Logo IIIS


International Institute of
Informatics and Systemics

Proceedings of the 11th International Multi-Conference on
Complexity, Informatics and Cybernetics: IMCIC 2020

VOLUME I (Papers)


A Case Study: Incorporating Parallel and Distributed Computing into Computer Science Curriculum

Abu-El Humos, A.; Hong, S.; Pei, T.; Aljawfi, O. (United States)

ABSTRACT:
Recent technology advances in parallel computing such as multicore CPUs, GPUs, and their driving software require a well-prepared workforce to support this demanding and fast changing industry. Parallel and Distributed Computing (PDC) education for computer science and computer engineering majors will play a major role in preparing well trained graduates to join this workforce. In this work, we share past and future plans to update the computer science curriculum at Jackson State University (JSU) with PDC modules. As part of this effort, some of the NSF/IEEE-TCPP curriculum initiative on PDC modules were integrated into department-wide core and elective courses offered in both fall and spring semesters. These courses were: CSC 119 Object Oriented Programming (core) [2, 4, 6, 9], CSC 216 Computer Architecture and Organization (core) [3, 5, 9], CSC 312 Advanced Computer Architecture (core) [3,5], CSC 325 Operating Systems (core) [6, 9], CSC 350 Organization of Programming Languages (core) [9], CSC 425 Parallel Computing (elective) [1, 2, 6] , CSC 499 Special Topics: Data Mining (elective) and UNIV 100 University Success course, which is a university-wide class offered for all JSU majors. In an effort to update the contents of the UNIV 100 course, some contemporary PDC topics and their essence in higher education were incorporated into this course. The inclusion of the PDC modules was gradual and light weighted in the lower level courses and more aggressive in the higher-level courses to let the students easily grasp PDC concepts. Specific test questions, homework assignments and projects were developed to assess students’ performance.

Abstract | PDF


A Simple Sparse Representation-Based Method for Improving the Boundaries Definition among Segmented Regions from Grey Level Digital Images

Leal, Nallig; Zurek, Eduardo (Colombia)

ABSTRACT:
Segmentation is an important intermediate task in digital image processing, which tries to isolate the objects of interest in an image, to extract invariant descriptors to orientation, location, and size for classifying or recognizing such objects from these descriptors. However, this is a non-trivial task because normally the limits between regions may be neither clear or well defined. This paper presents a novel method for improving the boundaries definition among segmented regions from a digital image. Our method, from a label matrix of segmented regions and the original image, yields a new improved label matrix in which the limits among regions are better defined according to the ground truth segmentation. To determine if a pixel belongs to its assigned region, we build a patch around the pixel and build dictionaries from the patches of the regions that border such a pixel; then, we run sparse coding on each dictionary to find the sparse representation of the patch that contains the pixel. The pixel is assigned to the region whose dictionary best represents the patch that contains the pixel. Processing of patches instead of pixels makes our method robust to noise, outliers, and blurring. Numerical results validate our method.

Abstract | PDF


A Technique for Program and Project Portfolio Prioritization: RAB2/E Matrix

Moraes, Altino José Mentzingen de (Brazil)

ABSTRACT:
The propose of this paper is to present some Techniques those can be use as tool for Program and Project Portfolio Prioritization according the aspects of the solution to be build and external facts that can be perceived. After that, any Project Management Methodology – such as PMBoK© [1], PRINCE2® [2] and ZOPP [3] – can be applied to control the tasks which have to be done. Beyond this propose, also this article introduces a new Technique as an extended version of Matriz RAB - Rapidez, Autonomia e Benefício (RAB Matrix - Rapidity, Autonomy and Benefit) [4] which will be called as “Matriz RAB2/E - Rapidez, Autonomia e Benefício / Estendida” (“RAB2/E Matrix - Rapidity, Autonomy and Benefit / Extended”).

Abstract | PDF


An Artificial Intelligence Tool for Accessible Science Education

Watters, Jacob; Liu, Chao; Hill, April; Jiang, Feng (United States)

ABSTRACT:
One of the leading issues in accessible science education is creating a laboratory workspace accessible to blind students or students with visual impairments (VI). Although such students can be involved in the science lectures, they are rarely active in the laboratory where more hands-on work and spatial awareness are needed. This marginalization of Students with VI in science laboratory work prevents them from being active learners in the laboratory. Current approaches to solve this problem focus on providing different accommodations such as relying on sighted lab partners to complete the hands-on work. However, while the accessibility of the laboratory work is improved, students with VI remain passive learners. In this paper, we propose a new artificial intelligence (AI) tool developed with natural language processing (NLP) techniques and the Amazon Alexa Skills Kit (ASK). This AI tool can be used as a “virtual assistant” in the lab. In combination with other access technologies and tools, the VLA will allow students with VI to perform the lab tasks by themselves. A demo software called the “Virtual Laboratory Assistant (VLA)” has been released, which can be launched by a smartphone or computer in the laboratory workspace to assist the lab process and control other electronic devices, thereby creating a more accessible lab environment. We believe that such an AI tool promotes the inclusion of learners with VI and has the potential to be helpful for any accessible science education work.

Abstract | PDF


An Exploration of the Concept of Tradition in Relation to Complexity, Informatics, and Cybernetics

Nugent, Paul D. (United States)

ABSTRACT:
As our world becomes more secular, rational, and bureaucratic, tradition, as a means to pass knowledge, skills, norms, and beliefs, etc. from one generation to the next seems to be losing its power. Indeed, as management fads embrace continuous improvement and change, and political philosophies seek secular equality, authenticity and freedom, tradition is often framed as an impediment or obstacle to these goals. But a closer examination of tradition and its cybernetic and informational dynamics shows us that these perspectives miss some of the more fundamental roles of tradition in modern institutions and in society.
While there are many definitions of tradition, its etymology reminds us that at its core it involves “trans” some kind of transmission in conjunction with “dare” or a kind of giving [1]. It is, therefore, a giving across and is typically associated with giving across time, especially from one generation or group to another. In a sense, it means that at any given time a group or individual is not starting from scratch with their own isolated biographies and experiences but are being handed down, in various ways, valuable beliefs, practices, skills, and knowledge.
This provides a context within which to think about tradition’s role in modern life and in modern institutions.

[1] etymonline.com/word/tradition, retrieved December 12, 2019.

Abstract | PDF


An Optimal Deep Learning Approach for Classification of Age Groups in Social Network

Swain, Anil Kumar; Balabantaray, Bunil Kumar; Rout, Jitendra Kumar; Satpathy, Suneeta (India)

ABSTRACT:
There is huge amount of data in social networks, where people post their opinion on a topic, or share their information. But people often don’t provide their personal data, like gender, age and other demographics. Research can be done on this data to develop applications of sentiment analysis, but the success rate is restricted by the number of words in the dictionaries as they do not consider all the words which reflect the sentiment in our messages as most of the communication on social networks is non-standard language with small messages. Moreover, with contemporary technology it is quite easy to create profile with false age, gender and location which provides criminals an easy way to deceive. Thus we can analyze the text messages posted by the user on social network platform. As per the research done so far, age is one of the important parameter in the user profile which reveals the important information about the typical behavior among same age group users. An analysis is done with more than 4000 tuples which contains relevant parameters like number of friends, length of message, number of likes, number of hash tags and comments are considered for the classification. In this study, we use the user profile information for the prediction of age group, which we collected using Facebook API. In this project we classified the users into two age groups teenagers and adults using different Machine learning algorithms like deep convolutional neural networks, Multilayer perceptron, Random forest, SVM and Decision trees. Among all these algorithms deep convolutional neural network stands out to be the best among all of them reaching the best performance with an accuracy of 94%.

Abstract | PDF


Artificial and Natural Development Systems

Korzhova, Valentina N.; Ivanova, Natalya V. (United States)

ABSTRACT:
The paper presents the main notions, mathematical models, and applications of the novel branch of mathematics and its applications of Artificial and Natural development systems.

Abstract | PDF


Automated Compliance Analysis of Digital Building Models to Brazilian BIM Regulatory Framework

Soares, Bruno Cesarino; Baracho, Renata Maria Abrantes; Porto, Marcelo Franco (Brazil)

ABSTRACT:
Building Information modeling (BIM) can be used in a variety of ways to support real estate management. BIM models are the product of a comprehensive digital design process, serving as the basis for representing and storing a large amount of data and information about a real estate investment project, which can be new construction, renovation, expansion, acquisition or even the renting of a building. These digital building models are, therefore, excellent sources of information for performing analysis and simulations, such as the one proposed in this article. Recently, technical standards have been created in Brazil to guide Architecture, Engineering and Construction (AEC) representatives, as well as public officials, regarding the use of BIM in new projects. An information portal on the Brazilian dissemination strategy for BIM has been created, as well as a national BIM library, which contains digital components uploaded by qualified suppliers and vendors, available for entrepreneurs to download and use in their projects. The analysis proposed here uses an automatic evaluation of real estate projects, represented as BIM models. These models are verified in relation to the Brazilian regulatory framework on BIM. This process aims to conduct a compliance assessment of digital building models based on the appropriate use of BIM components in accordance with the construction information classification system prescribed by the Brazilian technical standards. An evolutionary prototype was then implemented as an extension application to run within a BIM platform. This application is designed to perform a rule checking process. Rules are defined from Brazilian BIM regulations, and their compliance is are verified from information retrieved from BIM models, which range from generic components to families of objects supplied by the manufacturers themselves, including the stages of execution of the work. Thus, the various levels of detail of the information obtained from the assessment of BIM models are very useful for real estate management, and from them it is also possible to generate some indicators to be used, for example, in the context of smart buildings and smart cities.

Abstract | PDF


Cloud Security Threats, Statics and Mitigation Plans

Al Hammoshi, Mayyada; Khan, Farhana (United States)

ABSTRACT:
Cloud computing is a fast-growing technology that will continue to grow up due to its impact on every life joint. Cloud computing threats, attacks and vulnerabilities paralyzes and equals this fast-growing. Big companies allocated high portions of their budged on securing their confidential data as it will be shown later in the paper. In this paper we will present a classification on the cloud security attacks by showing the most vulnerable threats in numerical values and statistics with naming the most serious cloud security threats. We then offered defense lines and layers to protect cloud assets from these vulnerabilities. Finally, we showed the human contribution in the cloud security threats and how can we educate the user to reduce these attacks.

Abstract | PDF


Concept Design of Estimation Scheme for Social Graph Based on Occupancy Time in Space

Ushiyama, Akari; Miwa, Yukina; Osaki, Shotaro; Yamada, Yuki; Naito, Katsuhiro (Japan)

ABSTRACT:
Recently, education institutes have to take care of students to avoid repeating a year or dropping out. For these purposes, human relations among students is an important factor. Since human relations dynamically changes, continuous recognition of students is required. Indoor positioning methods are candi- date technology to track students with cheap wireless devices. Bluetooth, WiFi, and IEEE 802.1.5.4 are usually used for the service because of the decreasing costs of the devices. Bluetooth Low Energy (BLE) is the low energy standard of Bluetooth and is suitable for long operation with a battery. This paper proposes a concept design of an estimation scheme for social graph based on occupancy time in space. The proposed scheme uses a BLE beacon to track each student and recognizes a student share time in the same space. It also estimates social relations among students. The main target of the scheme is to find lonely students who do not have any relations with other students and to take care of them. We have developed a prototype system for tracking BLE beacon and estimating a location according to Received Signal Strength (RSS) value from the BLE beacon.

Abstract | PDF


Construction Quality Control of Dams: Software Modeling for Geotechnical Data Visualization

Buitrago Frainz, Gabriela; Franco Porto, Marcelo; Matos de Almeida, Vinícius; Ananias de Mendonça, Antônio; Abrantes Baracho, Renata Maria (Brazil)

ABSTRACT:
The hereby paper aims to present the modeling of a data visualization module of construction quality control applied to dams, in a geotechnical information management software. The types of dams studied are presented, as well as the importance of monitoring the construction of compacted embankments, which occurs, within the scope of geotechnics, from the execution of tests – field and laboratory – in soils, object of analysis of this work. The tests result in geotechnical parameters, studied from the visualization of the data on maps, result of modeling and subsequent prototyping of the model using Visual Basic for Applications (VBA), in Excel software, based on the definition of the software requirements and the idealization of the solution. The algorithms developed are then applied to a set of data from a dam under construction. The information obtained from Geolabor, geotechnical data management software, results in: maps that illustrate the distribution of the tests performed, indicating the representativeness of the technological control; and specific chloropletic maps for each geotechnical parameter, indicating by color the intervals of occurrence of the values.

Abstract | PDF


Cybersecurity and Risk Assessment

Blair, Risa (United States)

ABSTRACT:
Weebly is the cloud-based website building tool that will serve as the basis of this evaluation of a software system and the cybersecurity risks associated with it. Weebly is a free tool with a professional version option. The tool is based on Linux, and although it is quite stable, some security breaches have been reported over time. This paper will explore known security breaches as well as potential breaches based on current research available in the information technology and computer security realms. The database behind the scenes is the most likely to be attacked by hackers, as there is quite a bit of confidential customer and business data available. Users and website builders are storing their business information, personal data, and perhaps even their clients’ data on the cloud. Much is entrusted to Weebly to maintain strong security. When using software in the cloud, the end user needs to have shared responsibility for maintaining security best practices.

Abstract | PDF


Detection of Ascorbic Acid, Acetaminophen and Caffeine - Can It Occur Simultaneously Using Electrochemistry Techniques and Bare Electrodes?

Lunsford, Suzanne K.; Richardson, Marlee; Muran, Kai (United States)

ABSTRACT:
The electrocatalytic oxidation of ascorbic acid, acetaminophen and caffeine will be detected by differential pulse voltammetry (DPV) but not simultaneously. There will be comparison of the different bare electrode materials carbon, platinum and gold response to the various organic compounds. This study has engaged undergraduate students into problem solving the organic structure of various compounds integrated with redox chemistry to analyze by electrochemistry techniques that are selective and highly sensitive.

Abstract | PDF


Electronic Cane Supported with Artificial Vision

Molina, Cristian; Condo, Jonathan; Saeteros, Morelva; Caiza, Gustavo (Ecuador)

ABSTRACT:
Visually impaired people often use a white cane to improve their mobility. The electronic cane was created with the aim to increase the capabilities of traditional canes and thus enhance the people´s move and safety. This device features the following characteristics: (i) an obstacle detection system that vibrates to indicate the distance of the object, (ii) a location system using a Global Positioning System (GPS) and a Global System for Mobile Communication (GSM) that sends a message with the location of the person in real time. When opening the message, the contact receives the link that binds with Google Maps. The system also includes an artificial vision system for identifying the information and signage set in the surrounding places to improve orientation with audio indications that guide people in safe places. The tests were applied on students with visual impairments of the UNESCO Chair at the Salesian Polytechnic University where a total validation percentage of 89% was obtained for the use of the electronic cane compared to the traditional cane.

Abstract | PDF


I Don't Always Spread Disinformation on the Web, but When I Do I Like to Use Memes: An Examination of Memes in the Spread of Disinformation

Williams, Andrew; Dupuis, Marc (United States)

ABSTRACT:
Social media has become a potent vector for the spread of disinformation. Content initially posted by bots, trolls, or malicious actors is often picked up and magnified by ordinary users, greatly extending its influence and reach. In order to combat disinformation online, it is important to understand how users interact with and spread this type of content, unwittingly or not. We studied patterns in the sharing of propaganda and disinformation on social media through political image-based memes. We chose a selection of six memes, and conducted a survey in order to better understand the behavior of ordinary users as they interact with propaganda and disinformation on social media. Particular attention was paid to differences based on political affiliation and psychological factors, including personality and trait affect. Negative types of affect appear to dominate the level of engagement Republicans and Independents have with memes, while positive types of affect and extraversion do the same for Democrats.

Abstract | PDF


Integrating Semantic Web Technologies into Undergraduate AI Curriculum

Zlatareva, Neli (United States)

ABSTRACT:
Semantic Web is one of the most inspirational and exciting successes of Artificial Intelligence in the last decade. It redefines our understanding of how to represent and process knowledge, and how to maximize its role in our everyday lives. Beyond its commercial success, Semantic Web is a fertile domain for AI education allowing us to revisit some of the core topics in an undergraduate AI course such as knowledge engineering, representation and reasoning.
This paper describes our experience with introducing a hands-on project utilizing the latest Semantic Web technologies to teach Ontological Engineering and Description Logics to computer science majors at undergraduate level. Our motivation was not to replace established AI curriculum, but to illustrate the evolving understanding of AI from a stand-alone problem solver into a network of intelligent agents working in cooperation and serving as equal partners to humans in a variety of applications built on the top of the Semantic Web. Initial assessment of the pedagogical value of this project suggests that it enhances students’ understanding of the core AI topics, boosts their engagement and interest in the course, but more importantly introduces them to the most prominent field of applied AI for the years to come.

Abstract | PDF


Integration of Information to Support Projects Decision Making

Baracho, Rodrigo; Baracho, Renata Maria; Mattos, Max (Brazil)

ABSTRACT:
This article is a partial result of ongoing research in the Postgraduate Program in Knowledge Management & Organization of UFMG (Federal University of Minas Gerais - Brazil), which requests a model of integrating project management information for decision making in projects of engineering. Projects involve software such as ERP, MS Project, Solid Works / AutoCAD / Inventor / E-Plan and Outlook, and engineering companies have problems achieving interoperability between them. Up-to-date, accurate information available to everyone involved in an engineering project is crucial to its success. To propose the construction of the model needs to identify the variables of cultural and technical barriers that may interfere with the integration of this information. In this first stage, a bibliographic study to evaluate the cultural and technical aspects is performed to propose a model overcoming these barriers. The main objective of this paper is to identify technical and cultural barriers to the integration of information in project management. This paper presents the literature review to identify related works and state of the art on this subject. The literature review will describe the variables that compromise the integration of this information. Research is conducted on the Web of Science to identify barriers such as misinformation, delays in finding information, dissemination of information, integration of information, and use of information by project staff in companies using software mentioned above. This research is expected to optimize the engineering project management.

Abstract | PDF


Interactive Effect of Information Systems and Instructional Systems Design on Digital Leadership Training Development

McKay, Elspeth *; Jamaludin, Rozinah ** (* Australia, ** Malaysia)

ABSTRACT:
This paper explores the relationship between information systems (IS) and instructional systems design (ISD) to innovate an extended Baldridge Performance Indicator (BPI) model for developing massive open online courses (MOOCs). The project is part of an ongoing collaborative research project between the Universiti Sains Malaysia, Penang and RMIT University, Melbourne, Australia, to design and implement online digital leadership training modules for the Malaysian higher education leadership academy (AKEPT). To date, the education sector has been slow to adopt the BPI for academic performance recognition. This paper presents a work in progress that highlights the importance of designing effective training ePedagogies, which promote good digital leadership skills based on four MOOCs modules: vision, mission and values; digital workforce environment; digital workforce engagement; and ethical digital leadership behavior. The extended BPI model will enable accurate measurement of visionary academic digital leadership, such as: (1) definition and application of key knowledge and concepts; (2) independence, self-determination, self-teaching and self-motivation; (3) problem-solving, thinking and computing skills; (4) strong ethical characteristics and values; (5) awareness of societal, health, safety, legal and cultural issues; and (6) recognition of the need to undertake life-long learning.

Abstract | PDF


International Cybercrime Law Comparison

Blair, Risa (United States)

ABSTRACT:
Cybercrime laws vary from country to country. However, based on the research, the United States appears to be well ahead of India and Nigeria in terms of managing the cybercrime and cybersecurity ecosystems. India and Nigeria have developed laws which appear to evolve from cybersecurity law developed by the United States. Although cybersecurity laws in India and Nigeria are in place, they were developed far later in the game than what was provided by the United States. Additionally, the United States has HIPAA and SOX, and there do not appear to be clear laws in place in India or Nigeria that align with these specific laws. What is particularly impressive about India is its futuristic National Cyber Security Policy 2013, which presented guidelines about future cybersecurity development, research, and protection. Neither the United States nor Nigeria had what appeared to be an equitable document. However, it does seem that the United States has the most in the way of resources to resolve cybercrime and cybersecurity issues. Additionally, the United States has been involved in developing laws to manage cybersecurity far longer than either India or Nigeria. As time moves forward, one can only hope that the world will catch up with the international law and technology aspects concerning cybersecurity and cybercrime.

Abstract | PDF


Monitoring Network for Nuclear Research Laboratory Using WSN and IOT Devices

Rocha, Kaio; Costa, Matheus; Savoine, Marcia (Brazil)

ABSTRACT:
This work presents a proposal of implementation of an automatic monitoring system for environments who does experimentation and manipulation of ionizing radioactive particles, having as a base scenario the structures off nuclear energy research laboratories through sensors coupled to integrated microprocessor circuit boards, to carry out the communication between the sensors a Wireless Sensor Network with star topology was raised by resorting in the Internet of Things paradigm. For the network security, the concept of layered access level was applied, specifically, access level according to the criticality off the process and environment whose the sensors are exposed to.

Abstract | PDF


Overview of Basic Network Services Using IPv6-IPv4 Translation as Transition Mechanism

Ospina Bedoya, Daniel; Santiago Cely, Claudia Patricia (Colombia)

ABSTRACT:
Transitioning from a perfectly working network to IPv6 can be an intimidating challenge. This paper aims to evaluate, describe and present the current technologies used for IPv6-IPv4 translation, as it is one of the most mature, simple and reliable mechanisms to implement IPv6 in a network. This paper is focused on standard network services like DHCP, DNS and NAT, the challenges that can be faced when implementing these technologies, and their differences between IPv4 and IPv6. Considering already deployed IPv4 infrastructure, how can both protocols coexist and implications on end user systems and experience.

Abstract | PDF


Overview of Industrial Applications with Fog Computing

Riofrio, Adriana; Caiza, Gustavo (Ecuador)

ABSTRACT:
The technological advance in industrial automation systems and device communication towards the Internet has developed new technologies such as the Industrial Internet of Things (IIoT). For the optimal functioning of the IIoT with the cloud, real-time communications and security protocols are required to guarantee data protection and privacy, which does not comply with the traditional architecture of cloud computing used for the Internet of Things (IoT). In order to overcome the existing challenges, Fog Computing appeared, which has a decentralized architecture that allows information to be managed on devices that are closer to the user, reducing latency and the amount of data transmitted to the cloud. There architecture allows apply security protocols. This paper provides an overview of the applications that have been developed in recent years at the industrial level with the use of fog computing, providing a description of the advantages and challenges that currently exist. The research showed the development of new architectures with different protocols and intelligent control techniques, whose results confirmed the advantages of using fog computing over traditional cloud computing.

Abstract | PDF


Project Based Teaching Was the Answer. But What Is the Question?

Killi, Steinar (Norway)

ABSTRACT:
Project based learning (PBL) has been praised as a teaching method. Lecture based teaching has, on the other hand, been regarded as old fashioned, boring, de-motivating and a waste of time[1] . “Tell me and I will forget it, show me, and I may remember, involve me and I will understand”, a proverb attributed to Aristotle (394 – 322 BC), has served as a beacon for project based learning.
This paper reflects on different teaching models, on learning motivations and on the questions that need to be asked when deciding which teaching models to use. Do we sometimes abandon good methods for the wrong reasons, or stick to methods that may not be the correct ones?

Abstract | PDF


Real-Time, On-Site, Machine Learning Identification Methodology of Intrinsic Human Cancers Based on Infra-Red Spectral Analysis – Clinical Results

Cohen, Yaniv *; Zilberman, Arkadi **; Dekel, Ben Zion **; Krouk, Evgenii * (* Russian Federation, ** Israel)

ABSTRACT:
In this work we present a real-time (RT), on-site, machine-learning based methodology for identifying intrinsic human cancers. The presented approach is reliable, effective, cost-effective and non-invasive and based on the Fourier transform infrared (FTIR) spectroscopy - a vibrational method with the ability to detect changes as a result of molecular vibration bonds using infrared (IR) radiation in human tissues and cells.
Medical IR optical system (IROS) is a table-top device for real-time tissue diagnosis that utilizes FTIR spectroscopy and the attenuated total reflectance (ATR) principle to accurately diagnose the tissue. The ATR measurement principle is performed utilizing a radiation source and a Fourier transform (FT) spectrometer. Information acquired and analyzed in accordance with this method provides accurate details of biochemical composition and pathologic condition of the tissue.
The combined device and method were used for RT diagnosis and characterization of normal and pathological tissues ex-vivo/ in-vitro. Therefore, the presented device can be used in close conjunction with a surgical procedure.
The solution methodology is to select a set of "features" that can be used to differentiate between cancer, normal and other pathologies using an appropriate classifier. These features serve as spectral signatures (intensity levels) at specific values of measured FTIR-ATR spectral responses.
Excellent results were achieved by applying the following three machine learning (ML) based classification methods to 76 wet samples: Partial least square regression (PLSR) and Principal component regression (PCR).
Both of the methods (PCR & PLSR) show a high performance to classify "Cancer" or "non-Cancer"; Correct Classification: 100 %; Incorrect Classification: 0.0 %.
Naive Bayesian classifier (NBC); Shows a high performance to classify "Cancer" or "non-Cancer" (benign); Correct Classification: 100 %; Incorrect Classification: 0.0 %.

Abstract | PDF


Research on Coverage Holes Detection in Sensor Networks Based on Voronoi Diagrams

Duan, Chaofan; Feng, Jing; Chang, Haotian; Zhang, Zhizheng; Li, Yi (China)

ABSTRACT:
Sensor networks have been widely used in environmental surveillance and battlefield detection. Coverage is an important requirement for resource allocation and tasks completion. Based on an in-depth study of the Voronoi diagrams and related theory of the sensor network coverage, a position-based coverage holes detection (PCHD) algorithm in sensor networks is proposed. We first construct the sensor nodes’ neighbor sets and the vertex sets of the Voronoi diagrams, determine whether the node is a boundary node or an internal node and calculate the uncovered vertexes of the boundary nodes in their diagrams. We then find the nodes which share the same vertex in their neighbor sets and after relevant judgment, the minimum loop of the coverage holes are obtained. The proposed algorithm focuses on the characteristics of Voronoi diagrams and nodes’ position and is able to locate the coverage holes accurately. We finally evaluate the correctness of the proposed algorithm through simulations. Simulation results demonstrate that the proposed algorithm can determine the number of holes and locate the coverage holes.

Abstract | PDF


Simon Says: "Send Money"

Conrad, Patrick N.; Wahsheh, Luay A. (United States)

ABSTRACT:
Social engineering attacks have increased dramatically in the past few years. The case study that is described in this work involves the deception of a subordinate by someone posing as his or her superior. The attacker assumes the identity of a high-level person in the company, usually a Chief Executive Officer (CEO) whose actions are rarely questioned. The attacker poses as the CEO through a spoofed email address or even one that looks similar to the correct one, and then sends a message to his or her assistant or another person in the company that fields the CEO’s requests. The message requests funds to be transferred through various methods ranging from wire transfers, credit card payments, and even the purchase of store gift cards. We believe that social engineering attacks that threaten personal and organizational information can be prevented by creating a cyber security awareness culture. Increasing awareness by drawing attention to the social engineering case that is discussed in this work is a step towards achieving this goal.

Abstract | PDF


Smartphones and People with Intellectual Disabilities: An International Comparison of Contextual Social Barriers for Effective Usage

Williams, Peter *; Cendón, Beatriz Valadares ** (* United Kingdom, ** Brazil)

ABSTRACT:
Mobile devices are becoming ubiquitous. However, very little research has been carried out on the use, benefits or barriers of this technology by people with Intellectual Disabilities (ID), either in an educational or social context. This paper explores self-reported constraints upon usage of smartphones by ID in a study conducted in the UK (with 59 participants) and replicated in a smaller scale in Brazil (23). The studies explored these issues via in-depth group and individual interview and observation. In both countries, similar ‘self-imposed’ barriers were elicited, with different emphasis. The categories ‘reluctance to reveal oneself online’ and ‘concerns about factors beyond one’s control’ (viruses, unreliable hardware) were more evident in UK participant comments. Factors in the category ‘burden of responsibility’, specifically fear of assault were emphasized by Brazilians. Constraints imposed by supporters, in both groups, included prohibitions, restrictions and usage monitoring, especially with regard to social media. These constraints were justified as being to protect the individuals. External barriers such as usability issues, cost management were mentioned by both groups. Overall, use of the technology by this cohort can be seen as a tension between enablement and control, with emphases on different aspects of these forces related to the social conditions prevailing in each country.

Abstract | PDF


System Design of WiFi-Signaling Based Accurate Occupancy Detection Scheme

Miwa, Yukina; Ushiyama, Akari; Komura, Hijiri; Naito, Katsuhiro (Japan)

ABSTRACT:
Indoor location systems provide the location of a human or a device in indoor space. WiFi is the practical standard to realize the indoor location systems because a receiver can find some WiFi access points (APs). Initial systems use Received Signal Strength (RSS) as the measurement of distance because RSS decreases according to the distance between AP and a receiver. Recently, more practical service using indoor location systems has been discussed. This paper proposes an occupancy detection scheme with smartphone devices. The location of a human in a room is useful information to manage human resources efficiently. Therefore, some systems track a beacon tag to estimate the location or typical location systems use WiFi signals from several APs to estimate a location. As a result, the conventional systems require a special beacon tag or special tracking application to realize the human location system. On the contrary, the proposed system uses users’ smartphones instead of special devices or applications. In this situation, the proposed system must track all WiFi devices that do not associate with a WiFi access point. Therefore WiFi APs cannot detect all users’ devices. The proposed scheme focuses on the WiFi signaling process to detect a user’s device and estimates the location of a user’s device. The WiFi signal receivers detect a probe request message from a user’s device because a probe request message should be transmitted even if the user’s device does not associate an AP. We have developed a prototype system to evaluate the performance.

Abstract | PDF


The Perception of the Urban Quality of Life Index in the Context of Smart Cities

Lima, Mariana Ribeiro dos Santos; Baracho, Renata Maria Abrantes (Brazil)

ABSTRACT:
The implementation of innovations in Information and Communication Technologies (ICTs) in urban areas provides more interconnected and harmonized cities, favoring the development of a new citizen experience with respect to the access and use of public services. The Urban Quality of Life Index (IQVU) of Belo Horizonte, Minas Gerais, is responsible for quantifying the availability of services from the analysis of different variables that identify the spatial distribution of infrastructures. However, even though the index offers greater insight for city management, IQVU does not consider user perception in its measurement. Collaborative mapping initiatives and crowd mapping, are digital cartographic methods capable of collecting and transmitting information about urban behavior, using citizens itself as the observer and regulator of events. This paper aims to validate areas with the highest quality of urban life through the overlap of IQVU information and crowd mapping initiatives in Belo Horizonte. This research focuses on the role of collaborative mapping as a fundamental tool for developing better representations of issues that affect urban planning, as well as for developing solid forms of civic engagement and social innovation.

Abstract | PDF


The Usage of Advanced AI Techniques in Telecommunication Networks Decisions Making Tasks

Awad, Mina; Essa, Mostafa; ElHoseiny, Mohamed; Nour, Mahmoud; Kamel, Mina (Egypt)

ABSTRACT:
Management decisions driven by technical analysis considered to be a daily task for any firm working in Information and Technology sector. Commands, Consults, Votes and Consensus normally built on abstract expertise and legacy data analysis, which are always subjected to variance and inconsistency, and here where Artificial Intelligence, Machine Learning and data analytic plays a major role reduce these side effects, and increase the accuracy when it used prior to the decision making methods.

Abstract | PDF


Toward a Comprehensive Smart Ecosystem Ontology – Smart Cities, Smart Buildings, Smart Life

Soergel, Dagobert *; Baracho, Renata Maria Abrantes **; Mullarkey, Matthew T. * (* United States, ** Brazil)

ABSTRACT:
This paper posits a smart ecosystem as a complex system with several interdependent components or subsystems: Smart city (or larger area), smart buildings, smart office, smart manufacturing, smart life. Understanding, design, and operation of such a system should be supported by a comprehensive ontology. The paper gives a short introduction to the structure of ontologies as consisting of a schema-level ontology ꟷ an elaborated entity-relationship model ꟷ and many entity-value-level ontologies ꟷ for each entity type a list or taxonomy of entity values or a specification how entity values should be formatted (such as the XML format for date and time). The paper outlines a process of developing a comprehensive ontology by collecting and integrating specifications from many sources and illustrates this process by building a very preliminary taxonomy of (smart) ecosystem functions from seven sources. Making ecosystems smart can improve the quality of life and contribute to more sustainable communities.

Abstract | PDF


Trends in Hack Attacks vs Unintended Data Disclosures, 2005-2018

Coffey, John W. (United States)

ABSTRACT:
Trends in Cybersecurity breaches are of interest in anticipating threats and in governance of training programs. Many different sources of data on data breaches report statistics on the topic. However, many of these sources are businesses with a view limited to data collected in their own work, and marketing of their services as an end goal of their reporting. Data from the Privacy Rights Clearinghouse Data Breach Database, one of the largest and most comprehensive collections documenting data breaches in the United States, provides flawed, but interesting and minimally biased reporting. After reviewing statistics from several reporting organizations, this article documents findings regarding secular trends in successful hack attacks versus unintended data disclosures from 2005 to the present, as culled from the PRC database.

Abstract | PDF


Virtual Coach

Jenq, John (United States)

ABSTRACT:
In this report, we propose an intelligent online e-learning system that focuses on advancing science education. Specifically, we are building a prototype system that teaches arithmetic operations of integers and rational numbers. This system can be personalized for different individuals through a virtual coach whose mission is to monitor a user’s progress and recommend the best possible learning path for the user. The proposed system allows us to investigate the opportunities and possibilities for educators to learn new pedagogies from the learners’ performance and behavior through online assessments and profiling of users. The proposed system consists of a controller which is the virtual coach, a learning unit, and an assessment unit and decision support system. In addition to these units, the backend will comprise of a data collector facility and machine learning subsystem, both of which will be built later for data analysis to gain insight on different online users according to their profiles.

Abstract | PDF

contact-us  
  Postal Address:
  13750 West Colonial Dr, Suite 350-408
  Winter Garden, Florida 34787, USA
  All rights reserved.
  © 2020 International Institute
   of Informatics and Systemics