Abstract: To know whether students’ achievements are the result of online interaction and not just a consequence of individual differences themselves, it seems essential to link the teaching presence and social presence to the types of knowledge built. The research aim is to analyze the social presence in relation to two types of knowledge, declarative and procedural. Qualitative methodology has been used. The analysis of the contents was based on an observation protocol that included community of enquiry indicators and procedural and declarative knowledge indicators. The research has been conducted in three phases that focused on an observational protocol and indicators, results and conclusions. Results show that the teaching-learning processes have been characterized by the patterns of presence and types of knowledge. Results also show the importance of social presence support provided by the teacher and the students, not only in regard to the nature of the instructional support but also concerning how it is presented to the student and the importance that is attributed to it in the teaching-learning process, that is, what it is that assistance is offered on. In this study, we find that the presence based on procedural guidelines and declarative reflection, the management of shared meaning on the basis of the skills and the evidence of these skills entail patterns of learning. Nevertheless, the importance that the teacher attributes to each support aspect has a bearing on the extent to which the students reflect more on the given task.
Abstract: A digital baseband Application-Specific Integrated Circuit (ASIC) (yclic Redundancy Checkis developed for a microchip transponder to transmit signals and temperature levels from biomedical monitoring devices. The transmission protocol is adapted from the ISO/IEC 11784/85 standard. The module has a decimation filter that employs only a single adder-subtractor in its datapath. The filtered output is coded with cyclic redundancy check and transmitted through backscattering Load Shift Keying (LSK) modulation to a reader. Fabricated using the 0.18-μm CMOS technology, the module occupies 0.116 mm2 in chip area (digital baseband: 0.060 mm2, decimation filter: 0.056 mm2), and consumes a total of less than 0.9 μW of power (digital baseband: 0.75 μW, decimation filter: 0.14 μW).
Abstract: Web applications are an integral part of modem life. They are mostly based upon the HyperText Markup Language (HTML). While HTML meets the basic needs, there are some shortcomings. For example, applications can cease to work once user goes offline, real-time updates may be lagging, and user interface can freeze on computationally intensive tasks. The latest language specification HTML5 attempts to rectify the situation with new tools and protocols. This paper studies the new Web Storage, Geolocation, Web Worker, Canvas, and Web Socket APIs, and presents applications to test their features and efficiencies.
Abstract: Web service adaptation involves the creation of adapters that solve Web services incompatibilities known as mismatches. Since the importance of Web services adaptation is increasing because of the frequent implementation and use of online Web services, this paper presents a literature review of web services to investigate the main methods of adaptation, their theoretical underpinnings and the metrics used to measure adapters performance. Eighteen publications were reviewed independently by two researchers. We found that adaptation techniques are needed to solve different types of problems that may arise due to incompatibilities in Web service interfaces, including protocols, messages, data and semantics that affect the interoperability of the services. Although adapters are non-invasive methods that can improve Web services interoperability and there are current approaches for service adaptation; there is, however, not yet one solution that fits all types of mismatches. Our results also show that only a few research projects incorporate theoretical frameworks and that metrics to measure adapters’ performance are very limited. We conclude that further research on software adaptation should improve current adaptation methods in different layers of the service interoperability and that an adaptation theoretical framework that incorporates a theoretical underpinning and measures of qualitative and quantitative performance needs to be created.
Abstract: Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.
Abstract: Wireless Body Area Network (WBAN) is a short-range
wireless communication around human body for various applications
such as wearable devices, entertainment, military, and especially
medical devices. WBAN attracts the attention of continuous health
monitoring system including diagnostic procedure, early detection of
abnormal conditions, and prevention of emergency situations.
Compared to cellular network, WBAN system is more difficult to
control inter- and inner-cell interference due to the limited power,
limited calculation capability, mobility of patient, and
non-cooperation among WBANs.
In this paper, we compare the performance of resource allocation
scheme based on several Pseudo Orthogonal Codewords (POCs) to
mitigate inter-WBAN interference. Previously, the POCs are widely
exploited for a protocol sequence and optical orthogonal code. Each
POCs have different properties of auto- and cross-correlation and
spectral efficiency according to its construction of POCs. To identify
different WBANs, several different pseudo orthogonal patterns based
on POCs exploits for resource allocation of WBANs. By simulating
these pseudo orthogonal resource allocations of WBANs on
MATLAB, we obtain the performance of WBANs according to
different POCs and can analyze and evaluate the suitability of POCs
for the resource allocation in the WBANs system.
Abstract: In this paper, we analyze NEtwork MObility (NEMO) supporting problems in Content-Centric Networking (CCN), and propose the CCN-NEMO which can well support the deployment of the content-centric paradigm in large-scale mobile Internet. The CCN-NEMO extends the signaling message of the basic CCN protocol, to support the mobility discovery and fast trigger of Interest re-issuing during the network mobility. Besides, the Mobile Router (MR) is extended to optimize the content searching and relaying in the local subnet. These features can be employed by the nested NEMO to maximize the advantages of content retrieving with CCN. Based on the analysis, we compare the performance on handover latency between the basic CCN and our proposed CCN-NEMO. The results show that our scheme can facilitate the content-retrieving in the NEMO scenario with improved performance.
Abstract: Automatic License plate recognition (ALPR) is a technology which recognizes the registration plate or number plate or License plate of a vehicle. In this paper, an Indian vehicle number plate is mined and the characters are predicted in efficient manner. ALPR involves four major technique i) Pre-processing ii) License Plate Location Identification iii) Individual Character Segmentation iv) Character Recognition. The opening phase, named pre-processing helps to remove noises and enhances the quality of the image using the conception of Morphological Operation and Image subtraction. The second phase, the most puzzling stage ascertain the location of license plate using the protocol Canny Edge detection, dilation and erosion. In the third phase, each characters characterized by Connected Component Approach (CCA) and in the ending phase, each segmented characters are conceptualized using cross correlation template matching- a scheme specifically appropriate for fixed format. Major application of ALPR is Tolling collection, Border Control, Parking, Stolen cars, Enforcement, Access Control, Traffic control. The database consists of 500 car images taken under dissimilar lighting condition is used. The efficiency of the system is 97%. Our future focus is Indian Vehicle License Plate Validation (Whether License plate of a vehicle is as per Road transport and highway standard).
Abstract: Knowledge transfer between personnel could benefit an organization’s improved competitive advantage in the marketplace from a strategic approach to knowledge management. The lack of information sharing between personnel could create knowledge transfer gaps while restricting the decision-making processes. Knowledge transfer between personnel can potentially improve information sharing based on an implemented knowledge management strategy. An organization’s capacity to gain more knowledge is aligned with the organization’s prior or existing captured knowledge. This case study attempted to understand the overall influence of a KMS within the corporate environment and knowledge exchange between personnel. The significance of this study was to help understand how organizations can improve the Return on Investment (ROI) of a knowledge management strategy within a knowledge-centric organization. A qualitative descriptive case study was the research design selected for this study. The lack of information sharing between personnel may create knowledge transfer gaps while restricting the decision-making processes. Developing a knowledge management strategy acceptable at all levels of the organization requires cooperation in support of a common organizational goal. Working with management and executive members to develop a protocol where knowledge transfer becomes a standard practice in multiple tiers of the organization. The knowledge transfer process could be measurable when focusing on specific elements of the organizational process, including personnel transition to help reduce time required understanding the job. The organization studied in this research acknowledged the need for improved knowledge management activities within the organization to help organize, retain, and distribute information throughout the workforce. Data produced from the study indicate three main themes including information management, organizational culture, and knowledge sharing within the workforce by the participants. These themes indicate a possible connection between an organizations KMS, the organizations culture, knowledge sharing, and knowledge transfer.
Abstract: This paper discusses the intake of combining multi-criteria
decision analysis (MCDA) with OLAP systems, to generate
an integrated analysis process dealing with complex multi-criteria
decision-making situations. In this context, a multi-agent modeling is
presented for decision support systems by combining multi-criteria
decision analysis (MCDA) with OLAP systems. The proposed
modeling which consists in performing the multi-agent system
(MAS) architecture, procedure and protocol of the negotiation model
is elaborated as a decision support tool for complex decision-making
environments. Our objective is to take advantage from the multi-agent
system which distributes resources and computational
capabilities across interconnected agents, and provide a problem
modeling in terms of autonomous interacting component-agents.
Thus, the identification and evaluation of criteria as well as the
evaluation and ranking of alternatives in a decision support situation
will be performed by organizing tasks and user preferences between
different agents in order to reach the right decision. At the end, an
illustrative example is conducted to demonstrate the function and
effectiveness of our MAS modeling.
Abstract: E-Learning enables the users to learn at anywhere at
any time. In E-Learning systems, authenticating the E-Learning user
has security issues. The usage of appropriate communication
networks for providing the internet connectivity for E-learning is
another challenge. WiMAX networks provide Broadband Wireless
Access through the Multicast Broadcast Service so these networks
can be most suitable for E-Learning applications. The authentication
of E-Learning user is vulnerable to session hijacking problems. The
repeated authentication of users can be done to overcome these
issues. In this paper, session based Profile Caching Authentication is
proposed. In this scheme, the credentials of E-Learning users can be
cached at authentication server during the initial authentication
through the appropriate subscriber station. The proposed cache based
authentication scheme performs fast authentication by using cached
user profile. Thus, the proposed authentication protocol reduces the
delay in repeated authentication to enhance the security in ELearning.
Abstract: Many cluster based routing protocols have been
proposed in the field of wireless sensor networks, in which a group of
nodes are formed as clusters. A cluster head is selected from one
among those nodes based on residual energy, coverage area, number
of hops and that cluster-head will perform data gathering from
various sensor nodes and forwards aggregated data to the base station
or to a relay node (another cluster-head), which will forward the
packet along with its own data packet to the base station. Here a
Game Theory based Diligent Energy Utilization Algorithm (GTDEA)
for routing is proposed. In GTDEA, the cluster head selection is done
with the help of game theory, a decision making process, that selects
a cluster-head based on three parameters such as residual energy
(RE), Received Signal Strength Index (RSSI) and Packet Reception
Rate (PRR). Finding a feasible path to the destination with minimum
utilization of available energy improves the network lifetime and is
achieved by the proposed approach. In GTDEA, the packets are
forwarded to the base station using inter-cluster routing technique,
which will further forward it to the base station. Simulation results
reveal that GTDEA improves the network performance in terms of
throughput, lifetime, and power consumption.
Abstract: This paper describes an ab-initio design, development and calibration results of an Optical Sensor Ground Reaction Force Measurement Platform (OSGRFP) for gait and geriatric studies. The developed system employs an array of FBG sensors to measure the respective ground reaction forces from all three axes (X, Y and Z), which are perpendicular to each other. The novelty of this work is two folded. One is in its uniqueness to resolve the tri axial resultant forces during the stance in to the respective pure axis loads and the other is the applicability of inherently advantageous FBG sensors which are most suitable for biomechanical instrumentation. To validate the response of the FBG sensors installed in OSGRFP and to measure the cross sensitivity of the force applied in other directions, load sensors with indicators are used. Further in this work, relevant mathematical formulations are presented for extracting respective ground reaction forces from wavelength shifts/strain of FBG sensors on the OSGRFP. The result of this device has implications in understanding the foot function, identifying issues in gait cycle and measuring discrepancies between left and right foot. The device also provides a method to quantify and compare relative postural stability of different subjects under test, which has implications in post-surgical rehabilitation, geriatrics and optimizing training protocols for sports personnel.
Abstract: At the Savonia University of Applied Sciences (UAS),
curriculum and studies have been improved by applying an Open
Innovation Space approach (OIS). It is based on multidisciplinary
action learning. The key elements of OIS-ideology are work-life
orientation, and student-centric communal learning. In this approach,
every participant can learn from each other and innovations will be
created. In this social innovation educational approach, all practices
are carried out in close collaboration with enterprises in real-life
settings, not in classrooms. As an example, in this paper, Savonia
UAS’s Future Food RDI hub (FF) shows how OIS practices are
implemented by providing food product development and consumer
research services for enterprises in close collaboration with
academicians, students and consumers. In particular one example of
OIS experimentation in the field is provided by a consumer research
carried out utilizing verbal analysis protocol combined with audiovisual
observation (VAP-WAVO). In this case, all co-learners were
acting together in supermarket settings to collect the relevant data for
a product development and the marketing department of a company.
The company benefitted from the results obtained, students were
more satisfied with their studies, educators and academicians were
able to obtain good evidence for further collaboration as well as
renewing curriculum contents based on the requirements of working
life. In addition, society will benefit over time as young university
adults find careers more easily through their OIS related food science
studies. Also this knowledge interaction model re-news education
practices and brings working-life closer to educational research
institutes.
Abstract: In this paper, an attempt has been made for the design
of a robotic library using an intelligent system. The robot works on
the ARM microprocessor, motor driver circuit with 5 degrees of
freedom with Wi-Fi and GPS based communication protocol. The
authenticity of the library books is controlled by RFID. The proposed
robotic library system is facilitated with embedded system and ARM.
In this library issuance system, the previous potential readers’
authentic review reports have been taken into consideration for
recommending suitable books to the deserving new users and the
issuance of books or periodicals is based on the users’ decision. We
have conjectured that the Wi-Fi based robotic library management
system would allow fast transaction of books issuance and it also
produces quality readers.
Abstract: In India, most of the pavement is laid by bituminous
road and the consumption of binder is high for pavement construction
and also modified binders are used to satisfy any specific pavement
requirement. Since the binders are visco-elastic material which is
having the mechanical properties of binder transition from viscoelastic
solid to visco-elastic fluid. In this paper, two different
protocols were used to measure the viscosity property of binder using
a Brookfield Viscometer and there is a need to find the appropriate
mixing and compaction temperatures of various types of binders
which can result in complete aggregate coating and adequate field
density of HMA mixtures. The aim of this work is to find the
transition temperature from Non-Newtonian behavior to Newtonian
behavior of the binder by adopting a steady shear protocol and the
shear rate ramp protocol. The transition from non-Newtonian to
Newtonian can occur through an increase of temperature and shear of
the material. The test has been conducted for unmodified binder VG
30. The transition temperature was found in the unmodified binder
VG is 120oC. Therefore, the application of both modified binder and
unmodified binder in the pavement construction needs to be studied
properly by considering temperature and traffic loading factors of the
respective project site.
Abstract: Small-size and low-power sensors with sensing, signal
processing and wireless communication capabilities is suitable for the
wireless sensor networks. Due to the limited resources and battery
constraints, complex routing algorithms used for the ad-hoc networks
cannot be employed in sensor networks. In this paper, we propose
node-disjoint multi-path hexagon-based routing algorithms in wireless
sensor networks. We suggest the details of the algorithm and compare
it with other works. Simulation results show that the proposed scheme
achieves better performance in terms of efficiency and message
delivery ratio.
Abstract: The question of legal liability over injury arising out
of the import and the introduction of GM food emerges as a crucial
issue confronting to promote GM food and its derivatives. There is a
greater possibility of commercialized GM food from the exporting
country to enter importing country where status of approval shall not
be same. This necessitates the importance of fixing a liability
mechanism to discuss the damage, if any, occurs at the level of
transboundary movement or at the market. There was a widespread consensus to develop the Cartagena
Protocol on Biosafety and to give for a dedicated regime on liability
and redress in the form of Nagoya Kuala Lumpur Supplementary
Protocol on the Liability and Redress (‘N-KL Protocol’) at the
international context. The national legal frameworks based on this
protocol are not adequately established in the prevailing food
legislations of the developing countries. The developing economy
like India is willing to import GM food and its derivatives after the
successful commercialization of Bt Cotton in 2002. As a party to the
N-KL Protocol, it is indispensable for India to formulate a legal
framework and to discuss safety, liability, and regulatory issues
surrounding GM foods in conformity to the provisions of the
Protocol. The liability mechanism is also important in the case where
the risk assessment and risk management is still in implementing
stage. Moreover, the country is facing GM infiltration issues with its
neighbors Bangladesh. As a precautionary approach, there is a need
to formulate rules and procedure of legal liability to discuss any kind
of damage occurs at transboundary trade. In this context, the
proposed work will attempt to analyze the liability regime in the
existing Food Safety and Standards Act, 2006 from the applicability
and domestic compliance and to suggest legal and policy options for
regulatory authorities.
Abstract: Opportunistic Routing (OR) increases the
transmission reliability and network throughput. Traditional routing
protocols preselects one or more predetermined nodes before
transmission starts and uses a predetermined neighbor to forward a
packet in each hop. The opportunistic routing overcomes the
drawback of unreliable wireless transmission by broadcasting one
transmission can be overheard by manifold neighbors. The first
cooperation-optimal protocol for Multirate OR (COMO) used to
achieve social efficiency and prevent the selfish behavior of the
nodes. The novel link-correlation-aware OR improves the
performance by exploiting the miscellaneous low correlated forward
links. Context aware Adaptive OR (CAOR) uses active suppression
mechanism to reduce packet duplication. The Context-aware OR
(COR) can provide efficient routing in mobile networks. By using
Cooperative Opportunistic Routing in Mobile Ad hoc Networks
(CORMAN), the problem of opportunistic data transfer can be
tackled. While comparing to all the protocols, COMO is the best as it
achieves social efficiency and prevents the selfish behavior of the
nodes.
Abstract: Routing in adhoc networks is a challenge as nodes are
mobile, and links are constantly created and broken. Present ondemand
adhoc routing algorithms initiate route discovery after a path
breaks, incurring significant cost to detect disconnection and
establish a new route. Specifically, when a path is about to be broken,
the source is warned of the likelihood of a disconnection. The source
then initiates path discovery early, avoiding disconnection totally. A
path is considered about to break when link availability decreases.
This study modifies Adhoc On-demand Multipath Distance Vector
routing (AOMDV) so that route handoff occurs through link
availability estimation.