首页 > 最新文献

2016 IEEE Region 10 Symposium (TENSYMP)最新文献

英文 中文
Covariance matrix compact differential evolution for embedded intelligence 嵌入式智能的协方差矩阵紧凑差分进化
Pub Date : 2016-05-09 DOI: 10.1109/TENCONSPRING.2016.7519431
Y. Jewajinda
This paper presents a compact evolutionary algorithm called the covariance matrix compact differential evolution (CMcDE). CMcDE is a real-parameter optimization evolutionary algorithm that adopt crossover in eigenvector space and representing population of search solutions as Gaussian probability distribution. The proposed algorithm has been tested using a standard test set of numerical problems. The experimental results show that the proposed CMcDE algorithm outperforms other algorithms in the test sets.
本文提出了一种称为协方差矩阵紧凑差分进化(CMcDE)的紧凑进化算法。CMcDE是一种实参数优化进化算法,它采用特征向量空间交叉,将搜索解的总体表示为高斯概率分布。所提出的算法已经用一个标准的数值问题测试集进行了测试。实验结果表明,本文提出的CMcDE算法在测试集上优于其他算法。
{"title":"Covariance matrix compact differential evolution for embedded intelligence","authors":"Y. Jewajinda","doi":"10.1109/TENCONSPRING.2016.7519431","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519431","url":null,"abstract":"This paper presents a compact evolutionary algorithm called the covariance matrix compact differential evolution (CMcDE). CMcDE is a real-parameter optimization evolutionary algorithm that adopt crossover in eigenvector space and representing population of search solutions as Gaussian probability distribution. The proposed algorithm has been tested using a standard test set of numerical problems. The experimental results show that the proposed CMcDE algorithm outperforms other algorithms in the test sets.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115436875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Real-time human movement mapping to a virtual environment 实时人类运动映射到虚拟环境
Pub Date : 2016-05-09 DOI: 10.1109/TENCONSPRING.2016.7519395
Subodha Charles
The development of Virtual Reality (VR) into consumer products has given new perspectives to many areas. This paper presents a method to enhance the VR experience by mapping real time body movements of a person to a virtual world such that the user can do basic interactions (move, lift, throw) with objects found in the virtual environment. This technique combines a Kinect controlled full body avatar with Oculus Rift head-mounted-display through the Unity game engine. Despite few failures in Kinect skeletal tracker when in sideways poses, movements were mapped with zero latency allowing the user to interact in real time.
虚拟现实技术在消费品领域的发展为许多领域提供了新的视角。本文提出了一种通过将人的实时身体运动映射到虚拟世界来增强VR体验的方法,使用户可以与虚拟环境中的物体进行基本交互(移动,举起,投掷)。这种技术通过Unity游戏引擎将Kinect控制的全身化身与Oculus Rift头戴式显示器结合在一起。尽管Kinect骨骼跟踪器在侧身姿势时很少出现故障,但动作被映射为零延迟,允许用户实时交互。
{"title":"Real-time human movement mapping to a virtual environment","authors":"Subodha Charles","doi":"10.1109/TENCONSPRING.2016.7519395","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519395","url":null,"abstract":"The development of Virtual Reality (VR) into consumer products has given new perspectives to many areas. This paper presents a method to enhance the VR experience by mapping real time body movements of a person to a virtual world such that the user can do basic interactions (move, lift, throw) with objects found in the virtual environment. This technique combines a Kinect controlled full body avatar with Oculus Rift head-mounted-display through the Unity game engine. Despite few failures in Kinect skeletal tracker when in sideways poses, movements were mapped with zero latency allowing the user to interact in real time.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115652391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Convolutional neural network for vehicle detection in low resolution traffic videos 卷积神经网络在低分辨率交通视频中的车辆检测
Pub Date : 2016-05-09 DOI: 10.1109/TENCONSPRING.2016.7519418
Carlo Migel Bautista, Clifford Austin Dy, Miguel Inigo Manalac, Raphael Angelo Orbe, M. Cordel
Recent works on Convolutional Neural Network (CNN) in object detection and identification show its superior performance over other systems. It is being used on several machine vision tasks such as in face detection, OCR and traffic monitoring. These systems, however, use high resolution images which contain significant pattern information as compared to the typical cameras, such as for traffic monitoring, which are low resolution, thus, suffer low SNR. This work investigates the performance of CNN in detection and classification of vehicles using low quality traffic cameras. Results show an average accuracy equal to 94.72% is achieved by the system. An average of 51.28 ms execution time for a 2GHz CPU and 22.59 ms execution time for NVIDIA Fermi GPU are achieved making the system applicable to be implemented in real-time using 4-input traffic video with 6 fps.
近年来,卷积神经网络(CNN)在目标检测和识别方面的研究表明,其性能优于其他系统。它被用于几个机器视觉任务,如人脸检测、OCR和交通监控。然而,与典型的摄像头相比,这些系统使用的是包含重要模式信息的高分辨率图像,例如用于交通监控的低分辨率图像,因此信噪比较低。这项工作研究了CNN在使用低质量交通摄像头检测和分类车辆方面的性能。结果表明,该系统的平均准确率为94.72%。2GHz CPU的平均执行时间为51.28 ms, NVIDIA Fermi GPU的平均执行时间为22.59 ms,使系统适用于使用4输入6 fps的实时交通视频实现。
{"title":"Convolutional neural network for vehicle detection in low resolution traffic videos","authors":"Carlo Migel Bautista, Clifford Austin Dy, Miguel Inigo Manalac, Raphael Angelo Orbe, M. Cordel","doi":"10.1109/TENCONSPRING.2016.7519418","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519418","url":null,"abstract":"Recent works on Convolutional Neural Network (CNN) in object detection and identification show its superior performance over other systems. It is being used on several machine vision tasks such as in face detection, OCR and traffic monitoring. These systems, however, use high resolution images which contain significant pattern information as compared to the typical cameras, such as for traffic monitoring, which are low resolution, thus, suffer low SNR. This work investigates the performance of CNN in detection and classification of vehicles using low quality traffic cameras. Results show an average accuracy equal to 94.72% is achieved by the system. An average of 51.28 ms execution time for a 2GHz CPU and 22.59 ms execution time for NVIDIA Fermi GPU are achieved making the system applicable to be implemented in real-time using 4-input traffic video with 6 fps.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123088103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 97
Big data analytics for transportation: Problems and prospects for its application in China 交通大数据分析:在中国的应用问题与前景
Pub Date : 2016-05-09 DOI: 10.1109/TENCONSPRING.2016.7519399
R. Biuk-Aghai, Weng Tat Kou, S. Fong
Transportation, as a means for moving goods and people between different locations, is a vital element of modern society. In this paper, we discuss how big data technology infrastructure fits into the current development of China, and provide suggestions for improvement. We discuss the current situation of China's transportation system, and outline relevant big data technologies that are being used in the transportation domain. Finally we point out opportunities for improvement of China's transportation system, through standardisation, integration of big data analytics in a national framework, and point to the future of transportation in China and beyond.
交通运输是在不同地点之间运送货物和人员的一种手段,是现代社会的重要组成部分。本文讨论了大数据技术基础设施如何适应中国当前的发展,并提出了改进建议。我们讨论了中国交通系统的现状,并概述了交通领域正在使用的相关大数据技术。最后,我们指出了中国交通系统的改进机会,通过标准化,在国家框架内整合大数据分析,并指出了中国乃至世界交通的未来。
{"title":"Big data analytics for transportation: Problems and prospects for its application in China","authors":"R. Biuk-Aghai, Weng Tat Kou, S. Fong","doi":"10.1109/TENCONSPRING.2016.7519399","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519399","url":null,"abstract":"Transportation, as a means for moving goods and people between different locations, is a vital element of modern society. In this paper, we discuss how big data technology infrastructure fits into the current development of China, and provide suggestions for improvement. We discuss the current situation of China's transportation system, and outline relevant big data technologies that are being used in the transportation domain. Finally we point out opportunities for improvement of China's transportation system, through standardisation, integration of big data analytics in a national framework, and point to the future of transportation in China and beyond.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128327469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Evaluation of implementation MyUMN as academic information system using UTAUT to Multimedia Nusantara University 利用UTAUT实现MyUMN作为多媒体努沙达拉大学学术信息系统的评价
Pub Date : 2016-05-09 DOI: 10.1109/TENCONSPRING.2016.7519444
Dwi Kristiawan, Harisno
The implementation of an information system is not just updating to the development of the era, especially for an academic information system. Academic Information system has been turned into a necessity for every single university as an instrument to deliver the simplicity of manipulating students data as well as the organizations data in an academic institution. The rate of a successful information system could be achieved by user's acceptance level which shows the acceptance of the users when using the system. This study will focus to the implementation of Oracle Peoplesoft Campus Solutions (OPCS) as an academic information system named MyUMN at Universitas Multimedia Nusantara with Unified Theory of Acceptance and Use of Technology (UTAUT) method. The purpose of this research is to analyze the UTAUT variables that is able to influence the interest and behavior of the users (students, instructors, and staffs) to the academic information system MyUMN and recommend an improvement to the system. The data collecting method was done by deploying questionares through an e-mail with sample of 423 respondents, while the data analysis was done by using Structural Equation Model (SEM) along with version 23 of AMOS software. The result indicated that the Performance Expectancy and Social Influence is significantly related one to another with Behavioral Intentions. But, in another way the Effort Expectancy indicated no effect on it. Facilitating Conditions and Behavioral Intentions were showing the significant effect of user's behavior to the academic information system MyUMN.
信息系统的实施不仅仅是为了时代的发展而更新,对于一个学术信息系统来说更是如此。学术信息系统已经成为每一所大学的必需品,作为一种工具,它可以简单地处理学生数据以及学术机构的组织数据。一个信息系统的成功率可以通过用户的接受程度来衡量,用户的接受程度反映了用户在使用系统时的接受程度。本研究将著重于以统一技术接受与使用理论(UTAUT)方法,在努沙马拉多媒体大学实施Oracle Peoplesoft Campus Solutions (OPCS)作为学术资讯系统MyUMN。本研究的目的是分析能够影响用户(学生、教师和工作人员)对学术信息系统MyUMN的兴趣和行为的UTAUT变量,并建议对系统进行改进。数据收集方法是通过电子邮件进行问卷调查,样本为423名受访者,数据分析采用结构方程模型(SEM)和AMOS软件23版进行。结果表明,绩效期望、社会影响与行为意向呈显著相关。但是,从另一个角度来看,努力预期对它没有影响。便利条件和行为意向对学术信息系统MyUMN的用户行为有显著影响。
{"title":"Evaluation of implementation MyUMN as academic information system using UTAUT to Multimedia Nusantara University","authors":"Dwi Kristiawan, Harisno","doi":"10.1109/TENCONSPRING.2016.7519444","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519444","url":null,"abstract":"The implementation of an information system is not just updating to the development of the era, especially for an academic information system. Academic Information system has been turned into a necessity for every single university as an instrument to deliver the simplicity of manipulating students data as well as the organizations data in an academic institution. The rate of a successful information system could be achieved by user's acceptance level which shows the acceptance of the users when using the system. This study will focus to the implementation of Oracle Peoplesoft Campus Solutions (OPCS) as an academic information system named MyUMN at Universitas Multimedia Nusantara with Unified Theory of Acceptance and Use of Technology (UTAUT) method. The purpose of this research is to analyze the UTAUT variables that is able to influence the interest and behavior of the users (students, instructors, and staffs) to the academic information system MyUMN and recommend an improvement to the system. The data collecting method was done by deploying questionares through an e-mail with sample of 423 respondents, while the data analysis was done by using Structural Equation Model (SEM) along with version 23 of AMOS software. The result indicated that the Performance Expectancy and Social Influence is significantly related one to another with Behavioral Intentions. But, in another way the Effort Expectancy indicated no effect on it. Facilitating Conditions and Behavioral Intentions were showing the significant effect of user's behavior to the academic information system MyUMN.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128387708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A passive and privacy-friendly area based localization for wireless indoor networks 一种基于被动和隐私友好区域的无线室内网络定位
Pub Date : 2016-05-09 DOI: 10.1109/TENCONSPRING.2016.7519407
N. M. Ahmad, A. Amin, Subarmaniam Kannan, A. M. Ali, M. F. Abdollah, R. Yusof
The proliferation of geosocial networking applications has fostered an intense interest to enrich Location-based Services (LBSs). The poor scalability of Global Positioning System (GPS) within the building or dense urban area has forced such services to leverage the existing network infrastructure such as wireless networks. However, most of indoor localization systems pose a great risk to the client's privacy since the systems require the exchange of client's private information that allows the tracking of client's whereabouts. In this paper, we propose a passive and privacy-friendly area based localization system to address the privacy issue and intrinsic properties of wireless indoor channel. This system utilizes information element field in the beacon frame to piggyback the network information for the client to construct lightweight radio map. In this paper also, we evaluate the performance of the radio map in facilitating the localization system.
地理社交网络应用程序的激增激发了人们对丰富基于位置的服务(lbs)的强烈兴趣。全球定位系统(GPS)在建筑物内或人口密集的城市地区的可扩展性差,迫使这些服务利用现有的网络基础设施,如无线网络。然而,大多数室内定位系统对客户的隐私构成了很大的风险,因为系统需要交换客户的私人信息,从而可以跟踪客户的位置。本文针对无线室内信道的隐私问题和固有特性,提出了一种被动且隐私友好的基于区域的定位系统。该系统利用信标帧中的信息元域为客户端承载网络信息,构建轻量级无线电地图。在本文中,我们还评估了无线电地图在促进定位系统方面的性能。
{"title":"A passive and privacy-friendly area based localization for wireless indoor networks","authors":"N. M. Ahmad, A. Amin, Subarmaniam Kannan, A. M. Ali, M. F. Abdollah, R. Yusof","doi":"10.1109/TENCONSPRING.2016.7519407","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519407","url":null,"abstract":"The proliferation of geosocial networking applications has fostered an intense interest to enrich Location-based Services (LBSs). The poor scalability of Global Positioning System (GPS) within the building or dense urban area has forced such services to leverage the existing network infrastructure such as wireless networks. However, most of indoor localization systems pose a great risk to the client's privacy since the systems require the exchange of client's private information that allows the tracking of client's whereabouts. In this paper, we propose a passive and privacy-friendly area based localization system to address the privacy issue and intrinsic properties of wireless indoor channel. This system utilizes information element field in the beacon frame to piggyback the network information for the client to construct lightweight radio map. In this paper also, we evaluate the performance of the radio map in facilitating the localization system.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129650484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Construction of Jakarta Land Use/Land Cover dataset using classification method 基于分类方法的雅加达土地利用/土地覆盖数据集构建
Pub Date : 2016-05-09 DOI: 10.1109/TENCONSPRING.2016.7519429
T. W. Cenggoro, S. M. Isa, Gede Putra Kusuma
The field of remote sensing has drawn a lot of attention recently. However, collecting necessary ground truth data for research in this field requires a lot of effort. Therefore, this paper presents a method for constructing estimated ground truth data using classification. This method reduces the workload in collecting remote sensing ground truth data. The contribution of this paper is to prepare and provide estimated Land Cover/Land Use (LULC) ground truth data of Jakarta area using the proposed method. The estimated ground truth data then can be used along with remote sensing image of Jakarta area to form dataset, which can be used for remote sensing research. For the estimated ground truth data to be reliable, the employed classification model have to achieve a reasonably good result. This research compares several algorithms to find the classification model with the best result for this case. The experimental result shows that Neural Network with single hidden layer of 30 neurons achieves best test accuracy of 75.41%. The method of this paper has been successfully implemented to construct LULC dataset of Jakarta area.
遥感领域最近引起了人们的广泛关注。然而,为这一领域的研究收集必要的地面真实数据需要付出很大的努力。因此,本文提出了一种利用分类构造估计地面真值数据的方法。该方法减少了遥感地物真值数据采集的工作量。本文的贡献在于利用本文提出的方法编制并提供了雅加达地区土地覆盖/土地利用(LULC)地面真值估算数据。估算得到的地面真值数据可与雅加达地区的遥感影像一起组成数据集,用于遥感研究。为了使估计的地真值数据可靠,所采用的分类模型必须达到相当好的结果。本研究通过对几种算法的比较,找到适合本案例的最佳分类模型。实验结果表明,单隐层30个神经元的神经网络测试准确率最高,达到75.41%。本文方法已成功应用于雅加达地区LULC数据集的构建。
{"title":"Construction of Jakarta Land Use/Land Cover dataset using classification method","authors":"T. W. Cenggoro, S. M. Isa, Gede Putra Kusuma","doi":"10.1109/TENCONSPRING.2016.7519429","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519429","url":null,"abstract":"The field of remote sensing has drawn a lot of attention recently. However, collecting necessary ground truth data for research in this field requires a lot of effort. Therefore, this paper presents a method for constructing estimated ground truth data using classification. This method reduces the workload in collecting remote sensing ground truth data. The contribution of this paper is to prepare and provide estimated Land Cover/Land Use (LULC) ground truth data of Jakarta area using the proposed method. The estimated ground truth data then can be used along with remote sensing image of Jakarta area to form dataset, which can be used for remote sensing research. For the estimated ground truth data to be reliable, the employed classification model have to achieve a reasonably good result. This research compares several algorithms to find the classification model with the best result for this case. The experimental result shows that Neural Network with single hidden layer of 30 neurons achieves best test accuracy of 75.41%. The method of this paper has been successfully implemented to construct LULC dataset of Jakarta area.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114716409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MIPS64 simulator on a mobile environment 移动环境下的MIPS64模拟器
Pub Date : 2016-05-09 DOI: 10.1109/TENCONSPRING.2016.7519408
Ma Angelica Capuz, Lorraine Policarpio, Brylle Joseph Quinto, Selwyn Emerson Reyes, R. Uy
There are several MIPS simulators which are already available for the students to use. However, majority of the existing works are developed in the year 2005 or older, all of which are PC-based while most of the people are now using mobile or tablet-based technologies. A mobile application called Mobile-based MIPS Simulator (MMIPSS) is a simulator for MIPS64 Architecture that is capable of simulating MIPS64 assembly codes. It also supports pipeline map of the assembly code and all types of MIPS64 static pipeline methods that are essential in understanding computer architecture and are not complete in majority of existing simulators.
有几个MIPS模拟器已经可供学生使用。然而,大多数现有作品是在2005年或更早的时候开发的,所有这些作品都是基于pc的,而大多数人现在使用的是基于手机或平板电脑的技术。一个名为基于移动的MIPS模拟器(MMIPSS)的移动应用程序是MIPS64架构的模拟器,能够模拟MIPS64汇编代码。它还支持汇编代码的管道映射和所有类型的MIPS64静态管道方法,这些方法对于理解计算机体系结构是必不可少的,并且在大多数现有的模拟器中是不完整的。
{"title":"MIPS64 simulator on a mobile environment","authors":"Ma Angelica Capuz, Lorraine Policarpio, Brylle Joseph Quinto, Selwyn Emerson Reyes, R. Uy","doi":"10.1109/TENCONSPRING.2016.7519408","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519408","url":null,"abstract":"There are several MIPS simulators which are already available for the students to use. However, majority of the existing works are developed in the year 2005 or older, all of which are PC-based while most of the people are now using mobile or tablet-based technologies. A mobile application called Mobile-based MIPS Simulator (MMIPSS) is a simulator for MIPS64 Architecture that is capable of simulating MIPS64 assembly codes. It also supports pipeline map of the assembly code and all types of MIPS64 static pipeline methods that are essential in understanding computer architecture and are not complete in majority of existing simulators.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133325759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Information security maturity model: A best practice driven approach to PCI DSS compliance 信息安全成熟度模型:PCI DSS遵从性的最佳实践驱动方法
Pub Date : 2016-05-09 DOI: 10.1109/TENCONSPRING.2016.7519379
Semi Yulianto, Charles Lim, B. Soewito
A successful of PCI DSS implementation depends on the capability of the organization's information security in providing the effective safeguard of their information asset, while cardholder data security is the main concern. Many organizations failed to comply with the standard, and this eventually results in fines or even termination of the ability to process credit cards. Clearly, an evaluation mechanism or tool used to measure the current state of the organization's information security is needed. In this paper, an Information Security Maturity Model for PCI DSS (ISMM-PCI) with four maturity level - None, Initial, Basic and Capable - was proposed. The ISMM-PCI utilizes the use of quantitative and qualitative analysis, enhancing the PCI DSS to ISO/IEC 27001 mapping, and focuses on improving the quality of people, process and technology. The model assists the organizations to easily identify the key success factors and gaps (point of weaknesses), provides the guideline to better manage information security and formulate the best strategy for the enhancement, improving the overall information security state by selecting the best security countermeasures (controls) to protect their information assets from the emerging cyber-attacks, while achieving PCI DSS full compliant. The main advantage of ISMM-PCI over other ISMMs is its ease of use. The comparative analysis of the case results affirms the statement. ISMM-PCI may be used by a wide range of organizations regardless of the size.
PCI DSS的成功实施取决于组织的信息安全能力,为其信息资产提供有效的保护,而持卡人的数据安全是主要关注的问题。许多组织未能遵守标准,这最终导致罚款甚至终止处理信用卡的能力。显然,需要一种评估机制或工具来度量组织的信息安全的当前状态。本文提出了一种包含无、初始、基本和能力四个成熟度级别的PCI DSS信息安全成熟度模型(ISMM-PCI)。ISMM-PCI利用定量和定性分析,增强PCI DSS对ISO/IEC 27001的映射,并着重于提高人员、过程和技术的质量。该模型帮助组织轻松识别关键成功因素和差距(弱点),为更好地管理信息安全提供指导,并制定最佳的增强策略,通过选择最佳的安全对策(控制)来保护其信息资产免受新兴的网络攻击,从而改善整体信息安全状态,同时实现PCI DSS的完全合规。与其他ismm相比,ISMM-PCI的主要优点是易于使用。案例结果的对比分析证实了这一说法。ISMM-PCI可以被各种各样的组织使用,无论其规模大小。
{"title":"Information security maturity model: A best practice driven approach to PCI DSS compliance","authors":"Semi Yulianto, Charles Lim, B. Soewito","doi":"10.1109/TENCONSPRING.2016.7519379","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519379","url":null,"abstract":"A successful of PCI DSS implementation depends on the capability of the organization's information security in providing the effective safeguard of their information asset, while cardholder data security is the main concern. Many organizations failed to comply with the standard, and this eventually results in fines or even termination of the ability to process credit cards. Clearly, an evaluation mechanism or tool used to measure the current state of the organization's information security is needed. In this paper, an Information Security Maturity Model for PCI DSS (ISMM-PCI) with four maturity level - None, Initial, Basic and Capable - was proposed. The ISMM-PCI utilizes the use of quantitative and qualitative analysis, enhancing the PCI DSS to ISO/IEC 27001 mapping, and focuses on improving the quality of people, process and technology. The model assists the organizations to easily identify the key success factors and gaps (point of weaknesses), provides the guideline to better manage information security and formulate the best strategy for the enhancement, improving the overall information security state by selecting the best security countermeasures (controls) to protect their information assets from the emerging cyber-attacks, while achieving PCI DSS full compliant. The main advantage of ISMM-PCI over other ISMMs is its ease of use. The comparative analysis of the case results affirms the statement. ISMM-PCI may be used by a wide range of organizations regardless of the size.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123598287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Rsync and Rdiff implementation on Moodle's backup and restore feature for course synchronization over the network 在Moodle的备份和恢复功能上的Rsync和Rdiff实现,用于通过网络进行课程同步
Pub Date : 2016-05-09 DOI: 10.1109/TENCONSPRING.2016.7519372
Fajar Purnama, T. Usagawa, R. Ijtihadie, Linawati
E-learning has been widely implemented in educations system. Most higher institutions have applied Learning Management Systems (LMSs) to manage their online courses, with Moodle as one of the most favored LMS. However on the other side creating a well designed and written course remains problematic for teachers. That's why the community encourages them to share their courses for others to reuse. The authors or teachers then will continuously revise their courses, that will make subscribers to re-download the whole course again, which will soon lead to exhaustive network usage. To cope with this issue a synchronization model of course's backup file is proposed, retrieving the differential updates only. This paper proposed the synchronization of the existing backup and restore features. The file synchronization is performed between course's backup files based on rsync algorithm. The experiment was conducted on virtual machine, local network, and public network. The result showed lower network traffic compared to the conventional sharing method just like our previous synchronization method. However unlike the previous one this method had two other additional advantages which are the flexibility to control the synchronization content and compatibility to all versions of Moodle.
电子学习在教育系统中得到了广泛的应用。大多数高等院校已经应用学习管理系统(LMS)来管理他们的在线课程,Moodle是最受欢迎的LMS之一。然而,另一方面,创建一个精心设计和写作的课程对教师来说仍然是一个问题。这就是为什么社区鼓励他们分享他们的课程供他人重用。然后,作者或教师将不断修改他们的课程,这将使订阅者重新下载整个课程,这将很快导致彻底的网络使用。为了解决这个问题,我们提出了一个当然备份文件的同步模型,只检索差异更新。本文提出了现有备份和恢复特性的同步。通过rsync算法实现课程备份文件之间的文件同步。实验分别在虚拟机、局域网和公网上进行。结果表明,与传统的共享方法(就像我们之前的同步方法)相比,该方法的网络流量更低。然而,与前一种方法不同,这种方法还有另外两个优点,即控制同步内容的灵活性和与所有版本的Moodle的兼容性。
{"title":"Rsync and Rdiff implementation on Moodle's backup and restore feature for course synchronization over the network","authors":"Fajar Purnama, T. Usagawa, R. Ijtihadie, Linawati","doi":"10.1109/TENCONSPRING.2016.7519372","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519372","url":null,"abstract":"E-learning has been widely implemented in educations system. Most higher institutions have applied Learning Management Systems (LMSs) to manage their online courses, with Moodle as one of the most favored LMS. However on the other side creating a well designed and written course remains problematic for teachers. That's why the community encourages them to share their courses for others to reuse. The authors or teachers then will continuously revise their courses, that will make subscribers to re-download the whole course again, which will soon lead to exhaustive network usage. To cope with this issue a synchronization model of course's backup file is proposed, retrieving the differential updates only. This paper proposed the synchronization of the existing backup and restore features. The file synchronization is performed between course's backup files based on rsync algorithm. The experiment was conducted on virtual machine, local network, and public network. The result showed lower network traffic compared to the conventional sharing method just like our previous synchronization method. However unlike the previous one this method had two other additional advantages which are the flexibility to control the synchronization content and compatibility to all versions of Moodle.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125792248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2016 IEEE Region 10 Symposium (TENSYMP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1