This paper proves that Life-long learning and Cultural Education can be supported through the use of technological advances and techniques which so far were extensively used in Games and immersive applications. In order to promote learning, this research proposal focuses on Augmented Reality (AR) and on Gamification for the creation of an educational AR book. The suggested learning subject is Science aimed at children between the ages of 10-12 years old, although the platform can be easily applied also to Culture, Arts and History. In our project, users interact with a virtual laboratory and are able to perform experiments and complete challenges through gaming so as to expand and test their knowledge. Using AR and gamification techniques, the aim is to deliver a more comprehensive understanding of the subject matter while at the same time engage learners and increase their enjoyment during the learning process. By engaging learners in cultural subjects, the cultural heritage is delivered to next generations and remains alive.
{"title":"An innovative augmented reality educational platform using Gamification to enhance lifelong learning and cultural education","authors":"Chantzi Athanasia Eleftheria, Plessa Charikleia, Chatziparadeisis Gkanas Iason, Tsakalidis Athanasios, Tsolis Dimitrios","doi":"10.1109/IISA.2013.6623724","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623724","url":null,"abstract":"This paper proves that Life-long learning and Cultural Education can be supported through the use of technological advances and techniques which so far were extensively used in Games and immersive applications. In order to promote learning, this research proposal focuses on Augmented Reality (AR) and on Gamification for the creation of an educational AR book. The suggested learning subject is Science aimed at children between the ages of 10-12 years old, although the platform can be easily applied also to Culture, Arts and History. In our project, users interact with a virtual laboratory and are able to perform experiments and complete challenges through gaming so as to expand and test their knowledge. Using AR and gamification techniques, the aim is to deliver a more comprehensive understanding of the subject matter while at the same time engage learners and increase their enjoyment during the learning process. By engaging learners in cultural subjects, the cultural heritage is delivered to next generations and remains alive.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115621691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623730
Anna Trikalinou, N. Bourbakis
In this paper we present a security methodology which can efficiently and deterministically detect a control-flow hijacking attack against real-world vulnerable applications and visually illustrate its functionality by using Stochastic Petri Nets (SPNs). We then discuss two possible implementation scenarios of this methodology, one that requires no hardware or OS modification and one that utilizes a special hardware component but is able to deliver no runtime performance degradation. Finally, we quantifiably show that, even in the worst possible scenario, the proposed security technique can be applied in real-world, real-time security systems with no significant performance overhead.
{"title":"A synergistic security method for control-flow hijacking detection using SPNs","authors":"Anna Trikalinou, N. Bourbakis","doi":"10.1109/IISA.2013.6623730","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623730","url":null,"abstract":"In this paper we present a security methodology which can efficiently and deterministically detect a control-flow hijacking attack against real-world vulnerable applications and visually illustrate its functionality by using Stochastic Petri Nets (SPNs). We then discuss two possible implementation scenarios of this methodology, one that requires no hardware or OS modification and one that utilizes a special hardware component but is able to deliver no runtime performance degradation. Finally, we quantifiably show that, even in the worst possible scenario, the proposed security technique can be applied in real-world, real-time security systems with no significant performance overhead.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122203807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623696
D. Akoumianakis, Giorgos Ktistakis, Giannis Milolidakis, K. Michailidis
This paper examines the mechanics and the implications of remediated practices in the context of virtual cross-organizational collaboration. Our treatment of the issue is informed by a case study aiming to assess how imbrications of representations hosted by different social media enable or constrain peer co-engagement of members in a virtual partnership. To this effect, we draw upon theories of agency and artifacts to anchor the concept of imbrication of representations and then we describe a prototypical platform intended to facilitate distributed organizing in an organic farming virtual partnership. Key property of this platform is the improved capability for coordinated virtual work attained through the blending of computer-mediated boundary artifacts and generic cloud services.
{"title":"Enacted virtual partnerships: Imbrications of representations of boundary artifacts and cloud services","authors":"D. Akoumianakis, Giorgos Ktistakis, Giannis Milolidakis, K. Michailidis","doi":"10.1109/IISA.2013.6623696","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623696","url":null,"abstract":"This paper examines the mechanics and the implications of remediated practices in the context of virtual cross-organizational collaboration. Our treatment of the issue is informed by a case study aiming to assess how imbrications of representations hosted by different social media enable or constrain peer co-engagement of members in a virtual partnership. To this effect, we draw upon theories of agency and artifacts to anchor the concept of imbrication of representations and then we describe a prototypical platform intended to facilitate distributed organizing in an organic farming virtual partnership. Key property of this platform is the improved capability for coordinated virtual work attained through the blending of computer-mediated boundary artifacts and generic cloud services.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123319730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623715
C. Troussas, M. Virvou, Anna Vougiouklidou, K. Espinosa
This paper describes the misconception diagnosis mechanism incorporated in a multilingual learning Facebook application. In order to achieve misconception diagnosis, the authors of this paper have incorporated machine learning techniques in the aforementioned Facebook application. The confusion of Facebook users between multiple language learning is extensively examined. Misconception handling within the application renders the users capable of being aware of their misconceptions and prevents them from re-conducting them. Furthermore, the collaboration between users in language confusion conditions is ameliorated by the user clustering through the Facebook platform.
{"title":"Automatic misconception diagnosis in multiple language learning over social networks","authors":"C. Troussas, M. Virvou, Anna Vougiouklidou, K. Espinosa","doi":"10.1109/IISA.2013.6623715","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623715","url":null,"abstract":"This paper describes the misconception diagnosis mechanism incorporated in a multilingual learning Facebook application. In order to achieve misconception diagnosis, the authors of this paper have incorporated machine learning techniques in the aforementioned Facebook application. The confusion of Facebook users between multiple language learning is extensively examined. Misconception handling within the application renders the users capable of being aware of their misconceptions and prevents them from re-conducting them. Furthermore, the collaboration between users in language confusion conditions is ameliorated by the user clustering through the Facebook platform.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127742701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623684
Markku Kylänpää, A. Rantala, Janne Merilinna, M. Nieminen
Managing a modern IP-based city-wide surveillance system requires that sensors and actuators in the system are visible to multiple computation and co-ordination nodes deployed in the surveillance network. As current and future surveillance systems can often consist of multiple independently managed local-area networks utilizing network address translation, it is not guaranteed that the nodes can communicate with each other. One approach for overcoming this challenge is to utilize a dedicated proxy visible to all parties to mediate all communication between the nodes. The mediated data must be secure from end-to-end particularly in the context of surveillance systems due to the confidentiality of the data. In this paper a secure communication platform called dROS is presented. The platform enables secure end-to-end communication between nodes deployed in multiple networks.
{"title":"Secure communication platform for distributed city-wide surveillance systems","authors":"Markku Kylänpää, A. Rantala, Janne Merilinna, M. Nieminen","doi":"10.1109/IISA.2013.6623684","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623684","url":null,"abstract":"Managing a modern IP-based city-wide surveillance system requires that sensors and actuators in the system are visible to multiple computation and co-ordination nodes deployed in the surveillance network. As current and future surveillance systems can often consist of multiple independently managed local-area networks utilizing network address translation, it is not guaranteed that the nodes can communicate with each other. One approach for overcoming this challenge is to utilize a dedicated proxy visible to all parties to mediate all communication between the nodes. The mediated data must be secure from end-to-end particularly in the context of surveillance systems due to the confidentiality of the data. In this paper a secure communication platform called dROS is presented. The platform enables secure end-to-end communication between nodes deployed in multiple networks.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125118907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623706
M. Burmester
Most critical infrastructures can be modeled as cyber-physical systems whose cyber components control underlying physical processes so as to optimize system objectives based on physical properties/constraints and the current and estimated state of the system. Such systems usually require performance guarantees and support for security: wrongly received or missed commands can render the entire system unstable. Yet, securing cyber-physical systems with heterogeneous components is still an open and challenging problem. In this paper we propose a trusted computing architecture for critical infrastructure protection based on the trusted computing paradigm. We discuss the threat model, the vulnerabilities, real-time availability, run-time integrity and show how to get resilience against intentional and unintentional faults by using trusted computing enabled components and an access control structure that enforces need-to-get-now (availability) policies. We conclude by showing how this approach can be used to secure substation automation systems of an IEC/TR 61850-90-5-compliant electricity grid.
{"title":"A trusted computing architecture for critical infrastructure protection","authors":"M. Burmester","doi":"10.1109/IISA.2013.6623706","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623706","url":null,"abstract":"Most critical infrastructures can be modeled as cyber-physical systems whose cyber components control underlying physical processes so as to optimize system objectives based on physical properties/constraints and the current and estimated state of the system. Such systems usually require performance guarantees and support for security: wrongly received or missed commands can render the entire system unstable. Yet, securing cyber-physical systems with heterogeneous components is still an open and challenging problem. In this paper we propose a trusted computing architecture for critical infrastructure protection based on the trusted computing paradigm. We discuss the threat model, the vulnerabilities, real-time availability, run-time integrity and show how to get resilience against intentional and unintentional faults by using trusted computing enabled components and an access control structure that enforces need-to-get-now (availability) policies. We conclude by showing how this approach can be used to secure substation automation systems of an IEC/TR 61850-90-5-compliant electricity grid.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133946748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623681
A. A. Sioson
The codeCurator is an automatic C++ solution grader used in teaching programming to first year College students in Ateneo de Naga University. It provides programming exercises and challenge problems based on a prescribed sequence of programming topics. The exercises and challenge problems are designed to help students get a grip on formulation of functions, class methods, complete class implementation, or complete stand-alone programs in C++. Solutions are typically short and are checked using automatic testing techniques similar to online judge of ACM ICPC problems. In this paper, we present an analysis of the frequency of submissions, similarity of submitted solutions, categories of problems, and prospects on how to achieve an effective delivery of instruction.
{"title":"Experiences on the use of an automatic C++ solution grader system","authors":"A. A. Sioson","doi":"10.1109/IISA.2013.6623681","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623681","url":null,"abstract":"The codeCurator is an automatic C++ solution grader used in teaching programming to first year College students in Ateneo de Naga University. It provides programming exercises and challenge problems based on a prescribed sequence of programming topics. The exercises and challenge problems are designed to help students get a grip on formulation of functions, class methods, complete class implementation, or complete stand-alone programs in C++. Solutions are typically short and are checked using automatic testing techniques similar to online judge of ACM ICPC problems. In this paper, we present an analysis of the frequency of submissions, similarity of submitted solutions, categories of problems, and prospects on how to achieve an effective delivery of instruction.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122810555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623729
Adamantia Psarologou, M. Virvou, N. Bourbakis
Managing and organizing the information is a difficult subject. Especially in our time with the plethora of available sources accessible to the public, basically through the Internet, the volume of these pieces of information becomes larger and larger. The purpose of this dissertation is the creation of a model of documents' categorization. Our goal is to illustrate an as possible automated way of classification that takes into consideration the meaning of the documents. The way in which a human evaluates and classifies documents is followed in this proposed methodology. We also illustrate some empirical examples of the function of our classification method.
{"title":"A NLU-based method for a first level automatic categorization of AI-based security documents","authors":"Adamantia Psarologou, M. Virvou, N. Bourbakis","doi":"10.1109/IISA.2013.6623729","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623729","url":null,"abstract":"Managing and organizing the information is a difficult subject. Especially in our time with the plethora of available sources accessible to the public, basically through the Internet, the volume of these pieces of information becomes larger and larger. The purpose of this dissertation is the creation of a model of documents' categorization. Our goal is to illustrate an as possible automated way of classification that takes into consideration the meaning of the documents. The way in which a human evaluates and classifies documents is followed in this proposed methodology. We also illustrate some empirical examples of the function of our classification method.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128846796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623704
D. Gritzalis, Yannis Soupionis, Vasilios Katos, Ioannis Psaroudakis, P. Katsaros, Anakreon Mentis
Sphinx was a monster in Greek mythology devouring those who could not solve her riddle. In VoIP, a new service in the role of Sphinx provides protection against SPIT (Spam over Internet Telephony) by discriminating human callers from botnets. The VoIP Sphinx tool uses audio CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) that are controlled by an anti-SPIT policy mechanism. The design of the Sphinx service has been formally verified for the absence of side-effects in the VoIP services (robustness), as well as for its DoS-resistance. We describe the principles and innovations of Sphinx, together with experimental results from pilot use cases.
{"title":"The Sphinx enigma in critical VoIP infrastructures: Human or botnet?","authors":"D. Gritzalis, Yannis Soupionis, Vasilios Katos, Ioannis Psaroudakis, P. Katsaros, Anakreon Mentis","doi":"10.1109/IISA.2013.6623704","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623704","url":null,"abstract":"Sphinx was a monster in Greek mythology devouring those who could not solve her riddle. In VoIP, a new service in the role of Sphinx provides protection against SPIT (Spam over Internet Telephony) by discriminating human callers from botnets. The VoIP Sphinx tool uses audio CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) that are controlled by an anti-SPIT policy mechanism. The design of the Sphinx service has been formally verified for the absence of side-effects in the VoIP services (robustness), as well as for its DoS-resistance. We describe the principles and innovations of Sphinx, together with experimental results from pilot use cases.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121205864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623717
Spiridon Mousouris, Georgios D. Styliaras
This paper presents the development of Digital Cultural Heritage Map (DCHM) application that is based on open source technologies and combines the power of web-mapping and multimedia. The project aspires to collect all the spatial cultural information about an area in one and only dynamic and easy to maintain and modify, website. The basic component of the website is the web-map. The user can perform textual or spatial queries, or a combination of those two and subsequently access spatial data that render on the map or relevant multimedia that render on the webpage. The application is being implemented for the Aitoloakarnania Greek county and will be also deployed for mobile devices.
{"title":"On the creation of a Digital Cultural Heritage Map","authors":"Spiridon Mousouris, Georgios D. Styliaras","doi":"10.1109/IISA.2013.6623717","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623717","url":null,"abstract":"This paper presents the development of Digital Cultural Heritage Map (DCHM) application that is based on open source technologies and combines the power of web-mapping and multimedia. The project aspires to collect all the spatial cultural information about an area in one and only dynamic and easy to maintain and modify, website. The basic component of the website is the web-map. The user can perform textual or spatial queries, or a combination of those two and subsequently access spatial data that render on the map or relevant multimedia that render on the webpage. The application is being implemented for the Aitoloakarnania Greek county and will be also deployed for mobile devices.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115006738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}