Abstract: The drastic increase in the usage of SMS technology
has led service providers to seek for a solution that enable users of
mobile devices to access services through SMSs. This has resulted in
the proposal of solutions towards SMS-based service invocation in
service oriented environments. However, the dynamic nature of
service-oriented environments coupled with sudden load peaks
generated by service request, poses performance challenges to
infrastructures for supporting SMS-based service invocation. To
address this problem we adopt load balancing techniques. A load
balancing model with adaptive load balancing and load monitoring
mechanisms as its key constructs is proposed. The load balancing
model then led to realization of Least Loaded Load Balancing
Framework (LLLBF). Evaluation of LLLBF benchmarked with round
robin (RR) scheme on the queuing approach showed LLLBF
outperformed RR in terms of response time and throughput.
However, LLLBF achieved better result in the cost of high
processing power.
Abstract: Wireless sensor network can be applied to both abominable
and military environments. A primary goal in the design of
wireless sensor networks is lifetime maximization, constrained by
the energy capacity of batteries. One well-known method to reduce
energy consumption in such networks is data aggregation. Providing
efcient data aggregation while preserving data privacy is a challenging
problem in wireless sensor networks research. In this paper,
we present privacy-preserving data aggregation scheme for additive
aggregation functions. The Cluster-based Private Data Aggregation
(CPDA)leverages clustering protocol and algebraic properties of
polynomials. It has the advantage of incurring less communication
overhead. The goal of our work is to bridge the gap between
collaborative data collection by wireless sensor networks and data
privacy. We present simulation results of our schemes and compare
their performance to a typical data aggregation scheme TAG, where
no data privacy protection is provided. Results show the efficacy and
efficiency of our schemes.
Abstract: Virtual environments are a hot topic in academia and more importantly in courses offered via distance education. Today-s gaming generation view virtual worlds as strong social and interactive mediums for communicating and socializing. And while institutions of higher education are challenged with increasing enrollment while balancing budget cuts, offering effective courses via distance education become a valid option. Educators can utilize virtual worlds to offer students an enhanced learning environment which has the power to alleviate feelings of isolation through the promotion of communication, interaction, collaboration, teamwork, feedback, engagement and constructivists learning activities. This paper focuses on the use of virtual environments to facilitate interaction in distance education courses so as to produce positive learning outcomes for students. Furthermore, the instructional strategies were reviewed and discussed for use in virtual worlds to enhance learning within a social context.
Abstract: In this paper, an adaptive polarized Multiple-Input
Multiple-Output (MIMO) Multicarrier Spread Spectrum Code Division Multiple Access (MC-SS-CDMA) system is designed for downlink mobile communications. The proposed system will be
examined in Frequency Division Duplex (FDD) mode for both macro urban and suburban environments. For the same transmission
bandwidth, a performance comparison between both nonoverlapped and orthogonal Frequency Division Multiplexing (FDM) schemes will be presented. Also, the proposed system will be compared with
both the closed loop vertical MIMO MC-SS-CDMA system and the
synchronous vertical STBC-MIMO MC-SS-CDMA system. As will
be shown, the proposed system introduces a significant performance
gain as well as reducing the spatial dimensions of the MIMO system
and simplifying the receiver implementation. The effect of the
polarization diversity characteristics on the BER performance will be
discussed. Also, the impact of excluding the cross-polarization MCSS-
CDMA blocks in the base station will be investigated. In addition,
the system performance will be evaluated under different Feedback
Information (FBI) rates for slowly-varying channels. Finally, a
performance comparison for vehicular and pedestrian environments
will be presented
Abstract: Students with high level skills are in demand, especially in scare skill environments. If universities wish to be successful and competitive, its students need to be adequately equipped with the necessary tools. Work Integrated Learning (WIL) is an essential component of the education of a student. The relevance of higher education should be assessed in terms of how it meets the needs of society and the world of work in a global economy. This paper demonstrates how to use Habermas's theory of communicative action to reflect on students- perceptions on their integration in the work environment to achieve social integration and financial justification. Interpretive questionnaires are used to determine the students- view of how they are integrated into society, and contributing to the economy. This paper explores the use of Habermas-s theory of communicative action to give theoretical and methodological guidance for the practice of social findings obtained in this inquiry.
Abstract: Business process automation is an important task in an
enterprise business environment software development. The
requirements of processing acceleration and automation level of
enterprises are inherently different from one organization to another.
We present a methodology and system for automation of business
process management system architecture by multi-agent collaboration
based on SOA. Design layer processes are modeled in semantic
markup language for web services application. At the core of our
system is considering certain types of human tasks to their further
automation across over multiple platform environments. An
improved abnormality processing with model for automation of
BPMS architecture by multi-agent collaboration based on SOA is
introduced. Validating system for efficiency of process automation,
an application for educational knowledge base instance would also be
described.
Abstract: This paper presents a solution for the behavioural
animation of autonomous virtual agent navigation in virtual environments.
We focus on using Dempster-Shafer-s Theory of Evidence
in developing visual sensor for virtual agent. The role of the visual
sensor is to capture the information about the virtual environment
or identifie which part of an obstacle can be seen from the position
of the virtual agent. This information is require for vitual agent to
coordinate navigation in virtual environment. The virual agent uses
fuzzy controller as a navigation system and Fuzzy α - level for
the action selection method. The result clearly demonstrates the path
produced is reasonably smooth even though there is some sharp turn
and also still not diverted too far from the potential shortest path.
This had indicated the benefit of our method, where more reliable
and accurate paths produced during navigation task.
Abstract: This paper presents a distributed intrusion
detection system IDS, based on the concept of specialized
distributed agents community representing agents with the
same purpose for detecting distributed attacks. The semantic of
intrusion events occurring in a predetermined network has been
defined. The correlation rules referring the process which our
proposed IDS combines the captured events that is distributed
both spatially and temporally. And then the proposed IDS tries
to extract significant and broad patterns for set of well-known
attacks. The primary goal of our work is to provide intrusion
detection and real-time prevention capability against insider
attacks in distributed and fully automated environments.
Abstract: In this paper, we describe a rule-based message passing method to support developing collaborative applications, in which multiple users share resources in distributed environments. Message communications of applications in collaborative environments tend to be very complex because of the necessity to manage context situations such as sharing events, access controlling of users, and network places. In this paper, we propose a message communications method based on unification of artificial intelligence and logic programming for defining rules of such context information in a procedural object-oriented programming language. We also present an implementation of the method as java classes.
Abstract: The growing outsourcing of logistics services
resulting from the ongoing current in firms of costs
reduction/increased efficiency means that it is becoming more and
more important for the companies doing the outsourcing to carry out
a proper evaluation.
The multiple definitions and measures of logistics service
performance found in research on the topic create a certain degree of
confusion and do not clear the way towards the proper measurement
of their performance. Do a model and a specific set of indicators exist
that can be considered appropriate for measuring the performance of
logistics services outsourcing in industrial environments? Are said
indicators in keeping with the objectives pursued by outsourcing? We
aim to answer these and other research questions in the study we have
initiated in the field within the framework of the international High
Performance Manufacturing (HPM) project of which this paper
forms part.
As the first stage of this research, this paper reviews articles
dealing with the topic published in the last 15 years with the aim of
detecting the models most used to make this measurement and
determining which performance indicators are proposed as part of
said models and which are most used. The first steps are also taken in
determining whether these indicators, financial and operational, cover
the aims that are being pursued when outsourcing logistics services.
The findings show there is a wide variety of both models and
indicators used. This would seem to testify to the need to continue
with our research in order to try to propose a model and a set of
indicators for measuring the performance of logistics services
outsourcing in industrial environments.
Abstract: In this paper, frequency offset (FO) estimation schemes
robust to the non-Gaussian noise environments are proposed for
orthogonal frequency division multiplexing (OFDM) systems. First,
a maximum-likelihood (ML) estimation scheme in non-Gaussian
noise environments is proposed, and then, the complexity of the
ML estimation scheme is reduced by employing a reduced set of
candidate values. In numerical results, it is demonstrated that the
proposed schemes provide a significant performance improvement
over the conventional estimation scheme in non-Gaussian noise
environments while maintaining the performance similar to the
estimation performance in Gaussian noise environments.
Abstract: Chloride induced corrosion of steel reinforcement is
the main cause of deterioration of reinforced concrete marine
structures. This paper investigates the relative performance of
alternative repair options with respect to the deterioration of
reinforced concrete bridge elements in marine environments. Focus is
placed on the initiation phase of reinforcement corrosion. A
laboratory study is described which involved exposing concrete
samples to accelerated chloride-ion ingress. The study examined the
relative efficiencies of two repair methods, namely Ordinary Portland
Cement (OPC) concrete and a concrete which utilised Ground
Granulated Blastfurnace Cement (GGBS) as a partial cement
replacement. The mix designs and materials utilised were identical to
those implemented in the repair of a marine bridge on the South East
coast of Ireland in 2007. The results of this testing regime serve to
inform input variables employed in probabilistic modelling of
deterioration for subsequent reliability based analysis to compare the
relative performance of the studied repair options.
Abstract: SAD (Sum of Absolute Difference) algorithm is
heavily used in motion estimation which is computationally highly
demanding process in motion picture encoding. To enhance the
performance of motion picture encoding on a VLIW processor, an
efficient implementation of SAD algorithm on the VLIW processor is
essential. SAD algorithm is programmed as a nested loop with a
conditional branch. In VLIW processors, loop is usually optimized by
software pipelining, but researches on optimal scheduling of software
pipelining for nested loops, especially nested loops with conditional
branches are rare. In this paper, we propose an optimal scheduling and
implementation of SAD algorithm with conditional branch on a VLIW
DSP processor. The proposed optimal scheduling first transforms the
nested loop with conditional branch into a single loop with conditional
branch with consideration of full utilization of ILP capability of the
VLIW processor and realization of earlier escape from the loop. Next,
the proposed optimal scheduling applies a modulo scheduling
technique developed for single loop. Based on this optimal scheduling
strategy, optimal implementation of SAD algorithm on TMS320C67x,
a VLIW DSP is presented. Through experiments on TMS320C6713
DSK, it is shown that H.263 encoder with the proposed SAD
implementation performs better than other H.263 encoder with other
SAD implementations, and that the code size of the optimal SAD
implementation is small enough to be appropriate for embedded
environments.
Abstract: Intelligent schools are those which use IT devices and
technologies as media software, hardware and networks to improve
learning process. On the other hand Strategic management is a field
that deals with the major intended and emergent initiatives taken by
general managers on behalf of owners, involving utilization of resources, to enhance the performance of firms in their external environments. Here, we present a model Strategic Management System that has been applied on some schools and have made strict
improvement.
Abstract: The following study aims to outline, whether the
perceptions of entrepreneurs about their entrepreneurial activities and
the underlying meanings of their activities are universal or whether
they vary systematically across cultures. In contrast to previous
studies, the phenomenographical approach and the resulting findings
of this study provide new insights into what constitutes
entrepreneurship by drawing an inference from the perceptions of
entrepreneurs in the United States and in Germany. Culture is shown
to have an important impact on entrepreneurship, since the
underlying meanings of entrepreneurship vary significantly among
the two sample groups. Furthermore, the study sheds more light on
the culturally contingent 'why' of entrepreneurship by looking at the
internal motivations of individuals instead of exclusively focusing on
character traits or external influences of the respective economic
environments.
Abstract: This paper examines ethical and social issues which
have proved important when initiating and creating educational spaces within a virtual environment. It focuses on one project, identifying the key decisions made, the barriers to new practice
encountered and the impact these had on the project. It demonstrates
the importance of the 'backstage' ethical and social issues involved in
the creation of a virtual education community and offers conclusions,
and questions, which will inform future research and practice in this
area. These ethical issues are considered using Knobel-s framework
of front-end, in-process and back-end concerns, and include
establishing social practices for the islands, allocating access rights,
considering personal safety and supporting researchers appropriately
within this context.
Abstract: This paper presents an optimized algorithm for robot localization which increases the correctness and accuracy of the estimating position of mobile robot to more than 150% of the past methods [1] in the uncertain and noisy environment. In this method the odometry and vision sensors are combined by an adapted well-known discrete kalman filter [2]. This technique also decreased the computation process of the algorithm by DKF simple implementation. The experimental trial of the algorithm is performed on the robocup middle size soccer robot; the system can be used in more general environments.
Abstract: Reliable secure multicast communication in mobile
adhoc networks is challenging due to its inherent characteristics of
infrastructure-less architecture with lack of central authority, high
packet loss rates and limited resources such as bandwidth, time and
power. Many emerging commercial and military applications require
secure multicast communication in adhoc environments. Hence key
management is the fundamental challenge in achieving reliable
secure communication using multicast key distribution for mobile
adhoc networks. Thus in designing a reliable multicast key
distribution scheme, reliability and congestion control over
throughput are essential components. This paper proposes and
evaluates the performance of an enhanced optimized multicast cluster
tree algorithm with destination sequenced distance vector routing
protocol to provide reliable multicast key distribution. Simulation
results in NS2 accurately predict the performance of proposed
scheme in terms of key delivery ratio and packet loss rate under
varying network conditions. This proposed scheme achieves
reliability, while exhibiting low packet loss rate with high key
delivery ratio compared with the existing scheme.
Abstract: This paper demonstrates a model of an e-Learning
system based on nowadays learning theory and distant education
practice. The relationships in the model are designed to be simple
and functional and do not necessarily represent any particular e-
Learning environments. It is meant to be a generic e-Learning
system model with implications for any distant education course
instructional design. It allows online instructors to move away from
the discrepancy between the courses and body of knowledge. The
interrelationships of four primary sectors that are at the e-Learning
system are presented in this paper. This integrated model includes
[1] pedagogy, [2] technology, [3] teaching, and [4] learning. There
are interactions within each of these sectors depicted by system loop
map.
Abstract: As German companies roll out their standardized
production systems to offshore manufacturing plants, they face the
challenge of implementing them in different cultural environments.
Studies show that the local adaptation is one of the key factors for a
successful implementation. Thus the question arises of where the line
between standardization and adaptation can be drawn. To answer
this question the influence of culture on production systems is
analysed in this paper. The culturally contingent components of
production systems are identified. Also the contingency factors are
classified according to their impact on the necessary adaptation
changes and implementation effort. Culturally specific decision
making, coordination, communication and motivation patterns
require one-time changes in organizational and process design. The
attitude towards rules requires more intense coaching and controlling.
Lastly a framework is developed to depict standardization and
adaption needs when transplanting production systems into different
cultural environments.