Pub Date : 2015-11-19DOI: 10.1109/CSCESM.2015.7331827
J. Dunne, David Malone, J. Flood
Continuous delivery (CD) represents a challenge for software test teams, because of the continuous introduction of new features and feedback from customers. We consider testing in a framework where users are encouraged to report defects through social or other incentive schemes. Using an enterprise dataset, we address the question of which types of defects can best be found in the field, allowing in-house test resources to be refocused. Validation of these touch points ultimately interweaves both customer and business needs. The proposed framework is one which can help small to medium software businesses, which typically have limited resources to test and release software via CD.
{"title":"Social testing: A framework to support adoption of continuous delivery by small medium enterprises","authors":"J. Dunne, David Malone, J. Flood","doi":"10.1109/CSCESM.2015.7331827","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331827","url":null,"abstract":"Continuous delivery (CD) represents a challenge for software test teams, because of the continuous introduction of new features and feedback from customers. We consider testing in a framework where users are encouraged to report defects through social or other incentive schemes. Using an enterprise dataset, we address the question of which types of defects can best be found in the field, allowing in-house test resources to be refocused. Validation of these touch points ultimately interweaves both customer and business needs. The proposed framework is one which can help small to medium software businesses, which typically have limited resources to test and release software via CD.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123951651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-19DOI: 10.1109/CSCESM.2015.7331820
A. Miettinen, J. Nousiainen, J. Rajamäki, J. Knuuttila
The usage of social media (SOME) has increased during the last few years due the increase in the amount of smartphones. SOME has emerged alongside the traditional channels of communication in crisis communication. SOME has become extremely popular in recent years and the authorities have adopted it as part of their communication strategy. This paper explains how SOME is used in crisis situations, what kind of strengths, weaknesses, opportunities and threats (SWOT) it has, and how its use could be improved.
{"title":"The usage of social media in crisis communication","authors":"A. Miettinen, J. Nousiainen, J. Rajamäki, J. Knuuttila","doi":"10.1109/CSCESM.2015.7331820","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331820","url":null,"abstract":"The usage of social media (SOME) has increased during the last few years due the increase in the amount of smartphones. SOME has emerged alongside the traditional channels of communication in crisis communication. SOME has become extremely popular in recent years and the authorities have adopted it as part of their communication strategy. This paper explains how SOME is used in crisis situations, what kind of strengths, weaknesses, opportunities and threats (SWOT) it has, and how its use could be improved.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"33 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114020775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-19DOI: 10.1109/CSCESM.2015.7331829
Christopher Ruff, Florian Maier, Tobias Muller, H. Kett
E-shop operators have a particular high interest in using web-analytics software to gain deeper insight in their visitor and customer base and to use this knowledge to optimize their sales through various activities. Compared to larger-scale companies, small and medium enterprises often lack the ability, time or resources to do the necessary data analysis to effectively use and understand the available data. In order to support these smaller enterprises, a tool was designed and implemented in a prototype, which uses Complex Event Processing (CEP) in order to automate the evaluation of relevant business data originating from web-analytics software, competitor website analysis tools, real-time user interaction data and potentially additional data sources. Rules can be defined and configured, that automatically and immediately notify the user when relevant changes in the visitor or competitor behavior occur. Additional rules were implemented, aimed at directly increasing sales by dynamically changing the shop-site, based on the analysis of the individual visitor's behavior. This allows the e-shop operators to concentrate on their main business while still benefiting from the available analytics data. The tool is developed as part of the SME E-Compass [1] project.
{"title":"Leveraging Complex Event Processing for supporting small and medium-sized e-commerce enterprises","authors":"Christopher Ruff, Florian Maier, Tobias Muller, H. Kett","doi":"10.1109/CSCESM.2015.7331829","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331829","url":null,"abstract":"E-shop operators have a particular high interest in using web-analytics software to gain deeper insight in their visitor and customer base and to use this knowledge to optimize their sales through various activities. Compared to larger-scale companies, small and medium enterprises often lack the ability, time or resources to do the necessary data analysis to effectively use and understand the available data. In order to support these smaller enterprises, a tool was designed and implemented in a prototype, which uses Complex Event Processing (CEP) in order to automate the evaluation of relevant business data originating from web-analytics software, competitor website analysis tools, real-time user interaction data and potentially additional data sources. Rules can be defined and configured, that automatically and immediately notify the user when relevant changes in the visitor or competitor behavior occur. Additional rules were implemented, aimed at directly increasing sales by dynamically changing the shop-site, based on the analysis of the individual visitor's behavior. This allows the e-shop operators to concentrate on their main business while still benefiting from the available analytics data. The tool is developed as part of the SME E-Compass [1] project.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114695058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-19DOI: 10.1109/CSCESM.2015.7331873
M. Mirończuk
This article describes a proposal of information system project method. This method based on author's cascading knowledge discovery in databases process. In this article, the author also to presented use case of this process. All analysis presented in this article based on text reports from the rescue fire service.
{"title":"The cascading knowledge discovery in databases process in the information system development","authors":"M. Mirończuk","doi":"10.1109/CSCESM.2015.7331873","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331873","url":null,"abstract":"This article describes a proposal of information system project method. This method based on author's cascading knowledge discovery in databases process. In this article, the author also to presented use case of this process. All analysis presented in this article based on text reports from the rescue fire service.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127623517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-19DOI: 10.1109/CSCESM.2015.7331886
Mikko Taponen, Mari Liiri-Forsberg, Ilkka Tikanmaki
The goal of this study is to define the cloud service model when sharing real time pictures in governmental information sharing to different authorities. This article includes different kinds of viewpoints how to approach distinct cloud service models, what are the data security and legislation issues, concept level approach and benefits for real time picture sharing. The concept study of a real time picture was concluded using Needs, Approach, Benefits and Competition (NABC) framework. Swot analysis is used for Cloud service model survey. The application presented in this study may help future innovations to approach this complex mix of legal, secure and technical obstacles with accumulated information.
{"title":"The real time picture sharing in the cloud service","authors":"Mikko Taponen, Mari Liiri-Forsberg, Ilkka Tikanmaki","doi":"10.1109/CSCESM.2015.7331886","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331886","url":null,"abstract":"The goal of this study is to define the cloud service model when sharing real time pictures in governmental information sharing to different authorities. This article includes different kinds of viewpoints how to approach distinct cloud service models, what are the data security and legislation issues, concept level approach and benefits for real time picture sharing. The concept study of a real time picture was concluded using Needs, Approach, Benefits and Competition (NABC) framework. Swot analysis is used for Cloud service model survey. The application presented in this study may help future innovations to approach this complex mix of legal, secure and technical obstacles with accumulated information.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117278367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-19DOI: 10.1109/CSCESM.2015.7331889
Sulaiman Al Sheibani
Internet Addiction (IA) has been a significant topical area for research since 1996. Considerable research has been done on IA across many nations around the world. Hence, there currently exists a rich body of literature addressing various aspects of IA. The study described in this report seeks to analyze the key findings expressed in the existing IA literature. In doing so, this study addresses four specific concerns relating to: a) reviewing various definitions of IA, b) growth of IA research over time in different parts of the world, c) the major themes identified in the literature, and d) future opportunities for research into IA. These concerns were addressed using a rigorous literature analysis involving 64 studies on IA selected from various scholarly sources. The outcomes of literature analysis are discussed in detail and some useful observations and insightful reflections are made. The findings reported in this study are useful because it offers a number of important recommendations for future research in this area.
{"title":"Internet addiction: A structured literature review and future research directions","authors":"Sulaiman Al Sheibani","doi":"10.1109/CSCESM.2015.7331889","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331889","url":null,"abstract":"Internet Addiction (IA) has been a significant topical area for research since 1996. Considerable research has been done on IA across many nations around the world. Hence, there currently exists a rich body of literature addressing various aspects of IA. The study described in this report seeks to analyze the key findings expressed in the existing IA literature. In doing so, this study addresses four specific concerns relating to: a) reviewing various definitions of IA, b) growth of IA research over time in different parts of the world, c) the major themes identified in the literature, and d) future opportunities for research into IA. These concerns were addressed using a rigorous literature analysis involving 64 studies on IA selected from various scholarly sources. The outcomes of literature analysis are discussed in detail and some useful observations and insightful reflections are made. The findings reported in this study are useful because it offers a number of important recommendations for future research in this area.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116803731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-19DOI: 10.1109/CSCESM.2015.7331823
Yusuke Kawakami, T. Hattori, Y. Horikawa, Janaka Rajapakse
This paper proposes the Histogram Matching based on the Gaussian Distribution (HMGD) method to improve feeling (or Kansei) impression for multiple-peak images. In the previous papers, we have described the HMGD processing. And we also proposed how calculate whether the processing results good or not, using curvature computation. As the results, we have understood that the HMGD processing works well for single-peak images. In this paper, we describe the principle and processing method of HMGD processing to correspond multiple-peak images. And we also illustrate experimental results.
{"title":"Automated color image arrangement method for multiple-peak image","authors":"Yusuke Kawakami, T. Hattori, Y. Horikawa, Janaka Rajapakse","doi":"10.1109/CSCESM.2015.7331823","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331823","url":null,"abstract":"This paper proposes the Histogram Matching based on the Gaussian Distribution (HMGD) method to improve feeling (or Kansei) impression for multiple-peak images. In the previous papers, we have described the HMGD processing. And we also proposed how calculate whether the processing results good or not, using curvature computation. As the results, we have understood that the HMGD processing works well for single-peak images. In this paper, we describe the principle and processing method of HMGD processing to correspond multiple-peak images. And we also illustrate experimental results.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123406243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-19DOI: 10.1109/CSCESM.2015.7331890
M. Fekihal, I. Jaluta, Dinesh Kumar Saini
Information Retrieval Systems (IR) is using different indexing techniques to retrieve information such as, Inverted files, and Signature files. However, Signature files are suitable for small IR systems due to its slow response, while inverted file have better response time but its space overhead is high. Moreover, inverted files use B±trees for single-word queries. In this paper, a new indexing structure called TB±tree to be used in the design of inverted files for large information retrieval systems. The TB±tree is a variant of the B±tree that supports single key-word queries and phrase queries efficiently. In TB±tree algorithms which represent each key-word stored in the index by a numeric value, and this numeric value can be used as encryption and inforce security. The numeric value for each keyword is stored in binary format, which may reduce the size of the index file by 19%. The records in TB±tree may be of variable length.
{"title":"TB±tree: Index structure for Information Retrieval Systems","authors":"M. Fekihal, I. Jaluta, Dinesh Kumar Saini","doi":"10.1109/CSCESM.2015.7331890","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331890","url":null,"abstract":"Information Retrieval Systems (IR) is using different indexing techniques to retrieve information such as, Inverted files, and Signature files. However, Signature files are suitable for small IR systems due to its slow response, while inverted file have better response time but its space overhead is high. Moreover, inverted files use B±trees for single-word queries. In this paper, a new indexing structure called TB±tree to be used in the design of inverted files for large information retrieval systems. The TB±tree is a variant of the B±tree that supports single key-word queries and phrase queries efficiently. In TB±tree algorithms which represent each key-word stored in the index by a numeric value, and this numeric value can be used as encryption and inforce security. The numeric value for each keyword is stored in binary format, which may reduce the size of the index file by 19%. The records in TB±tree may be of variable length.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"50 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130972118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-19DOI: 10.1109/CSCESM.2015.7331884
Norah M. Asiri, Nourah AlHumaidi, Nourah AlOsaim
The sketch based image retrieval (SBIR) systems is still little argued and debated. Histogram of oriented gradients (HOG) has shown good performance in sketch based retrieval systems over all other methods. In this paper, we propose an enhancement of HOG by using HOG combined with hierarchical centroid of irregular shape. We also compare the result with original HOG, edge histogram and the shape properties descriptors. The system uses free-hand sketched queries as input and matches it with images from different 12 classes.
{"title":"Combination of histogram of oriented gradients and hierarchical centroid for sketch-based image retrieval","authors":"Norah M. Asiri, Nourah AlHumaidi, Nourah AlOsaim","doi":"10.1109/CSCESM.2015.7331884","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331884","url":null,"abstract":"The sketch based image retrieval (SBIR) systems is still little argued and debated. Histogram of oriented gradients (HOG) has shown good performance in sketch based retrieval systems over all other methods. In this paper, we propose an enhancement of HOG by using HOG combined with hierarchical centroid of irregular shape. We also compare the result with original HOG, edge histogram and the shape properties descriptors. The system uses free-hand sketched queries as input and matches it with images from different 12 classes.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125841011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-19DOI: 10.1109/CSCESM.2015.7331877
Geonlyang Kim, Yong-Sung Jeon, Jeongnyeo Kim
Many organizations want to support Bring Your Own Device initiatives to allow end-users to use personally owned devices at work. Organizations face significant challenges as users increasingly provide their own devices for work. So, interests of many people have grown how to prevent the leakage of security data of their enterprises. There are the technologies for using smart mobile devices safely by separating the personal area and the business area. This paper describes the Secure Domain of the Mobile Security Solution which is designed based on the Trusted Execution Environment system architecture of the Global Platform, and it describes the architecture and the operating procedure of the Secure Urgent Situation Propagation System. The Secure Urgent Situation Propagation System uses the Mobile Security Solution having the Secure Domain isolated from the normal domain, and it provides safe storages, data cryptographic functions through Secure Functions of the Secure Domain, and so on.
{"title":"The Secure Urgent Situation Propagation System using the Mobile Security Solution","authors":"Geonlyang Kim, Yong-Sung Jeon, Jeongnyeo Kim","doi":"10.1109/CSCESM.2015.7331877","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331877","url":null,"abstract":"Many organizations want to support Bring Your Own Device initiatives to allow end-users to use personally owned devices at work. Organizations face significant challenges as users increasingly provide their own devices for work. So, interests of many people have grown how to prevent the leakage of security data of their enterprises. There are the technologies for using smart mobile devices safely by separating the personal area and the business area. This paper describes the Secure Domain of the Mobile Security Solution which is designed based on the Trusted Execution Environment system architecture of the Global Platform, and it describes the architecture and the operating procedure of the Secure Urgent Situation Propagation System. The Secure Urgent Situation Propagation System uses the Mobile Security Solution having the Secure Domain isolated from the normal domain, and it provides safe storages, data cryptographic functions through Secure Functions of the Secure Domain, and so on.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121704708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}