Skip to main content

2019 | Buch

Applied Computing and Information Technology

insite
SUCHEN

Über dieses Buch

This book presents the scientific outcomes of the 6th International Conference on Applied Computing and Information Technology (ACIT 2018), which was held in Kunming, China on June 13–15, 2018. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. The book includes research findings on all aspects (theory, applications and tools) of computer and information science and discusses the practical challenges encountered and the solutions adopted to address them.

The book features 13 of the conference’s most promising papers.

Inhaltsverzeichnis

Frontmatter
Factors Affecting Satisfaction of NCS Based Educational System
Abstract
The purpose of this study is to verify the relationship between quality factors, expected value and educational satisfaction of NCS education system for university students A total of 289 college students from Seoul and Gyeonggi provinces were selected for the study and a questionnaire survey was conducted from March to April 2017. The collected questionnaires were analyzed using SPSS 22.0 and AMOS 22.0 statistical programs and the following study results were derived. First, responsibility, contentability, assurance and usefulness have significant influence on perceived value, and reactivity and tangibility have no effect on quality factor of NCS education system. Second, responsibility, contentability, assurance and usefulness have a significant effect on educational satisfaction, and reactivity and tangibility have no effect on educational satisfaction. Finally, the perceived value of the NCS education system has a significant effect on educational satisfaction. Therefore, this study suggested implications for the satisfaction of the values and educational satisfaction of the students in terms of educational service quality provided by the NCS education system.
Soo-Yeon Yoon, Yang-Ha Chun, Jong-Bae Kim
Model-Driven Development of Mobile Applications Allowing Role-Driven Variants
Abstract
This research aims to simplify the creation of applications for mobile platforms by developing a high-level and platform independent model of an application, and automatically transforming this high-level model to platform specific code. The research method is a combination of the model-driven development (MDD) approach in software development and application of techniques in the field of human-computer interaction (HCI) particularly on user centered system design. This research involves developing a graphical modeling language which is specific to mobile applications, and coming up with a generic algorithm for the conversion of this graphical model into code. The main focus of the research however, will be on the design of the graphical model, and the interaction techniques which will allow non-expert people 1 to create specialized mobile applications with ease. Key research questions that need to be answered are: Which level of abstraction and modeling constructs are adequate for non-expert people to create specialized mobile applications? How can technical details such as device limitations, transmission of information to other devices or to the network, etc., be abstracted from the non-expert user as they model the application so that they can focus more on the design and logic of their application, but at the same time take advantage of advance capabilities of mobile devices (GPS, Bluetooth, Wi-Fi, etc.)? How can the design of interaction with other devices that connects to mobile applications become simpler? Do non-experts want the modeler interface to look like the actual application or do some high level form just like in UML would be enough?
Veiga Yamodo Marland, Haeng-Kon Kim
E-Learning Adaptation and Mobile Learning for Education
Abstract
Mobile learning through the use of mobile wireless technology allows anyone to access information and learning materials from anywhere around the globe. Mobile learning, through the use of mobile technology, will allow the users to access learning materials and information from anywhere, at any time at any cost. With mobile learning, students will be empowered because they can learn when and where they want to. They can use wireless mobile technology for formal and informal learning, where they can access personalized and additional learning materials from the Internet or from the host organization. This document is timely because there is significant growth in the use of mobile technology by people around the world, especially in developing countries. This study shows how mobile learning can transform the delivery of education and training.
Mechelle Grace Zaragoza, Haeng-Kon Kim, Ha Jin Hwang
Design and Evaluation of Soil pH IoT Sensor Attribute for Rice Agriculture in Central Africa
Abstract
The IoT platform is a crucial middleware that allows us to walk safely in the field of IoT agriculture. The Rice Intensification System (SRI) uses less water and improves rice yield through the synergy of several agronomic management practices around the world. Rice is a staple crop for many countries and is one of the three main food crops in Central Africa. Environmental stresses such as drought, salinity, disease, acidity and iron toxicity can limit growth and performance. In Central Africa, rice is grown mainly in the lowlands. Africa consumes 11.5 million tons of rice per year, of which 33.6% is imported. Import trends showed only a slight decrease of 55 000 tones, while rice production increased by 2.3 million tones. And Central Africa’s average self-sufficiency reached 37.9%. This is new way of more production in agriculture sector for saving a life have to be researched. The most natural one being the use of different machine in farm by connecting different sensors, connected devices, developing intelligent breeding systems as much as possible. In the paper, an architecture based on IoT agriculture is proposed after analyzing of soil organic. This work includes the expansion of rice management scales, including human resources, water and agricultural land; response strategies to irrigation during the drought; and the application of several agricultural water resources. Finally, it presents a architecture for IoT agriculture services based on cloud sensor infrastructure. Our results show that rice should be planted in lowland rice production systems in Central Africa.
Symphorien Karl Yoki Donzia, Hyun Yeo, Haeng-Kon Kim
A Study on the Architecture of Mixed Reality Application for Architectural Design Collaboration
Abstract
The purpose of this study is to elucidate the utilization of mixed reality technology in the field of Architectural design. For this purpose, this study introduces the mixed reality development in architectural design and construction business and suggests design collaboration service platform composed of mixed reality service server, which is a web service system for authoring and managing mixed reality contents, and terminal application that implements it in mixed reality environment.
The result of this research is that mixed reality contents can be used in a mixed reality environment after storing and setting the mixed reality contents on a server, and a collaboration environment can be implemented using an MR device. In addition, proposing a simple mixed reality teleconference system using a relay system to support remote conferencing in mixed reality environment.
Kiljae Ahn, Dae-Sik Ko, Sang-Hoon Gim
Exploring the Improvement of the Defense Information System
Abstract
This study of the information communication technology is intended to suggest Defense Information System (C4I) success model to improve the operational performance of the C4I system and to empirically verify the model. To this end, this study suggested information system quality (system quality, information quality, service quality), perceived usefulness and user satisfaction as antecedent factors affecting the operational performance of the C4I system and then analyzed the effect relationship between the antecedent factors and operational performance. Additionally, this study analyzed the moderating effect of use experiences and IS efficacy. This study is meaningful in that it empirically confirmed the factors affecting the operational performance of the C4I system, and suggested the theoretical foundation and the strategic directions for evaluating and improving the operational performance of the C4I system.
Donghyuk Jo
A Modern Solution for Identifying, Monitoring, and Selecting Configurations for SSL/TLS Deployment
Abstract
Some of the well-known vulnerabilities like DROWN, POODLE, and Heartbleed affect a subset of all possible configurations of protocols and cipher-suites in SSL/TLS protocol. Recently, new vulnerabilities are also frequently discovered and could be used to mount attacks on systems whose configurations are not updated in time or were misconfigured from the start. Thus, we provide an overview of the landscape of vulnerabilities relating to SSL/TLS protocol versions with estimated risk levels. Selecting the best configuration for a given use-case is a time-consuming task and testing a given configuration of a server for all known vulnerabilities is also difficult. Thus, there is a great motivation to create a new tool that abstracts the tedious parts of this process. Our new software solution can automatically scan and rate the configuration of servers and help in selecting suitable ones. The goal is to simplify testing and evaluation of server-side configurations of SSL/TLS and ciphersuites for the community and thus the software is released as an open source.
Lamya Alqaydi, Chan Yeob Yeun, Ernesto Damiani
Analyses of Characteristics of Changes in Cerebral Activation Status, Depending on Blood Types, in Response to Auditory Stimulation
Abstract
As there has recently been growing interest in the correlation between blood type and personality in various fields, including educational organizations, corporations, culture related businesses, etc., numerous studies have been performed, and the results of such studies have been increasingly applied to the aforementioned organizations. In particular, a book authored by Park Hee-Yeon (2006), titled “Blood Type Reveals the Personality”, showed that there is a correlation between blood type and temperament, or physical constitutions, which have been proved by results of many investigations and experiments conducted thus far. Based on such facts, it was considered that blood types are likely to affect the brain waves indicative of the status of human cerebral activities, and the purpose of this study was to analyze the patterns of variation of the cerebral activation status, depending on blood types, in response to external stimulation. The results of this study would provide the basis for classification of subjects, which is necessary for the selection of effective auditory stimulant sound sources in the process of neurofeedback therapy/training, inducing the users to modify their own brain waves for healing, and would also present the measures for the selection of efficient visual and auditory stimuli.
Jeong Hoon Shin, Hyo Won Jeon
An International Comparative Study on the Intension to Using Crypto-Currency
Abstract
Currently, various cryptocurrencies are being traded throughout the day for the whole 24 h via crypto-currency markets in this borderless virtual world. Many people invest in cryptocurrencies which can be utilized and replace existing currencies. Despite this, not many studies on actual demand for cryptocurrencies have been conducted yet. This research extensively applied UTAUT to study elements influencing intention of usage for cryptocurrencies. It also added economic feasibility, payment convenience, government regulation, and risk as independent variables and established an UTAUT model applying said independent variables. Particularly, this research seeks to figure how characteristics among countries respond to the intention of usage for cryptocurrencies by comparing Korea, China, and Vietnam.
Kyung-Jin Jung, Jung-Boem Park, Nhu Quynh Phan, Chen Bo, Gwang-yong Gim
Detection of Replay Attack Traffic in ICS Network
Abstract
The malicious codes and attacks against ICS today are becoming more advanced and intelligent. The security risk for ICS is increasing, and it’s becoming more important to secure the cyber safety of ICS from these security threats. Recent ICS not only uses serial communication protocol, but also an Ethernet-based control communication protocol. Malicious codes attacking ICS attempts to imitate the corresponding control protocol to insert malware into the payload for communication, or imitates normal control packets for malicious control or disabling of control devices. Also, multiple presentations exist on the possible scenarios of various cyber attack targeting. However, current IDS/IPS for ICS functions with technology to detect attacks based on a blacklist, and thus cannot detect attacks exhibiting new techniques. In order to solve these problems, there have been recent studies on white list based attack detection technology for practical application on ICS. However, current studies on white list based detection technology utilizes a white list based on IP address, service port number information, etc., and thus cannot be utilized to detect attacks exhibiting a replay pattern or in which only data value is changed inside a normal command. This study suggests a technology that can detect attacks exhibiting a replay pattern against ICS, using white list based detection and machine learning to educate control traffic and apply the results to actual detection.
Ki-Seob Hong, Hyo-Bin Kim, Dong-Hyun Kim, Jung-Taek Seo
CipherBit192: Encryption Technique for Securing Data
Abstract
Cryptography is an important component in securing and protecting sensitive and confidential data. It is a technique of encrypting data, hiding the process and produced a ciphered text. The Data Encryption Standard (DES) algorithm is considerably known for its branded encryption/decryption technique. To explore the advantage of its recognized cycle process and ciphertext representation. This paper presents the new algorithm based on mixed technique by substituting reverse scheme, swapping and bit-manipulation. This encryption technique is a concept that combines selected cryptographic technique that can reduce and save time processing encryption operation, offers simplicity, and extended mixed encryption key generation.
Benedicto B. Balilo Jr., Bobby D. Gerardo, Yungcheol Byun
Reciprocating Link Hierarchical Clustering
Abstract
A new clustering algorithm, called reciprocating link hierarchical clustering, is proposed which considers the neighborhood of the points in the data set in term of their reciprocating affinity, while accommodating the agglomerative hierarchical clustering paradigm. In comparison to six conventional clustering methods, the proposed method has been shown to achieve better results with cases of clusters of different sizes and varying densities. It successfully replicates the results of the mutual k-nearest neighbor method, and extends the capability to agglomerative hierarchical clustering.
Eric Goold, Sean O’Neill, Gongzhu Hu
Development of Infant Care System Application
Abstract
Newborn infants spend up to 70% their time asleep. Neonates sleep at least 16–18 h per day, and their sleep patterns are markedly different from the sleep patterns of older infants and adults. Ideal sleep prepares the child to learn when she is awake, and after the learning has taken place during the awake state, the critical processes of memory association occur during sleep. Now Clearly, sleep deprivation, whether it’s for an infant or parents who are involved needs to be addressed. The good news is that there are strategies you can use to get the rest you need. First, topics related to SIDS vulnerability, to better understand the role of learning during sleep in promoting infant survival are discussed. Second, the importance of making sure that infants are given the comfort they need in order to continuously sleep without disturbing the guardians. To address both issues of deprived sleep for infants and parents and Lasty, a mobile application for the system.
Mechelle Grace Zaragoza, Haeng-Kon Kim
Backmatter
Metadaten
Titel
Applied Computing and Information Technology
herausgegeben von
Prof. Dr. Roger Lee
Copyright-Jahr
2019
Electronic ISBN
978-3-319-98370-7
Print ISBN
978-3-319-98369-1
DOI
https://doi.org/10.1007/978-3-319-98370-7