Abstract: Ambient Computing or Ambient Intelligence (AmI) is
emerging area in computer science aiming to create intelligently
connected environments and Internet of Things. In this paper, we
propose communication middleware architecture for AmI. This
middleware architecture addresses problems of communication,
networking, and abstraction of applications, although there are other
aspects (e.g. HCI and Security) within general AmI framework.
Within this middleware architecture, any application developer might
address HCI and Security issues with extensibility features of this
platform.
Abstract: The early-stage damage detection in offshore
structures requires continuous structural health monitoring and for the
large area the position of sensors will also plays an important role in
the efficient damage detection. Determining the dynamic behavior of
offshore structures requires dense deployment of sensors. The wired
Structural Health Monitoring (SHM) systems are highly expensive
and always needs larger installation space to deploy. Wireless sensor
networks can enhance the SHM system by deployment of scalable
sensor network, which consumes lesser space. This paper presents the
results of wireless sensor network based Structural Health Monitoring
method applied to a scaled experimental model of offshore structure
that underwent wave loading. This method determines the
serviceability of the offshore structure which is subjected to various
environment loads. Wired and wireless sensors were installed in the
model and the response of the scaled BLSRP model under wave
loading was recorded. The wireless system discussed in this study is
the Raspberry pi board with Arm V6 processor which is programmed
to transmit the data acquired by the sensor to the server using Wi-Fi
adapter, the data is then hosted in the webpage. The data acquired
from the wireless and wired SHM systems were compared and the
design of the wireless system is verified.
Abstract: The current web has become a modern encyclopedia,
where people share their thoughts and ideas on various topics around
them. This kind of encyclopedia is very useful for other people who
are looking for answers to their questions. However, with the
growing popularity of social networking and blogging and ever
expanding network services, there has also been a growing diversity
of technologies along with a different structure of individual web
sites. It is therefore difficult to directly find a relevant answer for a
common Internet user. This paper presents a web application for the
real-time end-to-end analysis of selected Internet trends where the
trend can be whatever the people post online. The application
integrates fully configurable tools for data collection and analysis
using selected webometric algorithms, and for its chronological
visualization to user. It can be assumed that the application facilitates
the users to evaluate the quality of various products that are
mentioned online.
Abstract: The paper presents a method in which the expert
knowledge is applied to fuzzy inference model. Even a less
experienced person could benefit from the use of such a system, e.g.
urban planners, officials. The analysis result is obtained in a very
short time, so a large number of the proposed locations can also be
verified in a short time. The proposed method is intended for testing
of locations of car parks in a city. The paper shows selected examples
of locations of the P&R facilities in cities planning to introduce the
P&R. The analyses of existing objects are also shown in the paper
and they are confronted with the opinions of the system users, with
particular emphasis on unpopular locations. The results of the
analyses are compared to expert analysis of the P&R facilities
location that was outsourced by the city and the opinions about
existing facilities users that were expressed on social networking
sites. The obtained results are consistent with actual users’ feedback.
The proposed method proves to be good, but does not require the
involvement of a large experts team and large financial contributions
for complicated research. The method also provides an opportunity to
show the alternative location of P&R facilities. Although the results
of the method are approximate, they are not worse than results of
analysis of employed experts. The advantage of this method is ease of
use, which simplifies the professional expert analysis. The ability of
analyzing a large number of alternative locations gives a broader
view on the problem. It is valuable that the arduous analysis of the
team of people can be replaced by the model's calculation. According
to the authors, the proposed method is also suitable for
implementation on a GIS platform.
Abstract: Social networking sites such as Twitter and Facebook
attracts over 500 million users across the world, for those users, their
social life, even their practical life, has become interrelated. Their
interaction with social networking has affected their life forever.
Accordingly, social networking sites have become among the main
channels that are responsible for vast dissemination of different kinds
of information during real time events. This popularity in Social
networking has led to different problems including the possibility of
exposing incorrect information to their users through fake accounts
which results to the spread of malicious content during life events.
This situation can result to a huge damage in the real world to the
society in general including citizens, business entities, and others. In this paper, we present a classification method for detecting the
fake accounts on Twitter. The study determines the minimized set of
the main factors that influence the detection of the fake accounts on
Twitter, and then the determined factors are applied using different
classification techniques. A comparison of the results of these
techniques has been performed and the most accurate algorithm is
selected according to the accuracy of the results. The study has been
compared with different recent researches in the same area; this
comparison has proved the accuracy of the proposed study. We claim
that this study can be continuously applied on Twitter social network
to automatically detect the fake accounts; moreover, the study can be
applied on different social network sites such as Facebook with minor
changes according to the nature of the social network which are
discussed in this paper.
Abstract: Research has shown that techno-entrepreneurship is
economically significant. Therefore, it is suggested that teaching
techno-entrepreneurship may be important because such programmes
would prepare current and future generations of learners to recognise
and act on high-technology opportunities. Education in technoentrepreneurship
may increase the knowledge of how to start one’s
own enterprise and recognise the technological opportunities for
commercialisation to improve decision-making about starting a new
venture; also it influence decisions about capturing the business
opportunities and turning them into successful ventures. Universities
can play a main role in connecting and networking technoentrepreneurship
students towards a cooperative attitude with real
business practice and industry knowledge. To investigate and answer
whether education for techno-entrepreneurs really helps, this paper
choses a comparison of literature reviews as its method of research.
After reviewing literature related to the impact of technoentrepreneurship
education on self-employment 6 studies which had
similar aim and objective to this paper were. These particular papers
were selected based on a keywords search and as their aim,
objectives, and gaps were close to the current research. In addition,
they were all based on the influence of techno-entrepreneurship
education in self-employment and intention of students to start new
ventures. The findings showed that teaching techno-entrepreneurship
education may have an influence on students’ intention and their
future self-employment, but which courses should be covered and the
duration of programmes, needs further investigation.
Abstract: This paper explores and provides substantiated
evidence on the usage patterns of Information and Communication
Technologies (ICTs) by female users at Vhembe District in Limpopo-
Province, South Africa. The study presents a comprehensive picture
on the usage of ICTs from female users’ perspective. The
significance of this study stems from the need to assess the role,
relevance and usage patterns of ICTs such as smartphones,
computers, laptops, and iPods, the internet and social networking
sites among females following the developments of new media
technologies in society. The objective of the study is to investigate
the usability and accessibility of ICTs to empower female users in
South Africa. The study used quantitative and qualitative research
methods to determine the major ideas, perceptions and usage patterns
of ICTs by users. Data collection involved the use of structured selfadministered
questionnaire from two groups of respondents who
participated in this study. Thus, (n=50) female students at the
University of Venda provided their ideas and perceptions about the
usefulness and usage patterns of ICTs such as smartphones, the
Internet and computers at the university level, whereas, the second
group were (n=50) learners from Makhado Comprehensive School
who provided their perceptions and ideas about the use of ICTs at the
high school level. The researcher also noted that the findings of the
study were useful as a guideline and model for ICT intervention that
could work as an empowerment to women in South Africa. It was
observed that the central purpose of ICTs among female users was to
search for information regarding assignment writing, conducting
research, dating, exchanging ideas and networking with friends and
relatives. This was demonstrated by a high number of females who
used ICTs for e-learning (62%) and social purposes (85%).
Therefore, the study revealed that most females used ICTs for social
purposes and accessing the internet rather than for entertainment, a
gesture that provides an opportune space to empower rural women in
South Africa.
Abstract: File sharing in networks is generally achieved using
Peer-to-Peer (P2P) applications. Structured P2P approaches are
widely used in adhoc networks due to its distributed and scalability
features. Efficient mechanisms are required to handle the huge
amount of data distributed to all peers. The intrinsic characteristics of
P2P system makes for easier content distribution when compared to
client-server architecture. All the nodes in a P2P network act as both
client and server, thus, distributing data takes lesser time when
compared to the client-server method. CHORD protocol is a resource
routing based where nodes and data items are structured into a 1-
dimensional ring. The structured lookup algorithm of Chord is
advantageous for distributed P2P networking applications. However,
structured approach improves lookup performance in a high
bandwidth wired network it could contribute to unnecessary overhead
in overlay networks leading to degradation of network performance.
In this paper, the performance of existing CHORD protocol on
Wireless Mesh Network (WMN) when nodes are static and dynamic
is investigated.
Abstract: Cloud computing has emerged as a promising
direction for cost efficient and reliable service delivery across data
communication networks. The dynamic location of service facilities
and the virtualization of hardware and software elements are stressing
the communication networks and protocols, especially when data
centres are interconnected through the internet. Although the
computing aspects of cloud technologies have been largely
investigated, lower attention has been devoted to the networking
services without involving IT operating overhead. Cloud computing
has enabled elastic and transparent access to infrastructure services
without involving IT operating overhead. Virtualization has been a
key enabler for cloud computing. While resource virtualization and
service abstraction have been widely investigated, networking in
cloud remains a difficult puzzle. Even though network has significant
role in facilitating hybrid cloud scenarios, it hasn't received much
attention in research community until recently. We propose Network
as a Service (NaaS), which forms the basis of unifying public and
private clouds. In this paper, we identify various challenges in
adoption of hybrid cloud. We discuss the design and implementation
of a cloud platform.
Abstract: This study found that most corporate personnel are
using social media to communicate with colleagues to make the
process of working more efficient. Complete satisfaction occurred on
the use of security within the University’s computer network. The
social network usage for communication, collaboration,
entertainment and demonstrating concerns accounted for fifty percent
of variance to predict interpersonal relationships of corporate
personnel. This evaluation on the effectiveness of social networking
involved 213 corporate personnel’s. The data was collected by
questionnaires. This data was analyzed by using percentage, mean,
and standard deviation.
The results from the analysis and the effectiveness of using online
social networks were derived from the attitude of private users and
safety data within the security system. The results showed that the
effectiveness on the use of an online social network for corporate
personnel of Suan Sunandha Rajabhat University was specifically at
a good level, and the overall effects of each aspect was (Ẋ=3.11).
Abstract: This paper examines the system protection for cyber-physical
systems (CPS). CPS are particularly characterized by their
networking system components. This means they are able to adapt to
the needs of their users and its environment. With this ability, CPS
have new, specific requirements on the protection against anti-counterfeiting,
know-how loss and manipulation. They increase the
requirements on system protection because piracy attacks can be
more diverse, for example because of an increasing number of
interfaces or through the networking abilities. The new requirements
were identified and in a next step matched with existing protective
measures. Due to the found gap the development of new protection
measures has to be forced to close this gap. Moreover a comparison
of the effectiveness between selected measures was realized and the
first results are presented in this paper.
Abstract: Networking is important among students to achieve
better understanding. Social networking plays an important role in the
education. Realizing its huge potential, various organizations,
including institutions of higher learning have moved to the area of
social networks to interact with their students especially through
Facebook. Therefore, measuring the effectiveness of Facebook as a
learning tool has become an area of interest to academicians and
researchers. Therefore, this study tried to integrate and propose new
theoretical and empirical evidences by linking the western idea of
adopting Facebook as an alternative learning platform from a
Malaysian perspective. This study, thus, aimed to fill a gap by being
among the pioneering research that tries to study the effectiveness of
adopting Facebook as a learning platform across other cultural
settings, namely Malaysia. Structural equation modeling was
employed for data analysis and hypothesis testing. This study finding
has provided some insights that would likely affect students’
awareness towards using Facebook as an alternative learning
platform in the Malaysian higher learning institutions. At the end,
future direction is proposed.
Abstract: The advent of social networking technologies has been
met with mixed reactions in academic and corporate circles around
the world. This study explored the influence of social network in
current era, the relation being maintained between the Social
networking site and its user by the extent of use, benefits and latest
technologies. The study followed a descriptive research design
wherein a questionnaire was used as the main research tool. The data
collected was analyzed using SPSS 16. Data was gathered from 1205
users and analyzed in accordance with the objectives of the study.
The analysis of the results seem to suggest that the majority of users
were mainly using Facebook, despite of concerns raised about the
disclosure of personal information on social network sites, users
continue to disclose huge quantity of personal information, they find
that reading privacy policy is time consuming and changes made can
result into improper settings.
Abstract: The adaptation of social networking sites within
higher education has garnered significant interest in the recent years
with numerous researches considering it as a possible shift from the
traditional classroom based learning paradigm. Notwithstanding this
increase in research and conducted studies however, the adaption of
SNS based modules have failed to proliferate within Universities.
This paper commences its contribution by analyzing the various
models and theories proposed in literature and amalgamate together
various effective aspects for the inclusion of social technology within
e-Learning. A three phased framework is further proposed which
details the necessary considerations for the successful adaptation of
SNS in enhancing the students learning experience. This proposal
outlines the theoretical foundations which will be analyzed in
practical implementation across international university campuses.
Abstract: In this paper we are presenting some spamming
techniques their behaviour and possible solutions. We have analyzed
how Spammers enters into online social networking sites (OSNSs) to
target them and diverse techniques used by them for this purpose.
Spamming is very common issue in present era of Internet
especially through Online Social Networking Sites (like Facebook,
Twitter, and Google+ etc.). Spam messages keep wasting Internet
bandwidth and the storage space of servers. On social networking
sites; spammers often disguise themselves by creating fake accounts
and hijacking user’s accounts for personal gains. They behave like
normal user and they continue to change their spamming strategy.
Following spamming techniques are discussed in this paper like
clickjacking, social engineered attacks, cross site scripting, URL
shortening, and drive by download. We have used elgg framework
for demonstration of some of spamming threats and respective
implementation of solutions.
Abstract: Future mobile networks following 5th generation will
be characterized by one thousand times higher gains in capacity;
connections for at least one hundred billion devices; user experience
capable of extremely low latency and response times. To be close to
the capacity requirements and higher reliability, advanced
technologies have been studied, such as multiple connectivity, small
cell enhancement, heterogeneous networking, and advanced
interference and mobility management. This paper is focused on the
multiple connectivity in heterogeneous cellular networks. We
investigate the performance of coverage and user throughput in several
deployment scenarios. Using the stochastic geometry approach, the
SINR distributions and the coverage probabilities are derived in case
of dual connection. Also, to compare the user throughput enhancement
among the deployment scenarios, we calculate the spectral efficiency
and discuss our results.
Abstract: The aim of this study was to build ‘Ubi-Net’, a
decision-making support system for systematic establishment in
U-City planning. We have experienced various urban problems caused
by high-density development and population concentrations in
established urban areas. To address these problems, a U-Service
contributes to the alleviation of urban problems by providing real-time
information to citizens through network connections and related
information. However, technology, devices, and information for
consumers are required for systematic U-Service planning in towns
and cities where there are many difficulties in this regard, and a lack of
reference systems.
Thus, this study suggests methods to support the establishment of
sustainable planning by providing comprehensive information
including IT technology, devices, news, and social networking
services (SNS) to U-City planners through intelligent searches. In this
study, we targeted Smart U-Parking Planning to solve parking
problems in an ‘old’ city. Through this study, we sought to contribute
to supporting advances in U-Space and the alleviation of urban
problems.
Abstract: This article is to review and understand the new
generation of students to understand their expectations and attitudes.
There are a group of students on school projects, creative work,
educational software and digital signal source, the use of social
networking tools to communicate with friends and a part in the
competition. Today's students have been described as the new
millennium students. They use information and communication
technology in a more creative and innovative at home than at school,
because the information and communication technologies for
different purposes, in the home, usually occur in school. They
collaborate and communicate more effectively when they are at
home. Most children enter school, they will bring about how to use
information and communication technologies, some basic skills and
some tips on how to use information and communication technology
will provide a more advanced than most of the school's expectations.
Many teachers can help students, however, still a lot of work,
"tradition", without a computer, and did not see the "new social
computing networks describe young people to learn and new ways of
working life in the future", in the education system of the benefits of
using a computer.
Abstract: Given the dynamic nature of the higher education
landscape, induction programmes for new academics has become the
norm nowadays to support academics negotiate these rough terrain.
This study investigates an induction programme for new academics
in a higher education institution to establish what difference it has
made to participants. The findings revealed that the benefits ranged
from creating safe spaces for collaboration and networking to
fostering reflective practice and contributing to the scholarship of
teaching and learning. The study also revealed that some of the
intentions of the programme may not have been achieved, for
example transformative learning. This led to questioning whether this
intention is an appropriate one given the short duration of the
programme and the long, drawn out process of transformation. It may
be concluded that the academic induction programme in this study
serves to sow the seeds for transformative learning through fostering
critically reflective practice. Recommendations for further study
could include long term impact of the programme on student learning
and success, these being the core business of higher education. It is
also recommended that in addition to an induction programme, the
university invests in a mentoring programme for new staff and extend
the support for academics in order to sustain critical reflection and
which may contribute to transformative educational practice.
Abstract: Wireless mesh networking is rapidly gaining in
popularity with a variety of users: from municipalities to enterprises,
from telecom service providers to public safety and military
organizations. This increasing popularity is based on two basic facts:
ease of deployment and increase in network capacity expressed in
bandwidth per footage; WMNs do not rely on any fixed
infrastructure. Many efforts have been used to maximizing
throughput of the network in a multi-channel multi-radio wireless
mesh network. Current approaches are purely based on either static or
dynamic channel allocation approaches. In this paper, we use a
hybrid multichannel multi radio wireless mesh networking
architecture, where static and dynamic interfaces are built in the
nodes. Dynamic Adaptive Channel Allocation protocol (DACA), it
considers optimization for both throughput and delay in the channel
allocation. The assignment of the channel has been allocated to be codependent
with the routing problem in the wireless mesh network and
that should be based on passage flow on every link. Temporal and
spatial relationship rises to re compute the channel assignment every
time when the pattern changes in mesh network, channel assignment
algorithms assign channels in network. In this paper a computing
path which captures the available path bandwidth is the proposed
information and the proficient routing protocol based on the new path
which provides both static and dynamic links. The consistency
property guarantees that each node makes an appropriate packet
forwarding decision and balancing the control usage of the network,
so that a data packet will traverse through the right path.