首页 > 最新文献

2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)最新文献

英文 中文
A Privacy Preserving Context-Aware Insider Threat Prediction and Prevention Model Predicated on the Components of the Fraud Diamond 基于欺诈钻石组件的隐私保护上下文感知内部威胁预测与预防模型
Solomon Mekonnen, Keshnee Padayachee, M. Meshesha
This paper presents a novel, interdisciplinary insider threat prediction and prevention model which combines several approaches, techniques and tools from computer science, criminology and psychology. It is based on the fraud diamond which comprises four components: pressure (i.e. motive), opportunity, capability and rationalisation. In general, it has been found that a criminal must have the motive and opportunity to commit a crime. However, the criminal must also have the capability to commit crime particularly in the cybercrime domain. Furthermore, criminals tend to rationalise (i.e. excuse) their crimes. The model presented here involves leveraging the fraud diamond to predict and prevent insider threats. Typically insider threat prediction and prevention models tend to overlook the privacy concerns of insiders. Hence the deployment of the model involves gathering information about the insider's possible intent within a privacy-preserving context. This will help to identify high risk insider threats while balancing privacy concerns.
本文提出了一种新的、跨学科的内部威胁预测和预防模型,该模型结合了计算机科学、犯罪学和心理学的几种方法、技术和工具。它基于欺诈钻石,它由四个部分组成:压力(即动机),机会,能力和合理化。一般来说,已经发现罪犯必须有犯罪的动机和机会。然而,犯罪分子还必须具备犯罪能力,特别是在网络犯罪领域。此外,罪犯倾向于为他们的罪行找借口。这里提出的模型包括利用欺诈钻石来预测和防止内部威胁。典型的内部威胁预测和预防模型往往忽略了内部人员的隐私问题。因此,该模型的部署涉及在保护隐私的上下文中收集有关内部人员可能意图的信息。这将有助于识别高风险的内部威胁,同时平衡隐私问题。
{"title":"A Privacy Preserving Context-Aware Insider Threat Prediction and Prevention Model Predicated on the Components of the Fraud Diamond","authors":"Solomon Mekonnen, Keshnee Padayachee, M. Meshesha","doi":"10.1109/GOCICT.2015.20","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.20","url":null,"abstract":"This paper presents a novel, interdisciplinary insider threat prediction and prevention model which combines several approaches, techniques and tools from computer science, criminology and psychology. It is based on the fraud diamond which comprises four components: pressure (i.e. motive), opportunity, capability and rationalisation. In general, it has been found that a criminal must have the motive and opportunity to commit a crime. However, the criminal must also have the capability to commit crime particularly in the cybercrime domain. Furthermore, criminals tend to rationalise (i.e. excuse) their crimes. The model presented here involves leveraging the fraud diamond to predict and prevent insider threats. Typically insider threat prediction and prevention models tend to overlook the privacy concerns of insiders. Hence the deployment of the model involves gathering information about the insider's possible intent within a privacy-preserving context. This will help to identify high risk insider threats while balancing privacy concerns.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115667871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Three Innovative Software Engineering Methodologies 三种创新的软件工程方法论
E. Foster
Software engineering has come to the stage where speed of development, level of correctness, interoperability, user friendliness, usefulness, and reusability in different projects are very important factors in determining the success of a software engineering venture. Equally important is the use of methodologies for software design. In just over six decades, we have seen the progress of software design from an amorphous set of informal methodologies to structured techniques, formal methodologies, and object-oriented methodologies. In the area of object-oriented methodologies (OOM), the unified modeling language (UML) has made a significant contribution in defining a set of methodologies that can be applied to any software engineering effort. This paper draws on the UML methodologies and proposes three methodologies that could add richness and additional flexibility to the software engineering experience. They are system topology charts, object/entity specification grid, and the extended operation specification. The system topology charts include an information topology chart (ITC) that presents the object types and/or information entities in the way they will be managed in the software system, and a user interface topology chart (UITC) that presents operations the way they will appear in the system. The object/entity specification grid (O/ESG) adopts the conventions of the UML class diagram, but expands it to include additional critical information that lead to better software construction. The extended operation specification (EOS) embraces the UML guidelines for the activity diagram, but is flexible enough to include other techniques such as pseudo-code, Warnier-Orr diagram, and collaboration diagram. It also allows for the specification of other critical information not covered in these standard techniques.
软件工程已经发展到这样一个阶段:不同项目中的开发速度、正确性水平、互操作性、用户友好性、有用性和可重用性是决定软件工程项目成功的非常重要的因素。同样重要的是软件设计方法的使用。在刚刚过去的60年里,我们已经看到了软件设计的进步,从一组无定形的非正式方法到结构化技术、形式化方法和面向对象的方法。在面向对象方法学(OOM)领域,统一建模语言(UML)在定义一组可应用于任何软件工程工作的方法学方面做出了重大贡献。本文借鉴了UML方法,并提出了三种可以为软件工程经验增加丰富性和额外灵活性的方法。它们是系统拓扑图、对象/实体规范网格和扩展操作规范。系统拓扑图包括一个信息拓扑图(ITC),它以将在软件系统中管理的方式表示对象类型和/或信息实体,以及一个用户界面拓扑图(UITC),它以将在系统中出现的方式表示操作。对象/实体规范网格(O/ESG)采用UML类图的约定,但对其进行了扩展,以包含导致更好的软件构造的附加关键信息。扩展操作规范(EOS)包含活动图的UML指导方针,但是足够灵活,可以包含其他技术,如伪代码、Warnier-Orr图和协作图。它还允许规范这些标准技术中未涵盖的其他关键信息。
{"title":"Three Innovative Software Engineering Methodologies","authors":"E. Foster","doi":"10.1109/GOCICT.2015.25","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.25","url":null,"abstract":"Software engineering has come to the stage where speed of development, level of correctness, interoperability, user friendliness, usefulness, and reusability in different projects are very important factors in determining the success of a software engineering venture. Equally important is the use of methodologies for software design. In just over six decades, we have seen the progress of software design from an amorphous set of informal methodologies to structured techniques, formal methodologies, and object-oriented methodologies. In the area of object-oriented methodologies (OOM), the unified modeling language (UML) has made a significant contribution in defining a set of methodologies that can be applied to any software engineering effort. This paper draws on the UML methodologies and proposes three methodologies that could add richness and additional flexibility to the software engineering experience. They are system topology charts, object/entity specification grid, and the extended operation specification. The system topology charts include an information topology chart (ITC) that presents the object types and/or information entities in the way they will be managed in the software system, and a user interface topology chart (UITC) that presents operations the way they will appear in the system. The object/entity specification grid (O/ESG) adopts the conventions of the UML class diagram, but expands it to include additional critical information that lead to better software construction. The extended operation specification (EOS) embraces the UML guidelines for the activity diagram, but is flexible enough to include other techniques such as pseudo-code, Warnier-Orr diagram, and collaboration diagram. It also allows for the specification of other critical information not covered in these standard techniques.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124903677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Procrustes Classifier for Marine Day Marker 海洋日标的Procrustes分类器
R. Steinhoff, Ben Wongsaroj, C. Cañas, Nicolas Diogo
This conceptual paper examines the computer identification of signs called day markers that commonly appear for navigation purposes in a marine channel waterway. Most people are familiar with these signs when navigating in a boat as they appear either as red triangles, green rectangles or diamonds since they aid navigation through the channel. The paper focuses on a proposed classifier using Procrustes analysis techniques for identification purposes.
这篇概念性的论文研究了在海洋航道航道中通常出现的用于导航目的的被称为日标记的标志的计算机识别。大多数人在航行时都熟悉这些标志,因为它们以红色三角形,绿色矩形或菱形的形式出现,因为它们有助于通过航道导航。本文重点介绍了一种使用Procrustes分析技术进行识别的分类器。
{"title":"Procrustes Classifier for Marine Day Marker","authors":"R. Steinhoff, Ben Wongsaroj, C. Cañas, Nicolas Diogo","doi":"10.1109/GOCICT.2015.15","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.15","url":null,"abstract":"This conceptual paper examines the computer identification of signs called day markers that commonly appear for navigation purposes in a marine channel waterway. Most people are familiar with these signs when navigating in a boat as they appear either as red triangles, green rectangles or diamonds since they aid navigation through the channel. The paper focuses on a proposed classifier using Procrustes analysis techniques for identification purposes.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134211356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incorporating Mobile Learning in Institutions of Higher Learning in South Africa 将移动学习纳入南非高等教育机构
Mphaphi Molebatsi, Kokisa Phorah
Despite the advancements made towards learning such as technological innovations in the classroom and access to learning in general, there are significant challenges that remain especially the modes of delivery of quality education apart from the traditional classroom teaching and learning. In the endeavour to discover feasible solutions for these challenges, much trust has been put in new data and correspondence advancements such as information communication technologies (ICTs) outside the classroom especially mobile devices. This study reviews several articles and previous studies relating to the use of mobile devices for portable learning instruction or mobile learning (m-learning) education and assess the potential and versatility of m-learning for mobile education experiences in institutions of higher learning in South Africa.
尽管在学习方面取得了进步,例如课堂上的技术创新和一般的学习机会,但除了传统的课堂教学和学习之外,仍然存在重大挑战,特别是提供优质教育的模式。在努力寻找应对这些挑战的可行解决方案的过程中,人们非常信任新的数据和通信技术的进步,例如课堂外的信息通信技术(ict),特别是移动设备。本研究回顾了几篇与移动设备用于便携式学习教学或移动学习(m-learning)教育相关的文章和先前的研究,并评估了南非高等院校移动学习在移动教育经验方面的潜力和多功能性。
{"title":"Incorporating Mobile Learning in Institutions of Higher Learning in South Africa","authors":"Mphaphi Molebatsi, Kokisa Phorah","doi":"10.1109/GOCICT.2015.13","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.13","url":null,"abstract":"Despite the advancements made towards learning such as technological innovations in the classroom and access to learning in general, there are significant challenges that remain especially the modes of delivery of quality education apart from the traditional classroom teaching and learning. In the endeavour to discover feasible solutions for these challenges, much trust has been put in new data and correspondence advancements such as information communication technologies (ICTs) outside the classroom especially mobile devices. This study reviews several articles and previous studies relating to the use of mobile devices for portable learning instruction or mobile learning (m-learning) education and assess the potential and versatility of m-learning for mobile education experiences in institutions of higher learning in South Africa.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126785686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Increasing Effectiveness of Churn Prediction Software 提高客户流失预测软件的有效性
Joseph Halim, J. Vucetic
Despite the development of several churn prediction software that investigate hundreds of factors, there is still much space for improving the accuracy of churn prediction. This explorative case study research investigated the behavioral factors, economic factors, and carrier policies causing churn and revealed a new set of important factors that cause churn that should be incorporated into churn prediction models to enhance the accuracy of churn prediction software.
尽管开发了几个流失预测软件,调查了数百个因素,但仍有很大的空间来提高流失预测的准确性。本探索性案例研究调查了导致客户流失的行为因素、经济因素和运营商政策,揭示了导致客户流失的一系列新的重要因素,这些因素应该被纳入客户流失预测模型,以提高客户流失预测软件的准确性。
{"title":"Increasing Effectiveness of Churn Prediction Software","authors":"Joseph Halim, J. Vucetic","doi":"10.1109/GOCICT.2015.30","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.30","url":null,"abstract":"Despite the development of several churn prediction software that investigate hundreds of factors, there is still much space for improving the accuracy of churn prediction. This explorative case study research investigated the behavioral factors, economic factors, and carrier policies causing churn and revealed a new set of important factors that cause churn that should be incorporated into churn prediction models to enhance the accuracy of churn prediction software.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126930438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Agent Based Simulation Model Applied to Emergency Vehicles in High Traffic Urban Environments 基于智能体的城市高交通环境应急车辆仿真模型
Andreea Ion, Vlad Constantinescu, M. Pătrașcu
Advances in information and communication technology offer new tools in managing the ever-growing urban infrastructure. It is non-trivial to design, maintain and expand road networks that insure a safe and fast transport of goods and people while still permitting a quick intervention in emergency situations. The objective of this paper is to present a simulated traffic model application. In this respect, we employ the use of cell agents which are a basic component of CitySCAPE, a Synergic Control Architecture for Protection during Emergencies. The traffic system is modelled and simulated using a multi-agent based solution which will allow emergency responders to go through a group of intersections with minimal waiting time. The purpose of the simulation is to obtain a lower travel time for emergency vehicles than the average value, inside the considered geographical area, taking into account the inherent uncertainties of the drivers' decisions to follow certain urban routes.
信息和通信技术的进步为管理日益增长的城市基础设施提供了新的工具。设计、维护和扩大道路网络,确保货物和人员的安全和快速运输,同时仍然允许在紧急情况下进行快速干预,这不是一件小事。本文的目的是给出一个模拟交通模型的应用。在这方面,我们使用了细胞代理,这是CitySCAPE的基本组成部分,这是一种用于紧急情况下保护的协同控制体系结构。交通系统使用基于多代理的解决方案进行建模和模拟,这将允许应急响应人员以最小的等待时间通过一组十字路口。模拟的目的是在考虑到驾驶员决定遵循某些城市路线的固有不确定性的情况下,在所考虑的地理区域内,获得比平均值更低的应急车辆行驶时间。
{"title":"An Agent Based Simulation Model Applied to Emergency Vehicles in High Traffic Urban Environments","authors":"Andreea Ion, Vlad Constantinescu, M. Pătrașcu","doi":"10.1109/GOCICT.2015.26","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.26","url":null,"abstract":"Advances in information and communication technology offer new tools in managing the ever-growing urban infrastructure. It is non-trivial to design, maintain and expand road networks that insure a safe and fast transport of goods and people while still permitting a quick intervention in emergency situations. The objective of this paper is to present a simulated traffic model application. In this respect, we employ the use of cell agents which are a basic component of CitySCAPE, a Synergic Control Architecture for Protection during Emergencies. The traffic system is modelled and simulated using a multi-agent based solution which will allow emergency responders to go through a group of intersections with minimal waiting time. The purpose of the simulation is to obtain a lower travel time for emergency vehicles than the average value, inside the considered geographical area, taking into account the inherent uncertainties of the drivers' decisions to follow certain urban routes.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114270733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predictive Pointing in Cascading Pull-Down Menus 级联下拉菜单中的预测指向
Igor Crk
Cascading pull-down menus are common interface elements in many modern graphical interactive applications. Navigation of standard cascading pull-down menus is governed by a combination of Fitts' and Acott-Zhai steering laws, however, recent research has shown that the constraints imposed by the two laws can be overcome by reducing the target distance by either reducing the target distance or increasing the target size. This paper describes the implementation and evaluation of monitoring and prediction mechanisms that can be used to reduce the distance to the user's pointing targets within standard pull-down menus in existing, unmodified applications. Facilitated pointing can be applied to cascading pull-down menus either through pointer jumps or menu reorganization, i.e. placing copies of commonly accessed options at the top of the menus.
级联下拉菜单是许多现代图形交互应用程序中常见的界面元素。标准的级联下拉菜单的导航是由Fitts和acot - zhai转向定律的组合控制的,然而,最近的研究表明,可以通过减小目标距离或增加目标尺寸来减小目标距离来克服这两个定律所施加的约束。本文描述了监控和预测机制的实现和评估,这些机制可用于减少现有的、未经修改的应用程序中标准下拉菜单中与用户指向目标的距离。便利指向可以通过指针跳转或菜单重组应用于级联下拉菜单,即在菜单顶部放置常用访问选项的副本。
{"title":"Predictive Pointing in Cascading Pull-Down Menus","authors":"Igor Crk","doi":"10.1109/GOCICT.2015.17","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.17","url":null,"abstract":"Cascading pull-down menus are common interface elements in many modern graphical interactive applications. Navigation of standard cascading pull-down menus is governed by a combination of Fitts' and Acott-Zhai steering laws, however, recent research has shown that the constraints imposed by the two laws can be overcome by reducing the target distance by either reducing the target distance or increasing the target size. This paper describes the implementation and evaluation of monitoring and prediction mechanisms that can be used to reduce the distance to the user's pointing targets within standard pull-down menus in existing, unmodified applications. Facilitated pointing can be applied to cascading pull-down menus either through pointer jumps or menu reorganization, i.e. placing copies of commonly accessed options at the top of the menus.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129075351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure and Efficient Data Transmission for Wireless Mesh Networks 安全高效的无线网状网络数据传输
Luis Cabrera, Tuan T. Tran, Scott Cordle, E. Udoh
Wireless data dissemination can be utilized for broadcasting emergency services and military communication. However secure and reliable dissemination of data over a lossy wireless network is challenging due to security attacks and network dynamics. The current proposed schemes require high computational capability of the devices which may not be feasible in most of hand held receivers. Furthermore, in many scenarios, data may need to be relayed via multiple links before reaching to the end users posing potential data breach. Our proposed scheme alleviates computational requirements along with transmission overhead by exploiting the new transmission technique, namely network coding. Our propose scheme utilizes a hierarchical key structure for efficient security key management. In addition, we utilize the null space of network coding to enable secure relay of data via multiple hops. Also, by exploiting network coding, our scheme don' require cooperation among the relay nodes which significantly reduce the communication overhead. Our analysis results show that under some condition, our propose scheme can save up to 50% transmission bandwidth compared with the traditional approach where users share a common group key. We also show that our proposed scheme can achieve high security under relay attacks. The proposed scheme is also efficient with light computation that would be feasible for mobile devices.
无线数据传播可用于广播应急服务和军事通信。然而,由于安全攻击和网络动态,在有损耗的无线网络上安全可靠地传播数据是一项挑战。目前提出的方案对设备的计算能力要求很高,这在大多数手持接收机中可能是不可行的。此外,在许多情况下,数据在到达最终用户之前可能需要通过多个链接进行中继,从而造成潜在的数据泄露。我们提出的方案利用新的传输技术,即网络编码,减轻了计算需求和传输开销。我们提出的方案利用分层密钥结构实现高效的安全密钥管理。此外,我们利用网络编码的零空间,通过多跳实现数据的安全中继。此外,通过利用网络编码,我们的方案不需要中继节点之间的协作,从而大大降低了通信开销。分析结果表明,在一定条件下,与用户共享公共组密钥的传统方法相比,我们提出的方案可以节省高达50%的传输带宽。结果表明,该方案在中继攻击下具有较高的安全性。所提出的方案在轻计算方面也很高效,在移动设备上也是可行的。
{"title":"Secure and Efficient Data Transmission for Wireless Mesh Networks","authors":"Luis Cabrera, Tuan T. Tran, Scott Cordle, E. Udoh","doi":"10.1109/GOCICT.2015.22","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.22","url":null,"abstract":"Wireless data dissemination can be utilized for broadcasting emergency services and military communication. However secure and reliable dissemination of data over a lossy wireless network is challenging due to security attacks and network dynamics. The current proposed schemes require high computational capability of the devices which may not be feasible in most of hand held receivers. Furthermore, in many scenarios, data may need to be relayed via multiple links before reaching to the end users posing potential data breach. Our proposed scheme alleviates computational requirements along with transmission overhead by exploiting the new transmission technique, namely network coding. Our propose scheme utilizes a hierarchical key structure for efficient security key management. In addition, we utilize the null space of network coding to enable secure relay of data via multiple hops. Also, by exploiting network coding, our scheme don' require cooperation among the relay nodes which significantly reduce the communication overhead. Our analysis results show that under some condition, our propose scheme can save up to 50% transmission bandwidth compared with the traditional approach where users share a common group key. We also show that our proposed scheme can achieve high security under relay attacks. The proposed scheme is also efficient with light computation that would be feasible for mobile devices.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134126503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accessibility, Quality and Performance of Government Portals and Ministry Web Sites: A View Using Diagnostic Tools 政府门户网站和部门网站的可访问性、质量和性能:使用诊断工具的观点
Winfred Yaokumah, Steven Brown, R. Amponsah
Accessibility, quality, and performance of government websites and portals are key issues for e-government programmes. Although the number of government sites has increased rapidly in the past few years, their ultimate success will largely depend on their accessibility, quality and performance. This paper reports the results of an evaluative study of 19 e-government websites and portals using a common set of Web diagnostic engines. The findings reveal that none of the sites evaluated meet the recommended Priority AA conformance level. A number of accessibility, quality, and performance weaknesses were identified. Majority of the sites assessed fail to comply with perceivable, operable, understandable, and robust principles of the Web Content Accessibility Guidelines (WCAG). Several non-compliance errors were found on the websites. The page load time for most sites falls far below the acceptable level, spelling errors and bad links were also found. Significant work needs to be done in order to make these websites examples of best practice e-government sites.
政府网站及入口网站的易读性、质素及表现,是电子政府计划的主要问题。虽然政府网站的数目在过去几年迅速增加,但它们的最终成功与否,在很大程度上取决于它们的无障碍程度、质素和表现。本文报告了使用一套通用的Web诊断引擎对19个电子政务网站和门户网站进行评估研究的结果。调查结果显示,没有一个被评估的站点达到建议的优先AA一致性级别。确定了许多可访问性、质量和性能弱点。被评估的大多数站点都没有遵守Web内容可访问性指南(WCAG)的可感知、可操作、可理解和健壮的原则。在网站上发现了一些不合规的错误。大多数网站的页面加载时间远远低于可接受的水平,拼写错误和不良链接也被发现。为了使这些网站成为最佳实践电子政务网站的例子,需要做大量的工作。
{"title":"Accessibility, Quality and Performance of Government Portals and Ministry Web Sites: A View Using Diagnostic Tools","authors":"Winfred Yaokumah, Steven Brown, R. Amponsah","doi":"10.1109/GOCICT.2015.18","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.18","url":null,"abstract":"Accessibility, quality, and performance of government websites and portals are key issues for e-government programmes. Although the number of government sites has increased rapidly in the past few years, their ultimate success will largely depend on their accessibility, quality and performance. This paper reports the results of an evaluative study of 19 e-government websites and portals using a common set of Web diagnostic engines. The findings reveal that none of the sites evaluated meet the recommended Priority AA conformance level. A number of accessibility, quality, and performance weaknesses were identified. Majority of the sites assessed fail to comply with perceivable, operable, understandable, and robust principles of the Web Content Accessibility Guidelines (WCAG). Several non-compliance errors were found on the websites. The page load time for most sites falls far below the acceptable level, spelling errors and bad links were also found. Significant work needs to be done in order to make these websites examples of best practice e-government sites.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132539155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Evaluating the Effectiveness of Lego Robots in Engaged Scholarship 评估乐高机器人在从事奖学金中的有效性
Keshnee Padayachee, Patricia Gouws, Marlou Lemmer
The aim of this paper is to investigate the effect of Lego Robotics Training on learner performance in mathematics. This research was conducted partially to determine the efficacy of a community engagement project that was established to inspire young people's interest in science, technology, engineering and mathematics (STEM) fields. The project uses LEGO League robotics to mentor learners (aged 10 to 16 years) to build and program robots and to do research based on real-world issues. Proficiency in mathematics is a foundation to all STEM related disciplines. Hence, this study aims to determine if using LEGO robotics may be used as a tool to improve proficiency in mathematics or, at least, encourage learners to develop an interest in STEM related disciplines.
本文的目的是研究乐高机器人训练对学习者数学表现的影响。这项研究的部分目的是确定一个社区参与项目的有效性,该项目旨在激发年轻人对科学、技术、工程和数学(STEM)领域的兴趣。该项目使用乐高联盟机器人来指导学习者(10至16岁)建造和编程机器人,并根据现实世界的问题进行研究。精通数学是所有STEM相关学科的基础。因此,本研究旨在确定使用LEGO机器人是否可以用作提高数学熟练程度的工具,或者至少可以鼓励学习者对STEM相关学科产生兴趣。
{"title":"Evaluating the Effectiveness of Lego Robots in Engaged Scholarship","authors":"Keshnee Padayachee, Patricia Gouws, Marlou Lemmer","doi":"10.1109/GOCICT.2015.12","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.12","url":null,"abstract":"The aim of this paper is to investigate the effect of Lego Robotics Training on learner performance in mathematics. This research was conducted partially to determine the efficacy of a community engagement project that was established to inspire young people's interest in science, technology, engineering and mathematics (STEM) fields. The project uses LEGO League robotics to mentor learners (aged 10 to 16 years) to build and program robots and to do research based on real-world issues. Proficiency in mathematics is a foundation to all STEM related disciplines. Hence, this study aims to determine if using LEGO robotics may be used as a tool to improve proficiency in mathematics or, at least, encourage learners to develop an interest in STEM related disciplines.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"57 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120907694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1