首页 > 最新文献

2015 International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
Design and Implementation of a Simulation System Based on Particle Swarm Optimization for Node Placement Problem in Wireless Mesh Networks 基于粒子群算法的无线Mesh网络节点布局仿真系统的设计与实现
Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, L. Barolli
With the fast development of wireless technologies, Wireless Mesh Networks (WMNs) are becoming an important networking infrastructure due to their low cost and increased high speed wireless Internet connectivity. In this paper, we propose and implement a simulation system based on Particle Swarm Optimization (PSO). We use Size of Giant Component (SGC) and Number of Covered Mesh Clients (NCMC) as metrics for optimization. From the simulation results, we found that all mesh routers are connected and all mesh clients in the area are covered. Therefore, WMN-PSO has a good performance.
随着无线技术的快速发展,无线网状网络(WMNs)以其低廉的成本和高速的无线网络连接能力成为一种重要的网络基础设施。本文提出并实现了一个基于粒子群算法(PSO)的仿真系统。我们使用巨型组件大小(SGC)和覆盖网格客户端数量(NCMC)作为优化指标。从仿真结果可以看出,该区域内所有的mesh路由器都是连通的,并且所有的mesh客户端都被覆盖。因此,WMN-PSO具有良好的性能。
{"title":"Design and Implementation of a Simulation System Based on Particle Swarm Optimization for Node Placement Problem in Wireless Mesh Networks","authors":"Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, L. Barolli","doi":"10.1109/INCoS.2015.18","DOIUrl":"https://doi.org/10.1109/INCoS.2015.18","url":null,"abstract":"With the fast development of wireless technologies, Wireless Mesh Networks (WMNs) are becoming an important networking infrastructure due to their low cost and increased high speed wireless Internet connectivity. In this paper, we propose and implement a simulation system based on Particle Swarm Optimization (PSO). We use Size of Giant Component (SGC) and Number of Covered Mesh Clients (NCMC) as metrics for optimization. From the simulation results, we found that all mesh routers are connected and all mesh clients in the area are covered. Therefore, WMN-PSO has a good performance.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"412 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120906762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A BGN-Type Multiuser Homomorphic Encryption Scheme 一种bgn型多用户同态加密方案
Zhang Wei
Homomorphic encryption(HE) is a new cryptographic primitive that can operate on ciphertext without decryption. It has significant application in cloud computing. However, most of the existing HE schemes are single user, which means they could only evaluate on ciphertext encrypted by a single public key. Combining the idea of proxy re-encryption and homomorphic encryption, we provide a BGN-type multi-user HEscheme that can evaluate on ciphertexts come from different users. The scheme is based on bilinear pairing and subgroup decision problem, and is a somewhat homomorphic scheme that can do one multiplication and infinite additions. Security of the scheme is based on the subgroup decision assumption.
同态加密(HE)是一种可以对密文进行不解密操作的新型密码原语。它在云计算中有着重要的应用。然而,现有的大多数HE方案都是单用户的,这意味着它们只能对由单个公钥加密的密文进行评估。结合代理再加密和同态加密的思想,提出了一种bgn型的多用户hesscheme,可以对来自不同用户的密文进行评估。该方案基于双线性配对和子群决策问题,是一个可以做一次乘法和无限次加法的某种同态方案。该方案的安全性基于子群决策假设。
{"title":"A BGN-Type Multiuser Homomorphic Encryption Scheme","authors":"Zhang Wei","doi":"10.1109/INCOS.2015.45","DOIUrl":"https://doi.org/10.1109/INCOS.2015.45","url":null,"abstract":"Homomorphic encryption(HE) is a new cryptographic primitive that can operate on ciphertext without decryption. It has significant application in cloud computing. However, most of the existing HE schemes are single user, which means they could only evaluate on ciphertext encrypted by a single public key. Combining the idea of proxy re-encryption and homomorphic encryption, we provide a BGN-type multi-user HEscheme that can evaluate on ciphertexts come from different users. The scheme is based on bilinear pairing and subgroup decision problem, and is a somewhat homomorphic scheme that can do one multiplication and infinite additions. Security of the scheme is based on the subgroup decision assumption.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125859087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Classification with Extreme Learning Machine on GPU 基于GPU的极限学习机分类
Toma Jeowicz, P. Gajdoš, Vojtěch Uher, V. Snás̃el
The general classification is a machine learning task that tries to assign the best class to a given unknown input vector based on past observations (training data). Most of developed algorithms are very time consuming for large datasets (Support Vector Machine, Deep Neural Networks, etc.). Extreme Learning Machine (ELM) is a high quality classification algorithm that gains much popularity in recent years. This paper shows that the speed of learning of this algorithm may be improved by using GPU platform. Experimental results showed that proposed approach is much faster and provides the same accuracy as the original ELM algorithm. The proposed approach runs completely on GPU platform and thus it may be effectively incorporated within other applications.
一般分类是一种机器学习任务,它试图根据过去的观察(训练数据)将最佳类分配给给定的未知输入向量。大多数已开发的算法对于大型数据集(支持向量机,深度神经网络等)都非常耗时。极限学习机(Extreme Learning Machine, ELM)是近年来得到广泛应用的一种高质量分类算法。研究表明,利用GPU平台可以提高该算法的学习速度。实验结果表明,该方法的速度更快,并且具有与原始ELM算法相同的精度。所提出的方法完全运行在GPU平台上,因此它可以有效地集成到其他应用中。
{"title":"Classification with Extreme Learning Machine on GPU","authors":"Toma Jeowicz, P. Gajdoš, Vojtěch Uher, V. Snás̃el","doi":"10.1109/INCoS.2015.30","DOIUrl":"https://doi.org/10.1109/INCoS.2015.30","url":null,"abstract":"The general classification is a machine learning task that tries to assign the best class to a given unknown input vector based on past observations (training data). Most of developed algorithms are very time consuming for large datasets (Support Vector Machine, Deep Neural Networks, etc.). Extreme Learning Machine (ELM) is a high quality classification algorithm that gains much popularity in recent years. This paper shows that the speed of learning of this algorithm may be improved by using GPU platform. Experimental results showed that proposed approach is much faster and provides the same accuracy as the original ELM algorithm. The proposed approach runs completely on GPU platform and thus it may be effectively incorporated within other applications.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115253751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Energy Availability Forecasting for Harvesting-aware Wireless Sensor Networks: Analysis of Energy Demand of a Predictor Based on Evolutionary Fuzzy Rules 面向收获感知无线传感器网络的能量可用性预测:基于进化模糊规则的预测器能量需求分析
Michal Prauzek, P. Musílek, P. Krömer, J. Rodway, Martin Stankus, Jakub Hlavica
Environmental monitoring sensor networks often operate in remote locations and thus must be designed for energy-efficiency and reliability. The first goal of energy efficiency can be achieved through low-power design of the monitoring hardware, often supplemented by energy management schemes of varying complexity and sophistication. In case of sensor nodes endowed with energy-harvesting capabilities, the energy management systems can take advantage of harvesting outlook that can take the form of prediction of energy available for harvest in the near future. When designing such sophisticated prediction and management schemes, it is important to consider the energy cost of gathering the predictor data and executing the forecasting algorithm. This contribution describes the results of experiments designed to assess the energy required to run a recently introduced energy-availability forecasting algorithm based on evolutionary fuzzy rules. In particular, it presents an analysis of experiments conducted using several hardware platforms typically used to implement the computational core of environmental sensor nodes. The results clearly show the advantages of using modern low-power, 32-bit hardware platforms. In addition, they demonstrate the advantages of support for floating point operations, as well the importance of embedded code optimization to maximize the benefits of the modern microcontroller units.
环境监测传感器网络通常在偏远地区运行,因此必须设计为能源效率和可靠性。能源效率的第一个目标可以通过监测硬件的低功耗设计来实现,通常辅以不同复杂性和复杂程度的能源管理方案。在具有能量收集能力的传感器节点的情况下,能量管理系统可以利用收集前景,以预测在不久的将来可用于收集的能量的形式。在设计这种复杂的预测和管理方案时,重要的是要考虑收集预测器数据和执行预测算法的能源成本。这篇文章描述了一些实验的结果,这些实验旨在评估运行最近引入的基于进化模糊规则的能源可用性预测算法所需的能量。特别地,它介绍了使用通常用于实现环境传感器节点计算核心的几个硬件平台进行的实验分析。结果清楚地显示了使用现代低功耗32位硬件平台的优势。此外,它们还展示了支持浮点运算的优势,以及嵌入式代码优化的重要性,以最大限度地发挥现代微控制器单元的优势。
{"title":"Energy Availability Forecasting for Harvesting-aware Wireless Sensor Networks: Analysis of Energy Demand of a Predictor Based on Evolutionary Fuzzy Rules","authors":"Michal Prauzek, P. Musílek, P. Krömer, J. Rodway, Martin Stankus, Jakub Hlavica","doi":"10.1109/INCoS.2015.54","DOIUrl":"https://doi.org/10.1109/INCoS.2015.54","url":null,"abstract":"Environmental monitoring sensor networks often operate in remote locations and thus must be designed for energy-efficiency and reliability. The first goal of energy efficiency can be achieved through low-power design of the monitoring hardware, often supplemented by energy management schemes of varying complexity and sophistication. In case of sensor nodes endowed with energy-harvesting capabilities, the energy management systems can take advantage of harvesting outlook that can take the form of prediction of energy available for harvest in the near future. When designing such sophisticated prediction and management schemes, it is important to consider the energy cost of gathering the predictor data and executing the forecasting algorithm. This contribution describes the results of experiments designed to assess the energy required to run a recently introduced energy-availability forecasting algorithm based on evolutionary fuzzy rules. In particular, it presents an analysis of experiments conducted using several hardware platforms typically used to implement the computational core of environmental sensor nodes. The results clearly show the advantages of using modern low-power, 32-bit hardware platforms. In addition, they demonstrate the advantages of support for floating point operations, as well the importance of embedded code optimization to maximize the benefits of the modern microcontroller units.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116008605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Semi-automatic System to Detect Relevant Learning Content for Each Subject 一种半自动检测各学科相关学习内容的系统
I. Guitart, J. Moré, Jordi Duran, J. Conesa, David Bañeres, D. Gañán
Today, the crisis has worsened the panorama for Universities, placing new constraints that require being more sustainable economically. In addition, universities will also have to improve their research and teaching in order to obtain more research funds and attract more students. In this panorama, analytics can be a very useful tool since it allows academics (and university managers) to get a more thorough view of their context, to better understand the environment, and to identify potential improvements. Some analytics have been done under the names of Learning analytics, Academic analytics, Educational Data Mining and etcetera. However, these systems, under our humble opinion, only take into account the small part of data related to the problem, but not contextual data. In order to perform analytics efficiently and reproduce their results easily in other contexts, it is necessary to have as much information as possible about the context. For example, when communication forums are analyzed to see the concepts in which students have more doubts, it is important to analyze also what concepts are taught in the subject. Having access to both sources, more information can be obtained and may help to discover not only the problem (a concept is difficult for students) but also its cause (maybe it is not explained in the materials of the course). The work presented in the paper proposes a novel approach to work in that direction: gathering information from different aspects within subjects. In particular, the paper presents an approach that uses natural language processing techniques to analyze the subject's materials in order to discover which concepts are taught and their importance in the subject. The contribution of the paper is a system that allows obtaining a better understanding of subjects. The results can be used for analyzing the suitability of materials to subjects and to enrich and contextualize other analytical processes.
如今,这场危机使大学的形势更加恶化,给大学施加了新的限制,要求它们在经济上更加可持续。此外,大学也必须提高他们的研究和教学,以获得更多的研究经费,吸引更多的学生。在这种情况下,分析可以是一个非常有用的工具,因为它可以让学者(和大学管理者)更全面地了解他们的背景,更好地了解环境,并确定潜在的改进。一些分析以学习分析、学术分析、教育数据挖掘等名义进行。然而,在我们看来,这些系统只考虑了与问题相关的一小部分数据,而不是上下文数据。为了有效地执行分析并在其他上下文中轻松地重现其结果,有必要拥有尽可能多的关于上下文的信息。例如,当分析交流论坛以查看学生对哪些概念有更多的疑问时,分析该学科教授的概念也很重要。有了这两种资源,可以获得更多的信息,不仅可以帮助发现问题(一个概念对学生来说很难),还可以发现问题的原因(也许课程材料中没有解释)。论文中提出的工作提出了一种朝这个方向工作的新方法:从主题的不同方面收集信息。特别是,本文提出了一种使用自然语言处理技术来分析学科材料的方法,以发现哪些概念被教授及其在学科中的重要性。本文的贡献在于提供了一个系统,使我们能够更好地理解学科。结果可用于分析材料对主题的适用性,并丰富和背景化其他分析过程。
{"title":"A Semi-automatic System to Detect Relevant Learning Content for Each Subject","authors":"I. Guitart, J. Moré, Jordi Duran, J. Conesa, David Bañeres, D. Gañán","doi":"10.1109/INCoS.2015.62","DOIUrl":"https://doi.org/10.1109/INCoS.2015.62","url":null,"abstract":"Today, the crisis has worsened the panorama for Universities, placing new constraints that require being more sustainable economically. In addition, universities will also have to improve their research and teaching in order to obtain more research funds and attract more students. In this panorama, analytics can be a very useful tool since it allows academics (and university managers) to get a more thorough view of their context, to better understand the environment, and to identify potential improvements. Some analytics have been done under the names of Learning analytics, Academic analytics, Educational Data Mining and etcetera. However, these systems, under our humble opinion, only take into account the small part of data related to the problem, but not contextual data. In order to perform analytics efficiently and reproduce their results easily in other contexts, it is necessary to have as much information as possible about the context. For example, when communication forums are analyzed to see the concepts in which students have more doubts, it is important to analyze also what concepts are taught in the subject. Having access to both sources, more information can be obtained and may help to discover not only the problem (a concept is difficult for students) but also its cause (maybe it is not explained in the materials of the course). The work presented in the paper proposes a novel approach to work in that direction: gathering information from different aspects within subjects. In particular, the paper presents an approach that uses natural language processing techniques to analyze the subject's materials in order to discover which concepts are taught and their importance in the subject. The contribution of the paper is a system that allows obtaining a better understanding of subjects. The results can be used for analyzing the suitability of materials to subjects and to enrich and contextualize other analytical processes.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116431098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Road Map to Risk Management Framework for Successful Implementation of Cloud Computing in Oman 阿曼成功实施云计算的风险管理框架路线图
Fatma Al-Musawi, A. Al-Badi, Saqib Ali
Cloud computing nowadays is adopted by many organizations around the world because of its potential benefits such as cost reduction, high availability and elastic scaling. In spite of all the claimed benefits and to deal with any potential risk and vulnerability of cloud computing, risk management is becoming a critical domain that requires a fundamental review in the business strategies and can be linked to cloud computing, in order to have a successful cloud implementation. Risk management can help in avoiding, transferring, mitigating or minimizing the risks associated with being on the cloud. The main objective of this research is to explore the existing risk management frameworks in order to recommend an appropriate risk management framework for cloud computing environment. Qualitative data were collected and analyzed based on interviews conducted amongst the information technology and risk management professionals in Omani organizations (public and private). The recommended framework can be used in conjunction with other risk management approaches for industries which already moved to cloud or in transition of moving towards cloud environment in Oman.
如今,云计算被世界各地的许多组织所采用,因为它具有降低成本、高可用性和弹性扩展等潜在优势。尽管有所有声称的好处,并且要处理云计算的任何潜在风险和脆弱性,但风险管理正在成为一个关键领域,需要对业务战略进行基本审查,并且可以与云计算联系起来,以便成功实现云计算。风险管理可以帮助避免、转移、减轻或最小化与云计算相关的风险。本研究的主要目的是探讨现有的风险管理框架,以便为云计算环境推荐合适的风险管理框架。定性数据的收集和分析基于阿曼组织(公共和私营)的信息技术和风险管理专业人员的访谈。建议的框架可与阿曼已经转向云计算或正在转向云计算环境的行业的其他风险管理方法结合使用。
{"title":"A Road Map to Risk Management Framework for Successful Implementation of Cloud Computing in Oman","authors":"Fatma Al-Musawi, A. Al-Badi, Saqib Ali","doi":"10.1109/INCoS.2015.80","DOIUrl":"https://doi.org/10.1109/INCoS.2015.80","url":null,"abstract":"Cloud computing nowadays is adopted by many organizations around the world because of its potential benefits such as cost reduction, high availability and elastic scaling. In spite of all the claimed benefits and to deal with any potential risk and vulnerability of cloud computing, risk management is becoming a critical domain that requires a fundamental review in the business strategies and can be linked to cloud computing, in order to have a successful cloud implementation. Risk management can help in avoiding, transferring, mitigating or minimizing the risks associated with being on the cloud. The main objective of this research is to explore the existing risk management frameworks in order to recommend an appropriate risk management framework for cloud computing environment. Qualitative data were collected and analyzed based on interviews conducted amongst the information technology and risk management professionals in Omani organizations (public and private). The recommended framework can be used in conjunction with other risk management approaches for industries which already moved to cloud or in transition of moving towards cloud environment in Oman.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122357006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An Analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman 阿曼云计算安全威胁与漏洞分析
Amira M. AlZadjali, A. Al-Badi, Saqib Ali
Cloud computing technology is known for its potential advantages which include cost reduction, enhanced flexibility, improved stability and the provision of a proven delivery platform for delivering IT services to its end users. In spite of the numerous benefits, cloud computing does attract security threats and therefore has vulnerabilities. Understanding and mitigating such threats and vulnerabilities are crucial to its continued existence. The main objective of this research is to explore the various threats and vulnerabilities associated with the cloud computing technologies that have been adopted by different organizations in Oman and hence propose solutions to mitigate them. To achieve the research objective of the study, a survey among the cloud computing users and providers was conducted. The main findings showed that data control and privacy, security risks and security threats present considerable barriers in the implementation of cloud computing.
云计算技术以其潜在优势而闻名,这些优势包括降低成本、增强灵活性、提高稳定性和提供一个经过验证的交付平台,用于向最终用户交付IT服务。尽管有许多好处,但云计算确实会带来安全威胁,因此存在漏洞。了解和减轻这些威胁和脆弱性对其继续存在至关重要。本研究的主要目的是探索与阿曼不同组织采用的云计算技术相关的各种威胁和漏洞,从而提出缓解这些威胁和漏洞的解决方案。为了实现本研究的研究目的,对云计算用户和提供商进行了调查。主要调查结果表明,数据控制和隐私、安全风险和安全威胁对云计算的实施构成了相当大的障碍。
{"title":"An Analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman","authors":"Amira M. AlZadjali, A. Al-Badi, Saqib Ali","doi":"10.1109/INCoS.2015.79","DOIUrl":"https://doi.org/10.1109/INCoS.2015.79","url":null,"abstract":"Cloud computing technology is known for its potential advantages which include cost reduction, enhanced flexibility, improved stability and the provision of a proven delivery platform for delivering IT services to its end users. In spite of the numerous benefits, cloud computing does attract security threats and therefore has vulnerabilities. Understanding and mitigating such threats and vulnerabilities are crucial to its continued existence. The main objective of this research is to explore the various threats and vulnerabilities associated with the cloud computing technologies that have been adopted by different organizations in Oman and hence propose solutions to mitigate them. To achieve the research objective of the study, a survey among the cloud computing users and providers was conducted. The main findings showed that data control and privacy, security risks and security threats present considerable barriers in the implementation of cloud computing.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117013716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Improving e-Assessment in Collaborative and Social Learning Settings 在协作和社会学习环境中改进电子评估
N. Mora, S. Caballé, T. Daradoumis
Cognitive assessment in collaborative and social learning requires assessment processes that achieve significant effect on collaborative learning and engage learners through accountability and constructive feedback. In order to design a coherent and efficient assessment system for collaborative and social learning it is necessary to design an enriched learning experience that predisposes the feedback and awareness in the group. This research focuses on e-assessment of collaborative learning and extends it with Social Network Analysis (SNA) techniques that are able to analyze and represent social network interaction during the live collaborative sessions. The interaction data extracted from social and collaborative networking must be integrated into a general assessment system to produce an efficient and personalized awareness and feedback about the collaborative activity and the social behavior of the participants. In previous work we provided a conceptual and methodological research approach of e-assessment applications and tools that meet the mentioned requirements and goals. In this paper we provide empirical data and interpretation to validate the approach.
协作学习和社会学习中的认知评估要求评估过程对协作学习产生重大影响,并通过问责制和建设性反馈吸引学习者。为了设计一个连贯和有效的评估系统,协作和社会学习,有必要设计一个丰富的学习经验,倾向于群体的反馈和意识。本研究的重点是协作学习的电子评估,并将其扩展为能够在实时协作会话中分析和表示社会网络交互的社会网络分析(SNA)技术。从社会和协作网络中提取的交互数据必须集成到一个一般的评估系统中,以产生对协作活动和参与者的社会行为的有效和个性化的认识和反馈。在之前的工作中,我们提供了满足上述要求和目标的电子评估应用和工具的概念和方法研究方法。在本文中,我们提供了经验数据和解释来验证该方法。
{"title":"Improving e-Assessment in Collaborative and Social Learning Settings","authors":"N. Mora, S. Caballé, T. Daradoumis","doi":"10.1109/INCoS.2015.76","DOIUrl":"https://doi.org/10.1109/INCoS.2015.76","url":null,"abstract":"Cognitive assessment in collaborative and social learning requires assessment processes that achieve significant effect on collaborative learning and engage learners through accountability and constructive feedback. In order to design a coherent and efficient assessment system for collaborative and social learning it is necessary to design an enriched learning experience that predisposes the feedback and awareness in the group. This research focuses on e-assessment of collaborative learning and extends it with Social Network Analysis (SNA) techniques that are able to analyze and represent social network interaction during the live collaborative sessions. The interaction data extracted from social and collaborative networking must be integrated into a general assessment system to produce an efficient and personalized awareness and feedback about the collaborative activity and the social behavior of the participants. In previous work we provided a conceptual and methodological research approach of e-assessment applications and tools that meet the mentioned requirements and goals. In this paper we provide empirical data and interpretation to validate the approach.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129151111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Management of Networking Systems Using Design Patterns 使用设计模式管理网络系统
Viliam Malcher
Recent advances in telecommunication technology, including wireless network and the Internet are putting increasing pressure for building telecommunication software systems. One of the costs of deploying a new service is the cost of integrating all necessary applications into an effective software solution. We provide a model and discussing that could be applied to other applications as a means to provide an effective solution for the management of telecommunication network systems. It is based on the design patterns for the development of effective and consistent interfaces.
包括无线网络和因特网在内的通信技术的最新进展给建立电信软件系统带来了越来越大的压力。部署新服务的成本之一是将所有必要的应用程序集成到一个有效的软件解决方案中的成本。我们提供了一个可以应用于其他应用的模型和讨论,作为一种为电信网络系统管理提供有效解决方案的手段。它基于设计模式,用于开发有效和一致的接口。
{"title":"Management of Networking Systems Using Design Patterns","authors":"Viliam Malcher","doi":"10.1109/INCoS.2015.13","DOIUrl":"https://doi.org/10.1109/INCoS.2015.13","url":null,"abstract":"Recent advances in telecommunication technology, including wireless network and the Internet are putting increasing pressure for building telecommunication software systems. One of the costs of deploying a new service is the cost of integrating all necessary applications into an effective software solution. We provide a model and discussing that could be applied to other applications as a means to provide an effective solution for the management of telecommunication network systems. It is based on the design patterns for the development of effective and consistent interfaces.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129740589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a General Adaptive e-Assessment System 迈向通用适应性电子评估系统
David Bañeres, Xavier Baró, Ana-Elena Guerrero-Roldán, M. E. Rodríguez
Assessment is an important part of the learning process. The instructor should be able to evaluate whether a learner has acquired the knowledge and competences provided in the course. Moreover, assessment activities also help a learner to check his level of expertise. Typically, the assessment model and assessment activities of subjects in official programmes are the same for all the learners, since they should be evaluated having the same opportunities and conditions. However, when the learner is evaluated by means of a continuous assessment model, he is proving on each activity his knowledge and proficiency level and, at the same time, his reputation could be also built based on the actions he is performing within the course. Therefore, the assessment model can be adapted based on this information. In this paper, we present a general system to adapt the assessment based on different evidences gathered from the learning process of the learner.
评估是学习过程的重要组成部分。教师应该能够评估学习者是否获得了课程提供的知识和能力。此外,评估活动也有助于学习者检查他的专业水平。一般来说,正式课程中各科目的评估模式和评估活动对所有学习者都是相同的,因为他们应该在相同的机会和条件下进行评估。然而,当学习者通过一个连续的评估模型进行评估时,他在每一个活动中都证明了他的知识和熟练程度,同时,他的声誉也可以根据他在课程中的表现来建立。因此,可以根据这些信息调整评估模型。在本文中,我们提出了一种基于学习者学习过程中收集的不同证据来适应评估的通用系统。
{"title":"Towards a General Adaptive e-Assessment System","authors":"David Bañeres, Xavier Baró, Ana-Elena Guerrero-Roldán, M. E. Rodríguez","doi":"10.1109/INCoS.2015.53","DOIUrl":"https://doi.org/10.1109/INCoS.2015.53","url":null,"abstract":"Assessment is an important part of the learning process. The instructor should be able to evaluate whether a learner has acquired the knowledge and competences provided in the course. Moreover, assessment activities also help a learner to check his level of expertise. Typically, the assessment model and assessment activities of subjects in official programmes are the same for all the learners, since they should be evaluated having the same opportunities and conditions. However, when the learner is evaluated by means of a continuous assessment model, he is proving on each activity his knowledge and proficiency level and, at the same time, his reputation could be also built based on the actions he is performing within the course. Therefore, the assessment model can be adapted based on this information. In this paper, we present a general system to adapt the assessment based on different evidences gathered from the learning process of the learner.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123382906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2015 International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1