首页 > 最新文献

2020 3rd International Conference on Information and Computer Technologies (ICICT)最新文献

英文 中文
An Investigation on Social Relations between University Students from Seat Position Data 基于座位位置数据的大学生社会关系调查
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00037
Toshiro Minami, Y. Ohura
The main aim of this paper is to investigate the social relationship among students using their seat position data. Together with the lecturer's intuitive recognition, we are able to know more about student's attitude and style to learning, which helps the lecturers to provide the students with more effective lectures. In this paper, we use the distance of seat positions of students as the index for their friendship relation and find student groups. By combining our findings in our previous studies, we are convinced that data analysis is a very useful tool for understanding students' behavior, which will help the lectures to have useful tips for delivering better lectures.
本文的主要目的是利用学生的座位位置数据来调查学生之间的社会关系。加上讲师的直观识别,我们可以更多地了解学生的学习态度和风格,这有助于讲师为学生提供更有效的讲座。本文以学生座位距离作为友谊关系的指标,寻找学生群体。结合我们之前的研究结果,我们相信数据分析是一个非常有用的工具来了解学生的行为,这将有助于我们的讲座有有用的建议,以提供更好的讲座。
{"title":"An Investigation on Social Relations between University Students from Seat Position Data","authors":"Toshiro Minami, Y. Ohura","doi":"10.1109/ICICT50521.2020.00037","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00037","url":null,"abstract":"The main aim of this paper is to investigate the social relationship among students using their seat position data. Together with the lecturer's intuitive recognition, we are able to know more about student's attitude and style to learning, which helps the lecturers to provide the students with more effective lectures. In this paper, we use the distance of seat positions of students as the index for their friendship relation and find student groups. By combining our findings in our previous studies, we are convinced that data analysis is a very useful tool for understanding students' behavior, which will help the lectures to have useful tips for delivering better lectures.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124099064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
[Title page i] [标题页i]
Pub Date : 2020-03-01 DOI: 10.1109/icict50521.2020.00001
{"title":"[Title page i]","authors":"","doi":"10.1109/icict50521.2020.00001","DOIUrl":"https://doi.org/10.1109/icict50521.2020.00001","url":null,"abstract":"","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"577 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123405777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Channel Allocation Scheme for Handover Calls in Cellular Networks 蜂窝网络中切换呼叫的动态信道分配方案
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00079
A. Abdelaziz, Mahmoud Mandour, A. Elbayoumy, G. Abdel-Hamid
Prioritizing handover calls is an important process in cellular networks. The blocking/dropping calls occurred when there is no free channel is assigned for the subscriber. So, we are going to devise a new scheme for handling the calls among the network. In this paper, the main idea is to maintain an acceptable blocking/dropping trade-off probability for the indoor cells. The proposed solution will show how to change dynamically the number of reserved channels and optimizing it based on the incoming offered traffic type (new or handover calls). The Guard Channel and Non-Prioritized schemes are considered. Finally, the results reveal that call blocking and dropping probabilities performs better while compared with the other existing scheme.
对切换呼叫进行优先排序是蜂窝网络中的一个重要过程。当没有为用户分配空闲信道时,发生阻塞/掉线呼叫。因此,我们将设计一种新的方案来处理网络间的呼叫。在本文中,主要思想是保持一个可接受的阻塞/丢弃权衡概率为室内细胞。提出的解决方案将展示如何动态更改保留通道的数量,并根据传入的提供流量类型(新呼叫或切换呼叫)对其进行优化。考虑了守卫通道和非优先级方案。结果表明,与其他现有方案相比,该方案具有更好的呼叫阻塞和丢弃概率。
{"title":"Dynamic Channel Allocation Scheme for Handover Calls in Cellular Networks","authors":"A. Abdelaziz, Mahmoud Mandour, A. Elbayoumy, G. Abdel-Hamid","doi":"10.1109/ICICT50521.2020.00079","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00079","url":null,"abstract":"Prioritizing handover calls is an important process in cellular networks. The blocking/dropping calls occurred when there is no free channel is assigned for the subscriber. So, we are going to devise a new scheme for handling the calls among the network. In this paper, the main idea is to maintain an acceptable blocking/dropping trade-off probability for the indoor cells. The proposed solution will show how to change dynamically the number of reserved channels and optimizing it based on the incoming offered traffic type (new or handover calls). The Guard Channel and Non-Prioritized schemes are considered. Finally, the results reveal that call blocking and dropping probabilities performs better while compared with the other existing scheme.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125756954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
[Copyright notice] (版权)
Pub Date : 2020-03-01 DOI: 10.1109/icict50521.2020.00003
{"title":"[Copyright notice]","authors":"","doi":"10.1109/icict50521.2020.00003","DOIUrl":"https://doi.org/10.1109/icict50521.2020.00003","url":null,"abstract":"","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126753799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topological Representation of Rare States Using Combination of Persistent Homology and Complexity Measures 结合持久同调和复杂性度量的稀有态拓扑表示
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00025
Rebecca Miao, Zhenyi Yang, V. Gavrishchaka
Identification of rare states and training models with limited data is fundamentally challenging for mainstream machine learning. Alternative approaches include one-shot learning using similarities to reference classes, meta-learning training on many related tasks and transfer learning using relevant pre-trained model. However, their performance quickly deteriorates with decreasing number of available reference classes and related tasks or lack of relevant problem for transfer learning. Previously, we proposed ensemble decomposition learning (EDL) where boosting-ensemble components trained on just two broad classes provide large number of implicit reference classes. Domain-expert knowledge such as complexity measures can be directly incorporated within EDL to reduce dependence on training data. However, success of EDL and similar approaches requires variety of complexity measures sufficiently flexible for further tuning given enough data which is not always available. Therefore, addition of complementary measures not requiring fine-tuning is important. Persistent homology (PH), one of computational topology tools, offers noise-tolerant topological summary of data set. Direct application of PH to high-dimensional data is often prohibitive and requires domain-specific dimensionality reduction. Here we suggest that PH computed on complexity measures rather than raw data could provide robust complementary metrics for enhancement of rare state representation as illustrated in the context of personalized medicine application using data from www.physionet.org.
用有限的数据识别稀有状态和训练模型对主流机器学习来说是一个根本性的挑战。替代方法包括使用参考类的相似性进行一次性学习,在许多相关任务上进行元学习训练,以及使用相关预训练模型进行迁移学习。然而,由于可用的参考类和相关任务数量的减少或缺乏迁移学习的相关问题,迁移学习的性能迅速下降。以前,我们提出了集成分解学习(EDL),其中仅在两个广义类上训练的增强集成组件提供了大量隐式参考类。领域专家知识(如复杂性度量)可以直接合并到EDL中,以减少对训练数据的依赖。然而,EDL和类似方法的成功需要各种复杂性度量,这些度量要足够灵活,以便在提供足够的数据(这些数据并不总是可用的)的情况下进行进一步调优。因此,添加不需要微调的补充措施是很重要的。持久同调(Persistent homology, PH)是一种计算拓扑工具,它提供了数据集的容噪拓扑摘要。PH对高维数据的直接应用通常是禁止的,并且需要特定于领域的降维。在此,我们建议基于复杂性度量而不是原始数据计算的PH值可以为增强稀有状态表示提供鲁棒的补充指标,如使用www.physionet.org数据的个性化医疗应用所示。
{"title":"Topological Representation of Rare States Using Combination of Persistent Homology and Complexity Measures","authors":"Rebecca Miao, Zhenyi Yang, V. Gavrishchaka","doi":"10.1109/ICICT50521.2020.00025","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00025","url":null,"abstract":"Identification of rare states and training models with limited data is fundamentally challenging for mainstream machine learning. Alternative approaches include one-shot learning using similarities to reference classes, meta-learning training on many related tasks and transfer learning using relevant pre-trained model. However, their performance quickly deteriorates with decreasing number of available reference classes and related tasks or lack of relevant problem for transfer learning. Previously, we proposed ensemble decomposition learning (EDL) where boosting-ensemble components trained on just two broad classes provide large number of implicit reference classes. Domain-expert knowledge such as complexity measures can be directly incorporated within EDL to reduce dependence on training data. However, success of EDL and similar approaches requires variety of complexity measures sufficiently flexible for further tuning given enough data which is not always available. Therefore, addition of complementary measures not requiring fine-tuning is important. Persistent homology (PH), one of computational topology tools, offers noise-tolerant topological summary of data set. Direct application of PH to high-dimensional data is often prohibitive and requires domain-specific dimensionality reduction. Here we suggest that PH computed on complexity measures rather than raw data could provide robust complementary metrics for enhancement of rare state representation as illustrated in the context of personalized medicine application using data from www.physionet.org.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128020880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust Adaptive AutoRegressive Weighted Constant Modulus Algorithm for Blind Equalization in MIMO-OFDM System MIMO-OFDM系统中稳健自适应加权常模盲均衡算法
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00096
S. Girija, R. Rao
Impulse noise is a major performance degrading factor, as it impairs the communication systems, such as mobile radio system, digital subscriber line system, and power line. Various Constant Modulus algorithms (CMA) were introduced to reduce the average of constant modulus error between the constant modulus and the equalizer output power in the impulsive noise environment. However, the existing blind learning methods generate large mis-adjustment and slow convergence rate in the impulse noise of Multiple Input Multiple Output (MIMO) system. To solve the impulse noise problem, the blind equalization method named Robust Adaptive Autoregressive weighted constant modulus algorithm (RAAWCMA) is introduced in this research work for MIMO system. Due to the feasibility and simplicity of stable convergence property, the proposed Robust Adaptive Autoregressive weighted constant modulus algorithm for blind equalization is utilized to solve the complexity of impulse noise in MIMO system. The proposed blind equalization method increases the performance of equalization by adjusting the weight vector based on the samples of output error. Moreover, the maximum average value obtained by the proposed algorithm is revealed based on the evaluation metrics, like Bit Error Rate, Symbol Error Rate, and Mean Square Error which acquire the values of 0.0005, 0.0005, and 0.0001 with the Rayleigh channel, and 0.0004, 0.0004, and 0.0001 with the Rician channel using six antennas.
脉冲噪声是一个主要的性能下降因素,因为它损害通信系统,如移动无线电系统,数字用户线路系统和电力线。为了减小脉冲噪声环境下均衡器输出功率与恒模误差的平均值,引入了各种恒模算法(CMA)。然而,现有的盲学习方法在多输入多输出(MIMO)系统的脉冲噪声中存在较大的失调和较慢的收敛速度。为了解决MIMO系统的脉冲噪声问题,本研究引入了一种鲁棒自适应自回归加权常模算法(RAAWCMA)盲均衡方法。由于稳定收敛性的可行性和简便性,提出的鲁棒自适应加权常模自回归盲均衡算法用于解决MIMO系统中脉冲噪声的复杂性。提出的盲均衡方法通过根据输出误差样本调整权向量来提高均衡性能。此外,基于误码率、符号误码率和均方误差等评价指标,给出了算法得到的最大平均值,在瑞利信道下得到0.0005、0.0005和0.0001,在六根天线的瑞利信道下得到0.0004、0.0004和0.0001。
{"title":"Robust Adaptive AutoRegressive Weighted Constant Modulus Algorithm for Blind Equalization in MIMO-OFDM System","authors":"S. Girija, R. Rao","doi":"10.1109/ICICT50521.2020.00096","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00096","url":null,"abstract":"Impulse noise is a major performance degrading factor, as it impairs the communication systems, such as mobile radio system, digital subscriber line system, and power line. Various Constant Modulus algorithms (CMA) were introduced to reduce the average of constant modulus error between the constant modulus and the equalizer output power in the impulsive noise environment. However, the existing blind learning methods generate large mis-adjustment and slow convergence rate in the impulse noise of Multiple Input Multiple Output (MIMO) system. To solve the impulse noise problem, the blind equalization method named Robust Adaptive Autoregressive weighted constant modulus algorithm (RAAWCMA) is introduced in this research work for MIMO system. Due to the feasibility and simplicity of stable convergence property, the proposed Robust Adaptive Autoregressive weighted constant modulus algorithm for blind equalization is utilized to solve the complexity of impulse noise in MIMO system. The proposed blind equalization method increases the performance of equalization by adjusting the weight vector based on the samples of output error. Moreover, the maximum average value obtained by the proposed algorithm is revealed based on the evaluation metrics, like Bit Error Rate, Symbol Error Rate, and Mean Square Error which acquire the values of 0.0005, 0.0005, and 0.0001 with the Rayleigh channel, and 0.0004, 0.0004, and 0.0001 with the Rician channel using six antennas.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131633537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Impact of DNS Over HTTPS Paradigm on Cyber Systems 关于DNS Over HTTPS范式对网络系统的影响
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00085
Kimo Bumanglag, H. Kettani
The Domain Name System (DNS) protocol has been in use for over thirty years. As the primary method of resolving domain names to Internet Protocol (IP) addresses, it is a fundamental component of the Internet. Despite its position of importance, the protocol lacks built-in security mechanisms to address confidentiality, integrity, or availability. Malware can use DNS to fulfill attacker objectives, such as establishing command and control (C2) or exfiltrating data. Various enhancements have been implemented in an attempt to address security after-the-fact. The latest such enhancement is DNS over HTTPS. Methods have also been developed to detect malware's use of DNS. In this paper, we review the weaknesses of the DNS protocol and how malware has abused those weaknesses, enhancements to DNS security, and how malware uses DNS and how that use is detected, with a special emphasis on the effects that DNS over HTTPS may have on an organization's security.
域名系统(DNS)协议已经使用了30多年。作为将域名解析为互联网协议(IP)地址的主要方法,它是互联网的一个基本组成部分。尽管它的地位很重要,但该协议缺乏内置的安全机制来处理机密性、完整性或可用性。恶意软件可以使用DNS来实现攻击者的目标,例如建立命令和控制(C2)或泄露数据。为了解决事后的安全问题,已经实现了各种增强功能。最新的增强是基于HTTPS的DNS。还开发了检测恶意软件使用DNS的方法。在本文中,我们回顾了DNS协议的弱点,恶意软件是如何滥用这些弱点的,对DNS安全性的增强,恶意软件是如何使用DNS的,以及如何检测到这种使用,特别强调了DNS通过HTTPS可能对组织安全产生的影响。
{"title":"On the Impact of DNS Over HTTPS Paradigm on Cyber Systems","authors":"Kimo Bumanglag, H. Kettani","doi":"10.1109/ICICT50521.2020.00085","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00085","url":null,"abstract":"The Domain Name System (DNS) protocol has been in use for over thirty years. As the primary method of resolving domain names to Internet Protocol (IP) addresses, it is a fundamental component of the Internet. Despite its position of importance, the protocol lacks built-in security mechanisms to address confidentiality, integrity, or availability. Malware can use DNS to fulfill attacker objectives, such as establishing command and control (C2) or exfiltrating data. Various enhancements have been implemented in an attempt to address security after-the-fact. The latest such enhancement is DNS over HTTPS. Methods have also been developed to detect malware's use of DNS. In this paper, we review the weaknesses of the DNS protocol and how malware has abused those weaknesses, enhancements to DNS security, and how malware uses DNS and how that use is detected, with a special emphasis on the effects that DNS over HTTPS may have on an organization's security.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130307503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Democratization of AI, Albeit Constrained IoT Devices & Tiny ML, for Creating a Sustainable Food Future 人工智能的民主化,尽管受到物联网设备和微型机器学习的限制,以创造可持续的食品未来
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00089
Chandrasekar Vuppalapati, Anitha Ilapakurti, Sharat Kedari, Rajasekar Vuppalapati, J. Vuppalapati, S. Kedari
Big Data surrounds us. Every minute, our smartphone collects huge amount of data from geolocations to next clickable item on the ecommerce site. Data has become one of the most important commodities for the individuals and companies. Nevertheless, this data revolution has not touched every economic sector, especially rural economies, e.g., small farmers have largely passed over the data revolution, in the developing countries due to infrastructure and compute constrained environments. Not only this is a huge missed opportunity for the big data companies, it is one of the significant obstacle in the path towards sustainable food and a huge inhibitor closing economic disparities. The purpose of the paper is to develop a framework to deploy artificial intelligence models in constrained compute environments that enable remote rural areas and small farmers to join the data revolution and start contribution to the digital economy and empowers the world through the data to create a sustainable food for our collective future.
大数据围绕着我们。每分钟,我们的智能手机都会收集大量的数据,从地理位置到电子商务网站上的下一个可点击项目。数据已经成为个人和公司最重要的商品之一。然而,这场数据革命并没有触及到每一个经济部门,特别是农村经济,例如,由于基础设施和计算环境的限制,发展中国家的小农在很大程度上错过了数据革命。对于大数据公司来说,这不仅是一个巨大的错失机会,也是实现可持续食品道路上的重大障碍之一,也是缩小经济差距的巨大阻碍。本文的目的是开发一个框架,在有限的计算环境中部署人工智能模型,使偏远农村地区和小农能够加入数据革命,开始为数字经济做出贡献,并通过数据赋予世界权力,为我们共同的未来创造可持续的食物。
{"title":"Democratization of AI, Albeit Constrained IoT Devices & Tiny ML, for Creating a Sustainable Food Future","authors":"Chandrasekar Vuppalapati, Anitha Ilapakurti, Sharat Kedari, Rajasekar Vuppalapati, J. Vuppalapati, S. Kedari","doi":"10.1109/ICICT50521.2020.00089","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00089","url":null,"abstract":"Big Data surrounds us. Every minute, our smartphone collects huge amount of data from geolocations to next clickable item on the ecommerce site. Data has become one of the most important commodities for the individuals and companies. Nevertheless, this data revolution has not touched every economic sector, especially rural economies, e.g., small farmers have largely passed over the data revolution, in the developing countries due to infrastructure and compute constrained environments. Not only this is a huge missed opportunity for the big data companies, it is one of the significant obstacle in the path towards sustainable food and a huge inhibitor closing economic disparities. The purpose of the paper is to develop a framework to deploy artificial intelligence models in constrained compute environments that enable remote rural areas and small farmers to join the data revolution and start contribution to the digital economy and empowers the world through the data to create a sustainable food for our collective future.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128286426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analyzing Enterprise Smart Business Capability in a Smart Technology Environment 智能技术环境下企业智能业务能力分析
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00097
C. Yoon
In the 4th industrial revolution, enterprise business environment has sharply been altered with advancing diverse smart technologies. The application of smart business for a firm is very crucial for the efficient execution of its management activities and for improving the performance of its business tasks. The analysis and management for firm smart business ability is required to reasonably build and advance the smart business environment appropriate for its management activities and business fields. A rational analysis framework needs to efficiently analyze an enterprise smart business ability to manage and upgrade its smart business ability. This research verified the validity and reliability of the developed 16-item scale based on previous studies. This study presents a structural framework that can properly analyze an enterprise smart business capability in a smart business ability perspective. The developed framework can be utilized for reasonably analyzing an enterprise smart business capability in a smart business environment.
在第四次工业革命中,随着各种智能技术的发展,企业经营环境发生了巨大变化。智能商务的应用对于一个公司的管理活动的有效执行和提高其业务任务的绩效是非常重要的。企业智能商业能力的分析与管理,是合理构建和推进适合其管理活动和业务领域的智能商业环境的必要条件。合理的分析框架需要有效地分析企业的智能业务能力,从而管理和提升企业的智能业务能力。本研究在前人研究的基础上,验证了所编制的16项量表的效度和信度。本研究提出了一个从智能业务能力角度分析企业智能业务能力的结构框架。所开发的框架可用于合理地分析智能业务环境中的企业智能业务能力。
{"title":"Analyzing Enterprise Smart Business Capability in a Smart Technology Environment","authors":"C. Yoon","doi":"10.1109/ICICT50521.2020.00097","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00097","url":null,"abstract":"In the 4th industrial revolution, enterprise business environment has sharply been altered with advancing diverse smart technologies. The application of smart business for a firm is very crucial for the efficient execution of its management activities and for improving the performance of its business tasks. The analysis and management for firm smart business ability is required to reasonably build and advance the smart business environment appropriate for its management activities and business fields. A rational analysis framework needs to efficiently analyze an enterprise smart business ability to manage and upgrade its smart business ability. This research verified the validity and reliability of the developed 16-item scale based on previous studies. This study presents a structural framework that can properly analyze an enterprise smart business capability in a smart business ability perspective. The developed framework can be utilized for reasonably analyzing an enterprise smart business capability in a smart business environment.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131099672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Exploration of Disinformation as a Cybersecurity Threat 虚假信息作为网络安全威胁的探索
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00076
Kevin Matthe Caramancion
Disinformation or "fake news" has continuously proven to be a pervasive threat in the digital space. The spread and persistence of disinformation especially in the social networking media sites currently factors as one of the most challenging threat for users and content administrators alike. Its ecosystem encompasses several attributing factors including but not limited to humans as information users and source, social communication model as its channel, current trust models in place as defense and guards against it, and finally the archival correction that may halt its persistence in the social space. In this paper, the author aims to explore the dynamics of the several interacting fields i.e. Psychology and Computer Science, their influence on its phenomenon, which provides an ideal interdisciplinary and holistic approach to its reduction and management. Another equally important section in this paper is its attempt to advocate to formally recognize disinformation as a cybersecurity threat for its prospective future categorization. The possible application of discourse analysis as a potential technological tool for its detection as solution is also discussed.
虚假信息或“假新闻”一直被证明是数字空间中无处不在的威胁。虚假信息的传播和持续存在,特别是在社交网络媒体网站上,目前对用户和内容管理员来说都是最具挑战性的威胁之一。它的生态系统包含几个归因因素,包括但不限于作为信息使用者和来源的人类,作为其渠道的社会沟通模式,作为防御和防范它的现有信任模式,最后是可能阻止其在社会空间中持续存在的档案更正。本文旨在探讨心理学和计算机科学这几个相互作用的领域的动态,以及它们对其现象的影响,为其减少和管理提供一个理想的跨学科和整体的方法。本文中另一个同样重要的部分是它试图倡导正式承认虚假信息作为其未来分类的网络安全威胁。文章还讨论了语篇分析作为一种潜在的技术工具的应用前景。
{"title":"An Exploration of Disinformation as a Cybersecurity Threat","authors":"Kevin Matthe Caramancion","doi":"10.1109/ICICT50521.2020.00076","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00076","url":null,"abstract":"Disinformation or \"fake news\" has continuously proven to be a pervasive threat in the digital space. The spread and persistence of disinformation especially in the social networking media sites currently factors as one of the most challenging threat for users and content administrators alike. Its ecosystem encompasses several attributing factors including but not limited to humans as information users and source, social communication model as its channel, current trust models in place as defense and guards against it, and finally the archival correction that may halt its persistence in the social space. In this paper, the author aims to explore the dynamics of the several interacting fields i.e. Psychology and Computer Science, their influence on its phenomenon, which provides an ideal interdisciplinary and holistic approach to its reduction and management. Another equally important section in this paper is its attempt to advocate to formally recognize disinformation as a cybersecurity threat for its prospective future categorization. The possible application of discourse analysis as a potential technological tool for its detection as solution is also discussed.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124441724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
期刊
2020 3rd International Conference on Information and Computer Technologies (ICICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1