首页 > 最新文献

2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)最新文献

英文 中文
Developing a Mobile Application and Six Sigma for Health Awareness Improvement regarding Diabetic Students in Kuwait 开发一个移动应用程序和六西格玛,以提高科威特糖尿病学生的健康意识
S. Kasap
In this study an attempt is made to improve health awareness regarding diabetic students in primary schools in Kuwait. First, a pilot test was conducted to prove the existence of the problem. The results revealed that 45% of teachers did not know the symptoms of hypoglycemia where 20% of them faced more than 6 cases of diabetic students in a school. Voice of the Customer (VOC) was then gained through a parent survey to identify the Critical to Quality (CTQ). Afterwards, teacher's current performance level was measured by distributing a Knowledge Test and the results revealed that it is 57.7% and therefore, the team decided to focus on increasing and improving health awareness of diabetes for the students and teachers. In order to do that, this research had two folds: developing a mobile application "I. Diabetic" to be used by students to assist them managing their heath condition while they are at school or out having a normal life and applying a six sigma study to increase teacher's awareness regarding diabetes and diabetic students in schools. Several Coding and Quality tools have been used and implemented in this work such as the Android Studio, Quality Function Deployment (QFD) and Failure Mode Effect Analysis (FMEA) in order to develop the mobile application and analyze and improve health awareness.
本研究旨在提高科威特小学糖尿病学生的健康意识。首先,进行了一次试点试验,以证明问题的存在。结果显示,45%的教师不知道低血糖的症状,其中20%的教师面对一所学校6例以上的糖尿病学生。然后通过家长调查获得客户的声音(VOC),以确定关键质量(CTQ)。之后,通过分发知识测试来测量教师的当前绩效水平,结果显示为57.7%,因此,团队决定将重点放在提高和提高学生和教师对糖尿病的健康意识上。为了做到这一点,本研究有两个方面:开发一个移动应用程序“I. diabetes”,以帮助学生在学校或正常生活中管理自己的健康状况,并应用六西格玛研究来提高教师对糖尿病和在校糖尿病学生的认识。在这项工作中使用并实施了几个编码和质量工具,如Android Studio,质量功能部署(QFD)和故障模式影响分析(FMEA),以开发移动应用程序并分析和提高健康意识。
{"title":"Developing a Mobile Application and Six Sigma for Health Awareness Improvement regarding Diabetic Students in Kuwait","authors":"S. Kasap","doi":"10.1109/W-FiCloud.2018.00025","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2018.00025","url":null,"abstract":"In this study an attempt is made to improve health awareness regarding diabetic students in primary schools in Kuwait. First, a pilot test was conducted to prove the existence of the problem. The results revealed that 45% of teachers did not know the symptoms of hypoglycemia where 20% of them faced more than 6 cases of diabetic students in a school. Voice of the Customer (VOC) was then gained through a parent survey to identify the Critical to Quality (CTQ). Afterwards, teacher's current performance level was measured by distributing a Knowledge Test and the results revealed that it is 57.7% and therefore, the team decided to focus on increasing and improving health awareness of diabetes for the students and teachers. In order to do that, this research had two folds: developing a mobile application \"I. Diabetic\" to be used by students to assist them managing their heath condition while they are at school or out having a normal life and applying a six sigma study to increase teacher's awareness regarding diabetes and diabetic students in schools. Several Coding and Quality tools have been used and implemented in this work such as the Android Studio, Quality Function Deployment (QFD) and Failure Mode Effect Analysis (FMEA) in order to develop the mobile application and analyze and improve health awareness.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"279 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131521561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Markov Chain Based Link Lifetime Prediction in Mobile Ad Hoc Networks 基于马尔可夫链的移动Ad Hoc网络链路寿命预测
Sayed Chhattan Shah, Sunil Kumar
A mobile ad hoc network provides communication and network services to internet of things and cyber physical system applications. The failure of a link in mobile ad hoc network during data transmission increases communication and energy consumption cost due to route rediscovery and reselection process. It may also result into a communication failure and therefore cyber physical system application failure. To avoid link failure during data transmission, a link lifetime prediction model is required. This paper proposes two link lifetime prediction models: LLPC and LLPH. LLPC model predicts link lifetime based on current information of nodes such as mobility and residual energy whereas LLPH uses history of link lifetime intervals to predict the link lifetime. Compared to existing models, LLPC model considers node mobility as well as residual energy whereas LLPH relies on history of links rather than user's mobility patterns or social relationships.
移动自组织网络为物联网和网络物理系统应用提供通信和网络服务。移动自组网在数据传输过程中,由于路由的重新发现和重新选择,链路故障增加了通信成本和能耗成本。它还可能导致通信失败,从而导致网络物理系统应用失败。为了避免数据传输过程中链路出现故障,需要建立链路寿命预测模型。本文提出了两种链路寿命预测模型:LLPC和LLPH。LLPC模型根据节点的迁移率和剩余能量等当前信息来预测链路的生存期,而LLPH模型则利用链路生存期间隔的历史来预测链路的生存期。与现有模型相比,LLPC模型考虑了节点的移动性和剩余能量,而LLPH模型依赖于链路的历史,而不是用户的移动模式或社会关系。
{"title":"A Markov Chain Based Link Lifetime Prediction in Mobile Ad Hoc Networks","authors":"Sayed Chhattan Shah, Sunil Kumar","doi":"10.1109/W-FICLOUD.2018.00011","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00011","url":null,"abstract":"A mobile ad hoc network provides communication and network services to internet of things and cyber physical system applications. The failure of a link in mobile ad hoc network during data transmission increases communication and energy consumption cost due to route rediscovery and reselection process. It may also result into a communication failure and therefore cyber physical system application failure. To avoid link failure during data transmission, a link lifetime prediction model is required. This paper proposes two link lifetime prediction models: LLPC and LLPH. LLPC model predicts link lifetime based on current information of nodes such as mobility and residual energy whereas LLPH uses history of link lifetime intervals to predict the link lifetime. Compared to existing models, LLPC model considers node mobility as well as residual energy whereas LLPH relies on history of links rather than user's mobility patterns or social relationships.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121735998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computing Len for Exploring the Historical People's Social Network 探索历史人物社会网络的计算Len
Junjie Huang, Tiejian Luo
A typical social research topic is to figure out the influential people's relationship and its weights. It is very tedious for social scientists to solve those problems by studying massive literature. Digital humanities bring a new way to a social subject. In this paper, we propose a framework for social scientists to find out ancient figures'power and their camp. The core of our framework consists of signed graph model and novel group partition algorithm. We validate and verify our solution by China Biographical Database Project (CBDB) dataset. The analytic results on a case study demonstrate the effectiveness of our framework, which gets information that consists with the literature's facts and social scientists' viewpoints.
一个典型的社会研究课题是找出有影响力的人的关系及其权重。对于社会科学家来说,通过研究大量文献来解决这些问题是非常繁琐的。数字人文学科为一门社会学科带来了新的途径。在本文中,我们提出了一个框架,为社会科学家发现古代人物的权力和他们的阵营。该框架的核心是签名图模型和新的群划分算法。我们用中国传记数据库项目(CBDB)的数据集验证了我们的解决方案。一个案例研究的分析结果证明了我们的框架的有效性,它得到的信息与文献的事实和社会科学家的观点相一致。
{"title":"Computing Len for Exploring the Historical People's Social Network","authors":"Junjie Huang, Tiejian Luo","doi":"10.1109/w-ficloud.2018.00021","DOIUrl":"https://doi.org/10.1109/w-ficloud.2018.00021","url":null,"abstract":"A typical social research topic is to figure out the influential people's relationship and its weights. It is very tedious for social scientists to solve those problems by studying massive literature. Digital humanities bring a new way to a social subject. In this paper, we propose a framework for social scientists to find out ancient figures'power and their camp. The core of our framework consists of signed graph model and novel group partition algorithm. We validate and verify our solution by China Biographical Database Project (CBDB) dataset. The analytic results on a case study demonstrate the effectiveness of our framework, which gets information that consists with the literature's facts and social scientists' viewpoints.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121932922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Energy-Scalable Montgomery-Curve ECDH Key Exchange for ARM Cortex-M3 Microcontrollers ARM Cortex-M3微控制器的能量可扩展montgomery曲线ECDH密钥交换
Christian Franck, J. Großschädl, Yann Le Corre, Cyrille Lenou Tago
The number of smart devices connected to the Internet is growing at an enormous pace and will reach 30 billion within the next five years. A large fraction of these devices have limited processing capabilities and energy supply, which makes the execution of computation-intensive cryptographic algorithms very costly. This problem is exacerbated by the fact that basic optimization techniques like loop unrolling can not (always) be applied since cryptographic software for the IoT often needs to meet strict constraints on code size to not exceed the program storage capacity of the target device. In this paper we introduce SECCCM3, a "lightweight" software library for scalable elliptic curve cryptography on ARM Cortex-M3 microcontrollers. The current version of SECCCM3 is able to carry out variable-base scalar multiplication on Montgomery-form curves over pseudo-Mersenne prime fields, such as Curve25519, and can be used to implement static ECDH key exchange. SECCCM3 is scalable in the sense that it supports curves of different order (as long as certain conditions are met), thereby enabling trade-offs between security and execution time (resp. energy dissipation). We made an effort to protect the field arithmetic against Timing Attacks (TAs) and Simple Power Analysis (SPA), taking into account the so-called early-termination effect of the Cortex-M3 integer multiplier, which makes the latency of "long" multiply instructions operand-dependent. Our experiments show that the integration of countermeasures against information leakage caused by this effect increases the execution time by 34%, while the code size grows by 13%. A TA and SPA-resistant scalar multiplication on Curve25519 has an execution time of 4.565 million clock cycles and consumes approximately 2.3 mJ of energy when executed on a STM32L152RE Cortex-M3 microcontroller. SECCCM3 has a binary code size of 4.0 kB, which includes domain parameters for curves over 159, 191, 223, and 255-bit prime fields.
连接到互联网的智能设备的数量正在以惊人的速度增长,并将在未来五年内达到300亿。这些设备中的很大一部分具有有限的处理能力和能量供应,这使得执行计算密集型加密算法的成本非常高。由于物联网的加密软件通常需要满足对代码大小的严格限制,以不超过目标设备的程序存储容量,因此不能(总是)应用诸如循环展开之类的基本优化技术,这一事实加剧了这个问题。本文介绍了SECCCM3,一个用于ARM Cortex-M3微控制器上可扩展椭圆曲线加密的“轻量级”软件库。当前版本的SECCCM3能够在伪mersenne素数域(如Curve25519)上对montgomery型曲线进行变基标量乘法,并可用于实现静态ECDH密钥交换。SECCCM3是可伸缩的,因为它支持不同顺序的曲线(只要满足某些条件),从而可以在安全性和执行时间之间进行权衡。能量耗散)。我们努力保护字段算法免受时序攻击(TAs)和简单功率分析(SPA),考虑到所谓的Cortex-M3整数乘子的早期终止效应,这使得“长”乘法指令的延迟依赖于操作数。我们的实验表明,针对这种影响导致的信息泄漏的对策集成使执行时间增加了34%,而代码大小增加了13%。在STM32L152RE Cortex-M3微控制器上执行时,Curve25519上抗TA和spa的标量乘法的执行时间为456.5万个时钟周期,消耗约2.3 mJ的能量。SECCCM3的二进制码大小为4.0 kB,其中包括159、191、223和255位素数域曲线的域参数。
{"title":"Energy-Scalable Montgomery-Curve ECDH Key Exchange for ARM Cortex-M3 Microcontrollers","authors":"Christian Franck, J. Großschädl, Yann Le Corre, Cyrille Lenou Tago","doi":"10.1109/W-FICLOUD.2018.00044","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00044","url":null,"abstract":"The number of smart devices connected to the Internet is growing at an enormous pace and will reach 30 billion within the next five years. A large fraction of these devices have limited processing capabilities and energy supply, which makes the execution of computation-intensive cryptographic algorithms very costly. This problem is exacerbated by the fact that basic optimization techniques like loop unrolling can not (always) be applied since cryptographic software for the IoT often needs to meet strict constraints on code size to not exceed the program storage capacity of the target device. In this paper we introduce SECCCM3, a \"lightweight\" software library for scalable elliptic curve cryptography on ARM Cortex-M3 microcontrollers. The current version of SECCCM3 is able to carry out variable-base scalar multiplication on Montgomery-form curves over pseudo-Mersenne prime fields, such as Curve25519, and can be used to implement static ECDH key exchange. SECCCM3 is scalable in the sense that it supports curves of different order (as long as certain conditions are met), thereby enabling trade-offs between security and execution time (resp. energy dissipation). We made an effort to protect the field arithmetic against Timing Attacks (TAs) and Simple Power Analysis (SPA), taking into account the so-called early-termination effect of the Cortex-M3 integer multiplier, which makes the latency of \"long\" multiply instructions operand-dependent. Our experiments show that the integration of countermeasures against information leakage caused by this effect increases the execution time by 34%, while the code size grows by 13%. A TA and SPA-resistant scalar multiplication on Curve25519 has an execution time of 4.565 million clock cycles and consumes approximately 2.3 mJ of energy when executed on a STM32L152RE Cortex-M3 microcontroller. SECCCM3 has a binary code size of 4.0 kB, which includes domain parameters for curves over 159, 191, 223, and 255-bit prime fields.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"31 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125706549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Study of Rule Placement Schemes for Minimizing TCAM Space and Effective Bandwidth Utilization in SDN SDN中最小化TCAM空间和有效带宽利用率的规则放置方案研究
Yen-Wen Chen, Yu-Hsuan Lin
Software Defined Networking (SDN) provides flexible route arrangement and specific packets processing through the resided flow table. The flow table is always implemented by using ternary content addressable memory (TCAM) for fast packet matching and forwarding. In addition to the route information, TCAM provides packet processing rules to deal with packet redirection, filtering, and dropping for network security consideration. The packet filtering rules are also placed in the flow table of a specific SDN switch that the packet will pass through. If the rule can be placed at the switch that most packets are aggregated, then it will save the overall TCAM utilization. However, it will consume more link bandwidth, if the packet shall be dropped before it reaches the switch that the associated rule is placed. This paper proposes the rule placement scheme by considering the tradeoff of TCAM space utilization and the bandwidth consumption in SDN networks. Practical network topologies were adopted for exhaustive simulations. The simulation results show that the proposed scheme achieves the desired objective.
SDN (Software Defined Networking)通过驻留流表提供灵活的路由安排和特定的报文处理。流表通常使用三元内容可寻址存储器(TCAM)来实现数据包的快速匹配和转发。除了路由信息外,TCAM还提供了数据包处理规则,用于处理数据包的重定向、过滤和丢弃,以保证网络安全。包过滤规则也被放置在数据包将经过的特定SDN交换机的流表中。如果规则可以放在大多数数据包聚合的交换机上,那么它将节省总体TCAM利用率。但是,如果在数据包到达放置关联规则的交换机之前将其丢弃,则会消耗更多的链路带宽。本文提出了在SDN网络中权衡TCAM空间利用率和带宽消耗的规则放置方案。采用实际的网络拓扑进行了详尽的仿真。仿真结果表明,该方案达到了预期目标。
{"title":"Study of Rule Placement Schemes for Minimizing TCAM Space and Effective Bandwidth Utilization in SDN","authors":"Yen-Wen Chen, Yu-Hsuan Lin","doi":"10.1109/W-FICLOUD.2018.00010","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00010","url":null,"abstract":"Software Defined Networking (SDN) provides flexible route arrangement and specific packets processing through the resided flow table. The flow table is always implemented by using ternary content addressable memory (TCAM) for fast packet matching and forwarding. In addition to the route information, TCAM provides packet processing rules to deal with packet redirection, filtering, and dropping for network security consideration. The packet filtering rules are also placed in the flow table of a specific SDN switch that the packet will pass through. If the rule can be placed at the switch that most packets are aggregated, then it will save the overall TCAM utilization. However, it will consume more link bandwidth, if the packet shall be dropped before it reaches the switch that the associated rule is placed. This paper proposes the rule placement scheme by considering the tradeoff of TCAM space utilization and the bandwidth consumption in SDN networks. Practical network topologies were adopted for exhaustive simulations. The simulation results show that the proposed scheme achieves the desired objective.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114291097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Predictive Repair and Support of Engineering Systems Based on Distributed Data Processing Model within an IoT Concept 基于物联网概念下分布式数据处理模型的工程系统预测修复与支持
V. Kireev, S. A. Filippov, A. Guseva, Pyotr V. Bochkaryov, I. A. Kuznetsov, V. Migalin, S. S. Filin
The development of cloud technologies, miniaturization of computing and sensor devices has led to an explosive growth in the field of the Internet of Things. One of the promising research areas within the framework of this concept is smart homes, and, more broadly, smart cities, associated with increasing the values of such parameters of housing and utility services as energy efficiency, resistance to failures, failing and efficiency in general. This article is devoted to the development of an information system for monitoring, remote management and maintenance of engineering systems at the housing infrastructure facilities. The functions of information system include the operational status control of engineering systems on housing infrastructure objects, support, maintenance, repair, prediction and alerts on routine, unplanned and critical situations. This system is based on the concept of "Dew computing - Fog computing - Cloud computing" and is designed to collect and process Big Data, collected via the Internet of Things.
云技术的发展、计算和传感器设备的小型化导致了物联网领域的爆炸式增长。在这一概念的框架内,一个有前途的研究领域是智能家居,更广泛地说,是智能城市,它与增加住房和公用事业服务参数的价值有关,如能源效率、抗故障能力、失败和效率。本文致力于开发一个用于监测、远程管理和维护住房基础设施工程系统的信息系统。信息系统的功能包括对住房基础设施对象的工程系统的运行状态控制,支持,维护,修理,对日常,计划外和紧急情况的预测和警报。该系统基于“露水计算-雾计算-云计算”的概念,旨在收集和处理通过物联网收集的大数据。
{"title":"Predictive Repair and Support of Engineering Systems Based on Distributed Data Processing Model within an IoT Concept","authors":"V. Kireev, S. A. Filippov, A. Guseva, Pyotr V. Bochkaryov, I. A. Kuznetsov, V. Migalin, S. S. Filin","doi":"10.1109/W-FICLOUD.2018.00019","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00019","url":null,"abstract":"The development of cloud technologies, miniaturization of computing and sensor devices has led to an explosive growth in the field of the Internet of Things. One of the promising research areas within the framework of this concept is smart homes, and, more broadly, smart cities, associated with increasing the values of such parameters of housing and utility services as energy efficiency, resistance to failures, failing and efficiency in general. This article is devoted to the development of an information system for monitoring, remote management and maintenance of engineering systems at the housing infrastructure facilities. The functions of information system include the operational status control of engineering systems on housing infrastructure objects, support, maintenance, repair, prediction and alerts on routine, unplanned and critical situations. This system is based on the concept of \"Dew computing - Fog computing - Cloud computing\" and is designed to collect and process Big Data, collected via the Internet of Things.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130725503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
[Title page i] [标题页i]
{"title":"[Title page i]","authors":"","doi":"10.1109/w-ficloud.2018.00001","DOIUrl":"https://doi.org/10.1109/w-ficloud.2018.00001","url":null,"abstract":"","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132677195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Understanding of Gamification in Blockchain Systems 关于区块链系统中游戏化的理解
R. Parizi, A. Dehghantanha
Blockchain is a new trend rising fast from the community and the enterprise world. As an infrastructural technology it is finding its way into a growing number of domains like finance, medical, digital marketplace, pharmaceutical and government agencies. While blockchain technology is primarily thought as the foundation of Bitcoin, it has grown far beyond underpinning the virtual currency. It promises building better trust, transparency, and integrity without a third-party and the risk of censorship. These remarkable advantages do however come at a price. The blockchain ecosystem is riddled with human-centric and economical issues for its participants, leading to unintended consequences in decentralized networks. Gamified software engineering is a growing field that in particular taps into gamification technology, the application of game mechanics in non-game contexts, to address human-related concerns. There are currently no studies around blockchain that have been identified to have a clear view of existing research and solutions for utilizing the gamification in the emerging blockchain systems. As a first step towards filling this gap, this paper discusses and identifies two major human-based problems in the blockchain decentralized applications and development. For those problems, it proposes a preliminary gamified model to provide a basis for expanding future research and applications in this joint domain.
区块链是社区和企业界迅速兴起的一种新趋势。作为一项基础设施技术,它正在进入越来越多的领域,如金融、医疗、数字市场、制药和政府机构。虽然区块链技术主要被认为是比特币的基础,但它的发展远远超出了支撑虚拟货币的范畴。它承诺在没有第三方和审查风险的情况下建立更好的信任、透明度和诚信。然而,这些显著的优势是有代价的。区块链生态系统充斥着以人为中心的问题和参与者的经济问题,导致去中心化网络产生意想不到的后果。游戏化软件工程是一个不断发展的领域,特别是利用游戏化技术,在非游戏环境中应用游戏机制,以解决与人类相关的问题。目前还没有关于区块链的研究被确定对现有研究和在新兴区块链系统中利用游戏化的解决方案有一个清晰的看法。作为填补这一空白的第一步,本文讨论并确定了区块链分散应用程序和开发中两个主要的基于人的问题。针对这些问题,提出了一个初步的游戏化模型,为进一步扩大该联合领域的研究和应用提供了基础。
{"title":"On the Understanding of Gamification in Blockchain Systems","authors":"R. Parizi, A. Dehghantanha","doi":"10.1109/W-FiCloud.2018.00041","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2018.00041","url":null,"abstract":"Blockchain is a new trend rising fast from the community and the enterprise world. As an infrastructural technology it is finding its way into a growing number of domains like finance, medical, digital marketplace, pharmaceutical and government agencies. While blockchain technology is primarily thought as the foundation of Bitcoin, it has grown far beyond underpinning the virtual currency. It promises building better trust, transparency, and integrity without a third-party and the risk of censorship. These remarkable advantages do however come at a price. The blockchain ecosystem is riddled with human-centric and economical issues for its participants, leading to unintended consequences in decentralized networks. Gamified software engineering is a growing field that in particular taps into gamification technology, the application of game mechanics in non-game contexts, to address human-related concerns. There are currently no studies around blockchain that have been identified to have a clear view of existing research and solutions for utilizing the gamification in the emerging blockchain systems. As a first step towards filling this gap, this paper discusses and identifies two major human-based problems in the blockchain decentralized applications and development. For those problems, it proposes a preliminary gamified model to provide a basis for expanding future research and applications in this joint domain.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124023183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Applying Big Data Technologies to Detect Cases of Money Laundering and Counter Financing of Terrorism 运用大数据技术侦破洗钱和反恐融资案件
Kirill V. Plaksiy, A. Nikiforov, N. Miloslavskaya
The paper suggests a technique that allows to automate schemes that generates new criminal cases for money laundering and counter financing of terrorism (ML/CFT), which are based on ML/CFT typologies but do not appear as their exact copies. This feature hinders an automated system from making a decision about their exact coincidence or its absence while comparing case objects and links among them and links in ML/CFT typologies. Possibilities and advantages of application of Big Data for financial investigation data analysis and processing are also explored. The visualization of ML/CFT typologies with the use of graphs is considered. The article proposes a technique for generating variants of typologies (for example, "Peso" typology, "commission scheme") based on cases built on typologies. A program for implementation and verification of this technique was written and successfully tested on case graphs built on typologies.
该论文提出了一种技术,该技术允许自动生成新的洗钱和反恐怖主义融资(ML/CFT)刑事案件的方案,这些方案基于ML/CFT类型,但不显示为其精确副本。在比较case对象和它们之间的链接以及ML/CFT类型中的链接时,该特性阻碍了自动化系统对它们的精确重合或缺失做出决定。探讨了大数据在金融调查数据分析处理中的应用可能性和优势。考虑了使用图来可视化ML/CFT类型。本文提出了一种基于基于类型学的案例生成类型学变体的技术(例如,“Peso”类型学,“commission scheme”)。编写了用于实现和验证该技术的程序,并成功地在基于类型学的案例图上进行了测试。
{"title":"Applying Big Data Technologies to Detect Cases of Money Laundering and Counter Financing of Terrorism","authors":"Kirill V. Plaksiy, A. Nikiforov, N. Miloslavskaya","doi":"10.1109/W-FICLOUD.2018.00017","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00017","url":null,"abstract":"The paper suggests a technique that allows to automate schemes that generates new criminal cases for money laundering and counter financing of terrorism (ML/CFT), which are based on ML/CFT typologies but do not appear as their exact copies. This feature hinders an automated system from making a decision about their exact coincidence or its absence while comparing case objects and links among them and links in ML/CFT typologies. Possibilities and advantages of application of Big Data for financial investigation data analysis and processing are also explored. The visualization of ML/CFT typologies with the use of graphs is considered. The article proposes a technique for generating variants of typologies (for example, \"Peso\" typology, \"commission scheme\") based on cases built on typologies. A program for implementation and verification of this technique was written and successfully tested on case graphs built on typologies.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123029091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Proposal of Analysis and Evaluation Method of Urban Area Space Utilizing of Wheelchair Probe Information 基于轮椅探测信息的城市空间分析与评价方法的提出
Yuriko Oda, Fumihito Ito, Ory Yoshifuji, Youichi Oda, S. Kanai, Zong Shichun, H. Ohuchi
This project is co-created by wheelchair users worldwide by posting their experiences and ideas on the map application, also provides details of suitable alternative routes.We propose these measurement methods and constructed the evaluation model. We believe these are useful as reference values for facility development, analysis and evaluation in future cities and regional spaces.
这个项目是由世界各地的轮椅使用者共同创建的,他们将自己的经验和想法张贴在地图应用程序上,同时还提供了合适的替代路线的详细信息。提出了这些测量方法,并构建了评价模型。我们相信这些对未来城市和区域空间的设施开发、分析和评估具有参考价值。
{"title":"Proposal of Analysis and Evaluation Method of Urban Area Space Utilizing of Wheelchair Probe Information","authors":"Yuriko Oda, Fumihito Ito, Ory Yoshifuji, Youichi Oda, S. Kanai, Zong Shichun, H. Ohuchi","doi":"10.1109/W-FICLOUD.2018.00033","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00033","url":null,"abstract":"This project is co-created by wheelchair users worldwide by posting their experiences and ideas on the map application, also provides details of suitable alternative routes.We propose these measurement methods and constructed the evaluation model. We believe these are useful as reference values for facility development, analysis and evaluation in future cities and regional spaces.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131643087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1