Abstract: In recent years, we see an increase of interest for efficient tracking systems in surveillance applications. Many of the proposed techniques are designed for static cameras environments. When the camera is moving, tracking moving objects become more difficult and many techniques fail to detect and track the desired targets. The problem becomes more complex when we want to track a specific object in real-time using a moving Pan and Tilt camera system to keep the target within the image. This type of tracking is of high importance in surveillance applications. When a target is detected at a certain zone, the possibility of automatically tracking it continuously and keeping it within the image until action is taken is very important for security personnel working in very sensitive sites. This work presents a real-time tracking system permitting the detection and continuous tracking of targets using a Pan and Tilt camera platform. A novel and efficient approach for dealing with occlusions is presented. Also a new intelligent forget factor is introduced in order to take into account target shape variations and avoid learning non desired objects. Tests conducted in outdoor operational scenarios show the efficiency and robustness of the proposed approach.
Abstract: In recent years there has been renewal of interest in the
relation between Green IT and Cloud Computing. The growing use of
computers in cloud platform has caused marked energy consumption,
putting negative pressure on electricity cost of cloud data center. This
paper proposes an effective mechanism to reduce energy utilization in
cloud computing environments. We present initial work on the
integration of resource and power management that aims at reducing
power consumption. Our mechanism relies on recalling virtualization
services dynamically according to user-s virtualization request and
temporarily shutting down the physical machines after finish in order
to conserve energy. Given the estimated energy consumption, this
proposed effort has the potential to positively impact power
consumption. The results from the experiment concluded that energy
indeed can be saved by powering off the idling physical machines in
cloud platforms.
Abstract: Mobile agent has motivated the creation of a new
methodology for parallel computing. We introduce a methodology
for the creation of parallel applications on the network. The proposed
Mobile-Agent parallel processing framework uses multiple Javamobile
Agents. Each mobile agent can travel to the specified
machine in the network to perform its tasks. We also introduce the
concept of master agent, which is Java object capable of
implementing a particular task of the target application. Master agent
is dynamically assigns the task to mobile agents. We have developed
and tested a prototype application: Mobile Agent Based Parallel
Computing. Boosted by the inherited benefits of using Java and
Mobile Agents, our proposed methodology breaks the barriers
between the environments, and could potentially exploit in a parallel
manner all the available computational resources on the network.
This paper elaborates performance issues of a mobile agent for
parallel computing.
Abstract: This paper describes the two actual tendencies in the
software development process usage: 'Scrum' and 'work in home
office'. It-s exposed the four main challenges to adopt Scrum
framework for distributed teams in this cited kind of work. The
challenges are mainly based on the communication problems due
distances since the Scrum encourages the team to work together in
the same room, and this is not possible when people work distributed
in their homes.
Abstract: We propose that Virtual Learning Environments (VLEs) should be designed by taking into account the characteristics, the special needs and the specific operating rules of the academic institutions in which they are employed. In this context, we describe a VLE module that extends the support of the organization and delivery of course material by including administration activities related to the various stages of teaching. These include the co-ordination, collaboration and monitoring of the course material development process and institution-specific course material delivery modes. Our specialized module, which enhances VLE capabilities by Helping Educators and Learners through a Laboratory Assistance System, is willing to assist the Greek tertiary technological sector, which includes Technological Educational Institutes (T.E.I.).
Abstract: The bit error rate (BER) performance for ultra-wide
band (UWB) indoor communication with impact of metallic furniture
is investigated. The impulse responses of different indoor
environments for any transmitter and receiver location are computed
by shooting and bouncing ray/image and inverse Fourier transform
techniques. By using the impulse responses of these multipath
channels, the BER performance for binary pulse amplitude
modulation (BPAM) impulse radio UWB communication system are
calculated. Numerical results have shown that the multi-path effect
by the metallic cabinets is an important factor for BER performance.
Also the outage probability for the UWB multipath environment with
metallic cabinets is more serious (about 18%) than with wooden
cabinets. Finally, it is worth noting that in these cases the present
work provides not only comparative information but also quantitative
information on the performance reduction.
Abstract: Delivering course material via a virtual environment
is beneficial to today-s students because it offers the interactivity,
real-time interaction and social presence that students of all ages
have come to accept in our gaming rich community. It is essential
that the Net Generation also known as Generation Why, have
exposure to learning communities that encompass interactivity to
form social and educational connections. As student and professor
become interconnected through collaboration and interaction in a
virtual learning space, relationships develop and students begin to
take on an individual identity. With this in mind the research project
was developed to investigate the use of virtual environments on
student satisfaction and the effectiveness of course delivery.
Furthermore, the project was designed to integrate both interactive
(real-time) classes conducted in the Virtual Reality (VR)
environment while also creating archived VR sessions for student use
in retaining and reviewing course content.
Abstract: Chemical detection is still a continuous challenge when
it comes to designing single-walled carbon nanotube (SWCNT)
sensors with high selectivity, especially in complex chemical
environments. A perfect example of such an environment would be in
thermally oxidized soybean oil. At elevated temperatures, oil oxidizes
through a series of chemical reactions which results in the formation of
monoacylglycerols, diacylglycerols, oxidized triacylglycerols, dimers,
trimers, polymers, free fatty acids, ketones, aldehydes, alcohols,
esters, and other minor products. In order to detect the rancidity of
oxidized soybean oil, carbon nanotube chemiresistor sensors have
been coated with polyethylenimine (PEI) to enhance the sensitivity
and selectivity. PEI functionalized SWCNTs are known to have a high
selectivity towards strong electron withdrawing molecules. The
sensors were very responsive to different oil oxidation levels and
furthermore, displayed a rapid recovery in ambient air without the
need of heating or UV exposure.
Abstract: Nowadays, the earth is countered with serious problem
of air pollution. This problem has been started from the industrial
revolution and has been faster in recent years, so that leads the earth
to ecological and environmental disaster. One of its results is the
global warming problem and its related increase in global
temperature. The most important factors in air pollution especially in
urban environments are Automobiles and residential buildings that are
the biggest consumers of the fossil energies, so that if the residential
buildings as a big part of the consumers of such energies reduce their
consumption rate, the air pollution will be decreased. Since
Metropolises are the main centers of air pollution in the world,
assessment and analysis of efficient strategies in decreasing air
pollution in such cities, can lead to the desirable and suitable results
and can solve the problem at least in critical level. Tabriz city is one
of the most important metropolises in North west of Iran that about
two million people are living there. for its situation in cold dry
climate, has a high rate of fossil energies consumption that make air
pollution in its urban environment. These two factors, being both
metropolis and in cold dry climate, make this article try to analyze the
strategies of climatic design in old districts of the city and use them in
new districts of the future. These strategies can be used in this city
and other similar cities and pave the way to reduce energy
consumption and related air pollution to save whole world.
Abstract: In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depends on the presence of an authentication authority. The advantage of the proposed system is that security measures is an integral part of the design, thus common security retrofitting problems do not arise. This is due to the presence of AlGamal encryption mechanism to protect its confidential content and any collected data by the agent from the visited host . So that eavesdropping on information from the agent is no longer possible to reveal any confidential information. Also the inherent security constraints within the framework allow the system to operate as an intrusion detection system for any mobile agent environment. The mechanism is tested for most of the well known severe attacks against agents and networked systems. The scheme proved a promising performance that makes it very much recommended for the types of transactions that needs highly secure environments, e. g., business to business.
Abstract: Context awareness is a capability whereby mobile
computing devices can sense their physical environment and adapt
their behavior accordingly. The term context-awareness, in
ubiquitous computing, was introduced by Schilit in 1994 and has
become one of the most exciting concepts in early 21st-century
computing, fueled by recent developments in pervasive computing
(i.e. mobile and ubiquitous computing). These include computing
devices worn by users, embedded devices, smart appliances, sensors
surrounding users and a variety of wireless networking technologies.
Context-aware applications use context information to adapt
interfaces, tailor the set of application-relevant data, increase the
precision of information retrieval, discover services, make the user
interaction implicit, or build smart environments. For example: A
context aware mobile phone will know that the user is currently in a
meeting room, and reject any unimportant calls. One of the major
challenges in providing users with context-aware services lies in
continuously monitoring their contexts based on numerous sensors
connected to the context aware system through wireless
communication. A number of context aware frameworks based on
sensors have been proposed, but many of them have neglected the
fact that monitoring with sensors imposes heavy workloads on
ubiquitous devices with limited computing power and battery. In this
paper, we present CALEEF, a lightweight and energy efficient
context aware framework for resource limited ubiquitous devices.
Abstract: Trust is essential for further and wider acceptance of
contemporary e-services. It was first addressed almost thirty years
ago in Trusted Computer System Evaluation Criteria standard by
the US DoD. But this and other proposed approaches of that
period were actually solving security. Roughly some ten years ago,
methodologies followed that addressed trust phenomenon at its core,
and they were based on Bayesian statistics and its derivatives, while
some approaches were based on game theory. However, trust is a
manifestation of judgment and reasoning processes. It has to be dealt
with in accordance with this fact and adequately supported in cyber
environment. On the basis of the results in the field of psychology
and our own findings, a methodology called qualitative algebra has
been developed, which deals with so far overlooked elements of trust
phenomenon. It complements existing methodologies and provides a
basis for a practical technical solution that supports management of
trust in contemporary computing environments. Such solution is also
presented at the end of this paper.
Abstract: This paper presents the outcomes of a qualitative
study which aims to investigate the pedagogical potentials of serious
games in the preparation of future teachers. The authors discuss the
existing problems and barriers associated with the organization of
teaching practices in Bulgaria as part of the pre-service teacher
training, as well as the attitudes and perceptions of the interviewed
academics, teachers and trainees concerning the integration of serious
games in the teaching practicum. The study outcomes strongly
confirm the positive attitudes of the respondents to the introduction
of virtual learning environments for the development of professional
skills of future teachers as a supplement to the traditional forms of
education. Through the inclusion of serious games it is expected to
improve the quality of practical training of pre-service teachers as
they overcome many of the problems identified in the existing
teaching practices. The outcomes of the study will inform the design
of the educational simulation software which is part of the project
SimAula Tomorrow's Teachers Training.
Abstract: Support Vector Machine (SVM) is a statistical
learning tool developed to a more complex concept of
structural risk minimization (SRM). In this paper, SVM is
applied to signal detection in communication systems in the
presence of channel noise in various environments in the form
of Rayleigh fading, additive white Gaussian background noise
(AWGN), and interference noise generalized as additive color
Gaussian noise (ACGN). The structure and performance of
SVM in terms of the bit error rate (BER) metric is derived and
simulated for these advanced stochastic noise models and the
computational complexity of the implementation, in terms of
average computational time per bit, is also presented. The
performance of SVM is then compared to conventional binary
signaling optimal model-based detector driven by binary
phase shift keying (BPSK) modulation. We show that the
SVM performance is superior to that of conventional matched
filter-, innovation filter-, and Wiener filter-driven detectors,
even in the presence of random Doppler carrier deviation,
especially for low SNR (signal-to-noise ratio) ranges. For
large SNR, the performance of the SVM was similar to that of
the classical detectors. However, the convergence between
SVM and maximum likelihood detection occurred at a higher
SNR as the noise environment became more hostile.
Abstract: Direction of Arrival estimation refers to defining a mathematical function called a pseudospectrum that gives an indication of the angle a signal is impinging on the antenna array. This estimation is an efficient method of improving the quality of service in a communication system by focusing the reception and transmission only in the estimated direction thereby increasing fidelity with a provision to suppress interferers. This improvement is largely dependent on the performance of the algorithm employed in the estimation. Many DOA algorithms exists amongst which are MUSIC, Root-MUSIC and ESPRIT. In this paper, performance of these three algorithms is analyzed in terms of complexity, accuracy as assessed and characterized by the CRLB and memory requirements in various environments and array sizes. It is found that the three algorithms are high resolution and dependent on the operating environment and the array size.
Abstract: Formative usability evaluation aims at finding
usability problems during the development process. The earlier these
problems are identified, the less expensive to fix they are. This paper
presents some preliminary results from a formative usability testing
of the 1st prototype developed for the ARiSE (Augmented Reality in
School Environments) project.
Abstract: Jordan exerts many efforts to nurture their academically gifted students in special schools since 2001. During
the past nine years of launching these schools, their learning and excellence environments were believed to be distinguished compared
to public schools. This study investigated the environments of gifted
students compared with other non-gifted, using a survey instrument
that measures the dimensions of family, peers, teachers, school- support, society, and resources –dimensions rooted deeply in supporting gifted education, learning, and achievement. A total
number of 109 were selected from excellence schools for
academically gifted students, and 119 non-gifted students were selected from public schools. Around 8.3% of the non-gifted students
reported that they “Never" received any support from their surrounding environments, 14.9% reported “Seldom" support, 23.7% reported “ Often" support, 26.0% reported “Frequent" support, and
32.8% reported “Very frequent" support. Where the gifted students reported more “Never" support than the non-gifted did with 11.3%,
“Seldom" support with 15.4%, “Often" support with 26.6%,
“Frequent" support with 29.0%, and reported “Very frequent" support less than the non-gifted students with 23.6%. Unexpectedly,
statistical differences were found between the two groups favoring
non-gifted students in perception of their surrounding environments
in specific dimensions, namely, school- support, teachers, and society. No statistical differences were found in the other dimensions
of the survey, namely, family, peers, and resources. As the
differences were found in teachers, school- support, and society, the
nurturing environments for the excellence schools need to be revised to adopt more creative teaching styles, rich school atmosphere and
infrastructures, interactive guiding for the students and their parents, promoting for the excellence environments, and re-build successful
identification models. Thus, families, schools, and society should
increase their cooperation, communication, and awareness of the
gifted supportive environments. However, more studies to investigate
other aspects of promoting academic giftedness and excellence are recommended.
Abstract: Robust face recognition under various illumination
environments is very difficult and needs to be accomplished for
successful commercialization. In this paper, we propose an improved
illumination normalization method for face recognition. Illumination
normalization algorithm based on anisotropic smoothing is well known
to be effective among illumination normalization methods but
deteriorates the intensity contrast of the original image, and incurs less
sharp edges. The proposed method in this paper improves the previous
anisotropic smoothing-based illumination normalization method so
that it increases the intensity contrast and enhances the edges while
diminishing the effect of illumination variations. Due to the result of
these improvements, face images preprocessed by the proposed
illumination normalization method becomes to have more distinctive
feature vectors (Gabor feature vectors) for face recognition. Through
experiments of face recognition based on Gabor feature vector
similarity, the effectiveness of the proposed illumination
normalization method is verified.
Abstract: The increasing usage of antibiotics in the animal
farming industry is an emerging worldwide problem contributing to
the development of antibiotic resistance. The purpose of this work was
to investigate the prevalence and antibiotic resistance profile of
bacterial isolates collected from aquatic environments and meats in a
peri-urban community in Daejeon, Korea. In an antibacterial
susceptibility test, the bacterial isolates showed a high incidence of
resistance (~ 26.04 %) to cefazolin, tetracycline, gentamycin,
norfloxacin, erythromycin and vancomycin. The results from a test for
multiple antibiotic resistance indicated that the isolates were
displaying an approximately 5-fold increase in the incidence of
multiple antibiotic resistance to combinations of two different
antibiotics compared to combinations of three or more antibiotics.
Most of the isolates showed multi-antibiotic resistance, and the
resistance patterns were similar among the sampling groups.
Sequencing data analysis of 16S rRNA showed that most of the
resistant isolates appeared to be dominated by the classes
Betaproteobacteria and Gammaproteobacteria in the phylum
Proteobacteria.
Abstract: Cryptographic algorithms play a crucial role in the
information society by providing protection from unauthorized
access to sensitive data. It is clear that information technology will
become increasingly pervasive, Hence we can expect the emergence
of ubiquitous or pervasive computing, ambient intelligence. These
new environments and applications will present new security
challenges, and there is no doubt that cryptographic algorithms and
protocols will form a part of the solution. The efficiency of a public
key cryptosystem is mainly measured in computational overheads,
key size and bandwidth. In particular the RSA algorithm is used in
many applications for providing the security. Although the security
of RSA is beyond doubt, the evolution in computing power has
caused a growth in the necessary key length. The fact that most chips
on smart cards can-t process key extending 1024 bit shows that there
is need for alternative. NTRU is such an alternative and it is a
collection of mathematical algorithm based on manipulating lists of
very small integers and polynomials. This allows NTRU to high
speeds with the use of minimal computing power. NTRU (Nth degree
Truncated Polynomial Ring Unit) is the first secure public key
cryptosystem not based on factorization or discrete logarithm
problem. This means that given sufficient computational resources
and time, an adversary, should not be able to break the key. The
multi-party communication and requirement of optimal resource
utilization necessitated the need for the present day demand of
applications that need security enforcement technique .and can be
enhanced with high-end computing. This has promoted us to develop
high-performance NTRU schemes using approaches such as the use
of high-end computing hardware. Peer-to-peer (P2P) or enterprise
grids are proven as one of the approaches for developing high-end
computing systems. By utilizing them one can improve the
performance of NTRU through parallel execution. In this paper we
propose and develop an application for NTRU using enterprise grid
middleware called Alchemi. An analysis and comparison of its
performance for various text files is presented.