The Internet of things (IoT) connects a large number of smart objects that are seamlessly integrated into the information network to provide integrated services in all fields of human activity. Since IoT is vulnerable to various attacks, security and privacy are the key issues for IoT applications. In the past few years, IoT has presented a strong focus of research and different approaches have been recently proposed to address security and privacy. This paper reviews the research progress of IoT by analyzing the security requirements and presenting the different approaches and mechanisms used in IoT to ensure privacy, data protection and security.
物联网(Internet of things, IoT)将大量智能对象无缝集成到信息网络中,为人类活动的各个领域提供一体化服务。由于物联网容易受到各种攻击,因此安全和隐私是物联网应用的关键问题。在过去的几年里,物联网已经成为研究的重点,最近提出了不同的方法来解决安全和隐私问题。本文通过分析物联网的安全需求,介绍物联网中用于确保隐私、数据保护和安全的不同方法和机制,综述了物联网的研究进展。
{"title":"A Survey on Security Models, Techniques, and Tools for the Internet of Things","authors":"Raja Benabdessalem, Mohamed Hamdi, Tai-hoon Kim","doi":"10.1109/ASEA.2014.15","DOIUrl":"https://doi.org/10.1109/ASEA.2014.15","url":null,"abstract":"The Internet of things (IoT) connects a large number of smart objects that are seamlessly integrated into the information network to provide integrated services in all fields of human activity. Since IoT is vulnerable to various attacks, security and privacy are the key issues for IoT applications. In the past few years, IoT has presented a strong focus of research and different approaches have been recently proposed to address security and privacy. This paper reviews the research progress of IoT by analyzing the security requirements and presenting the different approaches and mechanisms used in IoT to ensure privacy, data protection and security.","PeriodicalId":320279,"journal":{"name":"2014 7th International Conference on Advanced Software Engineering and Its Applications","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122068280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to estimate the effectiveness of simulation-based acquisition quantitatively, development cost for simulation models should be carefully considered within the estimation. To that end, in this paper, we propose a method for the estimation of development cost for three types of models. For each unit model, its size is computed by size measurement approache (s), and then its development cost is estimated based on the measured size and the unit development cost calculated from past projects. The cost for the whole model can be obtained by tallying up the costs of all unit models. A proof-of-concept tool is currently being developed based on the proposed method.
{"title":"Cost Estimation of Simulation Models for the Effectiveness Estimation of Simulation-Based Acquisition","authors":"Hae Young Lee, Hyung-Jong Kim","doi":"10.1109/ASEA.2014.9","DOIUrl":"https://doi.org/10.1109/ASEA.2014.9","url":null,"abstract":"In order to estimate the effectiveness of simulation-based acquisition quantitatively, development cost for simulation models should be carefully considered within the estimation. To that end, in this paper, we propose a method for the estimation of development cost for three types of models. For each unit model, its size is computed by size measurement approache (s), and then its development cost is estimated based on the measured size and the unit development cost calculated from past projects. The cost for the whole model can be obtained by tallying up the costs of all unit models. A proof-of-concept tool is currently being developed based on the proposed method.","PeriodicalId":320279,"journal":{"name":"2014 7th International Conference on Advanced Software Engineering and Its Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115867997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Many kind of pattern integration need to be effectively analyzed in large data which require extremely accurate pattern. Data integration is the problem of combining data residing at different sources, and providing the user with a unified view of these data. Existing patterns integration extracts low quality of pattern mapping in large databases and the systems focus only on identifying useful patterns at the attribute-value level. We propose a generalized technique to enable seamless integration of Multiple Data Sources It improves the quality of pattern reorganization significantly. Finally, experiments are conducted on few datasets, and the results of the experiments show that our method is useful and efficient.
{"title":"Data Integration Progression in Large Data Source Using Mapping Affinity","authors":"Bazeer Ahamed B, T. Ramkumar, S. Hariharan","doi":"10.1109/ASEA.2014.11","DOIUrl":"https://doi.org/10.1109/ASEA.2014.11","url":null,"abstract":"Many kind of pattern integration need to be effectively analyzed in large data which require extremely accurate pattern. Data integration is the problem of combining data residing at different sources, and providing the user with a unified view of these data. Existing patterns integration extracts low quality of pattern mapping in large databases and the systems focus only on identifying useful patterns at the attribute-value level. We propose a generalized technique to enable seamless integration of Multiple Data Sources It improves the quality of pattern reorganization significantly. Finally, experiments are conducted on few datasets, and the results of the experiments show that our method is useful and efficient.","PeriodicalId":320279,"journal":{"name":"2014 7th International Conference on Advanced Software Engineering and Its Applications","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127306877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hae Young Lee, Hyung-Jong Kim, Jiwon Seo, Hyunju Cha
In this paper, as a part of a model for the effectiveness estimation of simulation-based acquisition (SBA), we propose a conceptual model that calculates an estimated cost for non-SBA of a system based the actual cost for SBA of the same system. The proposed model takes account of the profit gained through the use of modeling and simulation (M&S), which would be derived from considerable decrease of trials and errors in the entire acquisition process. A web-based prototype system for the estimation of SBA effectiveness has been implemented based on the proposed model.
{"title":"Model for the Effectiveness Estimation of Simulation-Based Acquisition by Considering the Value of Modeling and Simulation","authors":"Hae Young Lee, Hyung-Jong Kim, Jiwon Seo, Hyunju Cha","doi":"10.1109/ASEA.2014.8","DOIUrl":"https://doi.org/10.1109/ASEA.2014.8","url":null,"abstract":"In this paper, as a part of a model for the effectiveness estimation of simulation-based acquisition (SBA), we propose a conceptual model that calculates an estimated cost for non-SBA of a system based the actual cost for SBA of the same system. The proposed model takes account of the profit gained through the use of modeling and simulation (M&S), which would be derived from considerable decrease of trials and errors in the entire acquisition process. A web-based prototype system for the estimation of SBA effectiveness has been implemented based on the proposed model.","PeriodicalId":320279,"journal":{"name":"2014 7th International Conference on Advanced Software Engineering and Its Applications","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122986891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Since usability is considered as a critical success factor for any software application, several evaluation methods have been developed. Nowadays, it is possible to find many proposals in the literature that address to evaluate usability issues. However, there is still discussion about what usability evaluation method is the most widely accepted by the scientific community. In this research, a systematic review was performed to identify the evaluation methods that have been more employed over the last three years in order to assess the level of usability of a software application. From these results, it has been possible to establish clear evidence about the current trends in this field. A total of 274 usability studies have allowed to reach useful information for scholars in this area.
{"title":"Current Trends in Usability Evaluation Methods: A Systematic Review","authors":"Freddy Paz, J. Pow-Sang","doi":"10.1109/ASEA.2014.10","DOIUrl":"https://doi.org/10.1109/ASEA.2014.10","url":null,"abstract":"Since usability is considered as a critical success factor for any software application, several evaluation methods have been developed. Nowadays, it is possible to find many proposals in the literature that address to evaluate usability issues. However, there is still discussion about what usability evaluation method is the most widely accepted by the scientific community. In this research, a systematic review was performed to identify the evaluation methods that have been more employed over the last three years in order to assess the level of usability of a software application. From these results, it has been possible to establish clear evidence about the current trends in this field. A total of 274 usability studies have allowed to reach useful information for scholars in this area.","PeriodicalId":320279,"journal":{"name":"2014 7th International Conference on Advanced Software Engineering and Its Applications","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126976070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Algebraic immunity is a new cryptographic criterion. In order to resist algebraic attacks, Boolean functions used in cryptosystem should have high algebraic immunity. This paper presents a new recursive construction of Boolean function with maximum algebraic immunity. The constructed Boolean functions are pointed out to be balanced.
{"title":"Construction for Balanced Boolean Function with Maximum Algebraic Immunity","authors":"Yindong Chen, Wei Tian, Ya-nan Zhang","doi":"10.1109/ASEA.2014.12","DOIUrl":"https://doi.org/10.1109/ASEA.2014.12","url":null,"abstract":"Algebraic immunity is a new cryptographic criterion. In order to resist algebraic attacks, Boolean functions used in cryptosystem should have high algebraic immunity. This paper presents a new recursive construction of Boolean function with maximum algebraic immunity. The constructed Boolean functions are pointed out to be balanced.","PeriodicalId":320279,"journal":{"name":"2014 7th International Conference on Advanced Software Engineering and Its Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114566591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we presents a fuzzy concept based histogram equalization approach. We use Kaufmann's metric of fuzziness concept for histogram equalization. The principal idea of this article is to utilize and evaluate degree of fuzziness. The presented histogram equalization approach is processed to Y component of YUV color space, which is transformed information from RGB image. The improved Y channel information is merged with color information signals I and Q, and re-transformed to generated RGB image. The subjective performance comparison is provided in simulation results section.
{"title":"Optical Illusion Effect by Histogram Analysis","authors":"Gwanggil Jeon, Eunju Kim, Nam Kook Kim","doi":"10.1109/ASEA.2014.13","DOIUrl":"https://doi.org/10.1109/ASEA.2014.13","url":null,"abstract":"In this paper, we presents a fuzzy concept based histogram equalization approach. We use Kaufmann's metric of fuzziness concept for histogram equalization. The principal idea of this article is to utilize and evaluate degree of fuzziness. The presented histogram equalization approach is processed to Y component of YUV color space, which is transformed information from RGB image. The improved Y channel information is merged with color information signals I and Q, and re-transformed to generated RGB image. The subjective performance comparison is provided in simulation results section.","PeriodicalId":320279,"journal":{"name":"2014 7th International Conference on Advanced Software Engineering and Its Applications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133250949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As Wireless Sensor Networks (WSN) continue to grow, so does the need for effective security mechanisms. Enhancing the efficiency of these networks requires more security to provide integrity, authenticity and confidentiality of the data flowing through the network. Encryption is one of the most common tools used to provide security services for WSNs. There has been an enormous research potential in the field of encryption algorithms in WSNs. Algorithms, protocols, and implementations consist the main aspects the security specialist should consider to assess the efficiency of the protection approaches. In this survey, we review the most significant approaches that have been proposed to provide encryption-based security services for WSNs. We also emphasize on the weaknesses of these approaches.
{"title":"A Survey on Encryption Schemes in Wireless Sensor Networks","authors":"Haythem Hayouni, Mohamed Hamdi, Tai-hoon Kim","doi":"10.1109/ASEA.2014.14","DOIUrl":"https://doi.org/10.1109/ASEA.2014.14","url":null,"abstract":"As Wireless Sensor Networks (WSN) continue to grow, so does the need for effective security mechanisms. Enhancing the efficiency of these networks requires more security to provide integrity, authenticity and confidentiality of the data flowing through the network. Encryption is one of the most common tools used to provide security services for WSNs. There has been an enormous research potential in the field of encryption algorithms in WSNs. Algorithms, protocols, and implementations consist the main aspects the security specialist should consider to assess the efficiency of the protection approaches. In this survey, we review the most significant approaches that have been proposed to provide encryption-based security services for WSNs. We also emphasize on the weaknesses of these approaches.","PeriodicalId":320279,"journal":{"name":"2014 7th International Conference on Advanced Software Engineering and Its Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127739619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research was carried out to estimate the effect of database system application to alleviate chronic obstructive pulmonary disease. The subjects of this paper were 128 patients who had visited a general hospital which located in Chungnam area. As a result, for gender,the experimental group in a female with 64.1% showed higher than female with 60.9% in the control group. There was a significant difference in subjects who had intaked daikon after information intervention(t=-2.75, p=.000). In conclusion, a comprehensive adoption of a database system to minimize the damage of COPD will contribute effectively to the COPDrecovery and prevention.
{"title":"The Effect of Database System Application to Alleviate Chronic Obstructive Pulmonary Disease","authors":"Seong-Ran Lee","doi":"10.1109/ASEA.2014.20","DOIUrl":"https://doi.org/10.1109/ASEA.2014.20","url":null,"abstract":"This research was carried out to estimate the effect of database system application to alleviate chronic obstructive pulmonary disease. The subjects of this paper were 128 patients who had visited a general hospital which located in Chungnam area. As a result, for gender,the experimental group in a female with 64.1% showed higher than female with 60.9% in the control group. There was a significant difference in subjects who had intaked daikon after information intervention(t=-2.75, p=.000). In conclusion, a comprehensive adoption of a database system to minimize the damage of COPD will contribute effectively to the COPDrecovery and prevention.","PeriodicalId":320279,"journal":{"name":"2014 7th International Conference on Advanced Software Engineering and Its Applications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115294665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper is to design an efficient medical information system to enhancehealth behaviors after radical prostatectomy. The subjects of this paper were a total of142 patients who had visited a general hospital located in Metropolitan area. Theresults of this study are as follows. First, for soybean intake, positive change of healthbehaviors diminished the progression rate of prostate cancer(31.24±0.35, t=-0.57,p=.000). Second, this paper found that the health promotion behavior in prostatecancer patients was increased by 69.2-73.6% compared with the previous status.Therefore, systematic adoption of the medical information system to minimize thedamage of prostate cancer will contribute effectively to the rapid disease recovery andprevention.
{"title":"A Design of Efficient Medical Information System to Enhance Health Behaviors After Radical Prostatectomy","authors":"Seong-Ran Lee","doi":"10.1109/ASEA.2014.19","DOIUrl":"https://doi.org/10.1109/ASEA.2014.19","url":null,"abstract":"This paper is to design an efficient medical information system to enhancehealth behaviors after radical prostatectomy. The subjects of this paper were a total of142 patients who had visited a general hospital located in Metropolitan area. Theresults of this study are as follows. First, for soybean intake, positive change of healthbehaviors diminished the progression rate of prostate cancer(31.24±0.35, t=-0.57,p=.000). Second, this paper found that the health promotion behavior in prostatecancer patients was increased by 69.2-73.6% compared with the previous status.Therefore, systematic adoption of the medical information system to minimize thedamage of prostate cancer will contribute effectively to the rapid disease recovery andprevention.","PeriodicalId":320279,"journal":{"name":"2014 7th International Conference on Advanced Software Engineering and Its Applications","volume":"470 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123383930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}