Abstract: Nowadays, organizing a repository of documents and
resources for learning on a special field as Information Technology
(IT), together with search techniques based on domain knowledge or
document-s content is an urgent need in practice of teaching, learning
and researching. There have been several works related to methods of
organization and search by content. However, the results are still
limited and insufficient to meet user-s demand for semantic
document retrieval. This paper presents a solution for the
organization of a repository that supports semantic representation and
processing in search. The proposed solution is a model which
integrates components such as an ontology describing domain
knowledge, a database of document repository, semantic
representation for documents and a file system; with problems,
semantic processing techniques and advanced search techniques
based on measuring semantic similarity. The solution is applied to
build a IT learning materials management system of a university with
semantic search function serving students, teachers, and manager as
well. The application has been implemented, tested at the University
of Information Technology, Ho Chi Minh City, Vietnam and has
achieved good results.
Abstract: Knowledge management is a process taking any steps
that needed to get the most out of available knowledge resources.
KM involved several steps; capturing the knowledge discovering
new knowledge, sharing the knowledge and applied the knowledge in
the decision making process. In applying the knowledge, it is not
necessary for the individual that use the knowledge to comprehend it
as long as the available knowledge is used in guiding the decision
making and actions. When an expert is called and he provides stepby-
step procedure on how to solve the problems to the caller, the
expert is transferring the knowledge or giving direction to the caller.
And the caller is 'applying' the knowledge by following the
instructions given by the expert. An appropriate mechanism is
needed to ensure effective knowledge transfer which in this case is
by telephone or email. The problem with email and telephone is that
the knowledge is not fully circulated and disseminated to all users. In
this paper, with related experience of local university Help Desk, it is
proposed the usage of Information Technology (IT)to effectively
support the knowledge transfer in the organization. The issues
covered include the existing knowledge, the related works, the
methodology used in defining the knowledge management
requirements as well the overview of the prototype.
Abstract: In this paper, we employ the approach of linear
programming to propose a new interactive broadcast method. In our
method, a film S is divided into n equal parts and broadcast via k
channels. The user simultaneously downloads these segments from k
channels into the user-s set-top-box (STB) and plays them in order.
Our method assumes that the initial p segments will not have
fast-forwarding capabilities. Every time the user wants to initiate d
times fast-forwarding, according to our broadcasting strategy, the
necessary segments already saved in the user-s STB or are just
download on time for playing. The proposed broadcasting strategy not
only allows the user to pause and rewind, but also to fast-forward.
Abstract: Images are important in disease research, education,
and clinical medicine. This paper presents a Web Service Platform
(WSP) for support multiple programming languages to access image
from biomedical databases. The main function WSP is to allow web
users access image from biomedical databases. The WSP will
receive web user-s queries. After that, it will send to Querying
Server (QS) and the QS will search and retrieve data from
biomedical databases. Finally, the information will display to the
web users. Simple application is developed and tested for
experiment purpose. Result from experiment indicated WSP can be
used in biomedical environment.
Abstract: Online auctions are not very popular in Croatia. The
main reason for this is a very limited number of services which can
be used by Croatian users. Until recent times, even selling through
the most popular online auction site eBay wasn't possible because
PayPal services could not make payment to bank or debit card
accounts in Croatia. Furthermore, many foreign sellers do not offer
delivery of their products to Croatia which means that large
quantities of goods initially offered on such sites are not available.
With that in mind, it is necessary to analyze the buying and selling
habits of Croatian users and existing online auction sites, both
Croatian and foreign, and create a model for new domestic site. This
site will have to exploit every positive aspect of existing models and
neutralize every negative perception indicated by users in the survey
so that, hopefully, it would attract new users.
Abstract: Internet security attack could endanger the privacy of
World Wide Web users and the integrity of their data. The attack can
be carried out on today's most secure systems- browsers, including
Netscape Navigator and Microsoft Internet Explorer. There are too
many types, methods and mechanisms of attack where new attack
techniques and exploits are constantly being developed and
discovered. In this paper, various types of internet security attack
mechanisms are explored and it is pointed out that when different
types of attacks are combined together, network security can suffer
disastrous consequences.
Abstract: One of the essential requirements in order to have a
realistic surgical simulator is real-time interaction by means of a
haptic interface is. In fact, reproducing haptic sensations increases
the realism of the simulation. However, the interaction need to be
performed in real-time, since a delay between the user action and the
system reaction reduces the user immersion. In this paper, we present
a prototype of the coronary stent implant simulator developed in the
HERMES Project; this system allows real-time interactions with a
artery by means of a specific haptic device; thus the user can
interactively navigate in a reconstructed artery and force feedback is
produced when contact occurs between the artery walls and the
medical instruments
Abstract: According as the Architecture, Engineering and Construction (AEC) Industry projects have grown more complex and larger, the number of utilization of BIM for 3D design and simulation is increasing significantly. Therefore, typical applications of BIM such as clash detection and alternative measures based on 3-dimenstional planning are expanded to process management, cost and quantity management, structural analysis, check for regulation, and various domains for virtual design and construction. Presently, commercial BIM software is operated on single-user environment, so initial cost is so high and the investment may be wasted frequently. Cloud computing that is a next-generation internet technology enables simple internet devices (such as PC, Tablet, Smart phone etc) to use services and resources of BIM software. In this paper, we suggested developing method of the BIM software based on cloud computing environment in order to expand utilization of BIM and reduce cost of BIM software. First, for the benchmarking, we surveyed successful case of BIM and cloud computing. And we analyzed needs and opportunities of BIM and cloud computing in AEC Industry. Finally, we suggested main functions of BIM software based on cloud computing environment and developed a simple prototype of cloud computing BIM software for basic BIM model viewing.
Abstract: This paper explores the opportunity of using tri-axial
wireless accelerometers for supervised monitoring of sports
movements. A motion analysis system for the upper extremities of
lawn bowlers in particular is developed. Accelerometers are placed
on parts of human body such as the chest to represent the shoulder
movements, the back to capture the trunk motion, back of the hand,
the wrist and one above the elbow, to capture arm movements. These
sensors placement are carefully designed in order to avoid restricting
bowler-s movements. Data is acquired from these sensors in soft-real
time using virtual instrumentation; the acquired data is then
conditioned and converted into required parameters for motion
regeneration. A user interface was also created to facilitate in the
acquisition of data, and broadcasting of commands to the wireless
accelerometers. All motion regeneration in this paper deals with the
motion of the human body segment in the X and Y direction, looking
into the motion of the anterior/ posterior and lateral directions
respectively.
Abstract: The emergence of mobile application services and App
Store has led to the explosive growth of user innovation, which users
voluntarily contribute to. User innovation communities where end
users freely reveal innovative ideas and needs with other community
members are becoming increasingly influential in this area. However,
user-s ideas in user innovation community are not enough to be new
service opportunity, because some of them can already developed as
existing services in App Store. Moreover, the existing services similar
to new service opportunity can be significant references to apply
analogy to develop service concept. In response, this research
proposes Case-Based Reasoning approach to matching the user needs
and existing services, identifying unmet opportunistic user needs, and
retrieving similar services with opportunity. Due to its intuitive and
transparent algorithm, users related to App Store innovation
communities can easily employ Case-Based Reasoning based
approach to their innovation.
Abstract: In this work a surgical simulator is produced which
enables a training otologist to conduct a virtual, real-time prosthetic
insertion. The simulator provides the Ear, Nose and Throat surgeon
with real-time visual and haptic responses during virtual cochlear
implantation into a 3D model of the human Scala Tympani (ST). The
parametric model is derived from measured data as published in the
literature and accounts for human morphological variance, such as
differences in cochlear shape, enabling patient-specific pre- operative
assessment. Haptic modeling techniques use real physical data and
insertion force measurements, to develop a force model which
mimics the physical behavior of an implant as it collides with the ST
walls during an insertion. Output force profiles are acquired from the
insertion studies conducted in the work, to validate the haptic model.
The simulator provides the user with real-time, quantitative insertion
force information and associated electrode position as user inserts the
virtual implant into the ST model. The information provided by this
study may also be of use to implant manufacturers for design
enhancements as well as for training specialists in optimal force
administration, using the simulator. The paper reports on the methods
for anatomical modeling and haptic algorithm development, with
focus on simulator design, development, optimization and validation.
The techniques may be transferrable to other medical applications
that involve prosthetic device insertions where user vision is
obstructed.
Abstract: The resident registration number was adopted for the purposes of enhanced services for resident convenience and effective performance of governmental administrative affairs. However, it has been used for identification purposes customarily and irrationally in line with the development and spread of the Internet. In response to the growing concern about the leakage of collected RRNs and possible abuses of stolen RRNs, e.g. identity theft, for crimes, the Korean Communications Commission began to take legal/regulatory actions in 2011 to minimize the online collection and use of resident registration numbers. As the use of the RRN was limited after the revision of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc., online business providers were required to have alternatives to the RRN for the purpose of identifying the user's identity and age, in compliance with the law, and settling disputes with customers. This paper presents means of verifying the personal identity by taking advantage of the commonly used infrastructure and simply replacing personal information entered and stored, without requiring users to enter their RRNs.
Abstract: Despite the fact that B2c eCommerce has become
important in numerous economies, its adoption varies from country to
country. This paper aims to identify the factors affecting (enabling or
inhibiting) B2c eCommerce and to determine their quantitative
impact on the diffusion of online sales across countries. A dynamic
panel model analyzing the relationship between 13 factors
(Macroeconomic, Demographic, Socio-Cultural, Infrastructural and
Offer related) stemming from a complete literature analysis and the
B2c eCommerce value in 45 countries over 9 years has been
developed. Having a positive correlation coefficient, GDP, mobile
penetration, Internet user penetration and credit card penetration
resulted as enabling drivers of the B2c eCommerce value across
countries, whereas, having a negative correlation coefficient,equal
distribution of income and the development of traditional retailing
network act as inhibiting factors.
Abstract: In this paper we present a generic approach for the problem of the blind estimation of the parameters of linear and convolutional error correcting codes. In a non-cooperative context, an adversary has only access to the noised transmission he has intercepted. The intercepter has no knowledge about the parameters used by the legal users. So, before having acess to the information he has first to blindly estimate the parameters of the error correcting code of the communication. The presented approach has the main advantage that the problem of reconstruction of such codes can be expressed in a very simple way. This allows us to evaluate theorical bounds on the complexity of the reconstruction process but also bounds on the estimation rate. We show that some classical reconstruction techniques are optimal and also explain why some of them have theorical complexities greater than these experimentally observed.
Abstract: The increasing influence of traffic on building
objects and people residing in them should be taken into account in
diagnosis and design. Users of buildings expect that vibrations
occurring in their environment, will not only lead to damage to the
building or its accelerated wear, but neither would affect the required
comfort in rooms designed to accommodate people. This article
describes the methods and principles useful in designing and building
diagnostics located near transportation routes, with particular
emphasis on the impact of traffic vibration on people in buildings. It
also describes the procedures used in obtaining information about the
parameters of vibrations in different cases of diagnostics and design.
A universal algorithm of procedure in diagnostics and design of
buildings taking into account assurance of human vibration comfort
of people residing in the these buildings was presented.
Abstract: In this paper, hybrid FDMA-TDMA access technique in a cooperative distributive fashion introducing and implementing a modified protocol introduced in [1] is analyzed termed as Power and Cooperation Diversity Gain Protocol (PCDGP). A wireless network consists of two users terminal , two relays and a destination terminal equipped with two antennas. The relays are operating in amplify-and-forward (AF) mode with a fixed gain. Two operating modes: cooperation-gain mode and powergain mode are exploited from source terminals to relays, as it is working in a best channel selection scheme. Vertical BLAST (Bell Laboratories Layered Space Time) or V-BLAST with minimum mean square error (MMSE) nulling is used at the relays to perfectly detect the joint signals from multiple source terminals. The performance is analyzed using binary phase shift keying (BPSK) modulation scheme and investigated over independent and identical (i.i.d) Rayleigh, Ricean-K and Nakagami-m fading environments. Subsequently, simulation results show that the proposed scheme can provide better signal quality of uplink users in a cooperative communication system using hybrid FDMATDMA technique.
Abstract: In this paper we propose a novel approach for
searching eCommerce products using a mobile phone, illustrated by a
prototype eCoMobile. This approach aims to globalize the mobile
search by integrating the concept of user multilinguism into it. To
show that, we particularly deal with English and Arabic languages.
Indeed the mobile user can formulate his query on a commercial
product in either language (English/Arabic). The description of his
information need on commercial products relies on the ontology that
represents the conceptualization of the product catalogue knowledge
domain defined in both English and Arabic languages. A query
expressed on a mobile device client defines the concept that
corresponds to the name of the product followed by a set of pairs
(property, value) specifying the characteristics of the product. Once a
query is submitted it is then communicated to the server side which
analyses it and in its turn performs an http request to an eCommerce
application server (like Amazon). This latter responds by returning
an XML file representing a set of elements where each element
defines an item of the searched product with its specific
characteristics. The XML file is analyzed on the server side and then
items are displayed on the mobile device client along with its
relevant characteristics in the chosen language.
Abstract: Fair share objective has been included into the goaloriented
parallel computer job scheduling policy recently. However,
the previous work only presented the overall scheduling performance.
Thus, the per-user performance of the policy is still lacking. In this
work, the details of per-user fair share performance under the
Tradeoff-fs(Tx:avgX) policy will be further evaluated. A basic fair
share priority backfill policy namely RelShare(1d) is also studied.
The performance of all policies is collected using an event-driven
simulator with three real job traces as input. The experimental results
show that the high demand users are usually benefited under most
policies because their jobs are large or they have a lot of jobs. In the
large job case, one job executed may result in over-share during that
period. In the other case, the jobs may be backfilled for
performances. However, the users with a mixture of jobs may suffer
because if the smaller jobs are executing the priority of the remaining
jobs from the same user will be lower. Further analysis does not show
any significant impact of users with a lot of jobs or users with a large
runtime approximation error.
Abstract: The NGN (Next Generation Network), which can
provide advanced multimedia services over an all-IP based network, has been the subject of much attention for years. While there have
been tremendous efforts to develop its architecture and protocols, especially for IMS, which is a key technology of the NGN, it is far
from being widely deployed. However, efforts to create an advanced
signaling infrastructure realizing many requirements have resulted in a
large number of functional components and interactions between those
components. Thus, the carriers are trying to explore effective ways to
deploy IMS while offering value-added services. As one such
approach, we have proposed a self-organizing IMS. A self-organizing
IMS enables IMS functional components and corresponding physical
nodes to adapt dynamically and automatically based on situation such
as network load and available system resources while continuing IMS
operation. To realize this, service continuity for users is an important
requirement when a reconfiguration occurs during operation. In this
paper, we propose a mechanism that will provide service continuity to
users and focus on the implementation and describe performance
evaluation in terms of number of control signaling and processing time
during reconfiguration