Pub Date : 2015-11-19DOI: 10.1109/CSCESM.2015.7331888
Mohammad Alotaibi, I. Choudhury
The diagnosis and management of Diabetes type 1 (Children diabetes) is often a complicated process. Recent mobile health technologies are increasingly used in improving the self-management of chronic diseases such as diabetes and several studies have proven its efficiency. Further, research has shown that increased awareness of the disease helps the diabetics to effectively manage their disease and consequently reduce the complications arising due to diabetes. In this paper, an innovative social robotic children diabetes management and educational system for diabetic children in Kingdom of Saudi Arabia is presented. The presented system makes use of Aisoy1 v5 robot in parallel with mobile health technologies. The aim of the system is to improve the diabetes type 1 management with children and to empower them with relevant knowledge about disease management to improve their awareness about the disease in Saudi Arabia. The proposed system presented in this paper will be tested and evaluated extensively in a randomized controlled trial in Saudi Arabia.
{"title":"A social robotics children diabetes management and educational system for Saudi Arabia: System architecture","authors":"Mohammad Alotaibi, I. Choudhury","doi":"10.1109/CSCESM.2015.7331888","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331888","url":null,"abstract":"The diagnosis and management of Diabetes type 1 (Children diabetes) is often a complicated process. Recent mobile health technologies are increasingly used in improving the self-management of chronic diseases such as diabetes and several studies have proven its efficiency. Further, research has shown that increased awareness of the disease helps the diabetics to effectively manage their disease and consequently reduce the complications arising due to diabetes. In this paper, an innovative social robotic children diabetes management and educational system for diabetic children in Kingdom of Saudi Arabia is presented. The presented system makes use of Aisoy1 v5 robot in parallel with mobile health technologies. The aim of the system is to improve the diabetes type 1 management with children and to empower them with relevant knowledge about disease management to improve their awareness about the disease in Saudi Arabia. The proposed system presented in this paper will be tested and evaluated extensively in a randomized controlled trial in Saudi Arabia.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124946451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-19DOI: 10.1109/CSCESM.2015.7331882
Kihyun Kim
There are not a lot of artworks which touches on randomization. Artists such as Jackson Pollock, Karl Sim, and Gregory Volk tried to reach true randomness in their artworks. However, In this paper, I will evaluate why those artists failed to achieve randomness and create artworks using the random number generator in order to reach the true randomness.
{"title":"Random number visualization using the TRNG","authors":"Kihyun Kim","doi":"10.1109/CSCESM.2015.7331882","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331882","url":null,"abstract":"There are not a lot of artworks which touches on randomization. Artists such as Jackson Pollock, Karl Sim, and Gregory Volk tried to reach true randomness in their artworks. However, In this paper, I will evaluate why those artists failed to achieve randomness and create artworks using the random number generator in order to reach the true randomness.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121787367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-19DOI: 10.1109/CSCESM.2015.7331826
S. Alfadhli, A. Alsumait
Cloud Computing is considered as a provider of scalable storage and computational resources, which supports various types of online services for end users. This paper discusses cloud computing concepts, deployment models, and delivery models. Different public cloud computing services are compared. The Fun Academic Cloud Computing (FACC) framework is proposed to help game-based-learning developers determine how best to employ cloud-enabled services. FACC promotes building efficient, cost effective, and powerful learning games that can be used by many users anytime and anywhere. We discuss how to link the proposed framework with the appropriate public cloud computing system. Using this framework, learning institutes can access increased computing power through cloud services and enhance the learning experience.
{"title":"Fun Academic Cloud Computing","authors":"S. Alfadhli, A. Alsumait","doi":"10.1109/CSCESM.2015.7331826","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331826","url":null,"abstract":"Cloud Computing is considered as a provider of scalable storage and computational resources, which supports various types of online services for end users. This paper discusses cloud computing concepts, deployment models, and delivery models. Different public cloud computing services are compared. The Fun Academic Cloud Computing (FACC) framework is proposed to help game-based-learning developers determine how best to employ cloud-enabled services. FACC promotes building efficient, cost effective, and powerful learning games that can be used by many users anytime and anywhere. We discuss how to link the proposed framework with the appropriate public cloud computing system. Using this framework, learning institutes can access increased computing power through cloud services and enhance the learning experience.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114678650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-19DOI: 10.1109/CSCESM.2015.7331830
Andrea Horch, H. Kett, A. Weisbecker
Comparing products and prices of on-line offers is important to e-shoppers and on-line retailers. The e-shoppers compare products and prices for finding the best product or price whereas the retailers need to compare their own products and prices to those of their competitors in order to remain competitive. As there is a wide range of product offers available on the Web the product and price comparison need to be done by an automated approach. One challenging task of such an approach is the automated assignment of different product offers which refer to the same real-world product. Products are compared and assigned based on the calculation of the pairwise similarity of their attributes. Thus, the attributes need to be identified, extracted and harmonised. In the case of the comparison of unit attributes harmonisation means to convert the attributes and their values into the same unit. The contribution of this paper is an approach and a corresponding ontology for identifying, extracting and harmonising unit attributes of product offers. The unit attribute ontology is introduced, the extraction process is described and the adequacy of the approach is validated through an experiment.
{"title":"Extracting product unit attributes from product offers by using an ontology","authors":"Andrea Horch, H. Kett, A. Weisbecker","doi":"10.1109/CSCESM.2015.7331830","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331830","url":null,"abstract":"Comparing products and prices of on-line offers is important to e-shoppers and on-line retailers. The e-shoppers compare products and prices for finding the best product or price whereas the retailers need to compare their own products and prices to those of their competitors in order to remain competitive. As there is a wide range of product offers available on the Web the product and price comparison need to be done by an automated approach. One challenging task of such an approach is the automated assignment of different product offers which refer to the same real-world product. Products are compared and assigned based on the calculation of the pairwise similarity of their attributes. Thus, the attributes need to be identified, extracted and harmonised. In the case of the comparison of unit attributes harmonisation means to convert the attributes and their values into the same unit. The contribution of this paper is an approach and a corresponding ontology for identifying, extracting and harmonising unit attributes of product offers. The unit attribute ontology is introduced, the extraction process is described and the adequacy of the approach is validated through an experiment.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128422362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-19DOI: 10.1109/CSCESM.2015.7331881
Ramamoorthy Luxman, Xiao Liu
This work demonstrates building an ETH's back-stepping integral controller based quad-copter, and is driven by human gestures. A novel application of computer vision is introduced for easy operation of quad-copters. Furthermore a method for detecting and auto follow of human is devised in the quad-copter. The design and modeling have been successfully realized on the 450mm sized X-configured quad-copter built during this project. This paper also demonstrates a MATLAB framework, to simulate and analyze the performance of a quad-rotor designed with back-stepping integral controller. It gives a synopsis of the controller used in ETH OS4 quad-rotor and presents an easy to use GUI to tune the controller while designing the quad-rotor.
{"title":"Implementation of back-stepping integral controller for a gesture driven quad-copter with human detection and auto follow feature","authors":"Ramamoorthy Luxman, Xiao Liu","doi":"10.1109/CSCESM.2015.7331881","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331881","url":null,"abstract":"This work demonstrates building an ETH's back-stepping integral controller based quad-copter, and is driven by human gestures. A novel application of computer vision is introduced for easy operation of quad-copters. Furthermore a method for detecting and auto follow of human is devised in the quad-copter. The design and modeling have been successfully realized on the 450mm sized X-configured quad-copter built during this project. This paper also demonstrates a MATLAB framework, to simulate and analyze the performance of a quad-rotor designed with back-stepping integral controller. It gives a synopsis of the controller used in ETH OS4 quad-rotor and presents an easy to use GUI to tune the controller while designing the quad-rotor.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116917472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-19DOI: 10.1109/CSCESM.2015.7331885
A. Huotari, Ilkka Tikanmaki
Project EUCISE2020 aims to enhance European maritime safety in terms of supporting the integration of maritime surveillance through constructing a European Union (EU) wide Common Information Sharing Environment (CISE) for an enhanced operational picture. The EUCISE solution will be built on common service-based architecture and an information exchange environment, in its development operation, and maintenance. It aims to share information more effectively between public and private communities, across sectors and national borders. The introduction of the environment will raise the question of training personnel to use the environment. This paper proposes an online training / learning application to support this training of personnel to the efficient use of the Common Information Sharing Environment (CISE).
{"title":"An online training for the EU Common Information Sharing Environment","authors":"A. Huotari, Ilkka Tikanmaki","doi":"10.1109/CSCESM.2015.7331885","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331885","url":null,"abstract":"Project EUCISE2020 aims to enhance European maritime safety in terms of supporting the integration of maritime surveillance through constructing a European Union (EU) wide Common Information Sharing Environment (CISE) for an enhanced operational picture. The EUCISE solution will be built on common service-based architecture and an information exchange environment, in its development operation, and maintenance. It aims to share information more effectively between public and private communities, across sectors and national borders. The introduction of the environment will raise the question of training personnel to use the environment. This paper proposes an online training / learning application to support this training of personnel to the efficient use of the Common Information Sharing Environment (CISE).","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"361 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132616830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-19DOI: 10.1109/CSCESM.2015.7331878
Kihyun Kim, Taeson Yoon
Despite the highly educational potential and its long tradition in Korea, Gonu has been fairly unpopular as it entered the modern times. In this paper, The author will compare Gonu with other popular board games and extract important factors that differentiates the popular board games from Gonu. Then. the author will also pose possible solutions to solve the problem and use simulations in order to improve the game to a point where it could rival with other popular board games.
{"title":"Analysis and solutions to publicize Gonu","authors":"Kihyun Kim, Taeson Yoon","doi":"10.1109/CSCESM.2015.7331878","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331878","url":null,"abstract":"Despite the highly educational potential and its long tradition in Korea, Gonu has been fairly unpopular as it entered the modern times. In this paper, The author will compare Gonu with other popular board games and extract important factors that differentiates the popular board games from Gonu. Then. the author will also pose possible solutions to solve the problem and use simulations in order to improve the game to a point where it could rival with other popular board games.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115872323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-19DOI: 10.1109/CSCESM.2015.7331880
J. Rajamäki, J. Knuuttila, Harri Ruoslahti, Pasi Patama, J. Viitanen
Law enforcement agencies (LEAs) constantly seek new technological recording, retrieving and monitoring solutions that would facilitate their combat against organized crime. For example, GPS sensors and systems benefit LEAs when tracking non-cooperative targets. However, the management of numerous electronic tracking devices within many simultaneous crime investigations has proven to be a demanding task for LEAs. Complications have spawned many lawsuits and negative publicity. These episodes have diminished citizens' trust in a constitutional state. It has been verified by means of participative observations that LEAs have a tendency to create two-level systems: some that work on the streets and others that are valid in the courts of justice, which create tensions between authorities. The importance of transparency is emphasized at all EU administrative levels. However, LEAs concentrate only on data acquisition rather than on making their operations transparent throughout. To protect the privacy of suspects, investigations and data acquisition cannot be made public. However, these operations could be so transparent that they enable criticism and control by citizens. To improve the processes of LEAs, the three main functions (crime investigation, chain-of-custody and monitoring-of-legality) should be considered together. Combining their now separate information systems will avoid the triple workload. It will also lead to additional benefits, such as transparency of surveillance and a new tool for achieving a balance between surveillance and privacy. The guidelines for this combining cannot be drawn from criminal justice and organizational imperatives alone, but from ever advancing technical imperative, too.
{"title":"Building trust between citizens and their governments","authors":"J. Rajamäki, J. Knuuttila, Harri Ruoslahti, Pasi Patama, J. Viitanen","doi":"10.1109/CSCESM.2015.7331880","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331880","url":null,"abstract":"Law enforcement agencies (LEAs) constantly seek new technological recording, retrieving and monitoring solutions that would facilitate their combat against organized crime. For example, GPS sensors and systems benefit LEAs when tracking non-cooperative targets. However, the management of numerous electronic tracking devices within many simultaneous crime investigations has proven to be a demanding task for LEAs. Complications have spawned many lawsuits and negative publicity. These episodes have diminished citizens' trust in a constitutional state. It has been verified by means of participative observations that LEAs have a tendency to create two-level systems: some that work on the streets and others that are valid in the courts of justice, which create tensions between authorities. The importance of transparency is emphasized at all EU administrative levels. However, LEAs concentrate only on data acquisition rather than on making their operations transparent throughout. To protect the privacy of suspects, investigations and data acquisition cannot be made public. However, these operations could be so transparent that they enable criticism and control by citizens. To improve the processes of LEAs, the three main functions (crime investigation, chain-of-custody and monitoring-of-legality) should be considered together. Combining their now separate information systems will avoid the triple workload. It will also lead to additional benefits, such as transparency of surveillance and a new tool for achieving a balance between surveillance and privacy. The guidelines for this combining cannot be drawn from criminal justice and organizational imperatives alone, but from ever advancing technical imperative, too.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134175784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-19DOI: 10.1109/CSCESM.2015.7331883
Johannes Sianipar, C. Meinel
In the existing cloud brokerage system, the client does not have the ability to verify the result of the cloud service selection. There are possibilities that the cloud broker can be biased in selecting the best Cloud Service Provider (CSP) for a client. A compromised or dishonest cloud broker can unfairly select a CSP for its own advantage by cooperating with the selected CSP. To address this problem, we propose a mechanism to verify the CSP selection result of the cloud broker. In this verification mechanism, properties of every CSP will also be verified. It uses a trusted third party to gather clustering result from the cloud broker. This trusted third party is also used as a base station to collect CSP properties in a multi-agents system. Software Agents are installed and running on every CSP. The CSP is monitored by agents as the representative of the customer inside the cloud. These multi-agents give reports to a third party that must be trusted by CSPs, customers and the Cloud Broker. The third party provides transparency by publishing reports to the authorized parties (CSPs and Customers).
{"title":"A verification mechanism for cloud brokerage system","authors":"Johannes Sianipar, C. Meinel","doi":"10.1109/CSCESM.2015.7331883","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331883","url":null,"abstract":"In the existing cloud brokerage system, the client does not have the ability to verify the result of the cloud service selection. There are possibilities that the cloud broker can be biased in selecting the best Cloud Service Provider (CSP) for a client. A compromised or dishonest cloud broker can unfairly select a CSP for its own advantage by cooperating with the selected CSP. To address this problem, we propose a mechanism to verify the CSP selection result of the cloud broker. In this verification mechanism, properties of every CSP will also be verified. It uses a trusted third party to gather clustering result from the cloud broker. This trusted third party is also used as a base station to collect CSP properties in a multi-agents system. Software Agents are installed and running on every CSP. The CSP is monitored by agents as the representative of the customer inside the cloud. These multi-agents give reports to a third party that must be trusted by CSPs, customers and the Cloud Broker. The third party provides transparency by publishing reports to the authorized parties (CSPs and Customers).","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134059283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-19DOI: 10.1109/CSCESM.2015.7331892
Laura Tarkkanen, M. Aro
The current border surveillance is either conducted with a walking patrol and a dog, or electronic surveillance systems at the Finnish-Russian border. Laurea University of Applied Sciences is involved with two RPAS implementation projects, where their use has been studied for civilian authority use. Both projects used scenario work to test the RPA system's usability in the Finnish environment, and using the CBPI project's demonstrations as a case study.
{"title":"Using scenarios to showcase how RPAS can be implemented in border surveillance","authors":"Laura Tarkkanen, M. Aro","doi":"10.1109/CSCESM.2015.7331892","DOIUrl":"https://doi.org/10.1109/CSCESM.2015.7331892","url":null,"abstract":"The current border surveillance is either conducted with a walking patrol and a dog, or electronic surveillance systems at the Finnish-Russian border. Laurea University of Applied Sciences is involved with two RPAS implementation projects, where their use has been studied for civilian authority use. Both projects used scenario work to test the RPA system's usability in the Finnish environment, and using the CBPI project's demonstrations as a case study.","PeriodicalId":232149,"journal":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116191373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}