Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454765
Christopher Lehmann, Yijun Zhu, Andreas Ingo Grohmann, F. Fitzek
The demonstrator described in this work shows wireless multi-path communication to enable Ultra Reliable Low Latency Communication (URLLC) for mobile industrial applications in demanding scenarios, that implement closed-loop control systems in a cloud-native manner. We show mobile vehicles that are coordinated precisely through an intersection, controlled by a central entity located in an edge cloud. In order to ensure seamless operation, the connection to the controller needs to be ultra-reliable and with low latency, otherwise the mobile vehicles may crash. To enable this we use a WiFi network as well as a Non Public Network (NPN) of the 5th Generation of cellular mobile communications (5G) network in parallel to increase robustness against delays and losses on each individual link. The audience can experience the benefits of multi-path communication by interacting with the demonstration.
{"title":"Demonstration of Wireless Multi-Path Communication to Improve Reliability","authors":"Christopher Lehmann, Yijun Zhu, Andreas Ingo Grohmann, F. Fitzek","doi":"10.1109/CCNC51664.2024.10454765","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454765","url":null,"abstract":"The demonstrator described in this work shows wireless multi-path communication to enable Ultra Reliable Low Latency Communication (URLLC) for mobile industrial applications in demanding scenarios, that implement closed-loop control systems in a cloud-native manner. We show mobile vehicles that are coordinated precisely through an intersection, controlled by a central entity located in an edge cloud. In order to ensure seamless operation, the connection to the controller needs to be ultra-reliable and with low latency, otherwise the mobile vehicles may crash. To enable this we use a WiFi network as well as a Non Public Network (NPN) of the 5th Generation of cellular mobile communications (5G) network in parallel to increase robustness against delays and losses on each individual link. The audience can experience the benefits of multi-path communication by interacting with the demonstration.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"112 2","pages":"1118-1119"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454694
Ignacio Astaburuaga, Shamik Sengupta
Analyzing the intricate dynamics of cyber threat information (CTI) sharing platforms promotes strategic data exchange, fortifying organizations with the collective strength needed to mitigate cyber threats effectively. This research aims to quantitatively assess the utility of joining a cyber threat intelligence platform. More specifically, this paper attempts to apply the principles of game theory to cyber threat intelligence platforms to uncover how the game develops over time and examine whether it is beneficial for an organization to join in the first place. The source code for the implementation discussed in this paper is available at https://gitlab.com/ignaciochg/ccnc24-game-theory-cybex.
{"title":"Game Theory for Privacy-Preserving Cybersecurity Information Exchange Framework","authors":"Ignacio Astaburuaga, Shamik Sengupta","doi":"10.1109/CCNC51664.2024.10454694","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454694","url":null,"abstract":"Analyzing the intricate dynamics of cyber threat information (CTI) sharing platforms promotes strategic data exchange, fortifying organizations with the collective strength needed to mitigate cyber threats effectively. This research aims to quantitatively assess the utility of joining a cyber threat intelligence platform. More specifically, this paper attempts to apply the principles of game theory to cyber threat intelligence platforms to uncover how the game develops over time and examine whether it is beneficial for an organization to join in the first place. The source code for the implementation discussed in this paper is available at https://gitlab.com/ignaciochg/ccnc24-game-theory-cybex.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"111 4","pages":"730-735"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454717
Silvia Corpino, M. Anedda, M. Fadda, D. Giusto, R. Girau
The Internet of Things (IoT) is a global network of intelligent interconnected objects, enabling remote recognition, detection, and control. Through virtualization, these devices exchange knowledge in the Cloud, bridging physical and virtual worlds. However, the rapid growth in connected objects and data production necessitates innovative system designs. While virtualization offers scalability and flexibility, it proves insufficient alone. Recent studies recommend integrating social network concepts into IoT, forming the Social Internet of Things (SIoT). SIoT, mirroring human social networks, enhances smart devices with relational capabilities, addressing challenges in managing the surge in connected devices. This paper introduces the “Virtual User” concept-an autonomous entity streamlining user-device interactions in the digital realm. The research proposes, elucidates, and evaluates a Cloud infrastructure integrating the Virtual User into the SIoT paradigm. This novel approach offers a modular, extendable, and secure communication platform, marking the first Cloud solution tailored for the Virtual User concept, leveraging SIoT virtualization through containerization and automated service setup processes.
{"title":"Enabling a Scalable and Adaptive Cloud Infrastructure for Virtual Users in the Social Internet of Things","authors":"Silvia Corpino, M. Anedda, M. Fadda, D. Giusto, R. Girau","doi":"10.1109/CCNC51664.2024.10454717","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454717","url":null,"abstract":"The Internet of Things (IoT) is a global network of intelligent interconnected objects, enabling remote recognition, detection, and control. Through virtualization, these devices exchange knowledge in the Cloud, bridging physical and virtual worlds. However, the rapid growth in connected objects and data production necessitates innovative system designs. While virtualization offers scalability and flexibility, it proves insufficient alone. Recent studies recommend integrating social network concepts into IoT, forming the Social Internet of Things (SIoT). SIoT, mirroring human social networks, enhances smart devices with relational capabilities, addressing challenges in managing the surge in connected devices. This paper introduces the “Virtual User” concept-an autonomous entity streamlining user-device interactions in the digital realm. The research proposes, elucidates, and evaluates a Cloud infrastructure integrating the Virtual User into the SIoT paradigm. This novel approach offers a modular, extendable, and secure communication platform, marking the first Cloud solution tailored for the Virtual User concept, leveraging SIoT virtualization through containerization and automated service setup processes.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"15 1","pages":"376-379"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454661
Siya Bao, Yiqun Jin
Earnings meeting transcripts contain valuable information relevant to investment decision-making, and reflect firm's future performance such as sales revenue forecasts. In this paper, we proposed a BERT-based model to predict whether the actual sales beat the forecast using long-text Japanese EM transcripts. According to the experiment results, our proposed method outperforms the five conventional methods with an improvement ≥ 4% in accuracy.
收益会议记录包含与投资决策相关的宝贵信息,反映了公司的未来业绩,如销售收入预测。在本文中,我们提出了一种基于 BERT 的模型,利用日语 EM 长文本记录来预测实际销售额是否超过预测值。实验结果表明,我们提出的方法优于五种传统方法,准确率提高了 ≥ 4%。
{"title":"BERT-Based Prediction Model of Management Sales Forecast Error Using Japanese Firms' Earnings Meeting Transcripts","authors":"Siya Bao, Yiqun Jin","doi":"10.1109/CCNC51664.2024.10454661","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454661","url":null,"abstract":"Earnings meeting transcripts contain valuable information relevant to investment decision-making, and reflect firm's future performance such as sales revenue forecasts. In this paper, we proposed a BERT-based model to predict whether the actual sales beat the forecast using long-text Japanese EM transcripts. According to the experiment results, our proposed method outperforms the five conventional methods with an improvement ≥ 4% in accuracy.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"13 7","pages":"1066-1067"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454828
Diego Mendez, Marco Zennaro, Moez Altayeb, Pietro Manzoni
As context-aware location-based services (LBS) become increasingly important in many Internet of Things (IoT) verticals, such as logistics or industry 4.0, indoor localization is now an essential feature to be integrated in these solutions. For this purpose, fingerprinting-based solutions arise as a feasible solution, especially when integrating artificial intelligence on the edge, supported by computational and memory-restricted embedded devices, as it does not depend on a cloud-based deployment. In this work, we integrate this new paradigm, known as TinyML, and compare the implementation of a machine learning (ML) model when using only WiFi Received Signal Strength Indicator (RSSI) or WiFi Channel State Information (CSI) data. We tested two different scenarios, a single sample or time series, with different configurations of the trained neural network. Our results show that a CSI data ML model always outperforms an equivalent RSSI approach, with a massive difference in performance for the time-series case.
{"title":"On TinyML WiFi Fingerprinting-Based Indoor Localization: Comparing RSSI vs. CSI Utilization","authors":"Diego Mendez, Marco Zennaro, Moez Altayeb, Pietro Manzoni","doi":"10.1109/CCNC51664.2024.10454828","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454828","url":null,"abstract":"As context-aware location-based services (LBS) become increasingly important in many Internet of Things (IoT) verticals, such as logistics or industry 4.0, indoor localization is now an essential feature to be integrated in these solutions. For this purpose, fingerprinting-based solutions arise as a feasible solution, especially when integrating artificial intelligence on the edge, supported by computational and memory-restricted embedded devices, as it does not depend on a cloud-based deployment. In this work, we integrate this new paradigm, known as TinyML, and compare the implementation of a machine learning (ML) model when using only WiFi Received Signal Strength Indicator (RSSI) or WiFi Channel State Information (CSI) data. We tested two different scenarios, a single sample or time series, with different configurations of the trained neural network. Our results show that a CSI data ML model always outperforms an equivalent RSSI approach, with a massive difference in performance for the time-series case.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"64 8","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454643
Anan Sawabe, Y. Shinohara, Takanori Iwai
Private mobile networks, such as local 5G, have attracted the attention of industry players who expect flexible radio resource allocation by methods such as time-division duplex (TDD) scheduling based on the uplink and downlink traffic demand of their solutions. However, there are two challenges when communicating using TCP congestion control algorithms (CCAs) over the TDD link: TDD-induced ACK-waiting time and misestimating congestion states due to deterministic delay variation caused by TDD scheduling. In this paper, we propose a TDD-aware TCP pacing method for improving TCP throughput by pacing the sending time between two consecutive segments within the ACK-waiting time. We determine the pacing rate on the basis of the TDD-induced delay variation for sending TCP segments within allocated TDD slots while reducing round-trip time (RTT). We evaluate the performance of our method by using a network simulator (ns-3). TCP pacing improves throughput by about 10–70% compared with when there is no pacing, especially for TCP Illinois. We also verify that our TDD-aware pacing improves throughput by about 10% compared to the default pacing rate on the Linux kernel.
{"title":"Revisiting TCP Pacing for Throughput Performance Enhancement Over TDD Band in Private Mobile Networks","authors":"Anan Sawabe, Y. Shinohara, Takanori Iwai","doi":"10.1109/CCNC51664.2024.10454643","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454643","url":null,"abstract":"Private mobile networks, such as local 5G, have attracted the attention of industry players who expect flexible radio resource allocation by methods such as time-division duplex (TDD) scheduling based on the uplink and downlink traffic demand of their solutions. However, there are two challenges when communicating using TCP congestion control algorithms (CCAs) over the TDD link: TDD-induced ACK-waiting time and misestimating congestion states due to deterministic delay variation caused by TDD scheduling. In this paper, we propose a TDD-aware TCP pacing method for improving TCP throughput by pacing the sending time between two consecutive segments within the ACK-waiting time. We determine the pacing rate on the basis of the TDD-induced delay variation for sending TCP segments within allocated TDD slots while reducing round-trip time (RTT). We evaluate the performance of our method by using a network simulator (ns-3). TCP pacing improves throughput by about 10–70% compared with when there is no pacing, especially for TCP Illinois. We also verify that our TDD-aware pacing improves throughput by about 10% compared to the default pacing rate on the Linux kernel.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"71 7","pages":"863-868"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454873
Francesco Apollonio, Luca Bedogni, Giacomo Gori, A. Melis, M. Prandini
Location based services (LBS) are leveraged in everyday services and applications, as they can provide contextual and relevant information for the user needs. These services require the location of the user to be sent along with other relevant information, to provide the data in return that is relevant to the sent position. Although this opens up exciting scenarios for users, it has also been studied since it encompasses several potential privacy issues, which range from the re-identification of the user to the discovery of habits and routines. In this work, we present a study on the tradeoff between the information quality obtained from an LBS and the location precision sent by the user. Our results indicate that by sending out queries with imprecise location enhances the privacy of the users, while still providing a satisfactory quality of information.
{"title":"On the Trade-Off Between Privacy and Information Quality in Location Based Services","authors":"Francesco Apollonio, Luca Bedogni, Giacomo Gori, A. Melis, M. Prandini","doi":"10.1109/CCNC51664.2024.10454873","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454873","url":null,"abstract":"Location based services (LBS) are leveraged in everyday services and applications, as they can provide contextual and relevant information for the user needs. These services require the location of the user to be sent along with other relevant information, to provide the data in return that is relevant to the sent position. Although this opens up exciting scenarios for users, it has also been studied since it encompasses several potential privacy issues, which range from the re-identification of the user to the discovery of habits and routines. In this work, we present a study on the tradeoff between the information quality obtained from an LBS and the location precision sent by the user. Our results indicate that by sending out queries with imprecise location enhances the privacy of the users, while still providing a satisfactory quality of information.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"77 1","pages":"994-997"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454852
Han Jang, Youngbin Jin, Dongjun Lee, Ben Lee
CFDP and PFCD page allocation schemes are commonly adopted for datacenter SSDs. However, they have limitations on improving read performance as their fixed allocation unit of a single page causes the layout of related data to be dispersed. This paper proposes the Dynamic Clustering Page Allocation scheme, which dynamically adjusts the allocation unit by considering the characteristics of application-level I/Os to find an optimal trade-off between the utilization of channel-level parallelism and internal flash-chip features. Our simulation study shows that the DCPA scheme improves throughput for read-intensive applications compared to CFDP/PFCD by a factor of 1.59 – 3.15.
{"title":"Dynamic Clustering Page Allocation for Read-Intensive Multimedia Streaming Applications","authors":"Han Jang, Youngbin Jin, Dongjun Lee, Ben Lee","doi":"10.1109/CCNC51664.2024.10454852","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454852","url":null,"abstract":"CFDP and PFCD page allocation schemes are commonly adopted for datacenter SSDs. However, they have limitations on improving read performance as their fixed allocation unit of a single page causes the layout of related data to be dispersed. This paper proposes the Dynamic Clustering Page Allocation scheme, which dynamically adjusts the allocation unit by considering the characteristics of application-level I/Os to find an optimal trade-off between the utilization of channel-level parallelism and internal flash-chip features. Our simulation study shows that the DCPA scheme improves throughput for read-intensive applications compared to CFDP/PFCD by a factor of 1.59 – 3.15.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"69 6","pages":"84-89"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454886
Chiara Brunelli, Gianmarco Pappacoda, Ivan D. Zyrianoff, L. Bononi, M. D. Felice
Promoting sustainable water usage is a critical imperative across all sectors of society. Households are no exception since a significant portion of water is wasted daily due to inefficient appliances or improper habits. Thus, there is a need for innovative solutions that not only improve water utilization but also raise residents' awareness about this issue. This paper presents a promising solution leveraging the Internet of Things (IoT) and Machine Learning (ML) techniques to detect water wastage stemming from sink usage automatically. We have designed and developed a low-cost prototype equipped with an array of sensors, including a microphone, an ultrasonic sensor, and a PIR, to monitor sink usage. A deep learning model based on Gated Recurrent Units (GRU) has been trained to classify the wastage events. To validate our concept, we have gathered a small dataset relative to nine common daily water usage activities through the IoT prototype. Our preliminary findings demonstrate the feasibility of our solution, with an average accuracy exceeding 90% in detecting wastage events.
{"title":"Water Wastage Detection in Smart Homes Through IoT and Machine Learning","authors":"Chiara Brunelli, Gianmarco Pappacoda, Ivan D. Zyrianoff, L. Bononi, M. D. Felice","doi":"10.1109/CCNC51664.2024.10454886","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454886","url":null,"abstract":"Promoting sustainable water usage is a critical imperative across all sectors of society. Households are no exception since a significant portion of water is wasted daily due to inefficient appliances or improper habits. Thus, there is a need for innovative solutions that not only improve water utilization but also raise residents' awareness about this issue. This paper presents a promising solution leveraging the Internet of Things (IoT) and Machine Learning (ML) techniques to detect water wastage stemming from sink usage automatically. We have designed and developed a low-cost prototype equipped with an array of sensors, including a microphone, an ultrasonic sensor, and a PIR, to monitor sink usage. A deep learning model based on Gated Recurrent Units (GRU) has been trained to classify the wastage events. To validate our concept, we have gathered a small dataset relative to nine common daily water usage activities through the IoT prototype. Our preliminary findings demonstrate the feasibility of our solution, with an average accuracy exceeding 90% in detecting wastage events.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"68 10","pages":"372-375"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-06DOI: 10.1109/CCNC51664.2024.10454681
Lorenzo Perinello, O. Gaggi
From the first static webpages to Web 3.0 and ubiquitous devices, technologies enhance and influence our lives today more than ever. Mobile devices, like smartphones, allow users to download millions of applications developed with different programming languages, frameworks, and quality standards. In this context, accessibility is a critical point that needs to be persecuted not only by developers, but even offered as an out-of-the-box feature by mobile technologies so that modern mobile applications can improve the lives of all users. In this paper, we investigate how two frameworks for cross-platform development, Flutter and React Native, address accessibility issues, and we propose some solutions when the official documentation does not.
从最初的静态网页到 Web 3.0 和无处不在的设备,技术比以往任何时候都更能促进和影响我们今天的生活。智能手机等移动设备允许用户下载数以百万计使用不同编程语言、框架和质量标准开发的应用程序。在这种情况下,可访问性是一个关键点,不仅需要开发人员的努力,甚至需要移动技术提供开箱即用的功能,这样现代移动应用程序才能改善所有用户的生活。在本文中,我们将研究 Flutter 和 React Native 这两个跨平台开发框架是如何解决可访问性问题的,并提出一些官方文档中没有提及的解决方案。
{"title":"Accessibility of Mobile User Interfaces using Flutter and React Native","authors":"Lorenzo Perinello, O. Gaggi","doi":"10.1109/CCNC51664.2024.10454681","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454681","url":null,"abstract":"From the first static webpages to Web 3.0 and ubiquitous devices, technologies enhance and influence our lives today more than ever. Mobile devices, like smartphones, allow users to download millions of applications developed with different programming languages, frameworks, and quality standards. In this context, accessibility is a critical point that needs to be persecuted not only by developers, but even offered as an out-of-the-box feature by mobile technologies so that modern mobile applications can improve the lives of all users. In this paper, we investigate how two frameworks for cross-platform development, Flutter and React Native, address accessibility issues, and we propose some solutions when the official documentation does not.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"5 2","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}