首页 > 最新文献

2014 14th International Conference on Innovations for Community Services (I4CS)最新文献

英文 中文
SafeChat: A tool to shield children's communication from explicit messages SafeChat:一种保护儿童不受暴露信息影响的工具
Pub Date : 2014-06-04 DOI: 10.1109/I4CS.2014.6860557
Günter Fahrnberger, D. Nayak, M. VenkataSwamy, S. Ramaswamy
Internet, on one hand, is a primary foundation for knowledge acquisition in a child's life. On the other hand, there are many growing exploits over children. Motivated by the rising need to shield children's communication channels from obnoxious sources, this paper proposes a framework named SafeChat. SafeChat is the result of aggregating the context based authentication features of 4-CBAF model and the message encryption features from demonstrated SecureString 2.0. SafeChat intercepts children's communication and eradicates explicit words coming into the children's devices. SafeChat filters explicit words without recognizing their meaning. Such an approach hardens the system against malicious attacks. Furthermore, it secures the communication channels against possible man-in-the-middle attacks by employing an encryption mechanism. In addition, it encompasses the tools to authenticate and authorize communications and allows parents to monitor children communication channels in case an intervention is desirable. SafeChat supports to extend it to incorporate essential features including a facility to censor users through building a social network. Such a social network would allow other children to learn about the users with potential threats.
一方面,互联网是儿童生活中获取知识的主要基础。另一方面,对儿童的剥削越来越多。由于越来越需要保护儿童的通信渠道免受讨厌的来源,本文提出了一个名为SafeChat的框架。SafeChat是将4-CBAF模型中基于上下文的身份验证特性和演示的SecureString 2.0中的消息加密特性聚合在一起的结果。SafeChat拦截儿童的通信,并清除进入儿童设备的明确词语。SafeChat在不识别其含义的情况下过滤了明确的单词。这种方法可以增强系统抵御恶意攻击的能力。此外,它通过采用加密机制保护通信通道免受可能的中间人攻击。此外,它还包括认证和授权通信的工具,并允许父母在需要干预的情况下监视儿童的通信渠道。SafeChat支持对其进行扩展,以纳入基本功能,包括通过建立社交网络审查用户的设施。这样的社交网络可以让其他孩子了解有潜在威胁的用户。
{"title":"SafeChat: A tool to shield children's communication from explicit messages","authors":"Günter Fahrnberger, D. Nayak, M. VenkataSwamy, S. Ramaswamy","doi":"10.1109/I4CS.2014.6860557","DOIUrl":"https://doi.org/10.1109/I4CS.2014.6860557","url":null,"abstract":"Internet, on one hand, is a primary foundation for knowledge acquisition in a child's life. On the other hand, there are many growing exploits over children. Motivated by the rising need to shield children's communication channels from obnoxious sources, this paper proposes a framework named SafeChat. SafeChat is the result of aggregating the context based authentication features of 4-CBAF model and the message encryption features from demonstrated SecureString 2.0. SafeChat intercepts children's communication and eradicates explicit words coming into the children's devices. SafeChat filters explicit words without recognizing their meaning. Such an approach hardens the system against malicious attacks. Furthermore, it secures the communication channels against possible man-in-the-middle attacks by employing an encryption mechanism. In addition, it encompasses the tools to authenticate and authorize communications and allows parents to monitor children communication channels in case an intervention is desirable. SafeChat supports to extend it to incorporate essential features including a facility to censor users through building a social network. Such a social network would allow other children to learn about the users with potential threats.","PeriodicalId":226884,"journal":{"name":"2014 14th International Conference on Innovations for Community Services (I4CS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129662393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Stochastic automata networks for performance evaluation of composite Web services 用于组合Web服务性能评估的随机自动机网络
Pub Date : 2014-06-04 DOI: 10.1109/I4CS.2014.6860553
L. Mokdad, J. Ben-othman
One challenge of composite Web service architectures is the guarantee of the Quality of Service (QoS). Performance evaluation of these architectures is essential but complex due to synchronizations inside the orchestration of services. We propose in this paper, to use stochastic automata networks which a power formalism to modelize and to evaluate complex system with synchronizations.
复合Web服务体系结构的一个挑战是服务质量(QoS)的保证。这些体系结构的性能评估是必要的,但由于服务编排内部的同步,因此评估很复杂。本文提出利用幂形式的随机自动机网络对具有同步特性的复杂系统进行建模和评价。
{"title":"Stochastic automata networks for performance evaluation of composite Web services","authors":"L. Mokdad, J. Ben-othman","doi":"10.1109/I4CS.2014.6860553","DOIUrl":"https://doi.org/10.1109/I4CS.2014.6860553","url":null,"abstract":"One challenge of composite Web service architectures is the guarantee of the Quality of Service (QoS). Performance evaluation of these architectures is essential but complex due to synchronizations inside the orchestration of services. We propose in this paper, to use stochastic automata networks which a power formalism to modelize and to evaluate complex system with synchronizations.","PeriodicalId":226884,"journal":{"name":"2014 14th International Conference on Innovations for Community Services (I4CS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121234982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Background subtraction for aerial surveillance conditions 空中监视条件下的背景减法
Pub Date : 2014-06-04 DOI: 10.1109/I4CS.2014.6860549
F. Sánchez-Fernández, Philippe Brunet, S. Senouci
The first step in a surveillance system is to create a representation of the environment. Background subtraction is widely used algorithm to define a part of an image that most time remains stationary in a video. In surveillance tasks, this model helps to recognize those outlier objects in an area under monitoring. Set up a background model on moving platforms (intelligent cars, UAVs, etc.) is a challenging task due camera motion when images are acquired. In this paper, we propose a method to support instabilities caused by aerial images fusing spatial and temporal information about image motion. We used frame difference as first approximation, then age of pixels is estimated. This latter gives us an invariability level of a pixel over time. Gradient direction of ages and an adaptive weight are used to reduce impact from camera motion on background modelling. We tested our proposed method simulating several conditions that impair aerial image acquisition such as intentional and unintentional camera motion. Experimental results show improved performance compared to algorithms GMM and KDE.
监视系统的第一步是创建环境的表示。背景减法是一种广泛使用的算法,用于定义视频中大部分时间保持静止的图像部分。在监视任务中,该模型有助于识别监视区域中的异常目标。在移动平台(智能汽车、无人机等)上建立背景模型是一项具有挑战性的任务,因为在获取图像时摄像机是运动的。在本文中,我们提出了一种方法来支持由航空图像引起的不稳定性融合的空间和时间信息的图像运动。我们使用帧差作为第一个近似,然后估计像素的年龄。后者给了我们一个像素随时间的不变性水平。使用年龄梯度方向和自适应权值来减少摄像机运动对背景建模的影响。我们模拟了几种影响航空图像采集的条件,如有意和无意的相机运动,对我们提出的方法进行了测试。实验结果表明,与GMM和KDE算法相比,该算法的性能有所提高。
{"title":"Background subtraction for aerial surveillance conditions","authors":"F. Sánchez-Fernández, Philippe Brunet, S. Senouci","doi":"10.1109/I4CS.2014.6860549","DOIUrl":"https://doi.org/10.1109/I4CS.2014.6860549","url":null,"abstract":"The first step in a surveillance system is to create a representation of the environment. Background subtraction is widely used algorithm to define a part of an image that most time remains stationary in a video. In surveillance tasks, this model helps to recognize those outlier objects in an area under monitoring. Set up a background model on moving platforms (intelligent cars, UAVs, etc.) is a challenging task due camera motion when images are acquired. In this paper, we propose a method to support instabilities caused by aerial images fusing spatial and temporal information about image motion. We used frame difference as first approximation, then age of pixels is estimated. This latter gives us an invariability level of a pixel over time. Gradient direction of ages and an adaptive weight are used to reduce impact from camera motion on background modelling. We tested our proposed method simulating several conditions that impair aerial image acquisition such as intentional and unintentional camera motion. Experimental results show improved performance compared to algorithms GMM and KDE.","PeriodicalId":226884,"journal":{"name":"2014 14th International Conference on Innovations for Community Services (I4CS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121325956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Clustering-based algorithm for connectivity maintenance in Vehicular Ad-Hoc Networks 基于聚类的车载Ad-Hoc网络连通性维护算法
Pub Date : 2014-06-04 DOI: 10.1109/I4CS.2014.6860550
Ahmed Louazani, S. Senouci, M. Bendaoud
Among recent advances in wireless communication technologies' field, Vehicular Ad-hoc Networks (VANETs) have drawn the attention of both academic and industry researchers due to their potential applications including driving safety, entertainment, emergency applications, and content sharing. VANET networks are characterized by their high mobile topology changes. Clustering is one of the control schemes used to make this global topology less dynamic. It allows the formation of dynamic virtual backbone used to organize the medium access, to support quality of service and to simplify routing. Mainly, nodes are organized into clusters with at least one cluster head (CH) node that is responsible for the coordination tasks of its cluster. In this sight, our paper introduces a clustering mechanism based for connectivity maintenance in VANET. The proposed solution is experimentally evaluated using NS2 simulator.
在无线通信技术领域的最新进展中,车辆自组织网络(Vehicular Ad-hoc Networks, VANETs)因其在驾驶安全、娱乐、应急应用和内容共享等方面的潜在应用而受到学术界和产业界的关注。VANET网络的特点是其高度移动的拓扑变化。聚类是用来降低全局拓扑动态的一种控制方案。它允许形成动态的虚拟骨干网,用于组织媒体访问、支持服务质量和简化路由。主要是,节点被组织成至少有一个簇头(CH)节点的集群,负责其集群的协调任务。为此,本文介绍了一种基于集群的VANET连接维护机制。采用NS2仿真器对该方案进行了实验验证。
{"title":"Clustering-based algorithm for connectivity maintenance in Vehicular Ad-Hoc Networks","authors":"Ahmed Louazani, S. Senouci, M. Bendaoud","doi":"10.1109/I4CS.2014.6860550","DOIUrl":"https://doi.org/10.1109/I4CS.2014.6860550","url":null,"abstract":"Among recent advances in wireless communication technologies' field, Vehicular Ad-hoc Networks (VANETs) have drawn the attention of both academic and industry researchers due to their potential applications including driving safety, entertainment, emergency applications, and content sharing. VANET networks are characterized by their high mobile topology changes. Clustering is one of the control schemes used to make this global topology less dynamic. It allows the formation of dynamic virtual backbone used to organize the medium access, to support quality of service and to simplify routing. Mainly, nodes are organized into clusters with at least one cluster head (CH) node that is responsible for the coordination tasks of its cluster. In this sight, our paper introduces a clustering mechanism based for connectivity maintenance in VANET. The proposed solution is experimentally evaluated using NS2 simulator.","PeriodicalId":226884,"journal":{"name":"2014 14th International Conference on Innovations for Community Services (I4CS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127708128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
A self-adaptive structuring for P2P-based grid 基于p2p的网格自适应结构
Pub Date : 2014-06-04 DOI: 10.1109/I4CS.2014.6860564
Bassirou Gueye, O. Flauzac, Cyril Rabat, I. Niang
Grids that use the concept of services are generally based on highly centralized hierarchical architectures. The main issue of this centralization is the unified management of resources, but it is difficult to react rapidly against failure that can affect grid users. Therefore, in our previous works, we proposed a specification called P2P4GS for services management in a grid-computing environment based on peer-to-peer paradigm. In this approach, all nodes can participate to the deployment and the discovery processes for a given service. In addition, each node maintains a table called “Service Registry”, which lists the services owned by this node, as well as the other services located inside the grid and learned during a discovery process. However, the growth of the distributed systems size, in terms of number of nodes, services and users, raises the question of scalability. In this paper, we propose to limit the knowledge about the location of grid services on some nodes that we call ISP (Information System Proxy). Around each ISP, we form a community constituted by a set of nodes of the grid. In order to reduce the ISP overload, on the one hand, we delegate invocation and execution services tasks for nodes called IP (Invocation Proxy). On the other hand, we memorize information about the location of frequently requested services on LP (Location Proxy) nodes.
使用服务概念的网格通常基于高度集中的分层体系结构。这种集中化的主要问题是资源的统一管理,但很难对可能影响网格用户的故障做出快速反应。因此,在我们之前的工作中,我们提出了一个名为P2P4GS的规范,用于基于点对点范式的网格计算环境中的服务管理。在这种方法中,所有节点都可以参与给定服务的部署和发现过程。此外,每个节点维护一个名为“Service Registry”的表,其中列出了该节点拥有的服务,以及位于网格内并在发现过程中学习到的其他服务。然而,从节点、服务和用户的数量来看,分布式系统规模的增长提出了可伸缩性的问题。在本文中,我们建议将网格服务的位置信息限制在一些我们称之为ISP(信息系统代理)的节点上。在每个ISP周围,我们形成一个由一组网格节点组成的社区。为了减少ISP的过载,一方面,我们将调用和执行服务任务委托给称为IP(调用代理)的节点。另一方面,我们记住LP (location Proxy)节点上频繁请求的服务的位置信息。
{"title":"A self-adaptive structuring for P2P-based grid","authors":"Bassirou Gueye, O. Flauzac, Cyril Rabat, I. Niang","doi":"10.1109/I4CS.2014.6860564","DOIUrl":"https://doi.org/10.1109/I4CS.2014.6860564","url":null,"abstract":"Grids that use the concept of services are generally based on highly centralized hierarchical architectures. The main issue of this centralization is the unified management of resources, but it is difficult to react rapidly against failure that can affect grid users. Therefore, in our previous works, we proposed a specification called P2P4GS for services management in a grid-computing environment based on peer-to-peer paradigm. In this approach, all nodes can participate to the deployment and the discovery processes for a given service. In addition, each node maintains a table called “Service Registry”, which lists the services owned by this node, as well as the other services located inside the grid and learned during a discovery process. However, the growth of the distributed systems size, in terms of number of nodes, services and users, raises the question of scalability. In this paper, we propose to limit the knowledge about the location of grid services on some nodes that we call ISP (Information System Proxy). Around each ISP, we form a community constituted by a set of nodes of the grid. In order to reduce the ISP overload, on the one hand, we delegate invocation and execution services tasks for nodes called IP (Invocation Proxy). On the other hand, we memorize information about the location of frequently requested services on LP (Location Proxy) nodes.","PeriodicalId":226884,"journal":{"name":"2014 14th International Conference on Innovations for Community Services (I4CS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131657428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Curtailing privilege escalation attacks over asynchronous channels on Android 减少Android上异步通道上的特权升级攻击
Pub Date : 2014-06-04 DOI: 10.1109/I4CS.2014.6860558
Katharina Mollus, D. Westhoff, T. Markmann
Recently we presented QuantDroid [7], a quantitative approach towards mitigating privilege escalation attacks on Android. By monitoring all synchronous IPC via overt channels on-the-fly, a so called flow-graph service detects an abnormal amount of traffic exchanged between DVMs running different Apps to indicate a potential horizontal privilege escalation attack. However, although certainly a valuable first step, our initial QuantDroid approach fails when dealing with asynchronous IPC via persistent storage containers on the Android system. To also address this issue, in this work we extend QuantDroid to QuantDroid++ by providing i) a central storage of taints when operating on system-internal databases of Android, ii) an extension of the SQL cursor object to preserve taints and link requested data with such taints, and, finally iii) an inspection of the information flow with such newly available taints for all relevant database operations.
最近,我们提出了QuantDroid[7],这是一种量化的方法,可以缓解针对Android的特权升级攻击。通过公开通道实时监控所有同步IPC,所谓的流图服务检测运行不同应用程序的dvm之间交换的异常流量,以指示潜在的水平特权升级攻击。然而,尽管这是有价值的第一步,我们最初的QuantDroid方法在处理Android系统上通过持久存储容器的异步IPC时失败了。为了解决这个问题,在这项工作中,我们将QuantDroid扩展到QuantDroid++,提供i)在Android系统内部数据库上操作时的污点中央存储,ii) SQL游标对象的扩展,以保存污点并将请求的数据与这些污点链接,最后iii)使用这些新可用的污点检查所有相关数据库操作的信息流。
{"title":"Curtailing privilege escalation attacks over asynchronous channels on Android","authors":"Katharina Mollus, D. Westhoff, T. Markmann","doi":"10.1109/I4CS.2014.6860558","DOIUrl":"https://doi.org/10.1109/I4CS.2014.6860558","url":null,"abstract":"Recently we presented QuantDroid [7], a quantitative approach towards mitigating privilege escalation attacks on Android. By monitoring all synchronous IPC via overt channels on-the-fly, a so called flow-graph service detects an abnormal amount of traffic exchanged between DVMs running different Apps to indicate a potential horizontal privilege escalation attack. However, although certainly a valuable first step, our initial QuantDroid approach fails when dealing with asynchronous IPC via persistent storage containers on the Android system. To also address this issue, in this work we extend QuantDroid to QuantDroid++ by providing i) a central storage of taints when operating on system-internal databases of Android, ii) an extension of the SQL cursor object to preserve taints and link requested data with such taints, and, finally iii) an inspection of the information flow with such newly available taints for all relevant database operations.","PeriodicalId":226884,"journal":{"name":"2014 14th International Conference on Innovations for Community Services (I4CS)","volume":"251 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117284879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Semi-Dynamic Tree Scheduling Process for Wireless Sensor Networks 无线传感器网络的半动态树调度方法
Pub Date : 2014-06-04 DOI: 10.1109/I4CS.2014.6860556
B. Alghamdi, H. Fouchal, Marwane Ayaida
This paper presents Semi-Dynamic Tree Scheduling Process for Wireless Sensor Networks (WSN). We combined two type of scheduling in this study: the static scheduling for coordinator nodes and the dynamic scheduling for leaf nodes. We consider a cluster tree topology in our study with, one main coordinator (Personal Area Network Coordinator), several children coordinators (Routers) and several end devices (leafs). We implement the scheduling algorithm on the PAN Coordinator. The experimental implementation is done over TelosB sensors under TinyOS environment.
提出了无线传感器网络的半动态树调度方法。本文将协调节点的静态调度和叶节点的动态调度相结合。在我们的研究中,我们考虑了一个簇树拓扑结构,其中有一个主协调器(个人局域网协调器),几个子协调器(路由器)和几个终端设备(叶子)。我们在PAN协调器上实现了调度算法。在TinyOS环境下,在TelosB传感器上进行了实验实现。
{"title":"Semi-Dynamic Tree Scheduling Process for Wireless Sensor Networks","authors":"B. Alghamdi, H. Fouchal, Marwane Ayaida","doi":"10.1109/I4CS.2014.6860556","DOIUrl":"https://doi.org/10.1109/I4CS.2014.6860556","url":null,"abstract":"This paper presents Semi-Dynamic Tree Scheduling Process for Wireless Sensor Networks (WSN). We combined two type of scheduling in this study: the static scheduling for coordinator nodes and the dynamic scheduling for leaf nodes. We consider a cluster tree topology in our study with, one main coordinator (Personal Area Network Coordinator), several children coordinators (Routers) and several end devices (leafs). We implement the scheduling algorithm on the PAN Coordinator. The experimental implementation is done over TelosB sensors under TinyOS environment.","PeriodicalId":226884,"journal":{"name":"2014 14th International Conference on Innovations for Community Services (I4CS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128286362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Student Interaction Communities social requirements reflected by a tool and system landscape 学生互动社区社会需求反映了一个工具和系统景观
Pub Date : 2014-06-04 DOI: 10.1109/I4CS.2014.6860552
G. Eichler, C. Erfurth, Karl-Heinz Lüke
What will the future learning and academic support environment look like for students? What are the resulting requirements for a suitable tool landscape? As an active member of different communities, students already use a set of tools especially for communication and networking purposes. Students do not stop the usage of their social tools within their universities. However, universities provide their own tools for students to be connected with the organization. Which tools are out of fashion? Which tool classes are needed? And how is the degree of integration to be achieved with common community tools and systems? This paper analyses requirements from the student point of view and discusses aspects for the integration into an academic IT infrastructure.
对学生来说,未来的学习和学术支持环境会是什么样子?一个合适的工具景观的最终需求是什么?作为不同社区的活跃成员,学生们已经使用了一套专门用于交流和网络目的的工具。学生们并没有在大学里停止使用他们的社交工具。然而,大学为学生提供了与组织联系的工具。哪些工具已经过时了?需要哪些工具类?如何使用公共社区工具和系统实现集成的程度?本文从学生的角度分析了需求,并讨论了集成到学术IT基础设施中的各个方面。
{"title":"Student Interaction Communities social requirements reflected by a tool and system landscape","authors":"G. Eichler, C. Erfurth, Karl-Heinz Lüke","doi":"10.1109/I4CS.2014.6860552","DOIUrl":"https://doi.org/10.1109/I4CS.2014.6860552","url":null,"abstract":"What will the future learning and academic support environment look like for students? What are the resulting requirements for a suitable tool landscape? As an active member of different communities, students already use a set of tools especially for communication and networking purposes. Students do not stop the usage of their social tools within their universities. However, universities provide their own tools for students to be connected with the organization. Which tools are out of fashion? Which tool classes are needed? And how is the degree of integration to be achieved with common community tools and systems? This paper analyses requirements from the student point of view and discusses aspects for the integration into an academic IT infrastructure.","PeriodicalId":226884,"journal":{"name":"2014 14th International Conference on Innovations for Community Services (I4CS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130908221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Singular profile of diabetics 糖尿病患者的单一概况
Pub Date : 2014-06-04 DOI: 10.1109/I4CS.2014.6860560
A. A. Younes, Frédéric Blanchard, B. Delemer, M. Herbin
The therapeutic monitoring of patients at home produces a mass of data that requires new methods for analyzing and processing. The main challenge of medical data processing is the management of high intra-subject and inter-subject variabilities. The need for specific dashboards for both the patient and the group of patients with similar therapeutic behaviors is another difficulty. This paper describes a new way to analyze such medical data through the use of singular profiles of elderly patients in a population with type 2 diabetes. Our goal is to develop a methodology of data processing for following the insulin therapy at home. The first step of processing consists in the fuzzification of the attributes within the data samples to ensure the robustness of the method. The singularity index we propose assesses the fuzzy attributes relative to each patient. This index is obtained by computing the power of the fuzzy set associated with each attribute. The singularity of the attributes permits us to give the singular profile of each patient. The visualization step leads us to propose empirical rules to obtain three kinds of different profiles. This robust approach also permits us to highlight three clusters of elderly diabetics. The three clusters appear very similar as the ones obtained when using classical automated methods of clustering such as the k-medoids. By extending this approach, the ultimate goal of our future developments is the design of a recommender system for type 2 diabetics with insulin therapy.
在家对患者进行治疗性监测会产生大量数据,需要新的分析和处理方法。医疗数据处理的主要挑战是管理高学科内和学科间的变量。另一个困难是需要为患者和具有相似治疗行为的患者群体提供特定的指示板。本文描述了一种新的方法来分析这样的医疗数据,通过使用单一档案的老年患者的人口与2型糖尿病。我们的目标是开发一种数据处理方法,用于在家跟踪胰岛素治疗。处理的第一步是对数据样本内的属性进行模糊化,以确保方法的鲁棒性。我们提出的奇异性指标评估相对于每个病人的模糊属性。该指标是通过计算与每个属性相关联的模糊集的幂得到的。这些特征的独特性使我们能够给出每个病人的独特特征。可视化步骤引导我们提出经验规则,以获得三种不同的轮廓。这种稳健的方法也使我们能够突出老年糖尿病患者的三组。这三种聚类看起来与使用经典的自动聚类方法(如k- medioids)所获得的聚类非常相似。通过扩展这种方法,我们未来发展的最终目标是为2型糖尿病患者设计胰岛素治疗推荐系统。
{"title":"Singular profile of diabetics","authors":"A. A. Younes, Frédéric Blanchard, B. Delemer, M. Herbin","doi":"10.1109/I4CS.2014.6860560","DOIUrl":"https://doi.org/10.1109/I4CS.2014.6860560","url":null,"abstract":"The therapeutic monitoring of patients at home produces a mass of data that requires new methods for analyzing and processing. The main challenge of medical data processing is the management of high intra-subject and inter-subject variabilities. The need for specific dashboards for both the patient and the group of patients with similar therapeutic behaviors is another difficulty. This paper describes a new way to analyze such medical data through the use of singular profiles of elderly patients in a population with type 2 diabetes. Our goal is to develop a methodology of data processing for following the insulin therapy at home. The first step of processing consists in the fuzzification of the attributes within the data samples to ensure the robustness of the method. The singularity index we propose assesses the fuzzy attributes relative to each patient. This index is obtained by computing the power of the fuzzy set associated with each attribute. The singularity of the attributes permits us to give the singular profile of each patient. The visualization step leads us to propose empirical rules to obtain three kinds of different profiles. This robust approach also permits us to highlight three clusters of elderly diabetics. The three clusters appear very similar as the ones obtained when using classical automated methods of clustering such as the k-medoids. By extending this approach, the ultimate goal of our future developments is the design of a recommender system for type 2 diabetics with insulin therapy.","PeriodicalId":226884,"journal":{"name":"2014 14th International Conference on Innovations for Community Services (I4CS)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134415762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2014 14th International Conference on Innovations for Community Services (I4CS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1