertex sets of the Voronoi diagrams, determine whether
the node is a boundary node or an internal node and calculate the uncovered
vertexes of the boundary nodes in their diagrams. We then find the nodes
which share the same vertex in their neighbor sets and after relevant
judgment, the minimum loop of the coverage holes are obtained. The proposed
algorithm focuses on the characteristics of Voronoi diagrams and nodes’
position and is able to locate the coverage holes accurately. We finally
evaluate the correctness of the proposed algorithm through simulations.
Simulation results demonstrate that the proposed algorithm can determine
the number of holes and locate the coverage holes.
Simon Says: "Send Money"
Conrad, Patrick N.; Wahsheh, Luay A. (United States)
ABSTRACT:
Social engineering attacks have increased dramatically in the past few
years. The case study that is described in this work involves the deception
of a subordinate by someone posing as his or her superior. The attacker
assumes the identity of a high-level person in the company, usually
a Chief Executive Officer (CEO) whose actions are rarely questioned.
The attacker poses as the CEO through a spoofed email address or even
one that looks similar to the correct one, and then sends a message
to his or her assistant or another person in the company that fields
the CEO’s requests. The message requests funds to be transferred through
various methods ranging from wire transfers, credit card payments, and
even the purchase of store gift cards. We believe that social engineering
attacks that threaten personal and organizational information can be
prevented by creating a cyber security awareness culture. Increasing
awareness by drawing attention to the social engineering case that is
discussed in this work is a step towards achieving this goal.
Smartphones and People with Intellectual Disabilities: An International Comparison of Contextual Social Barriers for Effective Usage
Williams, Peter *; Cendón, Beatriz Valadares ** (* United Kingdom, ** Brazil)
ABSTRACT:
Mobile devices are becoming ubiquitous. However, very little research
has been carried out on the use, benefits or barriers of this technology
by people with Intellectual Disabilities (ID), either in an educational
or social context. This paper explores self-reported constraints upon
usage of smartphones by ID in a study conducted in the UK (with 59 participants)
and replicated in a smaller scale in Brazil (23). The studies explored
these issues via in-depth group and individual interview and observation.
In both countries, similar ‘self-imposed’ barriers were elicited, with
different emphasis. The categories ‘reluctance to reveal oneself online’
and ‘concerns about factors beyond one’s control’ (viruses, unreliable
hardware) were more evident in UK participant comments. Factors in the
category ‘burden of responsibility’, specifically fear of assault were
emphasized by Brazilians. Constraints imposed by supporters, in both
groups, included prohibitions, restrictions and usage monitoring, especially
with regard to social media. These constraints were justified as being
to protect the individuals. External barriers such as usability issues,
cost management were mentioned by both groups. Overall, use of the technology
by this cohort can be seen as a tension between enablement and control,
with emphases on different aspects of these forces related to the social
conditions prevailing in each country.
System Design of WiFi-Signaling Based Accurate Occupancy Detection Scheme
Miwa, Yukina; Ushiyama, Akari; Komura, Hijiri; Naito, Katsuhiro (Japan)
ABSTRACT:
Indoor location systems provide the location of a human or a device
in indoor space. WiFi is the practical standard to realize the indoor
location systems because a receiver can find some WiFi access points
(APs). Initial systems use Received Signal Strength (RSS) as the measurement
of distance because RSS decreases according to the distance between
AP and a receiver. Recently, more practical service using indoor location
systems has been discussed. This paper proposes an occupancy detection
scheme with smartphone devices. The location of a human in a room is
useful information to manage human resources efficiently. Therefore,
some systems track a beacon tag to estimate the location or typical
location systems use WiFi signals from several APs to estimate a location.
As a result, the conventional systems require a special beacon tag or
special tracking application to realize the human location system. On
the contrary, the proposed system uses users’ smartphones instead of
special devices or applications. In this situation, the proposed system
must track all WiFi devices that do not associate with a WiFi access
point. Therefore WiFi APs cannot detect all users’ devices. The proposed
scheme focuses on the WiFi signaling process to detect a user’s device
and estimates the location of a user’s device. The WiFi signal receivers
detect a probe request message from a user’s device because a probe
request message should be transmitted even if the user’s device does
not associate an AP. We have developed a prototype system to evaluate
the performance.
The Perception of the Urban Quality of Life Index in the Context of Smart Cities
Lima, Mariana Ribeiro dos Santos; Baracho, Renata Maria Abrantes (Brazil)
ABSTRACT:
The implementation of innovations in Information and Communication Technologies
(ICTs) in urban areas provides more interconnected and harmonized cities,
favoring the development of a new citizen experience with respect to
the access and use of public services. The Urban Quality of Life Index
(IQVU) of Belo Horizonte, Minas Gerais, is responsible for quantifying
the availability of services from the analysis of different variables
that identify the spatial distribution of infrastructures. However,
even though the index offers greater insight for city management, IQVU
does not consider user perception in its measurement. Collaborative
mapping initiatives and crowd mapping, are digital cartographic methods
capable of collecting and transmitting information about urban behavior,
using citizens itself as the observer and regulator of events. This
paper aims to validate areas with the highest quality of urban life
through the overlap of IQVU information and crowd mapping initiatives
in Belo Horizonte. This research focuses on the role of collaborative
mapping as a fundamental tool for developing better representations
of issues that affect urban planning, as well as for developing solid
forms of civic engagement and social innovation.
The Usage of Advanced AI Techniques in Telecommunication Networks Decisions Making Tasks
Awad, Mina; Essa, Mostafa; ElHoseiny, Mohamed; Nour, Mahmoud; Kamel, Mina (Egypt)
ABSTRACT:
Management decisions driven by technical analysis considered to be a
daily task for any firm working in Information and Technology sector.
Commands, Consults, Votes and Consensus normally built on abstract expertise
and legacy data analysis, which are always subjected to variance and
inconsistency, and here where Artificial Intelligence, Machine Learning
and data analytic plays a major role reduce these side effects, and
increase the accuracy when it used prior to the decision making methods.
Toward a Comprehensive Smart Ecosystem Ontology – Smart Cities, Smart Buildings, Smart Life
Soergel, Dagobert *; Baracho, Renata Maria Abrantes **; Mullarkey, Matthew T. * (* United States, ** Brazil)
ABSTRACT:
This paper posits a smart ecosystem as a complex system with several
interdependent components or subsystems: Smart city (or larger area),
smart buildings, smart office, smart manufacturing, smart life. Understanding,
design, and operation of such a system should be supported by a comprehensive
ontology. The paper gives a short introduction to the structure of ontologies
as consisting of a schema-level ontology ꟷ an elaborated entity-relationship
model ꟷ and many entity-value-level ontologies ꟷ for each
entity type a list or taxonomy of entity values or a specification how
entity values should be formatted (such as the XML format for date and
time). The paper outlines a process of developing a comprehensive ontology
by collecting and integrating specifications from many sources and illustrates
this process by building a very preliminary taxonomy of (smart) ecosystem
functions from seven sources. Making ecosystems smart can improve the
quality of life and contribute to more sustainable communities.
Trends in Hack Attacks vs Unintended Data Disclosures, 2005-2018
Coffey, John W. (United States)
ABSTRACT:
Trends in Cybersecurity breaches are of interest in anticipating threats
and in governance of training programs. Many different sources of data
on data breaches report statistics on the topic. However, many of these
sources are businesses with a view limited to data collected in their
own work, and marketing of their services as an end goal of their reporting.
Data from the Privacy Rights Clearinghouse Data Breach Database, one
of the largest and most comprehensive collections documenting data breaches
in the United States, provides flawed, but interesting and minimally
biased reporting. After reviewing statistics from several reporting
organizations, this article documents findings regarding secular trends
in successful hack attacks versus unintended data disclosures from 2005
to the present, as culled from the PRC database.
Virtual Coach
Jenq, John (United States)
ABSTRACT:
In this report, we propose an intelligent online e-learning system that
focuses on advancing science education. Specifically, we are building
a prototype system that teaches arithmetic operations of integers and
rational numbers. This system can be personalized for different individuals
through a virtual coach whose mission is to monitor a user’s progress
and recommend the best possible learning path for the user. The proposed
system allows us to investigate the opportunities and possibilities
for educators to learn new pedagogies from the learners’ performance
and behavior through online assessments and profiling of users. The
proposed system consists of a controller which is the virtual coach,
a learning unit, and an assessment unit and decision support system.
In addition to these units, the backend will comprise of a data collector
facility and machine learning subsystem, both of which will be built
later for data analysis to gain insight on different online users according
to their profiles.