We have been developing an anomaly detection system (ADS) for detecting malicious communication from the Internet to our campus network. We implement two methods for blocking malicious communications. However, these blocking methods have some problems. Therefore, we propose a new method for blocking malicious communications using OpenFlow technology. In this paper, we describe the overview of our blocking method using OpenFlow. We compared the ACL method and the OpenFlow method, and we conducted an experiment on our proposed system using actual packet data. As a result, we confirmed the method effective in blocking malicious communication on our system.
{"title":"Proposal of a Malicious Communication Control Method Using OpenFlow","authors":"Minoru Ikebe, Daiki Shimokawa, Kazuyuki Yoshida","doi":"10.1109/CISIS.2016.75","DOIUrl":"https://doi.org/10.1109/CISIS.2016.75","url":null,"abstract":"We have been developing an anomaly detection system (ADS) for detecting malicious communication from the Internet to our campus network. We implement two methods for blocking malicious communications. However, these blocking methods have some problems. Therefore, we propose a new method for blocking malicious communications using OpenFlow technology. In this paper, we describe the overview of our blocking method using OpenFlow. We compared the ACL method and the OpenFlow method, and we conducted an experiment on our proposed system using actual packet data. As a result, we confirmed the method effective in blocking malicious communication on our system.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114576804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Remarkable progresses of fabrication devices such as 3D printers and laser cutters allow nonprofessionals to manufacture their own products. They should, however, iterate design, production, and refinement processes through trial and error. Additionally, they must gain a good 3D modeling skill to make the products unique and different. In this paper, we propose a 3D modeling system allowing users to easily design a new product by directly comparing a graphical model to a real product without scanning the real one. The system visualizes the graphical model as a mid-air image that can coexist with the real product in a same physical space. The system also enables the users to manipulate the graphical model through a set of simple hand gestures. We conducted a preliminary experiment to verify the effectiveness of the proposed system.
{"title":"A Desktop 3D Modeling System Controllable by Mid-air Interactions","authors":"Kanako Nakazato, Hiroaki Nishino, T. Kodama","doi":"10.1109/CISIS.2016.80","DOIUrl":"https://doi.org/10.1109/CISIS.2016.80","url":null,"abstract":"Remarkable progresses of fabrication devices such as 3D printers and laser cutters allow nonprofessionals to manufacture their own products. They should, however, iterate design, production, and refinement processes through trial and error. Additionally, they must gain a good 3D modeling skill to make the products unique and different. In this paper, we propose a 3D modeling system allowing users to easily design a new product by directly comparing a graphical model to a real product without scanning the real one. The system visualizes the graphical model as a mid-air image that can coexist with the real product in a same physical space. The system also enables the users to manipulate the graphical model through a set of simple hand gestures. We conducted a preliminary experiment to verify the effectiveness of the proposed system.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":" 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113948860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Smart or intelligent farming is a relatively new concept, but it's becoming an important factor for the agricultural sectors, as a way to raise productivity through technology. This article presents a global management and decision system for smart farming. Our system is addressed to farmers and other actors involved in farming operations, such as rural service companies and banks. It can manage up to several groups of smart or technology-based farms. The system is functioning on two levels, local and Cloud. First of all, it must be deployed on the farm's local wireless network. And secondly, it uses the Cloud's resources and flexibility to offer even more complex services.
{"title":"Integrated Cloud Framework for Farm Management","authors":"C. Radu, E. Apostol, C. Leordeanu, M. Mocanu","doi":"10.1109/CISIS.2016.136","DOIUrl":"https://doi.org/10.1109/CISIS.2016.136","url":null,"abstract":"Smart or intelligent farming is a relatively new concept, but it's becoming an important factor for the agricultural sectors, as a way to raise productivity through technology. This article presents a global management and decision system for smart farming. Our system is addressed to farmers and other actors involved in farming operations, such as rural service companies and banks. It can manage up to several groups of smart or technology-based farms. The system is functioning on two levels, local and Cloud. First of all, it must be deployed on the farm's local wireless network. And secondly, it uses the Cloud's resources and flexibility to offer even more complex services.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134544529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amarpreet Bamrah, I. Woungang, L. Barolli, S. K. Dhurandher, Glaucio H. S. Carvalho, M. Takizawa
In Opportunistic networks (OppNets), due to high mobility, short radio range, intermittent links, unstable topology, sparse connectivity, to name a few, routing is a very challenging task since it relies on cooperation between the nodes. This paper focuses on using the concept of centrality to alleviate this task. Unlike other nodes in the network, central nodes are those that are more likely to act as communication hubs to facilitate the message forwarding and thereby routing. In this paper, a recently proposed History-Based Prediction Routing protocol (HBPR) for OppNets is re-designed using this concept, yielding the so-called centrality-based HBPR (CHBPR) routing protocol. The proposed CHBPR scheme is evaluated by simulations using the Opportunistic NEtwork (ONE) simulator, showing superior performance compared to HBPR without centrality and Epidemic protocol with centrality, in terms of number of messages delivered at destination and overhead ratio, under varying number of nodes and Time-to-Live.
{"title":"A Centrality-Based History Prediction Routing Protocol for Opportunistic Networks","authors":"Amarpreet Bamrah, I. Woungang, L. Barolli, S. K. Dhurandher, Glaucio H. S. Carvalho, M. Takizawa","doi":"10.1109/CISIS.2016.143","DOIUrl":"https://doi.org/10.1109/CISIS.2016.143","url":null,"abstract":"In Opportunistic networks (OppNets), due to high mobility, short radio range, intermittent links, unstable topology, sparse connectivity, to name a few, routing is a very challenging task since it relies on cooperation between the nodes. This paper focuses on using the concept of centrality to alleviate this task. Unlike other nodes in the network, central nodes are those that are more likely to act as communication hubs to facilitate the message forwarding and thereby routing. In this paper, a recently proposed History-Based Prediction Routing protocol (HBPR) for OppNets is re-designed using this concept, yielding the so-called centrality-based HBPR (CHBPR) routing protocol. The proposed CHBPR scheme is evaluated by simulations using the Opportunistic NEtwork (ONE) simulator, showing superior performance compared to HBPR without centrality and Epidemic protocol with centrality, in terms of number of messages delivered at destination and overhead ratio, under varying number of nodes and Time-to-Live.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123705427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There are many illegal memory access (IMA) defects in C programs, for example, null pointer dereference, buffer overflow and array out of bounds. When C programs are running, these defects may cause software failure, and may lead to serious consequences. In order to fully detect these IMA defects, we apply abstract regions to simulate memory blocks that allocated to memory objects at the runtime, and use the region-based model to describe memory states of each program point based on the result of dataflow analysis. Based on the region-based model, the determining criterion of IMA defects is introduced for detecting these defects. The method has been implemented in the defect detection tool DTSC, and 5 open source projects are tested, the test results show the validity of our method.
{"title":"Fully Detection of Illegal Memory Access Defects","authors":"Yukun Dong","doi":"10.1109/CISIS.2016.57","DOIUrl":"https://doi.org/10.1109/CISIS.2016.57","url":null,"abstract":"There are many illegal memory access (IMA) defects in C programs, for example, null pointer dereference, buffer overflow and array out of bounds. When C programs are running, these defects may cause software failure, and may lead to serious consequences. In order to fully detect these IMA defects, we apply abstract regions to simulate memory blocks that allocated to memory objects at the runtime, and use the region-based model to describe memory states of each program point based on the result of dataflow analysis. Based on the region-based model, the determining criterion of IMA defects is introduced for detecting these defects. The method has been implemented in the defect detection tool DTSC, and 5 open source projects are tested, the test results show the validity of our method.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123725232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Currently, the issues for the time being have become complex and diverse in the region, such as the disappearance of the local government by the super aging population is feared. Therefore from being considered as a tool for problem-solving is ICT to progress rapidly, among the information and communication technology such as IOT(internet of things), CPS(cyber physical system), AI(Artificial intelligence), wearable devices, SNS, a variety of communication pattern and the like. On the other hand, the negative aspects of bringing a rapid development of science and technology that makes light and dark, there is a reality that has been manifest. Moreover it influences big impact on future with economic growth in Asia particular in China, and globalization of the world. What can we do in such situation? First is to visualize a variety of initiatives according to find challenges. Second is to construct the cross-cutting and systematic network for problem-solving. The regional community network is important due to mutually complementary and coordination. Their activities in cooperation with Asian countries, aims to lead to the independence of the local ICT companies.
{"title":"Study on Cross-Cutting and Systematic Regional Community Networks","authors":"Eiji Aoki, Zenjiro Oba, Ritsuko Watanabe","doi":"10.1109/CISIS.2016.114","DOIUrl":"https://doi.org/10.1109/CISIS.2016.114","url":null,"abstract":"Currently, the issues for the time being have become complex and diverse in the region, such as the disappearance of the local government by the super aging population is feared. Therefore from being considered as a tool for problem-solving is ICT to progress rapidly, among the information and communication technology such as IOT(internet of things), CPS(cyber physical system), AI(Artificial intelligence), wearable devices, SNS, a variety of communication pattern and the like. On the other hand, the negative aspects of bringing a rapid development of science and technology that makes light and dark, there is a reality that has been manifest. Moreover it influences big impact on future with economic growth in Asia particular in China, and globalization of the world. What can we do in such situation? First is to visualize a variety of initiatives according to find challenges. Second is to construct the cross-cutting and systematic network for problem-solving. The regional community network is important due to mutually complementary and coordination. Their activities in cooperation with Asian countries, aims to lead to the independence of the local ICT companies.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129209632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we introduce an estimation of communication range using Wi-Fi for V2X communication environment. Traffic accidents and traffic hazard are serious social problems. Understanding road condition in advance is important and necessary to prevent traffic accidents and traffic hazards. In addition, getting information without Internet connection is necessary to provide road information for drivers in real-time because there is an environment that getting Internet connection is difficult. We construct a road condition sharing system with multiple vehicles using V2X communication. Our goal is to share road condition without Internet connection. To realize our goal, we experiment V2X communication, evaluate experimental results and estimate communication range.
{"title":"Estimation of Communication Range Using Wi-Fi for V2X Communication Environment","authors":"Kenta Ito, Go Hirakawa, Y. Shibata","doi":"10.1109/CISIS.2016.112","DOIUrl":"https://doi.org/10.1109/CISIS.2016.112","url":null,"abstract":"In this paper, we introduce an estimation of communication range using Wi-Fi for V2X communication environment. Traffic accidents and traffic hazard are serious social problems. Understanding road condition in advance is important and necessary to prevent traffic accidents and traffic hazards. In addition, getting information without Internet connection is necessary to provide road information for drivers in real-time because there is an environment that getting Internet connection is difficult. We construct a road condition sharing system with multiple vehicles using V2X communication. Our goal is to share road condition without Internet connection. To realize our goal, we experiment V2X communication, evaluate experimental results and estimate communication range.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123197141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reverse unknown protocol's hidden behavior has played an important role in the field of network security. The proposed work takes the captured messages and the binary code that implement the protocol both as the studied object. Dynamic Taint Analysis combined with Static Analysis is used for protocol analyzing. Firstly, monitor and analyze the process of protocol program parses the message in the virtual platform HiddenDisc prototype system developed by ourselves, record the protocol's public behavior, then based on our proposed Hidden Behavior Perception and Mining algorithm, static analyze the protocol's hidden behavior trigger conditions and hidden behavior instruction sequences. According to the hidden behavior trigger conditions, new protocol messages with the sensitive information are generated, and the hidden behaviors are executed by dynamic triggering. HiddenDisc prototype system can sense, trigger and analyze the protocol's hidden behaviors. According to the statistical analysis results, we propose the evaluation method of Protocol Execution Security. The experimental results show that the present method can accurately mining the protocol's hidden behaviors, and can evaluate unknown protocol's execution security.
{"title":"Hybrid Analysis for Mining Network Protocol's Hidden Behavior","authors":"Yanjing Hu, Xu An Wang","doi":"10.1109/CISIS.2016.64","DOIUrl":"https://doi.org/10.1109/CISIS.2016.64","url":null,"abstract":"Reverse unknown protocol's hidden behavior has played an important role in the field of network security. The proposed work takes the captured messages and the binary code that implement the protocol both as the studied object. Dynamic Taint Analysis combined with Static Analysis is used for protocol analyzing. Firstly, monitor and analyze the process of protocol program parses the message in the virtual platform HiddenDisc prototype system developed by ourselves, record the protocol's public behavior, then based on our proposed Hidden Behavior Perception and Mining algorithm, static analyze the protocol's hidden behavior trigger conditions and hidden behavior instruction sequences. According to the hidden behavior trigger conditions, new protocol messages with the sensitive information are generated, and the hidden behaviors are executed by dynamic triggering. HiddenDisc prototype system can sense, trigger and analyze the protocol's hidden behaviors. According to the statistical analysis results, we propose the evaluation method of Protocol Execution Security. The experimental results show that the present method can accurately mining the protocol's hidden behaviors, and can evaluate unknown protocol's execution security.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126446377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The development of e-learning products and provision of e-learning opportunities is one of the most rapidly expanding areas of education and training. The growth of e-learning application is accelerating through both offline and online system. These innovative systems are changing the face of learning as we know it. However, what is known about these innovative approaches to training has been limited by the shortage of scientifically evaluation. This study aims to assess students' satisfaction and preference toward a multimedia learning system. This paper describes the evaluation of a package of a Multimedia e-learning system for Computer Aided Design (CAD) practice course. This study develops a questionnaire based on usability evaluation method for a Multimedia e-learning system. The method extends the current practice by focusing not only on cognitive but also affective considerations that may influence e-learning usability. This paper presents findings from a study of the impact of the learning systems. The study also describes designing evaluation sheet, data collection and analysis strategies of a case study on the evaluation of the multimedia learning system implemented for Computer Assisted Design (CAD) Practice Course in Ritsumeikan Asia Pacific University (APU), Japan.
{"title":"Evaluating a Multimedia e-Learning System for CAD Drawing Course","authors":"D. Nariman","doi":"10.1109/CISIS.2016.96","DOIUrl":"https://doi.org/10.1109/CISIS.2016.96","url":null,"abstract":"The development of e-learning products and provision of e-learning opportunities is one of the most rapidly expanding areas of education and training. The growth of e-learning application is accelerating through both offline and online system. These innovative systems are changing the face of learning as we know it. However, what is known about these innovative approaches to training has been limited by the shortage of scientifically evaluation. This study aims to assess students' satisfaction and preference toward a multimedia learning system. This paper describes the evaluation of a package of a Multimedia e-learning system for Computer Aided Design (CAD) practice course. This study develops a questionnaire based on usability evaluation method for a Multimedia e-learning system. The method extends the current practice by focusing not only on cognitive but also affective considerations that may influence e-learning usability. This paper presents findings from a study of the impact of the learning systems. The study also describes designing evaluation sheet, data collection and analysis strategies of a case study on the evaluation of the multimedia learning system implemented for Computer Assisted Design (CAD) Practice Course in Ritsumeikan Asia Pacific University (APU), Japan.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126466825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents the analysis and design of an innovative web-based eLearning platform featuring Learning Analytics and Gamification called ICT-FLAG. A previous contribution presented the software development framework that will guide and support the effective construction of the platform. Following the selected framework, this paper defines the requirements of this platform and propose a solution to satisfy those requirements in terms of software artifacts. The design includes challenging non-functional requirements, such as scalability, security and performance. The research reported in this paper is currently undertaken within the project "Enhancing ICT education through Formative assessment, Learning Analytics and Gamification" (ICT-FLAG) funded by the Spanish Government.
{"title":"Analysis and Design of an eLearning Platform Featuring Learning Analytics and Gamification","authors":"D. Gañán, S. Caballé, R. Clarisó, J. Conesa","doi":"10.1109/CISIS.2016.42","DOIUrl":"https://doi.org/10.1109/CISIS.2016.42","url":null,"abstract":"This paper presents the analysis and design of an innovative web-based eLearning platform featuring Learning Analytics and Gamification called ICT-FLAG. A previous contribution presented the software development framework that will guide and support the effective construction of the platform. Following the selected framework, this paper defines the requirements of this platform and propose a solution to satisfy those requirements in terms of software artifacts. The design includes challenging non-functional requirements, such as scalability, security and performance. The research reported in this paper is currently undertaken within the project \"Enhancing ICT education through Formative assessment, Learning Analytics and Gamification\" (ICT-FLAG) funded by the Spanish Government.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125304391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}