With increasing the connectivity of today's vehicles it is necessary to consider the security of such communication. This paper deals with the security requirements for in-vehicle network traffic and presents a performance analysis of IPSec/AH protocol in automotive environment. The tests were conducted on an exemplar topology using a self-developed gateway between Controller Area Network and Ethernet network based on ARM Cortex-A7 dual core processor. The main contribution of this work is evaluating the time characteristics of CAN communication "tunnelled" through Ethernet network and secured using IPSec.
{"title":"A performance analysis of IPSec/AH protocol for automotive environment","authors":"J. Lastinec, L. Hudec","doi":"10.1145/2812428.2812434","DOIUrl":"https://doi.org/10.1145/2812428.2812434","url":null,"abstract":"With increasing the connectivity of today's vehicles it is necessary to consider the security of such communication. This paper deals with the security requirements for in-vehicle network traffic and presents a performance analysis of IPSec/AH protocol in automotive environment. The tests were conducted on an exemplar topology using a self-developed gateway between Controller Area Network and Ethernet network based on ARM Cortex-A7 dual core processor. The main contribution of this work is evaluating the time characteristics of CAN communication \"tunnelled\" through Ethernet network and secured using IPSec.","PeriodicalId":316788,"journal":{"name":"International Conference on Computer Systems and Technologies","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129804505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kumaran Rajarathianm, J. Gomm, K. Jones, Dingli Yu
In this paper, a new predetermined time constant approximation (Tsp) method for optimising the search space boundaries to improve SGAs convergence is proposed. This method is demonstrated on parameter identification of higher order models. Using the dynamic response period and desired settling time of the transfer function coefficients offered a better suggestion for initial Tsp values. Furthermore, an extension on boundaries derived from the initial Tsp values and the consecutive execution, brought the elite groups within feasible boundary regions for better exploration. This enhanced the process of locating of the optimal values of coefficients for the transfer function. The Tsp method is investigated on two processes; excess oxygen and a third order continuous model with and without random disturbance. The simulation results assured the Tsp method's effectiveness and flexibility in assisting SGAs to locate optimal transfer function coefficients.
{"title":"Predetermined time constant approximation method for optimising search space boundary by standard genetic algorithm","authors":"Kumaran Rajarathianm, J. Gomm, K. Jones, Dingli Yu","doi":"10.1145/2812428.2812466","DOIUrl":"https://doi.org/10.1145/2812428.2812466","url":null,"abstract":"In this paper, a new predetermined time constant approximation (Tsp) method for optimising the search space boundaries to improve SGAs convergence is proposed. This method is demonstrated on parameter identification of higher order models. Using the dynamic response period and desired settling time of the transfer function coefficients offered a better suggestion for initial Tsp values. Furthermore, an extension on boundaries derived from the initial Tsp values and the consecutive execution, brought the elite groups within feasible boundary regions for better exploration. This enhanced the process of locating of the optimal values of coefficients for the transfer function. The Tsp method is investigated on two processes; excess oxygen and a third order continuous model with and without random disturbance. The simulation results assured the Tsp method's effectiveness and flexibility in assisting SGAs to locate optimal transfer function coefficients.","PeriodicalId":316788,"journal":{"name":"International Conference on Computer Systems and Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127266649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This contribution describes a method to select regions of interest as capillaries of the oral mucosa and to extract their main features useful for real diagnosis purposes. A discrete version of the wavelet transform has been adopted for segmenting the images coming from video sequences acquired by a prototype capillaroscopic, able to put in evidence the red blood flow. A set of proper characteristics is automatically computed for a correct evaluation of the peripheral microcirculation.
{"title":"Segmentation and feature extraction in capillaroscopic videos","authors":"Emiliano Spera, D. Tegolo, Cesare Valenti","doi":"10.1145/2812428.2812472","DOIUrl":"https://doi.org/10.1145/2812428.2812472","url":null,"abstract":"This contribution describes a method to select regions of interest as capillaries of the oral mucosa and to extract their main features useful for real diagnosis purposes. A discrete version of the wavelet transform has been adopted for segmenting the images coming from video sequences acquired by a prototype capillaroscopic, able to put in evidence the red blood flow. A set of proper characteristics is automatically computed for a correct evaluation of the peripheral microcirculation.","PeriodicalId":316788,"journal":{"name":"International Conference on Computer Systems and Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125300273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we describe two new multi-touch interaction techniques. Both of them cover the six degrees of freedom and focus on one-handed touch-based approach. The first one (2F/3F) uses two and three finger gestures, the second one (1F/2F) one and two finger simple gestures. We conducted a series of user study tests. The main result is that the intuitiveness and comfort of 1F/2F is 91 % (against 2F/3F with 76 %) which is better than previously published results of other authors with less than 83 % of relevancy and easiness.
{"title":"Multi-touch interaction techniques to control 3D objects on a smartphone screen","authors":"F. Hlavacek, A. Kovárová","doi":"10.1145/2812428.2812462","DOIUrl":"https://doi.org/10.1145/2812428.2812462","url":null,"abstract":"In this paper we describe two new multi-touch interaction techniques. Both of them cover the six degrees of freedom and focus on one-handed touch-based approach. The first one (2F/3F) uses two and three finger gestures, the second one (1F/2F) one and two finger simple gestures. We conducted a series of user study tests. The main result is that the intuitiveness and comfort of 1F/2F is 91 % (against 2F/3F with 76 %) which is better than previously published results of other authors with less than 83 % of relevancy and easiness.","PeriodicalId":316788,"journal":{"name":"International Conference on Computer Systems and Technologies","volume":"265 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114940120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper views the problems related to the development of knitting software for handmade knitting. It presents an XML-based language for knitting symbols description, called Portable Knitting Format (PKF). Its purpose is to develop a uniform and platform independent description of simple graphics primitives corresponding to different types of stitches. PKF contains the XML elements describing the following graphic primitives: line, polygon, polyline, arc, ellipse, rectangle and Bezier curve. Using these primitives the editor can describe all possible knitting symbols. The XML language can be built on CAD systems for handmade knitting.
{"title":"Portable knitting format - XML-based language for knitting symbols description","authors":"E. Zaharieva-Stoyanova, Stefan Bozov","doi":"10.1145/2812428.2812465","DOIUrl":"https://doi.org/10.1145/2812428.2812465","url":null,"abstract":"This paper views the problems related to the development of knitting software for handmade knitting. It presents an XML-based language for knitting symbols description, called Portable Knitting Format (PKF). Its purpose is to develop a uniform and platform independent description of simple graphics primitives corresponding to different types of stitches. PKF contains the XML elements describing the following graphic primitives: line, polygon, polyline, arc, ellipse, rectangle and Bezier curve. Using these primitives the editor can describe all possible knitting symbols. The XML language can be built on CAD systems for handmade knitting.","PeriodicalId":316788,"journal":{"name":"International Conference on Computer Systems and Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114068844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer mouse usage features could be used to distinguish web page visitors. Particular data instances representing user's navigation actions are insufficient when used separately to perform classification with basic k-nearest neighbors (kNN) classifier. We propose a modification of kNN method in which instances of the same class form groups. Finding the nearest neighbors is based on measuring distance between histograms representing distributions of values for the corresponding groups. The paper provides a series of experiments on dataset from 100 web visitors. It describes comparison of several distance metrics as well as different levels of grouping. Combination of non-parametric tests statistics for measuring distance and suitable size of groups improves classification success rate significantly.
{"title":"Grouping instances in kNN for classification based on computer mouse features","authors":"D. Chudá, Peter Krátky","doi":"10.1145/2812428.2812454","DOIUrl":"https://doi.org/10.1145/2812428.2812454","url":null,"abstract":"Computer mouse usage features could be used to distinguish web page visitors. Particular data instances representing user's navigation actions are insufficient when used separately to perform classification with basic k-nearest neighbors (kNN) classifier. We propose a modification of kNN method in which instances of the same class form groups. Finding the nearest neighbors is based on measuring distance between histograms representing distributions of values for the corresponding groups. The paper provides a series of experiments on dataset from 100 web visitors. It describes comparison of several distance metrics as well as different levels of grouping. Combination of non-parametric tests statistics for measuring distance and suitable size of groups improves classification success rate significantly.","PeriodicalId":316788,"journal":{"name":"International Conference on Computer Systems and Technologies","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124006739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a comparison between two methods for normalizing the filtered pixel - division and multiplication by the reciprocal value of the normalization factor. The resources utilized for the FPGA-based implementation of the filters and the time taken to compute the normalized value of the pixel being filtered are compared.
{"title":"Comparison of two methods for computing FPGA-based weighted average linear spatial filters","authors":"Ivan Kanev","doi":"10.1145/2812428.2812444","DOIUrl":"https://doi.org/10.1145/2812428.2812444","url":null,"abstract":"This paper presents a comparison between two methods for normalizing the filtered pixel - division and multiplication by the reciprocal value of the normalization factor. The resources utilized for the FPGA-based implementation of the filters and the time taken to compute the normalized value of the pixel being filtered are compared.","PeriodicalId":316788,"journal":{"name":"International Conference on Computer Systems and Technologies","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127588726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we briefly present and discuss the results of an online survey regarding e-learning and Massive Open Online Courses (MOOCs). Part of a larger study which considered several aspects of teaching and learning in the fields of Computer Science, Computer Engineering, Software Engineering and Information Systems, the investigation was carried out in the context of the FETCH European Thematic Network. In particular, for both e-learning and MOOCs, we analyse the benefits and disadvantages perceived by people working in the academia (Professors), former students (Alumni) and employers (Industry Representatives). Although the analysis cannot be generalized due to the limited number of participants in the survey, we think that it can anyway provide some interesting insights to lay the ground for more complete studies on the subject.
{"title":"E-Learning and MOOCs: a short investigation in the context of the FETCH European thematic network","authors":"B. Çiço, M. Porta","doi":"10.1145/2812428.2812451","DOIUrl":"https://doi.org/10.1145/2812428.2812451","url":null,"abstract":"In this paper we briefly present and discuss the results of an online survey regarding e-learning and Massive Open Online Courses (MOOCs). Part of a larger study which considered several aspects of teaching and learning in the fields of Computer Science, Computer Engineering, Software Engineering and Information Systems, the investigation was carried out in the context of the FETCH European Thematic Network. In particular, for both e-learning and MOOCs, we analyse the benefits and disadvantages perceived by people working in the academia (Professors), former students (Alumni) and employers (Industry Representatives). Although the analysis cannot be generalized due to the limited number of participants in the survey, we think that it can anyway provide some interesting insights to lay the ground for more complete studies on the subject.","PeriodicalId":316788,"journal":{"name":"International Conference on Computer Systems and Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125166457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In introductory programming courses instructors usually experiment by introducing new activities based on new technologies in order to promote learning and achievement. This paper presents a case study from the Department of Informatics at the University of Rijeka where a blended course Programming 2 offers new supportive activities to students. The work gives objective evaluation of these activities implementing data mining on Moodle log data using the Apriori method and interactive visualization.
{"title":"Association rule mining and visualization of introductory programming course activities","authors":"M. Matetić, Marija Brkic Bakaric, Sabina Sisovic","doi":"10.1145/2812428.2812438","DOIUrl":"https://doi.org/10.1145/2812428.2812438","url":null,"abstract":"In introductory programming courses instructors usually experiment by introducing new activities based on new technologies in order to promote learning and achievement. This paper presents a case study from the Department of Informatics at the University of Rijeka where a blended course Programming 2 offers new supportive activities to students. The work gives objective evaluation of these activities implementing data mining on Moodle log data using the Apriori method and interactive visualization.","PeriodicalId":316788,"journal":{"name":"International Conference on Computer Systems and Technologies","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121484853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nowadays, the rapid development of technology has made it possible to store the data in memory with high capacity. There are various sources from where the data are collected or generated Moreover, the speed of updating and processing the data is very important to many organizations. Big Data is a concept the covers capacity, speed and different formats of data in many organizations. The aim of this paper is to analyze the Big Data in electricity using visualization aspect. Also, it gives an overview of features and sources of Big Data. The visualization on electricity data is made based on Revolution R Enterprise (RRE) tool. Writing scripts in RRE is found the relationship between electricity load and time. This relationship is illustrated using the line of best fit and the smoothing line. Also, some statistical parameters are computed and the relationship of data is evaluated using visualization.
如今,科技的飞速发展使得在内存中存储大容量数据成为可能。收集或生成数据的来源多种多样。此外,更新和处理数据的速度对许多组织来说非常重要。大数据是一个概念,涵盖了许多组织中数据的容量、速度和不同格式。本文旨在从可视化的角度对电力大数据进行分析。同时,概述了大数据的特点和来源。基于Revolution R Enterprise (RRE)工具对电力数据进行可视化处理。在RRE中编写脚本,发现了电力负荷与时间的关系。这种关系用最佳拟合线和平滑线来说明。此外,还计算了一些统计参数,并利用可视化技术评估了数据之间的关系。
{"title":"Big data in electricity-visualization aspect","authors":"Ilir Keka, B. Çiço","doi":"10.1145/2812428.2812441","DOIUrl":"https://doi.org/10.1145/2812428.2812441","url":null,"abstract":"Nowadays, the rapid development of technology has made it possible to store the data in memory with high capacity. There are various sources from where the data are collected or generated Moreover, the speed of updating and processing the data is very important to many organizations. Big Data is a concept the covers capacity, speed and different formats of data in many organizations.\u0000 The aim of this paper is to analyze the Big Data in electricity using visualization aspect. Also, it gives an overview of features and sources of Big Data. The visualization on electricity data is made based on Revolution R Enterprise (RRE) tool. Writing scripts in RRE is found the relationship between electricity load and time. This relationship is illustrated using the line of best fit and the smoothing line. Also, some statistical parameters are computed and the relationship of data is evaluated using visualization.","PeriodicalId":316788,"journal":{"name":"International Conference on Computer Systems and Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131593168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}