Abstract: Access control is a critical security service in Wire- less
Sensor Networks (WSNs). To prevent malicious nodes from joining
the sensor network, access control is required. On one hand, WSN
must be able to authorize and grant users the right to access to the
network. On the other hand, WSN must organize data collected by
sensors in such a way that an unauthorized entity (the adversary)
cannot make arbitrary queries. This restricts the network access only
to eligible users and sensor nodes, while queries from outsiders will
not be answered or forwarded by nodes. In this paper we presentee
different access control schemes so as to ?nd out their objectives,
provision, communication complexity, limits, etc. Using the node
density parameter, we also provide a comparison of these proposed
access control algorithms based on the network topology which can
be flat or hierarchical.
Abstract: Phishing, or stealing of sensitive information on the
web, has dealt a major blow to Internet Security in recent times. Most
of the existing anti-phishing solutions fail to handle the fuzziness
involved in phish detection, thus leading to a large number of false
positives. This fuzziness is attributed to the use of highly flexible and
at the same time, highly ambiguous HTML language. We introduce a
new perspective against phishing, that tries to systematically prove,
whether a given page is phished or not, using the corresponding
original page as the basis of the comparison. It analyzes the layout of
the pages under consideration to determine the percentage distortion
between them, indicative of any form of malicious alteration. The
system design represents an intelligent system, employing dynamic
assessment which accurately identifies brand new phishing attacks
and will prove effective in reducing the number of false positives.
This framework could potentially be used as a knowledge base, in
educating the internet users against phishing.
Abstract: This study proposes a conceptual model and
empirically tests the relationships between customers and librarians
(i.e. tangibles, responsiveness, assurance, reliability and empathy)
with a dependent variable (customer satisfaction) regarding library
services. The SERVQUAL instrument was administered to 100
respondents which comprises of staff and students at a public higher
learning institution in the Federal Territory of Labuan, Malaysia.
They were public university library users. Results revealed that all
service quality dimensions tested were significant and influenced
customer satisfaction of visitors to a public university library.
Assurance is the most important factor that influences customer
satisfaction with the services rendered by the librarian. It is
imperative for the library management to take note that the top five
service attributes that gained greatest attention from library visitors-
perspective includes employee willingness to help customers,
availability of customer representatives online for response to
queries, library staff actively and promptly provide services, signs in
the building are clear and library staff are friendly and courteous.
This study provides valuable results concerning the determinants of
the service quality and customer satisfaction of public university
library services from the users' perspective.
Abstract: Transaction management is one of the most crucial requirements for enterprise application development which often require concurrent access to distributed data shared amongst multiple application / nodes. Transactions guarantee the consistency of data records when multiple users or processes perform concurrent operations. Existing Fault Tolerance Infrastructure for Mobile Agents (FTIMA) provides a fault tolerant behavior in distributed transactions and uses multi-agent system for distributed transaction and processing. In the existing FTIMA architecture, data flows through the network and contains personal, private or confidential information. In banking transactions a minor change in the transaction can cause a great loss to the user. In this paper we have modified FTIMA architecture to ensure that the user request reaches the destination server securely and without any change. We have used triple DES for encryption/ decryption and MD5 algorithm for validity of message.
Abstract: Next generation networks with the idea of convergence of service and control layer in existing networks (fixed, mobile and data) and with the intention of providing services in an integrated network, has opened new horizon for telecom operators. On the other hand, economic problems have caused operators to look for new source of income including consider new services, subscription of more users and their promotion in using morenetwork resources and easy participation of service providers or 3rd party operators in utilizing networks. With this requirement, an architecture based on next generation objectives for service layer is necessary. In this paper, a new architecture based on IMS model explains participation of 3rd party operators in creation and implementation of services on an integrated telecom network.
Abstract: This study created new graphical icons and operating
functions in a CAD/CAM software system by analyzing icons in some
of the popular systems, such as AutoCAD, AlphaCAM, Mastercam
and the 1st edition of LiteCAM. These software systems all focused on
geometric design and editing, thus how to transmit messages
intuitively from icon itself to users is an important function of
graphical icons. The primary purpose of this study is to design
innovative icons and commands for new software.
This study employed the TRIZ method, an innovative design
method, to generate new concepts systematically. Through literature
review, it then investigated and analyzed the relationship between
TRIZ and idea development. Contradiction Matrix and 40 Principles
were used to develop an assisting tool suitable for icon design in
software development. We first gathered icon samples from the
selected CAD/CAM systems. Then grouped these icons by
meaningful functions, and compared useful and harmful properties.
Finally, we developed new icons for new software systems in order to
avoid intellectual property problem.
Abstract: Social media has led to paradigm shifts in ways
people work and do business, interact and socialize, learn and obtain
knowledge. So much so that social media has established itself as an
important spatial extension of this nation-s historicity and challenges.
Regardless of the enabling reputation and recommendation features
through social networks embedded in the social media system, the
overflow of broadcasted and publicized media contents turns the
table around from engendering trust to doubting the trust system.
When the trust is at doubt, the effects include deactivation of
accounts and creation of multiple profiles, which lead to the overflow
of 'ghost' contents (i.e. “the abundance of abandoned ships"). In
most literature, the study of trust can be related to culture; hence the
difference between Western-s “openness" and Eastern-s “blue-chip"
concepts in networking and relationships. From a survey on issues
and challenges among Malaysian social media users, 'authenticity'
emerges as one of the main factors that causes and is caused by other
factors. The other issue that has surfaced is credibility either in terms
of message/content and source. Another is the quality of the
knowledge that is shared. This paper explores the terrains of this
critical space which in recent years has been dominated increasingly
by, arguably, social networks embedded in the social media system,
the overflow of broadcasted and publicized media content.
Abstract: The purpose of this paper is to introduce an interactive online case-study library website developed in a national project. The design goal of the website is to provide interactive, enhanced, case-based and online educational resource for educators through the purpose and within the scope of a national project. The ADDIE instructional design model was used in the development of the website for interactive case-based library. This library is developed on a web-based platform, which is important in terms of manageability, accessibility, and updateability of data. Users are able to sort the displayed case-studies by their titles, dates, ratings, view counts, etc. The usability test is used and the expert opinion is taken for the evaluation of the website. This website is a tool to integrate technology into education. It is believed that this website will be beneficial for pre-service and in-service teachers in terms of their professional developments.
Abstract: Although achieving zero-defect software release is
practically impossible, software industries should take maximum
care to detect defects/bugs well ahead in time allowing only bare
minimums to creep into released version. This is a clear indicator of
time playing an important role in the bug detection. In addition to
this, software quality is the major factor in software engineering
process. Moreover, early detection can be achieved only through
static code analysis as opposed to conventional testing.
BugCatcher.Net is a static analysis tool, which detects bugs in .NET®
languages through MSIL (Microsoft Intermediate Language)
inspection. The tool utilizes a Parser based on Finite State Automata
to carry out bug detection. After being detected, bugs need to be
corrected immediately. BugCatcher.Net facilitates correction, by
proposing a corrective solution for reported warnings/bugs to end
users with minimum side effects. Moreover, the tool is also capable
of analyzing the bug trend of a program under inspection.
Abstract: Wikis are considered to be part of Web 2.0
technologies that potentially support collaborative learning and
writing. Wikis provide opportunities for multiple users to work on
the same document simultaneously. Most wikis have also a page for
written group discussion. Nevertheless, wikis may be used in
different ways depending on the pedagogy being used, and the
constraints imposed by the course design. This work explores
students- uses of wiki in teacher education. The analysis is based on a
taxonomy for classifying students- activities and actions carried out
on the wiki. The article also discusses the implications for using
wikis as collaborative writing tools in teacher education.
Abstract: Educational games (EG) seem to have lots of potential due to digital games popularity and preferences of our younger generations of learners. However, most studies focus on game design and its effectiveness while little has been known about the factors that can affect users to accept or to reject EG for their learning. User acceptance research try to understand the determinants of information systems (IS) adoption among users by investigating both systems factors and users factors. Upon the lack of knowledge on acceptance factors for educational games, we seek to understand the issue. This study proposed a model of acceptance factors based on Unified Theory of Acceptance and Use of Technology (UTAUT). We use original model (performance expectancy, effort expectancy and social influence) together with two new determinants (learning opportunities and enjoyment). We will also investigate the effect of gender and gaming experience that moderate the proposed factors.
Abstract: The third generation (3G) of cellular system adopted
the spread spectrum as solution for the transmission of the data in the
physical layer. Contrary to systems IS-95 or CDMAOne (systems
with spread spectrum of the preceding generation), the new standard,
called Universal Mobil Telecommunications System (UMTS), uses
long codes in the down link. The system is conceived for the vocal
communication and the transmission of the data. In particular, the
down link is very important, because of the asymmetrical request of
the data, i.e., more remote loading towards the mobiles than towards
the basic station. Moreover, the UMTS uses for the down link an
orthogonal spreading out with a variable factor of spreading out
(OVSF for Orthogonal Variable Spreading Factor). This
characteristic makes it possible to increase the flow of data of one or
more users by reducing their factor of spreading out without
changing the factor of spreading out of other users. In the current
standard of the UMTS, two techniques to increase the performances
of the down link were proposed, the diversity of sending antenna and
the codes space-time. These two techniques fight only fainding. The
receiver proposed for the mobil station is the RAKE, but one can
imagine a receiver more sophisticated, able to reduce the interference
between users and the impact of the coloured noise and interferences
to narrow band. In this context, where the users have long codes
synchronized with variable factor of spreading out and ignorance by
the mobile of the other active codes/users, the use of the sequences of
code pseudo-noises different lengths is presented in the form of one
of the most appropriate solutions.
Abstract: The paper is concerned with relationships between
SSME and ICTs and focuses on the role of Web 2.0 tools in
the service development process. The research presented aims at
exploring how collaborative technologies can support and improve
service processes, highlighting customer centrality and value coproduction.
The core idea of the paper is the centrality of user
participation and the collaborative technologies as enabling factors;
Wikipedia is analyzed as an example. The result of such analysis is
the identification and description of a pattern characterising specific
services in which users collaborate by means of web tools with value
co-producers during the service process. The pattern of collaborative
co-production concerning several categories of services including
knowledge based services is then discussed.
Abstract: Water has always been a very precious resource.
However, many of us do not fully understand or appreciate water-s
value until there will be a shortage. We intended to analyze the water
consumption into the Spanish households to understand their
behavior according to the habitants of the house. In this research was
carried out a survey of users, asking for water consumption of their
households. The aim of this paper is get a reference value of
consumers in Spanish households to help to check their bill and
realize if their consumption is excessive, including some tips to
decrease it.
Abstract: Human Computer Interaction (HCI) has been an
emerging field that draws in the experts from various fields to
enhance the application of computer programs and the ease of
computer users. HCI has much to do with learning and cognition and
an emerging approach to learning and problem-solving is problembased
learning (PBL). The processes of PBL involve important
cognitive functions in the various stages. This paper will illustrate
how closely related fields to HCI, PBL and cognitive psychology can
benefit from informing each other through analysing various
cognitive functions. Several cognitive functions from cognitive
function disc (CFD) would be presented and discussed in relation to
human-computer interface. This paper concludes with the
implications of bridging the gaps amongst these disciplines.
Abstract: Over the past few years, companies in developing
countries have implemented enterprise resource planning (ERP)
systems. Regardless of the various benefits of the ERP system, its
adoption and implementation have not been without problems. Many
companies have assigned considerable organizational resources to
their ERP projects, but have encountered unexpected challenges.
Neglecting a number of important factors in ERP projects might lead
to failure instead of success. User satisfaction is among those factors
that has a major influence on ERP implementation success. So, this
paper intends to investigate the key factors that create ERP users-
satisfaction and to discover whether ERP users- satisfaction varies
among different users- profiles. The study was conducted using a
survey questionnaire which was distributed to ERP users in Iranian
organizations. A total of 384 responses were collected and analyzed.
The findings indicated that younger ERP users tend to be more
satisfied with ERP systems. Furthermore, ERP users with more
experiences in IT and also more educated users have more
satisfaction with ERP softwares. However, the study found no
satisfaction differences between men and women users.
Abstract: The paper proposes an approach for design of modular
systems based on original technique for modeling and formulation of
combinatorial optimization problems. The proposed approach is
described on the example of personal computer configuration design.
It takes into account the existing compatibility restrictions between
the modules and can be extended and modified to reflect different
functional and users- requirements. The developed design modeling
technique is used to formulate single objective nonlinear mixedinteger
optimization tasks. The practical applicability of the
developed approach is numerically tested on the basis of real modules
data. Solutions of the formulated optimization tasks define the
optimal configuration of the system that satisfies all compatibility
restrictions and user requirements.
Abstract: The goal of this paper is to find Wardrop equilibrium
in transport networks at case of uncertainty situations, where the
uncertainty comes from lack of information. We use simulation tool
to find the equilibrium, which gives only approximate solution, but
this is sufficient for large networks as well. In order to take the
uncertainty into account we have developed an interval-based
procedure for finding the paths with minimal cost using the
Dempster-Shafer theory. Furthermore we have investigated the users-
behaviors using game theory approach, because their path choices
influence the costs of the other users- paths.
Abstract: With the proliferation of mobile computing technology, mobile learning (m-learning) will play a vital role in the rapidly growing electronic learning market. However, the acceptance of m-learning by individuals is critical to the successful implementation of m-learning systems. Thus, there is a need to research the factors that affect users- intention to use m-learning. Based on an updated information system (IS) success model, data collected from 350 respondents in Taiwan were tested against the research model using the structural equation modeling approach. The data collected by questionnaire were analyzed to check the validity of constructs. Then hypotheses describing the relationships between the identified constructs and users- satisfaction were formulated and tested.
Abstract: It is a challenge to provide a wide range of queries to
database query systems for small mobile devices, such as the PDAs
and cell phones. Currently, due to the physical and resource
limitations of these devices, most reported database querying systems
developed for them are only offering a small set of pre-determined
queries for users to possibly pose. The above can be resolved by
allowing free-form queries to be entered on the devices. Hence, a
query language that does not restrict the combination of query terms
entered by users is proposed. This paper presents the free-form query
language and the method used in translating free-form queries to
their equivalent SQL statements.