THE EFFECTS OF VARIED ANIMATION IN MULTIMEDIA LEARNING: IS THE EXTRA EFFORT WORTHY? |
Author : Riaza Mohd Rias, Halimah Badioze Zaman |
Abstract | Full Text |
Abstract : Animation in multimedia is said to be beneficial to learning especially when the learning material demands visual movements. The emergence of 3- Dimensional animated visuals has extended the presentation mode in multimedia learning. It is said that animated visuals in a 3-D representation not only possess motivational value that promotes positive attitudes toward instruction but also facilitate learning when the subject matter requires dynamic motion and 3-D visual cue. The field of computer science, especially in operating systems concepts uses an array of abstract concepts such as virtual memory, paging, fragmentations etc to describe and explain the underlying processes. Various studies together with our own observations strongly indicate that students often find these concepts difficult to learn, as they cannot easily be demonstrated. This study investigates the effects of animation on student understanding when studying a complex domain in computer science, that is, the subject of memory management concepts in operating systems. A multimedia learning system was developed in two different versions: 2-D animation and 3- D animation. A hundred and one students took part in this study and they were assigned into one of these groups. All the students who took part in this experiment had low prior knowledge in this subject and after viewing the treatment, they were asked to take a test which tested them for recall and transfer knowledge. This test was used to determine if, in fact, improved learning actually occurred and which version of the animation produced the better outcome. Initial analysis of results indicates no statistical difference between the scores for the two versions and suggests that animations, by themselves, do not necessarily improve student understanding. |
|
MOBILE COMMERCE APPROACH BASED ON MOBILE AGENT |
Author : Oussama Zerdoumi, Okba Kazar, Saber Benharzallah |
Abstract | Full Text |
Abstract : Telecommunications technologies are advanced; they introduced new technologies to meet the needs of individuals and organizations to make commercial transactions, where we find the birth of e-commerce after the emergence of the Internet. But this approach has limits like the use of a client / server model, which limit the use of these transactions in anytime and anywhere. Recently and after the emergence of the wireless networking, the commerce increase the range of the E-commerce applications in anytime and anywhere by the technology of mobile commerce. In this article, we propose an approach of mobile commerce based mobile agent with the aim to deploy the mobile agent paradigm for mobile commerce applications. |
|
GENETIC AGENT TO OPTIMIZE THE AUTOMATIC GENERALIZATION PROCESS OF SPATIAL DATA |
Author : Brahim lejdel, Okba kazar |
Abstract | Full Text |
Abstract : The automatic generalization processes consist to derive less detailed spatial data from data too detailed. The objective of this process is to provide the user a spatial data adapted to those needs. Several approaches are proposed to automate this process. These approaches include the agent-based approach. But the central problem of this approach is the selection of the optimal action performed by the agent in a given moment. In this paper, we proposed an approach that can optimize this process by satisfying the cartographic constraints. Our approach consist to provide agents geographic, genetic patrimony, to enable them choosing the optimal action, from where the concept of genetic agent. |
|
GRAPH SPLITTING BASED SELF-ORGANIZATION APPROACH FOR ENERGY AND ROUTING OPTIMIZATION |
Author : Ridha Ouni |
Abstract | Full Text |
Abstract : Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. Both self-organization and routing protocols significantly impact the energy consumption and therefore the network life time. This paper surveys recent self-organization and routing protocols for sensor networks and proposes enhanced approaches for low duty cycle and more reliable environment. We compare some of the relays-based protocols in a random graph model. Simulation results will show the impact of a graph splitting approach on the active node set and the topology connectivity. Moreover, we analyze the performance of that approach in terms of transmitted and received packet rate. |
|
WIRELESS AD-HOC NETWORK UNDER BLACK-HOLE ATTACK |
Author : Shree Om, Mohammad Talib |
Abstract | Full Text |
Abstract : Wireless Ad-hoc Network is a temporary and decentralized type of wireless network. Due to security vulnerabilities in the routing protocol currently, this type of network is unprotected to network layer attacks. Black-hole attack is such a type of attack and is a Denial-of-Service (DoS) attack. Due to its nature, the attack makes the source node send all the data packets to a Black-hole node that ends up dropping all the packets. The aim of this paper is to reflect light on the severe effects of a Black-hole attack in a Wireless Ad-hoc network and the drawbacks of the security mechanisms being used for the mitigation of this attack. |
|
INVESTIGATION OF MALWARE DEFENCE AND DETECTION TECHNIQUES |
Author : Farid Daryabar, Ali Dehghantanha, Hoorang Ghasem Broujerdi |
Abstract | Full Text |
Abstract :Malwares are considered as a major threat vector which can be potentially caused huge damage to both network infrastructure as well as network applications. In this paper, different techniques such as repacking, reverse engineering and hex editing for bypassing host-based Anti Virus (AV) signatures are illustrated, and the description and comparison of different channels and methods when malware might reach the host from outside the networks are demonstrated. After that, bypassing HTTP/SSL and SMTP malware defences as channels are discussed. Finally, a new malware detection technique base on honeynet systems is discussed and its strengths and weaknesses were highlighted. |
|
EFFICIENT FINGERPRINT CLASSIFICATION USING SINGULAR POINT |
Author : Ali Ismail Awad, Kensuke Baba |
Abstract | Full Text |
Abstract : Singular point is one of the local ï¬ngerprint features, and it is used as a landmark due its scale and rotation immutability. Singular point charac- teristics have been widely used as a feature vector for many ï¬ngerprint classiï¬cation approaches. This paper introduces a new ï¬ngerprint classi- ï¬cation method which utilizes a singular point as a reference point to part an input image. The key idea of the proposed classiï¬cation method is di- viding ï¬ngerprint into small sub-images using singular point location, and then, creating distinguished patterns for each class using frequency domain representation for each sub-image. The performance evaluation has been conducted for the singular point detection method and the proposed clas- siï¬cation algorithm with different database. Both the processing time and the classiï¬cation accuracy are considered as key issues of the classiï¬cation approach. The experimental work shows that the achieved classiï¬cation ac- curacy over FVC2002 database subsets is up to 83:7% with considerable processing time and robustness to scale, shift, and rotation. |
|
MOBILE BUSINESS APPROACH BASED ON MOBILE AGENT |
Author : Ahmed Aloui, Okba Kazar |
Abstract | Full Text |
Abstract : Users today want the opportunity to make (or manage) a businesses in anytime and anywhere via their mobile devices. This paper proposes the architecture with mobile agent for the mobile businesses (m-business). M-business appeared as the promising approach to drive the vague following one of electronic business (e-business). Most of the e-business [9] applications uses the traditional model client/server in which a commercial operation requires generally a link of stable communication being established between the customer and the server, and the traditional approach client/server [8] constitutes an obstacle to the development of application of m-business. The proposed architecture introduces several advantages: in the first place, allow the consumers to manage their commercial business driven by types of mobile devices (phones, PDAs, etc. ....) at any time and wherever. Secondly, minimize the waiting time of the customer, and the quantity of transferring information. Third, this architecture addresses the problem of time limited and expensive connection for mobile users. The Mobile agents will be used on a single level: research agent. Every research mobile agent will be used to visit the target server site of the application to collect the information's for his client, which allows it to interact locally with a server, and so to reduce the traffic on the network by transmitting only the useful data. |
|
FLEXI-ADAPTOR; AN AUTOMATED WEB CONTENT ADAPTATION FOR MOBILE DEVICES |
Author : Rajibul Anam, Chin Kuan Ho, Tek Yong Lim |
Abstract | Full Text |
Abstract : Mobile web browsing usually involves a lot of horizontal and vertical scrolling, which makes web browsing time-consuming. A user may be interested in a section of a web page, which may not fit to the mobile screen and requires more scrolling in both directions. In this paper, we propose to address this problem by displaying the block title and hide the block body contents from a large web page while maintaining their semantics, which display only the condensed information. The Flexi-adaptor, provides the block titles and reduce unnecessary information by allowing its users to see the most relevant blocks of the page. The Flexi- adaptor categorized each object of the web page as menu, block title and main content. Assign a weight to each object of the block by analyzing the object elements. It uses depth first traversal algorithm to select blocks, and delivers them to handheld devices. We conduct a usability test and result shows that Flexi-adapter is an effective adaptation system. The proposed solution improves web content accessibility and delivers the target contents to the users. |
|
EXPLORING RUBY AND JAVA INTEROPERABILITY FOR BUILDING CONVERGED WEB AND SIP APPLICATIONS |
Author : Edin Pjanic, Amer Hasanovic |
Abstract | Full Text |
Abstract : In this paper we present a Ruby infrastructure that can be used for rapid development of Web applications with SIP signaling capabilities. We construct this infrastructure by combining the Java based Cipango SIP/HTTP Servlet Application Server with the Ruby on Rails Web development framework. We provide detailed explanations of the steps required to build this infrastructure and produce a realistic SIP application with an integrated Web interface. The described infrastructure allows Ruby applications to utilize the entire functionality provided by the SIP Servlet API and can be used as a good starting point for the development of Ruby-based domain specific languages for the SIP protocol. We also compare the proposed infrastructure with the existing Ruby frameworks for SIP application development. Furthermore, we present the performance analysis results of the demo application using SIPp, a SIP traffic generator tool. |
|
SOFTWARE ENGINEERING OF AUGMENTED REALITY REMEDIAL PARADIGM FOR NEGATIVE NUMBERS: AN ALGORITHM VISUALIZATION OF CORRECT THINKING PROCESS FLOWCHART |
Author : Elango Periasamy, Halimah Badioze Zaman |
Abstract | Full Text |
Abstract : The aim of this study was about integrating augmented reality as visualization interface tool in software engineering process for mathematical remedial works. This study was based on the incorrect thinking process in solving negative numbers subtraction operation involving two integers then created an algorithm for visualization of correct thinking process in solving it. The respondent of this study were 124 students aged 14 years old from two secondary schools in Malaysia. This research was divided into five stages and this paper is about stage three, four and five. The findings were an algorithm for visualization of correct thinking process (AVCTP) and ethnographic approach was used with five students needing remediation in subject domain to identify its effectiveness. Then, a flowchart for AVCTP was created in the process of assisting software engineering process of augmented reality visualization based remedial works in subject domain. |
|
KNOWLEDGE BASED APPROACH TO SOFTWARE DEVELOPMENT PROCESS MODELING |
Author : Jan Kozusznik, Svatopluk Stolfa |
Abstract | Full Text |
Abstract : Modeling a software process is one way a can company decide which software process and/or its adjustment is the best solution for the current project. Modeling is the way the process is presented or simulated. Since there are many different approaches to modeling and all of them have pros and cons, the very first task is the selection of an appropriate and useful modeling approach for the current goal and selected conditions. In this paper, we propose an approach based on ontologies. |
|
SMARTPHONE FORENSICS: A CASE STUDY WITH NOKIA E5-00 MOBILE PHONE |
Author : SeyedHossein Mohtasebi, Ali Dehghantanha, Hoorang Ghasem Broujerdi |
Abstract | Full Text |
Abstract : In the past few years, there has been an exponential increase in the number of smartphone users. By its very nature, smartphone saves and manages vast amount of information pertaining to its owner. As a result, this ubiquitous device is being regarded as a valuable evidence item in forensic investigations. Nevertheless owing to disparity in smartphone models, retrieving whole data from all models using predefined instructions and tools is not always possible. This paper studies demo or trial versions of four widely used mobile forensics tools namely, Oxygen Forensic Suite, Paraben's Device Seizure, Mobile Internal Acquisition Tool, and MOBILedit! Forensic Lite in extracting data from a Nokia E5-00 smartphone. The result of this paper presents that existing toolkits are deficient to gather volatile data as well as deleted information. |
|