REMOTE MONITORING USING WIRELESS CELLULAR NETWORKS |
Author : Akram Aburas, Khalid Al-Mashouq, Zeyad Al-Hokail |
Abstract | Full Text |
Abstract :Remote sensing and alerting exists from long time and it has been under focus to improve the quality of sensing and alerting from long time. Due to major technology innovation in communication and wireless sensor technology, it made possible for common man and business magnets to use this technology to their industries. This research proposes value added service model to an existing model QMeter™ to exploit the same model for remote monitoring for other industries. QMeter™ is used for monitoring and alerting and call quality and bandwidth quality for mobile operator in particular. This particular research uses the same model and utilizes the short message service of the mobile operator as a part of VAS service to remotely monitor, alert and provide the reports. |
|
PAPER REGISTRATION TO REPOSITORY FROM RESEARCHER DATABASE |
Author : Kensuke Baba, Masao Mori |
Abstract | Full Text |
Abstract :This paper introduces a system that realizes a simultaneous registration of scholarly papers for both a researcher database and a repository. An institutional repository is a method to realize free access to research outputs. However, the number of scholarly papers archived in institutional repositories is extremely small compared to the papers practically produced by researchers. The authors considered that an obstacle to increase the number is the efforts of researchers to register their papers to institutional repositories, and they developed a system that realizes a simultaneous registration of papers to the researcher database and the institutional repository in their university. This paper introduces the main idea and the details of the implementation of the system. |
|
A FRAMEWORK FOR MODELING MEDICAL DIAGNOSIS AND DECISION SUPPORT SERVICES |
Author : Sankha Amarakoon, Ajantha Dahanayake, Bernhard Thalheim |
Abstract | Full Text |
Abstract :This paper introduces a framework and a service model improving the understanding of domain requirements acquisition for IT-service systems development. The service model fills the gap in domain specific requirements elicitation through its base in the classical rhetorical frame introduced by Hermagoras of Temnos and through the interpretation of the domain in terms of service offerings. The model is validated by a real-life situation – to establish an ophthalmologic Disease Diagnosis Decision Support Network (DDDSN) for age-related macular degeneration (ARMD) treatments. |
|
NNET BASED AUDIO CONTENT CLASSIFICATION AND INDEXING SYSTEM |
Author : Muhammad Al-Maathidi, Francis Li |
Abstract | Full Text |
Abstract :Rapid advancement in computers and internet technology has led large volume of multimedia files. The archiving and digitization of the old media contents also contributes to the growth of the digital library. The usefulness of these collections is largely dependent upon the availability, information retrieval, and search tools. Soundtracks are information-rich and there is a lot of related information can be extracted from them; that enabling metadata generation and semantic search. This paper proposes a machine learning system based on neural network; the system use set of audio features that belong to three different feature spaces as a training/testing features; this regime will presents a generic structure of a preprocessing stage for automated metadata generation. |
|
FORMAL SPECIFICATION FOR REAL-TIME OBJECT ORIENTED SYSTEMS WITH UML DESIGN |
Author : Benjamin D. Horne, Vinitha Hannah Subburaj, Joseph E. Urban |
Abstract | Full Text |
Abstract :Traditionally, real-time software system development focuses on low-level programming techniques to increase timeliness and operate within constraints; however, more recently higher-level, object-oriented methodologies are being used to create real-time software systems. This increase in object-oriented design for real- time systems is due to the improved use of active objects and concurrency in object-oriented languages. Real-time aspects have not only improved in many programming languages, but these real-time constraints are becoming more essential in general object-oriented software development. Consequently, the specification of real-time object-oriented systems is becoming important in software development processes. One of the many tools used to specify software is an executable specification language called Descartes. Descartes relates output data to input data as a function of the input data through a tree structure notation called "Hoare trees." This useful specification structure has been extended and supported for several types of systems since the language's creation in 1977. In particular, Descartes has been extended for the specification of real-time systems and for object-oriented designed systems. In spite of this, the combination of the two extensions for specification of real-time object oriented (RTOO) systems has not been tested. Thus, the main objective was to validate that the combination of the two Descartes extensions either satisfied the needed specification for RTOO systems or that the language needed to be additionally extended. To gain further verification of these united Descartes extensions, the Unified Modeling Language (UML) was used for comparison in aspects of design and effectiveness. In this research effort, UML 2.0, a widely used modeling language was used and analyzed to model security requirements along with the application requirements for real time object oriented systems. The outcome from this research effort was efficient modeling notations included to UML 2.0 modeling notations that can be used to specify security requirements in the beginning phase of software engineering, when application requirements are specified. |
|
A PRACTICAL PROXY SIGNATURE SCHEME |
Author : Sattar Aboud, Sufian Yousef |
Abstract | Full Text |
Abstract :A proxy signature scheme is a variation of the ordinary digital signature scheme which enables a proxy signer to generate signatures on behalf of an original signer. In this paper, we present two efficient types of proxy signature scheme. The first one is the proxy signature for warrant partial delegation combines an advantage of two well known warrant partial delegation schemes. This proposed proxy signature scheme is based on the difficulty of solving the discrete logarithm problem. The second proposed scheme is based on threshold delegation the proxy signer power to sign the message is share. We claim that the proposed proxy signature schemes meet the security requirements and more practical than the existing proxy signature schemes. |
|
CONSIDERATIONS FOR SOCIAL NETWORK SITE (SNS) USE IN EDUCATION |
Author : Alan Weber |
Abstract | Full Text |
Abstract :Social Networking Sites (SNSs) such as Facebook, Google+, Myspace, LinkedIn and Twitter have now become commonplace in international virtual space. Approximately 75% of all online adults maintain at least one social network profile. As SNSs are becoming more ubiquitous, they are also becoming more sophisticated and many operate on a free service model based on advertizing revenues. Free services are obviously attractive to educational institutions in the developing world with small education budgets. With the exception of sites such as Edmodo, SNSs, however, are generally commercially driven and educational goals and purposes were not part of their original design: educational uses have generally been the result of the creative adaptation of SNSs by educators and application builders. Therefore some serious issues of data privacy, trust, and security have arisen since both the educational, medical, and medical education realms operate in the U.S. under strict data protection laws such as HITECH, HIPAA, FERPA, and COPPA. Potential educational advantages of SNSs are similar to general e- learning benefits such as: anytime / anywhere instruction, lower cost for institutions, knowledge crowdsourcing, interconnectivity and facilitation of online collaborative work, peer-to-peer instruction, and the provision of virtual training scenarios (role-playing) not available or practical in the non-virtual world. However, the business models of many SNSs as essentially advertizing platforms and as a means of tracking online behaviors which can be monetized (with non-transparent policies of data collection and retention) raise some key concerns for educators. |
|
EVALUATION AND IMPROVEMENTS TO MOTION GENERATION IN NS2 FOR WIRELESS MOBILE NETWORK SIMULATION |
Author : Raid Alghamdi, John DeDourek, Przemyslaw Pochec |
Abstract | Full Text |
Abstract :Simulation of mobile networks requires reliable movement generation. Evaluation of the performance of the existing random movement generator used in ns2 shows a bias for placing the mobile nodes in the center of the experimental area. Applying the quadrat count and the VMR tests confirms the tendency for clustering of nodes. To remedy this problem we propose, and implement a different method for random movement generation for use with the ns2 simulator, and show that our movement generator improves the randomness of the node distribution during the simulation. |
|