Relationship between Security and Usability –
Authentication Case Study
by Miloslav Hub, Jan Capek, Renata
Myskova
Abstract:
In this paper there is discussed relation between seemingly independent aspects
of software quality – security and usability. This relation is demonstrated in
case study of password authentication. For this purposes a method of password
security is suggested and described in this paper. This method consists in
mathematical model of dictionary attack and brute force attack. This model is
used to break passwords gained from two studies. In these two studies different
groups of end users were instructed to select a password by a different way.
Afterwards, in security of selected passwords was examined and compared with
their usability and this relationship were examined.
Keywords:
Authentication, brute force attack, data security, dictionary attack, passwords,
usability
Full Paper, pp. 1-8
Adaptive Wireless Multipath Access Solution for Transport
Telematics
by Tomas Zelinka, Miroslav Svitek,
Tomas Starek, Zdenek Lokaj
Abstract:
Intelligent Transportation Systems solutions require availability of the
selectable range of wireless telecommunications services with guaranteed
coverage and service quality. Even though publically available mobile wireless
data services can usually offer acceptable service coverage and reasonable
pricing, providers’ portfolios mostly do not include guarantee of any data
services quality. Private solutions can frequently guarantee relevant quality of
provided service, however, such solutions are not typically ready for the wide
area mobile coverage. Authors of this paper propose mobile solution alternative
with more efficient quality as well as wide area coverage management based on
the dynamical seamless handover of the best possible service from the set of
just accessible different wireless alternatives. In contrary to the proposed
standards ISO TC204, WG16.1 (CALM) or IEEE 802.21 based on the L2 switching and
Policy-based Management (PBM) authors introduce alternative in category of the
“intelligent” routing, i.e. solution based and implemented exclusively on the
routing L3. Success of proposed solution is strongly dependent on efficient
adaptive decisions processes which are managing selection of the best possible
alternative between the available ones. Such approach has got remarkable
advantage in relatively simple system integration based dominantly on the SW
implementation with no or very limited additional requirements on mostly off
shelf available hardware.
Keywords:
Intelligent Transport System, Transport telematics, Multipath seamless
communications access service, Bayes statistics, Laplace density function,
adaptive approach
Full Paper, pp. 9-17
Path Loss Aspects of a Wireless Communication System for
Sensors
by T. Lkhagvatseren, F. Hruska
Abstract:
Over the past 10 years there have been rapid advances in wireless technologies
and an importance of a radio frequency (RF) communication system is expanding
day by day due to its advantages. In the meantime, a huge number of researchers
are investigating from the various aspects of such field. Electromagnetic wave
propagation in an indoor environment and, penetration trough environment medium
is still under consideration. In this paper, we reveal a measured result from
the different indoor environments for a various transmitted power levels and
frequencies. The experience can be used to application of a wireless
communication system between sensors and embedded system.
Keywords:
Communication, penetration, propagation, sensor, and wireless
Full Paper, pp. 18-26
Internal Versus External Cluster Validation Indexes
by Erendira Rendon, Itzel Abundez,
Alejandra Arizmendi, Elvia M. Quiroz
Abstract:
One of fundamental challenges of clustering is how to evaluate results, without
auxiliary information. A common approach for evaluation of clustering results is
to use validity indexes. Clustering validity approaches can use three criteria:
External criteria (evaluate the result with respect to a pre-specified
structure), internal criteria (evaluate the result with respect a information
intrinsic to the data alone). Consequently, different types of indexes are used
to solve different types of problems and indexes selection depends on the kind
of available information. That is why in this paper we show a comparison between
external and internal indexes. Results obtained in this study indicate that
internal indexes are more accurate in group determining in a given clustering
structure. Six internal indexes were used in this study: BIC, CH, DB, SIL, NIVA
and DUNN and four external indexes (F-measure, NMIMeasure, Entropy, Purity). The
clusters that were used were obtained through clustering algorithms K-means and
Bissecting-K-means.
Keywords:
Cluster validity, clustering algorithm, external indexes, internal indexes
Full Paper, pp. 27-34
ICT Integration of Public Protection and Disaster Relief:
Services for Fire and Rescue Personnel
by Jyri Rajamaki, Taina Hult, Paulinus
Ofem
Abstract:
In field operations of Public Protection and Disaster Relief (PPDR) services,
vehicles are the most important tools. Today, the vehicles are increasingly
dependent on ICT systems. PPDR responder’s need is to enhance mission critical
voice with broadband data. Command and control applications aboard a vehicle are
commonplace. There is a need to ease situational awareness and decision making
by utilizing sensor information, such as satellite or network based position
information, living video images. However, each country and even every single
user organization is developing their own solutions according to their
legislation and requirements, because uniform standards are missing. The Mobile
Object Bus Interaction (MOBI) research project is a kick off for creating a
common international ICT infrastructure for all PPDR vehicles. MOBI researches
possibilities to further develop and integrate ICT systems, applications and
services of PPDR vehicles. MOBI aims at starting the development of standards
used by like-minded countries and possibly with the European Commission, the
European Law Enforcement Agency EUROPOL and the European Agency for the
Management of Operational Cooperation at the External Borders FRONTEX. This
paper concentrates on services for fire and rescue personnel and researches the
Finnish fire and rescue environment and the ICT systems used in action. PPDR
services constitute a distributed system. Software development paradigms which
have been used in the past for distributed systems have inherent limitations
that do not support integration, interoperability and reusability. To contribute
towards resolving the well known issues of integration and interoperability
between ICT systems in emergency vehicles which often work in a collaborative
fashion, a preliminary investigation of the applicability of SOA and Web
Services Standards towards the optimization of ICT systems and services provided
by emergency vehicles is presented.
Keywords:
Data communications, Fire and rescue services, ICT, Professional mobile radio,
Public safety, Search and rescue, Serviceoriented architecture, Systems
integration, Web services
Full Paper, pp. 119-132
Business’ New Requirement: Information Systems Integration
– Methods and Technologies
by D. Litan, M. Velicanu, L. Copcea
Teohari, M. Teohari, A. M. Mocanu Virgolici, I. Surugiu, O. Raduta
Abstract:
Today, the integration of information systems has become a necessity due to the
fact that the big companies have developed over time, mostly, separate
information systems (which do not communicate between them) for the automation
of different activities. If in the beginning the “situation” seemed to be under
control, the boost in the number of customers, products, suppliers, etc. brought
about an acutely increasing need for the companies’ information systems to
communicate with each other. Also, in its turn, the current economic crisis has
increased the necessity to integrate the information systems within a company,
thus simplifying any means of controlling the business. That is why in this
paper we submit to your attention some types of information systems used by
companies (Enterprise Resource Planning - ERP, Customer Relationship Management
- CRM, Supply Chain Management - SCM) as well as possible ways of integrating
these systems (integration through business processes and services). On the
other hand, systems integration also implies integration of the data handled by
these systems, so we will consider also some ways of data integration
(databases, data warehouses) by means of technologies such as Oracle GoldenGate.
Finally, we will describe a technique for testing, the integrated operation of a
software product, more precisely, an integrated type of testing: Pairwise, a
powerful testing technique.
Keywords:
Customer Relationship Management, data integration, Enterprise Application
Integration, Enterprise Resource Planning, Geographical Information Systems,
Information Systems Integration, Supply Chain Management, Pairwise
Full Paper, pp. 133-145
Approached Evaluation of Rectangular Spiral Antenna
Parameters for UHF RFID Tag
by Makroum El Mostafa, Rifi Mounir,
Latrach Mohamed, Benbassou Ali
Abstract:
Radiofrequency identification is an emerging and promising technology for the
identification of individuals and goods: the automation of manual operation,
rapidity, precise information... the are many RFID technologies. In this
article, we are interested in the passive UHF RFID technology and especially to
the calculation of parameters of spirals rectangular antennas for RFID. First we
present a model based on the theory of diffraction by fine wires, we arrive at
an integro-differential equation, this equation can be solved by using the
method of moments. Although this method gives us a very good agreement with the
measure, it remains gourmand in calculation time. We then develop a method to
simplify the calculation of the parameters of spiral antenna for RFID tag
without resorting to numerical analysis methods. In high frequency, when
resonances appear, we introduce the propagation using the Transmission Line
Theory. Knowing that this theory doesn’t take into account neither common mode
currents nor lateral tracks of the loops. Then we introduce some improvements on
it. These improvements consist on the one hand to integrate common mode in this
theory decomposing excitations and on the other hand to correct the positions
and magnitudes of resonances by introducing lateral tracks of these loops. The
results obtained in this study highlight interesting prospects for future
studies.
Keywords:
Antennas, Spiral antennas, RFID tags, UHF RFID, Method of moments, S11
parameter, Transmission Lines Theory
Full Paper, pp. 146-153
Information Technology Standards - a Way to Bring Quality
and Performance in the Software Products Field
by D. Litan, M. Velicanu, A. M. Mocanu
Virgolici, I. Surugiu, O. Raduta
Abstract:
Project scope, budget and schedule are easily to maintain when working organized
and based on standards, keeping at least the same quality target as the initial
purpose. Standards create concepts and use them to simplify, organize, manage
and make the delivery process more efficient by reducing costs and increasing
scope and quality. In two words, the standards mean quality and efficiency; they
create more performant and predictable software products, offering at the same
time a tool for consistency, coherency, integrity, confidence and faster
communication. Therefore, in this paper, we will proceed to the analysis,
presentation and comparison of the current most important Information Technology
standards, in the fields of Information Technology Governance, Enterprise
Application Integration, Geographic Information Systems, egovernment,
information systems testing and information security.
Keywords:
E-government, Enterprise Application Integration, Geographical Information
Systems, information security, information systems performance, Information
Technology Governance, Information Technology standards, testing standards
Full Paper, pp. 154-168
Exploiting Local IPv4-only Access Networks to Deliver IPv6
Service to End-users
by Ala Hamarsheh, Marnix Goossens
Abstract:
This paper introduces a new IPv6 deployment protocol called E4Deliver6, which
stands for Exploiting Local IPv4-only Access Networks to Deliver IPv6 Service to
End-users. The protocol intends to help the Internet Service Providers (ISPs) to
rapidly start providing IPv6 service to the end-users. E4Deliver6 tunnels the
IPv6 traffic into IPv4 traffic to transit the IPv4-only access network
infrastructure. The new protocol offers IPv6 service alongside IPv4 service to
the end-users, economical solution, and requires simple and automatic
configurations at both end-users’ hosts and ISP sides at the time of setup.
E4Deliver6 connected hosts will be able to communicate with other IPv6-only
servers outside their local IPv4-only access network. The performance analysis
of E4Deliver6 showed that the performance parameters (e.g. Latency and
Throughput) are acceptable in comparison to other stateless protocols (e.g. 6rd)
and it is much better than other stateful protocols (e.g. BDMS) performance
parameters.
Keywords:
Local IPv4-only access networks, IPv6 deployment, IPv6 host, IPv6-in-IPv4
tunnels, IPv4 host, ISP, Latency, Throughput
Full Paper, pp. 169-177
Assessing Effectiveness in Mobile Learning by Devising
MLUAT (Mobile Learning Usability Attribute Testing) Methodology
by Bekim Fetaji, Mirlinda Ebibi,
Majlinda Fetaji
Abstract:
Mobile learning has been investigated from a range of perspectives, but there is
little published research studies on usability of m-learning and its efficiency.
Therefore investigated and analyzed the feasibility of m-learning by doing a
review of published research in the past decade (2000 - 2010) analyzing
successful m-learning projects and m-learning in general as well as realized
analyses of advantages and the pitfalls and issues found. Based on this analyses
provided are recommendations for improving m-learning in general. To have
successful and efficient m-learning it is essential to devise and implement
appropriate usability testing methodologies to evaluate the usability of mobile
applications. The primary goal of this research study was to develop more
efficient usability testing methodology that the authors called MLUAT (Mobile
Learning Usability Attribute Testing) for m-learning and comparing its results
with two other usability testing methods aimed for e-learning and applied in
m-learning. Findings showed that the developed MLUAT methodology is more
efficient and recommendations for approaching and improving m-learning are
discussed.
Keywords:
M-learning, e-learning, mobile devices, usability testing, HCI for mobile
devices
Full Paper, pp. 178-187
Development of Handheld Directory System built on
WiFi-based Positioning Techniques
by Lee Pieh Wen, Chan Wee Nee, Khor
Meng Chun, Tan Shiang-Yen, Rosnah Idrus
Abstract:
As outdoor positioning systems have relatively well established and matured,
indoor positioning and navigation systems still have great potential to grow.
The researches on indoor positioning system have gained the ever increasing
momentum and importance, as the needs toward indoor positioning and navigation
are flourishing. With the prominence of smartphone, this paper introduces a
portable indoor directory system that can be easily installed and operated on
the typical smartphone; hence the system could benefit greater number of users.
The proposed system is aimed to provide a new ways of providing indoor floor
directory, which offers capabilities to retrieve customizable and real time
information, to navigate interactively, and to enable location-awareness
computing. Additionally, the proposed system is designated to cater for the
needs of visually challenged persons by incorporating screen reader and improved
accessibility. The whole system consists of three modules, namely mobile phone
module, Kiosks module, and Website and Database module. The mobile phone module
is the main frontend module which installed on users’ mobile devices, whereas
the Kiosks and website are to provide supports and maintenances to the main
module. Users can download maps and application from the Kiosks or website. On
the other hand, administrator uses the website to manage the database.
Keywords:
WiFi Positioning, WLAN positioning, Navigation system, Mobile Application,
Visually impaired
Full Paper, pp. 188-197
Data Security in M-Learning Messaging Services
by Catalin Boja, Paul Pocatilu, Alin
Zamfiroiu
Abstract:
The m-learning field has been defined new educational services that deliver
knowledge and content on mobile devices, highlighting a dreamed educational
concept, anywhere, anytime. Education processes have evolved in the last decades
by integrating new technology. Many m-learning services use SMS to deliver
simple text content because it has a low cost, it is available on all mobile
devices and has wide coverage and availability. As more and more sensitive data
is processed by m-learning services, we propose a solution that will secure the
SMS content and that will have minimal impact on the device performance. The
solution implements a symmetric encryption scheme based on AES and is used by a
distributed m-learning architecture. The paper presents two examples developed
for Java ME and .NET CF platforms.
Keywords:
Cryptography, Mobile Applications, Security, SMS
Full Paper, pp. 198-205
Integrating New Calls and Performance Improvement in OVSF
based CDMA Networks
by Vipin Balyan, Davinder S. Saini
Abstract:
In code division multiple access (CDMA), orthogonal variable spreading factor
(OVSF) codes are used to allocate vacant codes when new calls arrive. In this
paper, integration is done for allocation of OVSF codes when a quantized or
non-quantized call arrives, and further, the voice calls and data calls are
treated differently as former are delay sensitive and later can be stored in
buffer. Voice calls are assigned a busy or vacant code when a call arrives. The
rate of data calls can increase or decrease according to the availability of
free capacity in code tree or according to type of traffic load. Single code and
multi code schemes are proposed which minimize the internal fragmentation of
busy codes by utilizing their wastage capacity. In addition, the external
fragmentation is also reduced. The vacant code is assigned when busy code
wastage capacity is insufficient to handle a call. Simulation results prove
dominance of our scheme over other novel schemes.
Keywords:
OVSF codes, code blocking, code searches, single code assignment, single code
assignment, wastage capacity
Full Paper, pp. 35-42
A Decision and Reconstruction Support Framework:
Elaborating on Web Technology
by Francisco Antunes, Joao Paulo Costa
Abstract:
In earlier research, we focused on the development of information models for
distributed GDSS (Group Decision Support Systems), closing the gap between the
study of concurrency control mechanisms, document structuring and decision
tracking. The properties of the developed information model (implemented into a
GDSS software tool) not only achieved the proposed goals, but allowed to support
the reconstruction of past decision-making processes. Decision reconstruction is
the process that allows an individual or group of individuals to understand how
a GDSS supported group has reached a previous decision in the context of an
organization. We believe that by fostering the decision reconstruction ability,
we promote their capability for information retrieval, while fostering knowledge
acquisition. In this paper we present a framework for developing decision and
reconstruction support systems. With this framework a GDSS encompass not only
quantitative analysis and deliberative support, but also decision reconstruction
or traceability support. The building blocks of the framework are: Contribution
support; Preservation of the information; Structure building support; Decision
making and reporting; and Visual representation. Instead of advocate the
development of systems from scratch, we posit their development by using the
common functionalities of Web 2.0/3.0 tools.
Keywords:
Decision, Framework, Group, Reconstruction, Support, System
Full Paper, pp. 43-50
Web Services-based Charging Control in Multimedia Networks
by Ivaylo I. Atanasov, Evelina N.
Pencheva, Dora A. Marinska
Abstract:
Parlay X is a set of Web Services interfaces for open access to network
function. One of the alternatives for deployment of Parlay X functionality is an
add-on to the Open Service Access (OSA) functionality. The OSA gateway is a
special type of application server that translates the OSA interfaces in the
network control protocols. The paper suggests a mapping of OSA Charging
interfaces onto Diameter protocol messages. A formal approach to specification
of OSA gateway behavior is suggested. The approach is based on the theory of
Labeled Transition Systems and the concept of bisimilarity. Using the available
mapping of Parlay X interfaces onto OSA interfaces, the possibilities of Parlay
X charging control on sessions in all IP-based multimedia networks are
investigated.
Keywords:
Service Oriented Architecture, Application Programming Interfaces, Charging,
Interface to protocol mapping, Labelled Transition Systems, Behavioural
equivalence
Full Paper, pp. 51-58
Reasoning on Service Interaction in Mobile Networks
by Ivaylo I. Atanasov, Evelina N.
Pencheva
Abstract:
The paper presents a formal approach to detection of interaction between
CAMEL-based services. CAMEL stands for Customized Application for Mobile network
Enhanced Logic and it is a way for mobile operators to offer customized services
that may be unique or differentiated from similar services offered by
competitors. The more services operate in the network, the greater chance that
they will interfere with each other. CAMEL basic call control models and
mobility management models are described by means of the formalism of
description logic. Services are modeled by refinement which transforms the
knowledge base. A standard inference mechanism is used to reason about service
interaction.
Keywords:
Call control, CAMEL, Description logic, Inference algorithm, Mobility management
control, Satisfiability
Full Paper, pp. 59-66
A Cluster Based Energy Efficient Location Routing Protocol
in Wireless Sensor Networks
by Nurhayati, Sung Hee Choi, Kyung Oh
Lee
Abstract:
One of the key issue that needs to be addressed in the wireless sensor network
field is how to create a most efficient energy system. This is a crucial element
because the wireless sensor network is a network made up of small batteries
powered devices with a limited amount of energy resources within it. The purpose
of the routing protocol is how to utilize energy efficiently and to prolong
network lifetime. The conventional clustering method has a unique potential to
be an important element for energy conserving sensor network. To address this
problem in this paper, we present A Cluster Based Energy Efficient Location
Routing Protocol (CELRP) in Wireless Sensor Networks. This routing adopted
hierarchical structure method, multi hop and location-based node in the field
area of the sensor node. The processes of the routing involves the clustering of
nodes and the selection of a Cluster Head (CH) node in each cluster which will
be the messenger that sends all the information to the Cluster Head Leader. This
Cluster Head Leader will then finally send the aggregated data to the Base
Station (BS). To prove the efficiency of energy in CELRP network, we have
compared it to the BCDCP and GPRS in the simulation conducted. BCDCP and GPRS
are both routing protocols that work well in a small-scale network however not
so much in a larger scale network since it uses a lot of energy for long
distance wireless communication. The Simulation results have proved energy
efficiency in CELRP, its’ ability to reduce energy dissipation and prolong
network lifetime that is superior compared to the BCDCP and GPRS.
Keywords:
Wireless Sensor Networks, Clustering, Routing Protocol, BCDCP, GPRS, CELRP
Full Paper, pp. 67-74
The Technology Evolution in Web Design, Development and
Deployment Supporting Web Scientific Applications
by S. Pastore
Abstract:
In recent years Internet and it famous application - the web - have seen a wide
diffusion and have been subjected to technological changes. The underlying
platforms supporting web applications are now based on layered software and
complex hardware solutions in order to support a growing load request. Sciences
in general and Astrophysics in specific take advantage of Internet and the web
since most of its applications are executed on the Internet and manifest a web
user interface. For modern applications is important both the architectural
framework where to execute them and the languages used in the design and
development of web applications that could be scientific applications or web
tools used to communicate this science. Among the different solution available
in these two topics, this paper proposes a framework in an open environment as a
combination of several software. The aim is to adhere to standards in every
stage of the application lifecycle to guarantee main features as openness,
accessibility, interoperability and internationalization. The solution
implements the cloud paradigm through an open platform like the Eucalyptus
software for the deployment environment and web specifications (i.e., HTML 5,
CC3 and ECMAScript) together with different standards proposed by international
bodies as languages to design and develop user interface accessing applications.
Keywords:
Cloud computing; grid computing; web applications; web standards technologies;
markup languages
Full Paper, pp. 75-83
A Tree-Based Power Saving Routing Protocol for Wireless
Sensor Networks
by Iman ALMomani, Maha Saadeh, Mousa
AL-Akhras, Hamzeh AL Jawawdeh
Abstract:
Wireless Sensor Networks (WSNs) are a recent promising technology used to
facilitate the provision of many civilian, military, and industrial services.
Many challenges hinder the effective use of WSNs to support different
applications, such as the resource limitations of sensor devices and the finite
battery power. This paper proposes a new routing protocol that considers sensors
power limitation and prolongs the network’s lifetime by avoiding excessive
messages between nodes. This protocol is based on Tree Routing (TR). It routes
the data over the shortest path using parent-child links in accompany with
neighbors' links. Also, it solves the problem of node’s failure. The proposed
protocol is analyzed and compared with other tree-based routing protocols.
Keywords:
Power Consumption, Shortest Path, Tree-Based Routing, Wireless Sensor Network,
WSN
Full Paper, pp. 84-92
AmIHomCare: AAL System for Elderly and Disabled People
Indoor Assistance
by Stefan Mocanu, Irina Mocanu, Silvia
Anton, Calin Munteanu
Abstract:
This paper presents a complex ambient intelligent system designed to monitor and
assist human subjects at their residence. Unlike other proposed systems,
AmIHomCare will monitor the vital signs of the patient or elderly people in
attempt to identify a potential dangerous situation and it is also capable to
control environmental parameters in order to ensure a personalized environment
for the user. The system offers several other functions: access control to some
restricted areas based on biometric recognition, gesture and object
identification based on image retrieval and processing, mobile robot assistance,
real time processing of data gathered from sensors, data logging and archiving,
communication with a remote call center, automatic alerts sending capabilities.
The system is based on 4 independent modules, each one with it’s own specific
task. The modules communicate and may cooperate if required by a specific
situation. The core of the system is represented by the environment monitoring
module where all the data from other modules is gathered and kept in a data
base. The core also acts as a relay for alert messages that are being sent by
the other modules (when detecting an emergency situation) to a call center.
Certain communication redundancy will be implemented in order to make sure that
alerts reach the destination and fast reaction is guaranteed. The emergency
medical unit that arrives at patient’s home can consult his/her medical history
by accessing the local database. Some individual components and functionality
have already been tested and other just simulated.
Keywords:
Ambient monitoring, content based retrieval, elderly and disabled assistance,
image annotation and retrieval, iris and fingerprint recognition, multi-agent
system, wireless body sensors, wearable sensors
Full Paper, pp. 93-100
Assessing the Prevailing Implementation Issues of RFID in
Healthcare: A Five-Phase Implementation Model
by E. Lefebvre, L. Castro, L. A.
Lefebvre
Abstract:
In healthcare, supply and demand of medical devices and equipment pose enormous
challenges for material managers who have to ensure that “the right equipment”
is at “the right moment” at the “point-of-need”. Every year hospitals lose
millions of dollar due to hoarded, lost, stolen, and misplaced medical
equipment. This lack of visibility on critical medical assets has led to
increase of operations inefficiencies, increase in needed resources and budgets,
loss of staff valuable time, as well as delays in patient care delivery,
generating patients and staff dissatisfaction and potentially affecting patient
flow and safety. Radio frequency identification (RFID) is rising as an enabling
technology to facilitate asset management in healthcare, where caregivers
continually use thousands of medical devices across multiple clinical
departments. RFID proven capabilities to automatically and capture, share and
synchronize product’s information, as precise as at the item-level, is giving
rise to new paradigms for the management of critical and life-saving medical
equipment in hospitals. Even tough RFID seems to be a very promising technology;
its adoption and implementation in this sector have been hindered by the
haziness of RFID projects’ ROI. Through a case study at a European hospital, we
intend to assess the suitability of a proposed RFID implementation model to
evaluate the various implications of RFID projects, the prevailing
implementation issues, as well as to investigate the anticipated benefits of
such implementation.
Keywords:
Healthcare, mobile asset management, key performance indicators, RFID
implementation
Full Paper, pp. 101-117
The Design of a Steganographic System Based on the Internal
MP4 File Structures
by M. Jokay
Abstract:
We propose a new technique for inserting the information into the mp4 video
files. This technique is based on a modification of the GOP (Group of Pictures)
structure and alternation of the streams in the video file. The proposed
steganographic system is implemented on the MP4 format. Although our method does
not assume decoding of the video stream included in the MP4 file, its
suitability depends on the used video encoder and more specially on the type of
video scenes. A variable number of adjacent P and B frames in the individual
GOPs (variable number of video frames in the MP4 chunk structures) is used to
decode the inserted (hidden) information.
Keywords:
GOP, I-frame, MP4 file, P-frame, steganography, video stream
Full Paper, pp. 207-214
Classification in the Speech Recognition
by D. Donko, I. Traljic
Abstract:
This paper presents specific approach of the classification of the incorrect
speech sounds. Sampled data are vowels gathered during the speech therapy with
children that have difficulties to pronounce them correctly. Continuous wavelet
transformation has been applied on these incorrectly pronounce vowels using
Morlet wavelet. Coefficients have been analyzed in the context of three main
formants that characterized each of the vowels. The selected coefficients have
been classified into main clusters, and have been compared with the one obtained
for correct signals. At the end some improvements have been proposed in order to
use results in the daily speech therapy and to automate process.
Keywords:
Classification, Morlet wavelet, Speech Therapy, Wavelet analysis
Full Paper, pp. 215-222
Breaking the Barcode and RFID Myth: Adoption Paths for
Improving the Medication Process
by Alejandro Romero, Elisabeth
Lefebvre, Louis-A. Lefebvre
Abstract:
The use of barcode has become a key primary technological strategy for improving
healthcare service quality in general and point-of-care patient safety in
particular. But will RFID eventually replace the widely adopted barcode
technology for decreasing adverse medication events? This paper explores four
different adoption paths for improving the medication process of an emergency
department, namely full barcode implementation, full RFID implementation,
migration and hybridization. Since medication errors are considered the most
frequent type of adverse events occurring in hospitals, it appears rather
crucial to gain a better understanding of the relative advantages and drawbacks
related to each of these four adoption paths.
Keywords:
Adverse medication events, RFID, barcode, technology adoption and medication
process
Full Paper, pp. 223-235
Parallel Approach of Sobel Edge Detector on Multicore
Platform
by N. E. A. Khalid, S. A. Ahmad, N. M.
Noor, A. F. A. Fadzil, M. N. Taib
Abstract:
This paper presents the parallel multicore Sobel edge algorithm which
parallelizes the traditional sequential Sobel edge detection algorithm on a
parallel multicore platform. Dealing with images, the algorithm inherits
repetitive instructions that depend on the image size, thus may slow down the
processing speed. The multicore architecture is a ready available resource on
ordinary personal computer but often not fully utilized to its utmost potential.
Align with this hidden opportunity, Sobel edge algorithm can be implemented on
parallel programming paradigm by focusing on the thread operations. This work
presents the parallel multicore Sobel edge algorithm which parallelizes the
traditional sequential Sobel edge detection algorithm on a parallel multicore
platform via Parallel communication software named Message Passing Interface
(MPI). The test is being done on ten different images with each image tested in
the varying size of 1KxK, 2KxK and 3KxK pixels. Various threads, ranging from
two to ten had been performed on Duo and Quad cores. An interesting result shows
that in sequential processing Duo core overcome Quad core speed. As for parallel
processing, two thread is the best used for Duo core and eight threads is finest
for Quad core.
Keywords:
Parallel programming, Sobel edge algorithm, Message Passing Interface (MPI),
Multicore
Full Paper, pp. 236-244
The Impact of Young Adults’ Lifestyles in Preference and
Belief towards Communication Media
by Siti Z.Z. Abidin, Nasiroh Omar,
Zamalia Mahmud, Marshima M. Rosli, Hani F.A. Rahman
Abstract:
Nowadays, there are a lot of communication media available for sharing
information. The use of online media is among the common activities within the
society of digital era especially for young adults. The Internet allows
information to be shared freely, easily and fast through social media. Several
studies show that information can be a weapon to influence people. The misuse of
communication media may lead to threat. It is therefore important to understand
the factors that affect people in selecting media and trusting their sources. In
this paper, we present an exploratory study to investigate the patterns of media
preferences and beliefs based on the young adults’ lifestyles focusing on
parents’ education level, standard of living and their access to the internet.
Participants comprise of ninety eight local young adults who use communication
media regularly. Data were analyzed using multidimensional proximity scaling and
multiple response techniques. The results show that media preferences are
affected by their lifestyles while belief towards the communication media are
not related to their lifestyles.
Keywords:
Belief, Communication media, Multi-dimensional proximity scaling, Pattern,
Preference, Social media, Visualization, Young adults
Full Paper, pp. 245-253
Users Management in Interactive Networked Collaborative
Environment
by Zainura Idrus, Siti Z. Z. Abidin, N.
Omar, R. Hashim
Abstract:
In interactive networked collaborative virtual environment (NCVE), users work in
a group to involve in activities such as game, discussion and learning. However,
their existence is not visibly presence. Therefore, there is a crucial need to
represent the invisible users so that users know with whom they are interacting
with, when to communicate and what to do during the collaboration. Most NCVE
systems support non-verbal communication cue only to a limited degree causing
unnatural communication and degrading communication quality. This leads to miss
communication and miss interpretation of information during the collaboration.
Research works on identifying this situation have been performed by many
researchers that lead to the issues of awareness. There is a lack of research
that focusing on the use of effective digital elements in networked
collaborative virtual environment. In this research, we investigate what are the
digital elements used and how they present invisible users. In this way, the
appropriate digital elements can be used to model the invisible users in terms
of their presence, states and roles. Thus, conflicts in communication between
users can be avoided and the digital elements can provide the mean of knowing
the participants in the virtual space.Then, our research further explore various
roles played by users and access right granted to each role, specifically in
e-learning, project management and game. A clear role and well defined job
function can strictly outline users’ access right for ensuring smooth
communication and secure protection as well as privacy of users.
Keywords:
Communication, Collaborative Applications, Digital elements, Networked
Collaborative Virtual Environment (NCVE), Role, Social Awareness, User
Management
Full Paper, pp. 254-262
Utility Enhancement by Power Control in WSN with Hexagonal
Deployment Scheme Using Game Theoretic Approach with Pricing
by R. Valli, P. Dananjayan
Abstract:
The fundamental component of resource management in Wireless Sensor Network
(WSN) is transmitter power control since they are miniature battery powered
devices. An efficient power control technique is essential to maintain reliable
communication links in wireless sensor network (WSN) and to maintain the battery
life of the sensor node and in turn the sensor network. This paper analyses a
game theoretic model with pricing for power control taking into account the
residual energy of the nodes in a homogeneous sensor network considering square
grid, triangular and hexagonal deployment schemes. The utility with pricing that
minimizes the power consumption of the nodes is analysed. Simulation results
show that, for hexagonal deployment scheme, with the inclusion of residual
energy check in the game, the transmitting power of the nodes is reduced thereby
saving energy and increasing the network lifetime.
Keywords:
Game theory, Pricing, Power control, Wireless sensor network
Full Paper, pp. 263-270
An Adaptive Call Admission Control Scheme with Load
Balancing for QoS Enhancement in RoF Based Converged UMTS/WLAN
by R. Shankar, P. Dananjayan
Abstract:
As universal mobile telecommunications system (UMTS) and wireless local area
network (WLAN) have complementary characteristics, convergence of UMTS and WLAN
offer seamless wireless access service to users. In a converged UMTS/WLAN
enhancing quality of service (QoS) for different services require call admission
control and load balancing. This paper analyses the performance of wideband
power based (WPB) and throughput based (TB) call admission control schemes in
UMTS/WLAN. Further an adaptive call admission control scheme with load balancing
for enhancing QoS in hybrid coupled and radio over fiber (RoF) based UMTS/WLAN
convergence network is analysed. Simulation results show that adaptive call
admission control with load balancing improves QoS in RoF based UMTS/WLAN
compared to hybrid coupled UMTS/WLAN convergence network.
Keywords:
Admission control, hybrid coupled, RoF, Converged UMTS WLAN, load balancing, QoS
Full Paper, pp. 271-278