首页 > 最新文献

2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)最新文献

英文 中文
Proposal of a Malicious Communication Control Method Using OpenFlow 提出一种基于OpenFlow的恶意通信控制方法
Minoru Ikebe, Daiki Shimokawa, Kazuyuki Yoshida
We have been developing an anomaly detection system (ADS) for detecting malicious communication from the Internet to our campus network. We implement two methods for blocking malicious communications. However, these blocking methods have some problems. Therefore, we propose a new method for blocking malicious communications using OpenFlow technology. In this paper, we describe the overview of our blocking method using OpenFlow. We compared the ACL method and the OpenFlow method, and we conducted an experiment on our proposed system using actual packet data. As a result, we confirmed the method effective in blocking malicious communication on our system.
我们一直在开发一个异常检测系统(ADS),用于检测从Internet到我们校园网的恶意通信。我们实现了两种阻止恶意通信的方法。然而,这些阻塞方法存在一些问题。因此,我们提出了一种利用OpenFlow技术阻止恶意通信的新方法。在本文中,我们描述了使用OpenFlow的阻塞方法的概述。我们比较了ACL方法和OpenFlow方法,并使用实际的数据包数据对我们提出的系统进行了实验。结果,我们证实了该方法可以有效地阻止系统上的恶意通信。
{"title":"Proposal of a Malicious Communication Control Method Using OpenFlow","authors":"Minoru Ikebe, Daiki Shimokawa, Kazuyuki Yoshida","doi":"10.1109/CISIS.2016.75","DOIUrl":"https://doi.org/10.1109/CISIS.2016.75","url":null,"abstract":"We have been developing an anomaly detection system (ADS) for detecting malicious communication from the Internet to our campus network. We implement two methods for blocking malicious communications. However, these blocking methods have some problems. Therefore, we propose a new method for blocking malicious communications using OpenFlow technology. In this paper, we describe the overview of our blocking method using OpenFlow. We compared the ACL method and the OpenFlow method, and we conducted an experiment on our proposed system using actual packet data. As a result, we confirmed the method effective in blocking malicious communication on our system.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114576804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Desktop 3D Modeling System Controllable by Mid-air Interactions 基于空中交互控制的桌面三维建模系统
Kanako Nakazato, Hiroaki Nishino, T. Kodama
Remarkable progresses of fabrication devices such as 3D printers and laser cutters allow nonprofessionals to manufacture their own products. They should, however, iterate design, production, and refinement processes through trial and error. Additionally, they must gain a good 3D modeling skill to make the products unique and different. In this paper, we propose a 3D modeling system allowing users to easily design a new product by directly comparing a graphical model to a real product without scanning the real one. The system visualizes the graphical model as a mid-air image that can coexist with the real product in a same physical space. The system also enables the users to manipulate the graphical model through a set of simple hand gestures. We conducted a preliminary experiment to verify the effectiveness of the proposed system.
3D打印机和激光切割机等制造设备的显著进步使非专业人员可以制造自己的产品。然而,他们应该通过试验和错误来迭代设计、生产和改进过程。此外,他们必须获得良好的3D建模技能,使产品独特和不同。在本文中,我们提出了一个三维建模系统,使用户可以通过直接将图形模型与真实产品进行比较,而无需扫描真实产品,从而轻松地设计新产品。该系统将图形模型可视化为可以与真实产品在同一物理空间中共存的半空中图像。该系统还使用户能够通过一组简单的手势操作图形模型。我们进行了初步实验来验证所提出系统的有效性。
{"title":"A Desktop 3D Modeling System Controllable by Mid-air Interactions","authors":"Kanako Nakazato, Hiroaki Nishino, T. Kodama","doi":"10.1109/CISIS.2016.80","DOIUrl":"https://doi.org/10.1109/CISIS.2016.80","url":null,"abstract":"Remarkable progresses of fabrication devices such as 3D printers and laser cutters allow nonprofessionals to manufacture their own products. They should, however, iterate design, production, and refinement processes through trial and error. Additionally, they must gain a good 3D modeling skill to make the products unique and different. In this paper, we propose a 3D modeling system allowing users to easily design a new product by directly comparing a graphical model to a real product without scanning the real one. The system visualizes the graphical model as a mid-air image that can coexist with the real product in a same physical space. The system also enables the users to manipulate the graphical model through a set of simple hand gestures. We conducted a preliminary experiment to verify the effectiveness of the proposed system.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":" 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113948860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Integrated Cloud Framework for Farm Management 农场管理集成云框架
C. Radu, E. Apostol, C. Leordeanu, M. Mocanu
Smart or intelligent farming is a relatively new concept, but it's becoming an important factor for the agricultural sectors, as a way to raise productivity through technology. This article presents a global management and decision system for smart farming. Our system is addressed to farmers and other actors involved in farming operations, such as rural service companies and banks. It can manage up to several groups of smart or technology-based farms. The system is functioning on two levels, local and Cloud. First of all, it must be deployed on the farm's local wireless network. And secondly, it uses the Cloud's resources and flexibility to offer even more complex services.
智能农业是一个相对较新的概念,但作为一种通过技术提高生产力的方式,它正在成为农业部门的一个重要因素。本文提出了一个面向智能农业的全局管理决策系统。我们的系统面向农民和参与农业经营的其他参与者,如农村服务公司和银行。它可以管理多组智能或基于技术的农场。该系统在本地和云两个层面上运行。首先,它必须部署在农场的本地无线网络上。其次,它利用云的资源和灵活性来提供更复杂的服务。
{"title":"Integrated Cloud Framework for Farm Management","authors":"C. Radu, E. Apostol, C. Leordeanu, M. Mocanu","doi":"10.1109/CISIS.2016.136","DOIUrl":"https://doi.org/10.1109/CISIS.2016.136","url":null,"abstract":"Smart or intelligent farming is a relatively new concept, but it's becoming an important factor for the agricultural sectors, as a way to raise productivity through technology. This article presents a global management and decision system for smart farming. Our system is addressed to farmers and other actors involved in farming operations, such as rural service companies and banks. It can manage up to several groups of smart or technology-based farms. The system is functioning on two levels, local and Cloud. First of all, it must be deployed on the farm's local wireless network. And secondly, it uses the Cloud's resources and flexibility to offer even more complex services.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134544529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Centrality-Based History Prediction Routing Protocol for Opportunistic Networks 机会网络中基于中心性的历史预测路由协议
Amarpreet Bamrah, I. Woungang, L. Barolli, S. K. Dhurandher, Glaucio H. S. Carvalho, M. Takizawa
In Opportunistic networks (OppNets), due to high mobility, short radio range, intermittent links, unstable topology, sparse connectivity, to name a few, routing is a very challenging task since it relies on cooperation between the nodes. This paper focuses on using the concept of centrality to alleviate this task. Unlike other nodes in the network, central nodes are those that are more likely to act as communication hubs to facilitate the message forwarding and thereby routing. In this paper, a recently proposed History-Based Prediction Routing protocol (HBPR) for OppNets is re-designed using this concept, yielding the so-called centrality-based HBPR (CHBPR) routing protocol. The proposed CHBPR scheme is evaluated by simulations using the Opportunistic NEtwork (ONE) simulator, showing superior performance compared to HBPR without centrality and Epidemic protocol with centrality, in terms of number of messages delivered at destination and overhead ratio, under varying number of nodes and Time-to-Live.
在机会网络(OppNets)中,由于高移动性、短无线电范围、间歇性链路、不稳定拓扑、稀疏连接等,路由是一项非常具有挑战性的任务,因为它依赖于节点之间的合作。本文着重于使用中心性的概念来减轻这一任务。与网络中的其他节点不同,中心节点更可能充当通信集线器,以促进消息转发和路由。本文利用这一概念重新设计了最近提出的OppNets基于历史的预测路由协议(HBPR),从而产生了所谓的基于中心性的HBPR (CHBPR)路由协议。利用机会网络(ONE)模拟器对所提出的CHBPR方案进行了仿真评估,在不同节点数量和生存时间下,从目的地传递的消息数量和开销比率来看,与不带中心性的HBPR和带中心性的Epidemic协议相比,CHBPR方案表现出优越的性能。
{"title":"A Centrality-Based History Prediction Routing Protocol for Opportunistic Networks","authors":"Amarpreet Bamrah, I. Woungang, L. Barolli, S. K. Dhurandher, Glaucio H. S. Carvalho, M. Takizawa","doi":"10.1109/CISIS.2016.143","DOIUrl":"https://doi.org/10.1109/CISIS.2016.143","url":null,"abstract":"In Opportunistic networks (OppNets), due to high mobility, short radio range, intermittent links, unstable topology, sparse connectivity, to name a few, routing is a very challenging task since it relies on cooperation between the nodes. This paper focuses on using the concept of centrality to alleviate this task. Unlike other nodes in the network, central nodes are those that are more likely to act as communication hubs to facilitate the message forwarding and thereby routing. In this paper, a recently proposed History-Based Prediction Routing protocol (HBPR) for OppNets is re-designed using this concept, yielding the so-called centrality-based HBPR (CHBPR) routing protocol. The proposed CHBPR scheme is evaluated by simulations using the Opportunistic NEtwork (ONE) simulator, showing superior performance compared to HBPR without centrality and Epidemic protocol with centrality, in terms of number of messages delivered at destination and overhead ratio, under varying number of nodes and Time-to-Live.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123705427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Fully Detection of Illegal Memory Access Defects 完全检测非法内存访问缺陷
Yukun Dong
There are many illegal memory access (IMA) defects in C programs, for example, null pointer dereference, buffer overflow and array out of bounds. When C programs are running, these defects may cause software failure, and may lead to serious consequences. In order to fully detect these IMA defects, we apply abstract regions to simulate memory blocks that allocated to memory objects at the runtime, and use the region-based model to describe memory states of each program point based on the result of dataflow analysis. Based on the region-based model, the determining criterion of IMA defects is introduced for detecting these defects. The method has been implemented in the defect detection tool DTSC, and 5 open source projects are tested, the test results show the validity of our method.
C语言程序中存在许多非法内存访问(IMA)缺陷,如空指针解引用、缓冲区溢出、数组越界等。当C程序运行时,这些缺陷可能会导致软件故障,并可能导致严重的后果。为了充分检测这些IMA缺陷,我们应用抽象区域来模拟运行时分配给内存对象的内存块,并基于数据流分析的结果,使用基于区域的模型来描述每个程序点的内存状态。在基于区域模型的基础上,引入了IMA缺陷的判定准则,用于缺陷的检测。该方法已在缺陷检测工具DTSC中实现,并对5个开源项目进行了测试,测试结果表明了该方法的有效性。
{"title":"Fully Detection of Illegal Memory Access Defects","authors":"Yukun Dong","doi":"10.1109/CISIS.2016.57","DOIUrl":"https://doi.org/10.1109/CISIS.2016.57","url":null,"abstract":"There are many illegal memory access (IMA) defects in C programs, for example, null pointer dereference, buffer overflow and array out of bounds. When C programs are running, these defects may cause software failure, and may lead to serious consequences. In order to fully detect these IMA defects, we apply abstract regions to simulate memory blocks that allocated to memory objects at the runtime, and use the region-based model to describe memory states of each program point based on the result of dataflow analysis. Based on the region-based model, the determining criterion of IMA defects is introduced for detecting these defects. The method has been implemented in the defect detection tool DTSC, and 5 open source projects are tested, the test results show the validity of our method.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123725232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on Cross-Cutting and Systematic Regional Community Networks 跨领域、系统的区域社区网络研究
Eiji Aoki, Zenjiro Oba, Ritsuko Watanabe
Currently, the issues for the time being have become complex and diverse in the region, such as the disappearance of the local government by the super aging population is feared. Therefore from being considered as a tool for problem-solving is ICT to progress rapidly, among the information and communication technology such as IOT(internet of things), CPS(cyber physical system), AI(Artificial intelligence), wearable devices, SNS, a variety of communication pattern and the like. On the other hand, the negative aspects of bringing a rapid development of science and technology that makes light and dark, there is a reality that has been manifest. Moreover it influences big impact on future with economic growth in Asia particular in China, and globalization of the world. What can we do in such situation? First is to visualize a variety of initiatives according to find challenges. Second is to construct the cross-cutting and systematic network for problem-solving. The regional community network is important due to mutually complementary and coordination. Their activities in cooperation with Asian countries, aims to lead to the independence of the local ICT companies.
目前,该地区的问题暂时变得复杂和多样化,例如担心人口超老龄化导致地方政府消失。因此,ICT从被认为是解决问题的工具,到在诸如IOT(物联网)、CPS(网络物理系统)、AI(人工智能)、可穿戴设备、SNS等各种通信模式的信息通信技术中迅速发展。另一方面,科技的快速发展带来的消极方面使得光明和黑暗,有一个现实已经显现出来。此外,它对亚洲特别是中国的经济增长和世界全球化的未来产生了重大影响。在这种情况下我们能做什么?首先是可视化各种举措,根据发现挑战。二是构建跨领域、系统的问题解决网络。区域社区网络的互补性和协调性十分重要。他们的活动与亚洲国家的合作,旨在导致当地的信息通信技术公司的独立性。
{"title":"Study on Cross-Cutting and Systematic Regional Community Networks","authors":"Eiji Aoki, Zenjiro Oba, Ritsuko Watanabe","doi":"10.1109/CISIS.2016.114","DOIUrl":"https://doi.org/10.1109/CISIS.2016.114","url":null,"abstract":"Currently, the issues for the time being have become complex and diverse in the region, such as the disappearance of the local government by the super aging population is feared. Therefore from being considered as a tool for problem-solving is ICT to progress rapidly, among the information and communication technology such as IOT(internet of things), CPS(cyber physical system), AI(Artificial intelligence), wearable devices, SNS, a variety of communication pattern and the like. On the other hand, the negative aspects of bringing a rapid development of science and technology that makes light and dark, there is a reality that has been manifest. Moreover it influences big impact on future with economic growth in Asia particular in China, and globalization of the world. What can we do in such situation? First is to visualize a variety of initiatives according to find challenges. Second is to construct the cross-cutting and systematic network for problem-solving. The regional community network is important due to mutually complementary and coordination. Their activities in cooperation with Asian countries, aims to lead to the independence of the local ICT companies.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129209632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Estimation of Communication Range Using Wi-Fi for V2X Communication Environment 基于Wi-Fi的V2X通信环境下通信距离估计
Kenta Ito, Go Hirakawa, Y. Shibata
In this paper, we introduce an estimation of communication range using Wi-Fi for V2X communication environment. Traffic accidents and traffic hazard are serious social problems. Understanding road condition in advance is important and necessary to prevent traffic accidents and traffic hazards. In addition, getting information without Internet connection is necessary to provide road information for drivers in real-time because there is an environment that getting Internet connection is difficult. We construct a road condition sharing system with multiple vehicles using V2X communication. Our goal is to share road condition without Internet connection. To realize our goal, we experiment V2X communication, evaluate experimental results and estimate communication range.
本文介绍了一种基于Wi-Fi的V2X通信环境下的通信距离估计方法。交通事故和交通危害是严重的社会问题。提前了解路况对于预防交通事故和交通危害是非常重要和必要的。此外,在没有互联网连接的环境下获取信息是必要的,因为很难获得互联网连接的环境,因此需要为驾驶员实时提供道路信息。我们利用V2X通信技术构建了一个多车的路况共享系统。我们的目标是在没有互联网连接的情况下分享路况。为了实现我们的目标,我们进行了V2X通信实验,评估了实验结果,估计了通信范围。
{"title":"Estimation of Communication Range Using Wi-Fi for V2X Communication Environment","authors":"Kenta Ito, Go Hirakawa, Y. Shibata","doi":"10.1109/CISIS.2016.112","DOIUrl":"https://doi.org/10.1109/CISIS.2016.112","url":null,"abstract":"In this paper, we introduce an estimation of communication range using Wi-Fi for V2X communication environment. Traffic accidents and traffic hazard are serious social problems. Understanding road condition in advance is important and necessary to prevent traffic accidents and traffic hazards. In addition, getting information without Internet connection is necessary to provide road information for drivers in real-time because there is an environment that getting Internet connection is difficult. We construct a road condition sharing system with multiple vehicles using V2X communication. Our goal is to share road condition without Internet connection. To realize our goal, we experiment V2X communication, evaluate experimental results and estimate communication range.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123197141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Hybrid Analysis for Mining Network Protocol's Hidden Behavior 挖掘网络协议隐藏行为的混合分析
Yanjing Hu, Xu An Wang
Reverse unknown protocol's hidden behavior has played an important role in the field of network security. The proposed work takes the captured messages and the binary code that implement the protocol both as the studied object. Dynamic Taint Analysis combined with Static Analysis is used for protocol analyzing. Firstly, monitor and analyze the process of protocol program parses the message in the virtual platform HiddenDisc prototype system developed by ourselves, record the protocol's public behavior, then based on our proposed Hidden Behavior Perception and Mining algorithm, static analyze the protocol's hidden behavior trigger conditions and hidden behavior instruction sequences. According to the hidden behavior trigger conditions, new protocol messages with the sensitive information are generated, and the hidden behaviors are executed by dynamic triggering. HiddenDisc prototype system can sense, trigger and analyze the protocol's hidden behaviors. According to the statistical analysis results, we propose the evaluation method of Protocol Execution Security. The experimental results show that the present method can accurately mining the protocol's hidden behaviors, and can evaluate unknown protocol's execution security.
反向未知协议的隐藏行为在网络安全领域发挥了重要作用。提出的工作以捕获的消息和实现协议的二进制代码作为研究对象。协议分析采用动态分析和静态分析相结合的方法。首先,在自行开发的虚拟平台HiddenDisc原型系统中对协议程序的过程进行监控和分析,解析消息,记录协议的公开行为,然后基于我们提出的隐藏行为感知和挖掘算法,静态分析协议的隐藏行为触发条件和隐藏行为指令序列。根据隐藏行为触发条件,生成包含敏感信息的新协议消息,并通过动态触发执行隐藏行为。HiddenDisc原型系统可以感知、触发和分析协议的隐藏行为。根据统计分析结果,提出了协议执行安全性的评价方法。实验结果表明,该方法能够准确挖掘协议的隐藏行为,并对未知协议的执行安全性进行评估。
{"title":"Hybrid Analysis for Mining Network Protocol's Hidden Behavior","authors":"Yanjing Hu, Xu An Wang","doi":"10.1109/CISIS.2016.64","DOIUrl":"https://doi.org/10.1109/CISIS.2016.64","url":null,"abstract":"Reverse unknown protocol's hidden behavior has played an important role in the field of network security. The proposed work takes the captured messages and the binary code that implement the protocol both as the studied object. Dynamic Taint Analysis combined with Static Analysis is used for protocol analyzing. Firstly, monitor and analyze the process of protocol program parses the message in the virtual platform HiddenDisc prototype system developed by ourselves, record the protocol's public behavior, then based on our proposed Hidden Behavior Perception and Mining algorithm, static analyze the protocol's hidden behavior trigger conditions and hidden behavior instruction sequences. According to the hidden behavior trigger conditions, new protocol messages with the sensitive information are generated, and the hidden behaviors are executed by dynamic triggering. HiddenDisc prototype system can sense, trigger and analyze the protocol's hidden behaviors. According to the statistical analysis results, we propose the evaluation method of Protocol Execution Security. The experimental results show that the present method can accurately mining the protocol's hidden behaviors, and can evaluate unknown protocol's execution security.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126446377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating a Multimedia e-Learning System for CAD Drawing Course CAD绘图课程多媒体电子学习系统的评估
D. Nariman
The development of e-learning products and provision of e-learning opportunities is one of the most rapidly expanding areas of education and training. The growth of e-learning application is accelerating through both offline and online system. These innovative systems are changing the face of learning as we know it. However, what is known about these innovative approaches to training has been limited by the shortage of scientifically evaluation. This study aims to assess students' satisfaction and preference toward a multimedia learning system. This paper describes the evaluation of a package of a Multimedia e-learning system for Computer Aided Design (CAD) practice course. This study develops a questionnaire based on usability evaluation method for a Multimedia e-learning system. The method extends the current practice by focusing not only on cognitive but also affective considerations that may influence e-learning usability. This paper presents findings from a study of the impact of the learning systems. The study also describes designing evaluation sheet, data collection and analysis strategies of a case study on the evaluation of the multimedia learning system implemented for Computer Assisted Design (CAD) Practice Course in Ritsumeikan Asia Pacific University (APU), Japan.
开发电子学习产品和提供电子学习机会是教育和培训领域中发展最为迅速的领域之一。通过线下和线上系统,电子学习应用正在加速增长。正如我们所知,这些创新系统正在改变学习的面貌。然而,由于缺乏科学的评估,对这些创新的培训方法的了解受到了限制。本研究旨在评估学生对多媒体学习系统的满意度和偏好。本文介绍了计算机辅助设计(CAD)实践课程多媒体电子学习系统软件包的评价。本研究开发了一种基于问卷的多媒体电子学习系统可用性评估方法。该方法扩展了当前的实践,不仅关注可能影响电子学习可用性的认知因素,还关注可能影响电子学习可用性的情感因素。本文介绍了一项关于学习系统影响的研究结果。本研究以日本立命馆亚太大学(APU)计算机辅助设计(CAD)实践课程的多媒体学习系统为例,描述了评估表的设计、数据收集和分析策略。
{"title":"Evaluating a Multimedia e-Learning System for CAD Drawing Course","authors":"D. Nariman","doi":"10.1109/CISIS.2016.96","DOIUrl":"https://doi.org/10.1109/CISIS.2016.96","url":null,"abstract":"The development of e-learning products and provision of e-learning opportunities is one of the most rapidly expanding areas of education and training. The growth of e-learning application is accelerating through both offline and online system. These innovative systems are changing the face of learning as we know it. However, what is known about these innovative approaches to training has been limited by the shortage of scientifically evaluation. This study aims to assess students' satisfaction and preference toward a multimedia learning system. This paper describes the evaluation of a package of a Multimedia e-learning system for Computer Aided Design (CAD) practice course. This study develops a questionnaire based on usability evaluation method for a Multimedia e-learning system. The method extends the current practice by focusing not only on cognitive but also affective considerations that may influence e-learning usability. This paper presents findings from a study of the impact of the learning systems. The study also describes designing evaluation sheet, data collection and analysis strategies of a case study on the evaluation of the multimedia learning system implemented for Computer Assisted Design (CAD) Practice Course in Ritsumeikan Asia Pacific University (APU), Japan.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126466825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis and Design of an eLearning Platform Featuring Learning Analytics and Gamification 以学习分析和游戏化为特色的电子学习平台的分析与设计
D. Gañán, S. Caballé, R. Clarisó, J. Conesa
This paper presents the analysis and design of an innovative web-based eLearning platform featuring Learning Analytics and Gamification called ICT-FLAG. A previous contribution presented the software development framework that will guide and support the effective construction of the platform. Following the selected framework, this paper defines the requirements of this platform and propose a solution to satisfy those requirements in terms of software artifacts. The design includes challenging non-functional requirements, such as scalability, security and performance. The research reported in this paper is currently undertaken within the project "Enhancing ICT education through Formative assessment, Learning Analytics and Gamification" (ICT-FLAG) funded by the Spanish Government.
本文介绍了一个创新的基于网络的电子学习平台的分析和设计,该平台具有学习分析和游戏化功能,称为ICT-FLAG。之前的一篇文章提出了软件开发框架,它将指导和支持平台的有效构建。根据所选择的框架,本文定义了该平台的需求,并从软件构件的角度提出了满足这些需求的解决方案。该设计包括具有挑战性的非功能需求,例如可伸缩性、安全性和性能。本文中报告的研究目前是在西班牙政府资助的“通过形成性评估、学习分析和游戏化加强ICT教育”(ICT- flag)项目中进行的。
{"title":"Analysis and Design of an eLearning Platform Featuring Learning Analytics and Gamification","authors":"D. Gañán, S. Caballé, R. Clarisó, J. Conesa","doi":"10.1109/CISIS.2016.42","DOIUrl":"https://doi.org/10.1109/CISIS.2016.42","url":null,"abstract":"This paper presents the analysis and design of an innovative web-based eLearning platform featuring Learning Analytics and Gamification called ICT-FLAG. A previous contribution presented the software development framework that will guide and support the effective construction of the platform. Following the selected framework, this paper defines the requirements of this platform and propose a solution to satisfy those requirements in terms of software artifacts. The design includes challenging non-functional requirements, such as scalability, security and performance. The research reported in this paper is currently undertaken within the project \"Enhancing ICT education through Formative assessment, Learning Analytics and Gamification\" (ICT-FLAG) funded by the Spanish Government.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125304391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1