This paper proves that Life-long learning and Cultural Education can be supported through the use of technological advances and techniques which so far were extensively used in Games and immersive applications. In order to promote learning, this research proposal focuses on Augmented Reality (AR) and on Gamification for the creation of an educational AR book. The suggested learning subject is Science aimed at children between the ages of 10-12 years old, although the platform can be easily applied also to Culture, Arts and History. In our project, users interact with a virtual laboratory and are able to perform experiments and complete challenges through gaming so as to expand and test their knowledge. Using AR and gamification techniques, the aim is to deliver a more comprehensive understanding of the subject matter while at the same time engage learners and increase their enjoyment during the learning process. By engaging learners in cultural subjects, the cultural heritage is delivered to next generations and remains alive.
{"title":"An innovative augmented reality educational platform using Gamification to enhance lifelong learning and cultural education","authors":"Chantzi Athanasia Eleftheria, Plessa Charikleia, Chatziparadeisis Gkanas Iason, Tsakalidis Athanasios, Tsolis Dimitrios","doi":"10.1109/IISA.2013.6623724","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623724","url":null,"abstract":"This paper proves that Life-long learning and Cultural Education can be supported through the use of technological advances and techniques which so far were extensively used in Games and immersive applications. In order to promote learning, this research proposal focuses on Augmented Reality (AR) and on Gamification for the creation of an educational AR book. The suggested learning subject is Science aimed at children between the ages of 10-12 years old, although the platform can be easily applied also to Culture, Arts and History. In our project, users interact with a virtual laboratory and are able to perform experiments and complete challenges through gaming so as to expand and test their knowledge. Using AR and gamification techniques, the aim is to deliver a more comprehensive understanding of the subject matter while at the same time engage learners and increase their enjoyment during the learning process. By engaging learners in cultural subjects, the cultural heritage is delivered to next generations and remains alive.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115621691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623696
D. Akoumianakis, Giorgos Ktistakis, Giannis Milolidakis, K. Michailidis
This paper examines the mechanics and the implications of remediated practices in the context of virtual cross-organizational collaboration. Our treatment of the issue is informed by a case study aiming to assess how imbrications of representations hosted by different social media enable or constrain peer co-engagement of members in a virtual partnership. To this effect, we draw upon theories of agency and artifacts to anchor the concept of imbrication of representations and then we describe a prototypical platform intended to facilitate distributed organizing in an organic farming virtual partnership. Key property of this platform is the improved capability for coordinated virtual work attained through the blending of computer-mediated boundary artifacts and generic cloud services.
{"title":"Enacted virtual partnerships: Imbrications of representations of boundary artifacts and cloud services","authors":"D. Akoumianakis, Giorgos Ktistakis, Giannis Milolidakis, K. Michailidis","doi":"10.1109/IISA.2013.6623696","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623696","url":null,"abstract":"This paper examines the mechanics and the implications of remediated practices in the context of virtual cross-organizational collaboration. Our treatment of the issue is informed by a case study aiming to assess how imbrications of representations hosted by different social media enable or constrain peer co-engagement of members in a virtual partnership. To this effect, we draw upon theories of agency and artifacts to anchor the concept of imbrication of representations and then we describe a prototypical platform intended to facilitate distributed organizing in an organic farming virtual partnership. Key property of this platform is the improved capability for coordinated virtual work attained through the blending of computer-mediated boundary artifacts and generic cloud services.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123319730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623684
Markku Kylänpää, A. Rantala, Janne Merilinna, M. Nieminen
Managing a modern IP-based city-wide surveillance system requires that sensors and actuators in the system are visible to multiple computation and co-ordination nodes deployed in the surveillance network. As current and future surveillance systems can often consist of multiple independently managed local-area networks utilizing network address translation, it is not guaranteed that the nodes can communicate with each other. One approach for overcoming this challenge is to utilize a dedicated proxy visible to all parties to mediate all communication between the nodes. The mediated data must be secure from end-to-end particularly in the context of surveillance systems due to the confidentiality of the data. In this paper a secure communication platform called dROS is presented. The platform enables secure end-to-end communication between nodes deployed in multiple networks.
{"title":"Secure communication platform for distributed city-wide surveillance systems","authors":"Markku Kylänpää, A. Rantala, Janne Merilinna, M. Nieminen","doi":"10.1109/IISA.2013.6623684","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623684","url":null,"abstract":"Managing a modern IP-based city-wide surveillance system requires that sensors and actuators in the system are visible to multiple computation and co-ordination nodes deployed in the surveillance network. As current and future surveillance systems can often consist of multiple independently managed local-area networks utilizing network address translation, it is not guaranteed that the nodes can communicate with each other. One approach for overcoming this challenge is to utilize a dedicated proxy visible to all parties to mediate all communication between the nodes. The mediated data must be secure from end-to-end particularly in the context of surveillance systems due to the confidentiality of the data. In this paper a secure communication platform called dROS is presented. The platform enables secure end-to-end communication between nodes deployed in multiple networks.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125118907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623715
C. Troussas, M. Virvou, Anna Vougiouklidou, K. Espinosa
This paper describes the misconception diagnosis mechanism incorporated in a multilingual learning Facebook application. In order to achieve misconception diagnosis, the authors of this paper have incorporated machine learning techniques in the aforementioned Facebook application. The confusion of Facebook users between multiple language learning is extensively examined. Misconception handling within the application renders the users capable of being aware of their misconceptions and prevents them from re-conducting them. Furthermore, the collaboration between users in language confusion conditions is ameliorated by the user clustering through the Facebook platform.
{"title":"Automatic misconception diagnosis in multiple language learning over social networks","authors":"C. Troussas, M. Virvou, Anna Vougiouklidou, K. Espinosa","doi":"10.1109/IISA.2013.6623715","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623715","url":null,"abstract":"This paper describes the misconception diagnosis mechanism incorporated in a multilingual learning Facebook application. In order to achieve misconception diagnosis, the authors of this paper have incorporated machine learning techniques in the aforementioned Facebook application. The confusion of Facebook users between multiple language learning is extensively examined. Misconception handling within the application renders the users capable of being aware of their misconceptions and prevents them from re-conducting them. Furthermore, the collaboration between users in language confusion conditions is ameliorated by the user clustering through the Facebook platform.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127742701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623706
M. Burmester
Most critical infrastructures can be modeled as cyber-physical systems whose cyber components control underlying physical processes so as to optimize system objectives based on physical properties/constraints and the current and estimated state of the system. Such systems usually require performance guarantees and support for security: wrongly received or missed commands can render the entire system unstable. Yet, securing cyber-physical systems with heterogeneous components is still an open and challenging problem. In this paper we propose a trusted computing architecture for critical infrastructure protection based on the trusted computing paradigm. We discuss the threat model, the vulnerabilities, real-time availability, run-time integrity and show how to get resilience against intentional and unintentional faults by using trusted computing enabled components and an access control structure that enforces need-to-get-now (availability) policies. We conclude by showing how this approach can be used to secure substation automation systems of an IEC/TR 61850-90-5-compliant electricity grid.
{"title":"A trusted computing architecture for critical infrastructure protection","authors":"M. Burmester","doi":"10.1109/IISA.2013.6623706","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623706","url":null,"abstract":"Most critical infrastructures can be modeled as cyber-physical systems whose cyber components control underlying physical processes so as to optimize system objectives based on physical properties/constraints and the current and estimated state of the system. Such systems usually require performance guarantees and support for security: wrongly received or missed commands can render the entire system unstable. Yet, securing cyber-physical systems with heterogeneous components is still an open and challenging problem. In this paper we propose a trusted computing architecture for critical infrastructure protection based on the trusted computing paradigm. We discuss the threat model, the vulnerabilities, real-time availability, run-time integrity and show how to get resilience against intentional and unintentional faults by using trusted computing enabled components and an access control structure that enforces need-to-get-now (availability) policies. We conclude by showing how this approach can be used to secure substation automation systems of an IEC/TR 61850-90-5-compliant electricity grid.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133946748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623730
Anna Trikalinou, N. Bourbakis
In this paper we present a security methodology which can efficiently and deterministically detect a control-flow hijacking attack against real-world vulnerable applications and visually illustrate its functionality by using Stochastic Petri Nets (SPNs). We then discuss two possible implementation scenarios of this methodology, one that requires no hardware or OS modification and one that utilizes a special hardware component but is able to deliver no runtime performance degradation. Finally, we quantifiably show that, even in the worst possible scenario, the proposed security technique can be applied in real-world, real-time security systems with no significant performance overhead.
{"title":"A synergistic security method for control-flow hijacking detection using SPNs","authors":"Anna Trikalinou, N. Bourbakis","doi":"10.1109/IISA.2013.6623730","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623730","url":null,"abstract":"In this paper we present a security methodology which can efficiently and deterministically detect a control-flow hijacking attack against real-world vulnerable applications and visually illustrate its functionality by using Stochastic Petri Nets (SPNs). We then discuss two possible implementation scenarios of this methodology, one that requires no hardware or OS modification and one that utilizes a special hardware component but is able to deliver no runtime performance degradation. Finally, we quantifiably show that, even in the worst possible scenario, the proposed security technique can be applied in real-world, real-time security systems with no significant performance overhead.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122203807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623723
M. Virvou, S. Sidiropoulos
Nowadays, children are becoming familiar with the computer technology at a very early age. Moreover the wide availability of the internet gives a new perspective in distance education making e-learning environments crucial to the future of education. Intelligent Tutoring Systems (ITSs) provide sophisticated tutoring systems using artificial intelligence techniques in computer programs to facilitate instruction. An ITS is able to provide personalized suggestions and adapt to each individual student's knowledge and skills. Furthermore social networking is becoming a part of everyday life for almost every student. Students can benefit from collaboration in e-learning environments especially when this is combined with an ITS. In this paper we describe a novel e-learning system that uses an open-source social network platform for mathematics tutoring.
{"title":"An Intelligent Tutoring System over a social network for mathematics learning","authors":"M. Virvou, S. Sidiropoulos","doi":"10.1109/IISA.2013.6623723","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623723","url":null,"abstract":"Nowadays, children are becoming familiar with the computer technology at a very early age. Moreover the wide availability of the internet gives a new perspective in distance education making e-learning environments crucial to the future of education. Intelligent Tutoring Systems (ITSs) provide sophisticated tutoring systems using artificial intelligence techniques in computer programs to facilitate instruction. An ITS is able to provide personalized suggestions and adapt to each individual student's knowledge and skills. Furthermore social networking is becoming a part of everyday life for almost every student. Students can benefit from collaboration in e-learning environments especially when this is combined with an ITS. In this paper we describe a novel e-learning system that uses an open-source social network platform for mathematics tutoring.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124833537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623714
C. Troussas, M. Virvou, Efthymios Alepis
In this paper, we present our multiple parameter cluster analysis in our multiple language learning system. Towards this direction, we have used algorithmic approaches residing in the field of machine learning. Multiple parameter cluster analysis is conducted by the k-means clustering algorithm which takes as input seven important users' characteristics in order to initialize the process. The clustering is conducted by k-means clustering algorithm, which takes as input multiple user characteristics. The incorporation of k-means clustering is used to address several barriers posed by the heterogeneous learning audience of educational systems. After determining in which cluster each new student belongs, the system can reason about this specific student, adapting its behavior to the student's needs, performance and preferences.
{"title":"Multiple parameter cluster analysis in a multiple language learning system","authors":"C. Troussas, M. Virvou, Efthymios Alepis","doi":"10.1109/IISA.2013.6623714","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623714","url":null,"abstract":"In this paper, we present our multiple parameter cluster analysis in our multiple language learning system. Towards this direction, we have used algorithmic approaches residing in the field of machine learning. Multiple parameter cluster analysis is conducted by the k-means clustering algorithm which takes as input seven important users' characteristics in order to initialize the process. The clustering is conducted by k-means clustering algorithm, which takes as input multiple user characteristics. The incorporation of k-means clustering is used to address several barriers posed by the heterogeneous learning audience of educational systems. After determining in which cluster each new student belongs, the system can reason about this specific student, adapting its behavior to the student's needs, performance and preferences.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125214115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623697
Sam Ferguson, Emery Schubert, Doheon Lee, D. Cabrera, G. McPherson
This paper investigates the use of psychoacoustic loudness analysis as a method for determining the likely emotional responses of listeners to musical excerpts. 19 excerpts of music were presented to 86 participants (7 randomly chosen excerpts per participant) who were asked to rate the emotion category using the emotion-clock-face continuous response interface. The same excerpts were analysed with a loudness model, and time series results were summarised as both loudness median and standard deviation. Comparisons indicate that the median and standard deviation of loudness plays an important role in determining the emotion category responses.
{"title":"A comparison between continuous categorical emotion responses and Stimulus loudness parameters","authors":"Sam Ferguson, Emery Schubert, Doheon Lee, D. Cabrera, G. McPherson","doi":"10.1109/IISA.2013.6623697","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623697","url":null,"abstract":"This paper investigates the use of psychoacoustic loudness analysis as a method for determining the likely emotional responses of listeners to musical excerpts. 19 excerpts of music were presented to 86 participants (7 randomly chosen excerpts per participant) who were asked to rate the emotion category using the emotion-clock-face continuous response interface. The same excerpts were analysed with a loudness model, and time series results were summarised as both loudness median and standard deviation. Comparisons indicate that the median and standard deviation of loudness plays an important role in determining the emotion category responses.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127733449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623704
D. Gritzalis, Yannis Soupionis, Vasilios Katos, Ioannis Psaroudakis, P. Katsaros, Anakreon Mentis
Sphinx was a monster in Greek mythology devouring those who could not solve her riddle. In VoIP, a new service in the role of Sphinx provides protection against SPIT (Spam over Internet Telephony) by discriminating human callers from botnets. The VoIP Sphinx tool uses audio CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) that are controlled by an anti-SPIT policy mechanism. The design of the Sphinx service has been formally verified for the absence of side-effects in the VoIP services (robustness), as well as for its DoS-resistance. We describe the principles and innovations of Sphinx, together with experimental results from pilot use cases.
{"title":"The Sphinx enigma in critical VoIP infrastructures: Human or botnet?","authors":"D. Gritzalis, Yannis Soupionis, Vasilios Katos, Ioannis Psaroudakis, P. Katsaros, Anakreon Mentis","doi":"10.1109/IISA.2013.6623704","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623704","url":null,"abstract":"Sphinx was a monster in Greek mythology devouring those who could not solve her riddle. In VoIP, a new service in the role of Sphinx provides protection against SPIT (Spam over Internet Telephony) by discriminating human callers from botnets. The VoIP Sphinx tool uses audio CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) that are controlled by an anti-SPIT policy mechanism. The design of the Sphinx service has been formally verified for the absence of side-effects in the VoIP services (robustness), as well as for its DoS-resistance. We describe the principles and innovations of Sphinx, together with experimental results from pilot use cases.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121205864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}