首页 > 最新文献

2013 International Conference on Adaptive Science and Technology最新文献

英文 中文
Service desk link into IT asset disposal: A case of a discarded IT asset 服务台链接到IT资产处置:一个废弃IT资产的案例
Pub Date : 2013-11-01 DOI: 10.1109/ICASTECH.2013.6707517
A. Adesemowo, Kerry Thompson
With the advent of Big Data and strategic investment into complex best-in-breed Governance, Risk, Compliance initiative, and the imminent introduction of Protection of Personal Information Bill in South Africa, are organizations in control of Information Technology Asset throughout its useful life. We look at oversight over IT Asset interface with IT Service Desk support function. Intruders like flowing water will explore the weakest opening much like a chain with the weakest link. In so far sound an organization's information security and internal controls are; it takes just the non-effectiveness or non-existence of a control, such as during IT Asset disposal for a vulnerability to be exploited and a breach to occur. This paper illustrates our finding from forensic analysis of a disposed IT Asset and discovered that we are far from improper disposal and its attendant risk. In actual fact, we are able to link improper disposal to lack of integration between IT Service Desk and IT Asset Disposal. We conclude by outlining considerations an organization should consider in integrating IT asset disposal with IT service desk.
随着大数据的出现和对复杂的最佳治理、风险、合规计划的战略投资,以及南非即将出台的《个人信息保护法案》,在信息技术资产的整个使用寿命中,组织都在控制着信息技术资产。我们着眼于对IT资产接口与IT服务台支持功能的监督。像流水一样的入侵者会探索最薄弱的开口,就像一条带有最薄弱环节的链条。到目前为止,一个组织的信息安全和内部控制是健全的;它只需要控制无效或不存在,例如在it资产处置期间,就可以利用漏洞并发生破坏。本文阐述了我们对处置的IT资产进行法医学分析的发现,并发现我们远离了不当处置及其伴随的风险。实际上,我们能够将不当的处理与IT Service Desk和IT Asset disposal之间缺乏集成联系起来。最后,我们概述了组织在将IT资产处置与IT服务台集成时应该考虑的事项。
{"title":"Service desk link into IT asset disposal: A case of a discarded IT asset","authors":"A. Adesemowo, Kerry Thompson","doi":"10.1109/ICASTECH.2013.6707517","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707517","url":null,"abstract":"With the advent of Big Data and strategic investment into complex best-in-breed Governance, Risk, Compliance initiative, and the imminent introduction of Protection of Personal Information Bill in South Africa, are organizations in control of Information Technology Asset throughout its useful life. We look at oversight over IT Asset interface with IT Service Desk support function. Intruders like flowing water will explore the weakest opening much like a chain with the weakest link. In so far sound an organization's information security and internal controls are; it takes just the non-effectiveness or non-existence of a control, such as during IT Asset disposal for a vulnerability to be exploited and a breach to occur. This paper illustrates our finding from forensic analysis of a disposed IT Asset and discovered that we are far from improper disposal and its attendant risk. In actual fact, we are able to link improper disposal to lack of integration between IT Service Desk and IT Asset Disposal. We conclude by outlining considerations an organization should consider in integrating IT asset disposal with IT service desk.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115720046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An analysis methodology for impact of new technology in complex sociotechnical systems 新技术在复杂社会技术系统中的影响分析方法
Pub Date : 2013-11-01 DOI: 10.1109/ICASTECH.2013.6707508
R. Oosthuizen, L. Pretorius
Systems Engineering techniques and approaches are applied to design and develop solutions for complex problems. Information and Communication Technology systems can be complex to develop where the impact of new technology is not always understood as humans can apply them different than intended. This necessitates the application of a Sociotechnical System framework to analyze the possible impact of a new technology. A rigorous and valid experimentation approach is required to analyze system behaviors in support of Systems Engineering efforts, which is difficult with complex Sociotechnical Systems. Cognitive Work Analysis and System Dynamics are two complementary approaches that can be applied within this context. The products of these methods assist in defining the hypothesis required for experimenting with the new technology.
系统工程技术和方法应用于设计和开发复杂问题的解决方案。信息和通信技术系统的开发可能很复杂,因为新技术的影响并不总是被理解,因为人类可以不同于预期地应用它们。这就需要应用社会技术系统框架来分析一项新技术可能产生的影响。需要一个严格和有效的实验方法来分析系统行为以支持系统工程工作,这对于复杂的社会技术系统是困难的。认知工作分析和系统动力学是两种互补的方法,可以在这种情况下应用。这些方法的产物有助于确定新技术实验所需的假设。
{"title":"An analysis methodology for impact of new technology in complex sociotechnical systems","authors":"R. Oosthuizen, L. Pretorius","doi":"10.1109/ICASTECH.2013.6707508","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707508","url":null,"abstract":"Systems Engineering techniques and approaches are applied to design and develop solutions for complex problems. Information and Communication Technology systems can be complex to develop where the impact of new technology is not always understood as humans can apply them different than intended. This necessitates the application of a Sociotechnical System framework to analyze the possible impact of a new technology. A rigorous and valid experimentation approach is required to analyze system behaviors in support of Systems Engineering efforts, which is difficult with complex Sociotechnical Systems. Cognitive Work Analysis and System Dynamics are two complementary approaches that can be applied within this context. The products of these methods assist in defining the hypothesis required for experimenting with the new technology.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114163133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detecting a malicious insider in the cloud environment using sequential rule mining 使用顺序规则挖掘检测云环境中的恶意内部人员
Pub Date : 2013-11-01 DOI: 10.1109/ICASTECH.2013.6707505
L. Nkosi, Paul Tarwireyi, M. Adigun
Cloud computing is a growing paradigm that offers a lot of benefits to cloud users. Despite the potential benefits that cloud computing could offer to business and individuals, security remains one of the growing concerns that are hindering the adoption of this paradigm. Researchers have identified and dealt with many security threats to cloud computing. However, insider threats still remain as one of the major concerns. Threats from malicious insiders are often listed as dangerous threats by many researchers. However, this threat has not received the attention it deserves because many organizations turn out to be extra careful about external threats than insider threats. This paper discusses an approach that can help in identifying insiders behaving in a malicious way, which may lead to an attack. A rule learning algorithm was used in learning the behavior pattern of users, in order to build user profiles. A Matching algorithm was then used to match the historical behavior of the user with the current behavior, in order to identify users that masquerade in the system as normal users. The obtained results show that it was possible to identify insiders that masquerade in the system by observing their behavior patterns.
云计算是一个不断发展的范例,它为云用户提供了很多好处。尽管云计算可以为企业和个人提供潜在的好处,但安全性仍然是阻碍采用这种模式的日益增长的担忧之一。研究人员已经发现并处理了云计算的许多安全威胁。然而,内部威胁仍然是主要问题之一。来自恶意内部人员的威胁经常被许多研究人员列为危险威胁。然而,这种威胁并没有得到应有的重视,因为许多组织对外部威胁比内部威胁更加小心。本文讨论了一种方法,可以帮助识别内部人员的恶意行为,这可能导致攻击。采用规则学习算法学习用户的行为模式,建立用户配置文件。然后使用匹配算法将用户的历史行为与当前行为进行匹配,以识别在系统中伪装成正常用户的用户。所获得的结果表明,可以通过观察其行为模式来识别在系统中伪装的内部人员。
{"title":"Detecting a malicious insider in the cloud environment using sequential rule mining","authors":"L. Nkosi, Paul Tarwireyi, M. Adigun","doi":"10.1109/ICASTECH.2013.6707505","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707505","url":null,"abstract":"Cloud computing is a growing paradigm that offers a lot of benefits to cloud users. Despite the potential benefits that cloud computing could offer to business and individuals, security remains one of the growing concerns that are hindering the adoption of this paradigm. Researchers have identified and dealt with many security threats to cloud computing. However, insider threats still remain as one of the major concerns. Threats from malicious insiders are often listed as dangerous threats by many researchers. However, this threat has not received the attention it deserves because many organizations turn out to be extra careful about external threats than insider threats. This paper discusses an approach that can help in identifying insiders behaving in a malicious way, which may lead to an attack. A rule learning algorithm was used in learning the behavior pattern of users, in order to build user profiles. A Matching algorithm was then used to match the historical behavior of the user with the current behavior, in order to identify users that masquerade in the system as normal users. The obtained results show that it was possible to identify insiders that masquerade in the system by observing their behavior patterns.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128193952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A novel cryptographic encryption technique of video images using quantum cryptography for satellite communications 一种基于量子密码的卫星通信视频图像加密新技术
Pub Date : 2013-11-01 DOI: 10.1109/ICASTECH.2013.6707496
Q. Kester, Laurent Nana, A. Pascu
In today's world where drones play a major role in military warfare and domestic surveillance activities, there is a need for transmission of secured video images without any intrusion by a third party. Any intrusion by an adversary should easily be detected in real-time and the compromised information should be virtually impossible to decipher. This paper proposed a new method of encryption of video images using quantum key distribution and visual cryptographic technique. The key agreement process was done using quantum key distribution and the generated key was be used by the proposed encryption algorithm.
在当今世界,无人机在军事战争和国内监视活动中发挥着重要作用,因此需要在不受第三方入侵的情况下传输安全的视频图像。对手的任何入侵都应该很容易被实时检测到,而且泄露的信息实际上不可能被破译。本文提出了一种利用量子密钥分配和视觉密码技术对视频图像进行加密的新方法。密钥协商过程采用量子密钥分发,生成的密钥用于加密算法。
{"title":"A novel cryptographic encryption technique of video images using quantum cryptography for satellite communications","authors":"Q. Kester, Laurent Nana, A. Pascu","doi":"10.1109/ICASTECH.2013.6707496","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707496","url":null,"abstract":"In today's world where drones play a major role in military warfare and domestic surveillance activities, there is a need for transmission of secured video images without any intrusion by a third party. Any intrusion by an adversary should easily be detected in real-time and the compromised information should be virtually impossible to decipher. This paper proposed a new method of encryption of video images using quantum key distribution and visual cryptographic technique. The key agreement process was done using quantum key distribution and the generated key was be used by the proposed encryption algorithm.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124658836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Semi-supervised local feature extraction of hyperspectral images over urban areas 城市地区高光谱图像的半监督局部特征提取
Pub Date : 2013-11-01 DOI: 10.1109/ICASTECH.2013.6707487
H. Adebanjo, J. Tapamo
We propose a novel Semi Supervised Local Embedding (SSLE) method for feature extraction from hyperspectral data. The proposed method combines a supervised method (Linear Discriminant Analysis (LDA)) and an unsupervised method (Local Linear Embedding (LLE)). The underlying idea is to get the Principal Components (PC) from the original data and input training samples from the principal components into LLE, LDA and into our proposed SSLE algorithm. Thereafter, Support Vetctor Machine (SVM) was used for classification. The overall accuracy of this new algorithm is then compared with other existing semi-supervised algorithms. Experiments on hyperspectral image show the efficacy of the proposed algorithm.
提出了一种新的半监督局部嵌入(SSLE)方法用于高光谱数据的特征提取。该方法结合了监督方法(线性判别分析(LDA))和非监督方法(局部线性嵌入(LLE))。其基本思想是从原始数据中获取主成分(PC),并从主成分中输入训练样本到LLE, LDA和我们提出的SSLE算法中。然后,使用支持向量机(SVM)进行分类。然后将该算法的总体精度与现有的半监督算法进行了比较。在高光谱图像上的实验表明了该算法的有效性。
{"title":"Semi-supervised local feature extraction of hyperspectral images over urban areas","authors":"H. Adebanjo, J. Tapamo","doi":"10.1109/ICASTECH.2013.6707487","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707487","url":null,"abstract":"We propose a novel Semi Supervised Local Embedding (SSLE) method for feature extraction from hyperspectral data. The proposed method combines a supervised method (Linear Discriminant Analysis (LDA)) and an unsupervised method (Local Linear Embedding (LLE)). The underlying idea is to get the Principal Components (PC) from the original data and input training samples from the principal components into LLE, LDA and into our proposed SSLE algorithm. Thereafter, Support Vetctor Machine (SVM) was used for classification. The overall accuracy of this new algorithm is then compared with other existing semi-supervised algorithms. Experiments on hyperspectral image show the efficacy of the proposed algorithm.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114995725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards a channel-agnostic mobile transaction platform to support drug adherence within a resource constrained environment 在资源受限的环境下,建立一个与渠道无关的移动交易平台来支持药物依从性
Pub Date : 2013-11-01 DOI: 10.1109/ICASTECH.2013.6707500
Mischa Koedderitzsch, A. Botha, M. Herselman, A. Coleman
The objective of this paper is to motivate the development of a Channel-Agnostic Mobile Transaction Platform to support drug adherence in a resource constrained environment, review relevant, existing literature in the areas of ICT4D, mHealth for development, and interventions to improve drug adherence, and propose a Design Science Research approach for the development of the platform. One of the main requirements for the utility of a Channel-Agnostic Mobile Transaction Platform is a high adaptation of mobile cellular technology and e-readiness of the audience, which holds true in South Africa. The platform will address the shortcomings of existing ICT solutions and will support services and transactions over multiple mobile channels to accommodate a variety of device capabilities and patients' preferences.
本文的目的是激励开发一个与渠道无关的移动交易平台,以支持资源受限环境下的药物依从性,回顾ICT4D、移动健康发展和改善药物依从性的干预措施领域的相关现有文献,并为平台的开发提出一种设计科学研究方法。一个与渠道无关的移动交易平台的主要需求之一是对移动蜂窝技术的高度适应和受众的电子准备程度,这在南非是正确的。该平台将解决现有ICT解决方案的缺点,并支持多种移动渠道的服务和交易,以适应各种设备功能和患者的偏好。
{"title":"Towards a channel-agnostic mobile transaction platform to support drug adherence within a resource constrained environment","authors":"Mischa Koedderitzsch, A. Botha, M. Herselman, A. Coleman","doi":"10.1109/ICASTECH.2013.6707500","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707500","url":null,"abstract":"The objective of this paper is to motivate the development of a Channel-Agnostic Mobile Transaction Platform to support drug adherence in a resource constrained environment, review relevant, existing literature in the areas of ICT4D, mHealth for development, and interventions to improve drug adherence, and propose a Design Science Research approach for the development of the platform. One of the main requirements for the utility of a Channel-Agnostic Mobile Transaction Platform is a high adaptation of mobile cellular technology and e-readiness of the audience, which holds true in South Africa. The platform will address the shortcomings of existing ICT solutions and will support services and transactions over multiple mobile channels to accommodate a variety of device capabilities and patients' preferences.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125798610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying vehicle descriptions in microblogging text with the aim of reducing or predicting crime 识别微博文本中的车辆描述,以减少或预测犯罪
Pub Date : 2013-11-01 DOI: 10.1109/ICASTECH.2013.6707494
Coral Featherstone
Could Social Media, and in particular, microblogs such as Twitter, play a part in helping to track criminal movement? The aim of this paper is to narrow the focus of this broader problem of using social media to crowdsource information to assist in the fight against crime, to the specific problem of identifying the description of vehicles in microblog text. As this problem has many aspects, especially in terms of data gathering and identification, an initial search is performed on preset keywords and the resulting database is tagged. The tags are then analysed to determine which features are the most common. Topic models are then run on the data to determine if any useful keyword can be found for further searches and initial statistics are recorded as a baseline for further processing. Our primary concern is establishing the common content of the relevant Tweets. The result could be used both for help with data collection as well as with feature selection when learning classification algorithms for data mining.
社交媒体,特别是像Twitter这样的微博,能在帮助追踪犯罪活动方面发挥作用吗?本文的目的是将利用社交媒体众包信息来协助打击犯罪这一更广泛的问题的焦点缩小到识别微博文本中车辆描述的具体问题上。由于这个问题有很多方面,特别是在数据收集和识别方面,因此对预设的关键字执行初始搜索,并对结果数据库进行标记。然后对标签进行分析,以确定哪些特征是最常见的。然后在数据上运行主题模型,以确定是否可以找到任何有用的关键字进行进一步搜索,并将初始统计数据记录为进一步处理的基线。我们主要关心的是建立相关推文的共同内容。该结果既可以用于数据收集的帮助,也可以用于学习数据挖掘分类算法时的特征选择。
{"title":"Identifying vehicle descriptions in microblogging text with the aim of reducing or predicting crime","authors":"Coral Featherstone","doi":"10.1109/ICASTECH.2013.6707494","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707494","url":null,"abstract":"Could Social Media, and in particular, microblogs such as Twitter, play a part in helping to track criminal movement? The aim of this paper is to narrow the focus of this broader problem of using social media to crowdsource information to assist in the fight against crime, to the specific problem of identifying the description of vehicles in microblog text. As this problem has many aspects, especially in terms of data gathering and identification, an initial search is performed on preset keywords and the resulting database is tagged. The tags are then analysed to determine which features are the most common. Topic models are then run on the data to determine if any useful keyword can be found for further searches and initial statistics are recorded as a baseline for further processing. Our primary concern is establishing the common content of the relevant Tweets. The result could be used both for help with data collection as well as with feature selection when learning classification algorithms for data mining.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121340391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The design of accessible and usable mobile services for low literate users 为低文化水平的用户设计可访问和可用的移动服务
Pub Date : 2013-11-01 DOI: 10.1109/ICASTECH.2013.6707504
P. Matyila, A. Botha, R. Alberts, G. Sibiya
The purpose of this paper is to assert that there is a need to design mobile services that are accessible and usable to low literacy user groups. There is currently an abundant availability of mobile phones supporting mobile services in the general population. However low literacy user groups have limited or no access to these mobile services. One of the challenges affecting access by these users is text and numeric intensity inherent in current mobile applications. Visual interfaces in terms of icons and widgets can provide a solution by minimizing the text intensity of the resulting mobile applications in support of mobile services. The standardization of the design of mobile applications geared for low literacy user groups is incomplete and poses challenges to the design community. Designing a sample mobile application satisfying the needs of low literacy users groups can form a working template which can facilitate the standardization process of mobile services for low literacy user groups. User centered approaches in the design of such an application are necessary for underpinning the needs of low literacy users. Further, a research approach supporting the creation of innovative artifacts enables variety in terms of the building blocks for providing a solution for the research problem. The design science research approach facilitates this requirement and further provides the necessary grounding for the research and as such it is adopted in the research process.
本文的目的是断言有必要设计对低文化水平用户群体可访问和可用的移动服务。目前,在普通人群中有大量支持移动服务的移动电话。然而,识字率低的用户群体很少或根本无法获得这些移动服务。影响这些用户访问的挑战之一是当前移动应用程序固有的文本和数字强度。图标和小部件方面的可视化界面可以提供一种解决方案,通过最小化生成的移动应用程序的文本强度来支持移动服务。针对低文化水平用户群体的移动应用程序设计的标准化是不完整的,这给设计社区带来了挑战。设计一个满足低文化用户群体需求的移动应用样本,可以形成一个工作模板,促进低文化用户群体移动服务的标准化进程。在设计这样的应用程序时,以用户为中心的方法对于支持低文化水平用户的需求是必要的。此外,一种支持创新工件创建的研究方法,能够在为研究问题提供解决方案的构建块方面实现多样性。设计科学研究方法促进了这一要求,并进一步为研究提供了必要的基础,因此它被采用在研究过程中。
{"title":"The design of accessible and usable mobile services for low literate users","authors":"P. Matyila, A. Botha, R. Alberts, G. Sibiya","doi":"10.1109/ICASTECH.2013.6707504","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707504","url":null,"abstract":"The purpose of this paper is to assert that there is a need to design mobile services that are accessible and usable to low literacy user groups. There is currently an abundant availability of mobile phones supporting mobile services in the general population. However low literacy user groups have limited or no access to these mobile services. One of the challenges affecting access by these users is text and numeric intensity inherent in current mobile applications. Visual interfaces in terms of icons and widgets can provide a solution by minimizing the text intensity of the resulting mobile applications in support of mobile services. The standardization of the design of mobile applications geared for low literacy user groups is incomplete and poses challenges to the design community. Designing a sample mobile application satisfying the needs of low literacy users groups can form a working template which can facilitate the standardization process of mobile services for low literacy user groups. User centered approaches in the design of such an application are necessary for underpinning the needs of low literacy users. Further, a research approach supporting the creation of innovative artifacts enables variety in terms of the building blocks for providing a solution for the research problem. The design science research approach facilitates this requirement and further provides the necessary grounding for the research and as such it is adopted in the research process.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122989195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A focussed dynamic path finding algorithm with constraints 一种带约束的聚焦动态寻径算法
Pub Date : 2013-11-01 DOI: 10.1109/ICASTECH.2013.6707501
L. Leenen, A. Terlunen
The Military Unit Path Finding Problem (MUPFP) is the problem of finding a path from a starting point to a destination where a military unit has to move, or be moved, safely whilst avoiding threats and obstacles and minimising path cost in some digital representation of the actual terrain [1]. The MUPFP has to be solved in an environment where information can change whilst the optimal path is being calculated, i.e. obstacles and threats can move or appear and path costs can change. In previous work, the authors formulated the MUPFP as a constraint satisfaction problem (CSP) where path costs are minimised whilst threat and obstacle avoidance constraints are satisfied in a dynamic environment [2]. In this paper the previous algorithm is improved by adding a heuristic to focus the search for an optimal path. Existing approaches to solving path planning problems tend to combine path costs with various other criteria such as obstacle avoidance in the objective function which is being optimised. The authors' approach is to optimise only path costs while ensuring that other criteria such as safety requirements, are met through the satisfaction of added constraints. Both the authors' previous algorithm and the improved version presented in this paper are based on dynamic path planning algorithms presented by Stenz [3], [4]. Stenz's original D* algorithm solves dynamic path finding problems (by optimising path costs without satisfying additional constraints) and his Focussed D* algorithm employs a heuristic function to focus the search. Stenz's algorithms only optimises path costs; no additional factors such as threat and obstacle avoidance are addressed.
军事单位寻径问题(MUPFP)是指在实际地形的一些数字表示中,寻找从起点到目的地的路径问题,军事单位必须在安全的情况下移动或被移动,同时避免威胁和障碍物,并将路径成本最小化[1]。MUPFP必须在计算最优路径时信息可能发生变化的环境中解决,即障碍物和威胁可能移动或出现,路径成本可能发生变化。在之前的工作中,作者将MUPFP表述为约束满足问题(CSP),其中路径成本最小化,同时在动态环境中满足威胁和避障约束[2]。本文通过增加一个启发式算法来集中搜索最优路径,对先前的算法进行了改进。解决路径规划问题的现有方法倾向于将路径成本与其他各种标准相结合,例如在目标函数中进行优化的避障。作者的方法是只优化路径成本,同时确保通过满足附加约束来满足其他标准,如安全要求。作者之前的算法和本文提出的改进版本都是基于Stenz[3],[4]提出的动态路径规划算法。Stenz最初的D*算法解决了动态寻路问题(通过在不满足额外约束的情况下优化路径成本),他的Focussed D*算法采用启发式函数来集中搜索。Stenz的算法只优化路径成本;没有其他因素,如威胁和障碍规避。
{"title":"A focussed dynamic path finding algorithm with constraints","authors":"L. Leenen, A. Terlunen","doi":"10.1109/ICASTECH.2013.6707501","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707501","url":null,"abstract":"The Military Unit Path Finding Problem (MUPFP) is the problem of finding a path from a starting point to a destination where a military unit has to move, or be moved, safely whilst avoiding threats and obstacles and minimising path cost in some digital representation of the actual terrain [1]. The MUPFP has to be solved in an environment where information can change whilst the optimal path is being calculated, i.e. obstacles and threats can move or appear and path costs can change. In previous work, the authors formulated the MUPFP as a constraint satisfaction problem (CSP) where path costs are minimised whilst threat and obstacle avoidance constraints are satisfied in a dynamic environment [2]. In this paper the previous algorithm is improved by adding a heuristic to focus the search for an optimal path. Existing approaches to solving path planning problems tend to combine path costs with various other criteria such as obstacle avoidance in the objective function which is being optimised. The authors' approach is to optimise only path costs while ensuring that other criteria such as safety requirements, are met through the satisfaction of added constraints. Both the authors' previous algorithm and the improved version presented in this paper are based on dynamic path planning algorithms presented by Stenz [3], [4]. Stenz's original D* algorithm solves dynamic path finding problems (by optimising path costs without satisfying additional constraints) and his Focussed D* algorithm employs a heuristic function to focus the search. Stenz's algorithms only optimises path costs; no additional factors such as threat and obstacle avoidance are addressed.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132652147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automated classification of computer network attacks 计算机网络攻击的自动分类
Pub Date : 2013-11-01 DOI: 10.1109/ICASTECH.2013.6707510
Renier van Heerden, L. Leenen, B. Irwin
In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes and inter-class relationships and has previously been implemented in the Protege ontology editor. Two significant recent instances of network based attacks are presented as individuals in the ontology and correctly classified by the automated reasoner according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank in 2012.
在本文中,我们演示了如何使用自动推理器(HermiT)与网络攻击本体一起对基于计算机网络的攻击实例进行分类。本体通过类和类间关系描述了不同类型的网络攻击,以前已经在Protege本体编辑器中实现过。最近两个重要的基于网络的攻击实例作为个体呈现在本体中,并由自动推理器根据本体中描述的相关攻击场景类型正确分类。这两起网络攻击事件分别是2013年针对SpamHaus的分布式拒绝服务攻击和2012年南非邮政银行4200万兰特(670万美元)被盗。
{"title":"Automated classification of computer network attacks","authors":"Renier van Heerden, L. Leenen, B. Irwin","doi":"10.1109/ICASTECH.2013.6707510","DOIUrl":"https://doi.org/10.1109/ICASTECH.2013.6707510","url":null,"abstract":"In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes and inter-class relationships and has previously been implemented in the Protege ontology editor. Two significant recent instances of network based attacks are presented as individuals in the ontology and correctly classified by the automated reasoner according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank in 2012.","PeriodicalId":173317,"journal":{"name":"2013 International Conference on Adaptive Science and Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121153759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2013 International Conference on Adaptive Science and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1