Abstract: With the approaching of digital era, various interactive
service platforms and systems support human beings- needs in lives by
different contents and measures. Design strategies have gradually
turned from function-based to user-oriented, and are often customized.
In other words, how designers include users- value reaction in creation
becomes the goal. Creative design service of interior design requires
positive interaction and communication to allow users to obtain full
design information, recognize the style and process of personal needs,
develop creative service design, lower communication time and cost
and satisfy users- sense of achievement. Thus, by constructing a
co-design method, based on the communication between interior
designers and users, this study recognizes users- real needs and
provides the measure of co-design for designers and users.
Abstract: Scarcity of water resources and huge costs of
establishing new hydraulic installations necessitate optimal
exploitation from existing reservoirs. Sustainable management and
efficient exploitation from existing finite water resources are
important factors in water resource management, particularly in the
periods of water insufficiency and in dry regions, and on account of
competitive allocations in the view of exploitation management. This
study aims to minimize reservoir water release from a determined
rate of demand. A numerical model for water optimal exploitation
has been developed using GAMS introduced by the World Bank and
applied to the case of Meijaran dam, northern Iran. The results
indicate that this model can optimize the function of reservoir
exploitation while required water for lower parts of the region will be
supplied. Further, allocating optimal water from reservoir, the
optimal rate of water allocated to any group of the users were
specified to increase benefits in curve dam exploitation.
Abstract: The aim of this paper is to examine factors related to system environment (namely, system quality and vendor support) that influences ERP implementation success in Iranian companies. Implementation success is identified using user satisfaction and organizational impact perspective. The study adopts the survey questionnaire approach to collect empirical data. The questionnaire was distributed to ERP users and a total of 384 responses were used for analysis. The results illustrated that both system quality and vendor support have significant effect on ERP implementation success. This implies that companies must ensure they source for the best available system and a vendor that is dependable, reliable and trustworthy.
Abstract: The paper investigates the feasibility of constructing a software multi-agent based monitoring and classification system and utilizing it to provide an automated and accurate classification of end users developing applications in the spreadsheet domain. The agents function autonomously to provide continuous and periodic monitoring of excels spreadsheet workbooks. Resulting in, the development of the MultiAgent classification System (MACS) that is in compliance with the specifications of the Foundation for Intelligent Physical Agents (FIPA). However, different technologies have been brought together to build MACS. The strength of the system is the integration of the agent technology with the FIPA specifications together with other technologies that are Windows Communication Foundation (WCF) services, Service Oriented Architecture (SOA), and Oracle Data Mining (ODM). The Microsoft's .NET widows service based agents were utilized to develop the monitoring agents of MACS, the .NET WCF services together with SOA approach allowed the distribution and communication between agents over the WWW that is in order to satisfy the monitoring and classification of the multiple developer aspect. ODM was used to automate the classification phase of MACS.
Abstract: In this paper, we proposed a new framework to incorporate an intelligent agent software robot into a crisis communication portal (CCNet) in order to send alert news to subscribed users via email and other mobile services such as Short Message Service (SMS), Multimedia Messaging Service (MMS) and General Packet Radio Services (GPRS). The content on the mobile services can be delivered either through mobile phone or Personal Digital Assistance (PDA). This research has shown that with our proposed framework, the embodied conversation agents system can handle questions intelligently with our multilayer architecture. At the same time, the extended framework can take care of delivery content through a more humanoid interface on mobile devices.
Abstract: In this paper, a model for an information retrieval
system is proposed which takes into account that knowledge about
documents and information need of users are dynamic. Two
methods are combined, one qualitative or symbolic and the other
quantitative or numeric, which are deemed suitable for many
clustering contexts, data analysis, concept exploring and
knowledge discovery. These two methods may be classified as
inductive learning techniques. In this model, they are introduced to
build “long term" knowledge about past queries and concepts in a
collection of documents. The “long term" knowledge can guide
and assist the user to formulate an initial query and can be
exploited in the process of retrieving relevant information. The
different kinds of knowledge are organized in different points of
view. This may be considered an enrichment of the exploration
level which is coherent with the concept of document/query
structure.
Abstract: This paper analyzes different techniques of the fine grained security of relational databases for the two variables-data accessibility and inference. Data accessibility measures the amount of data available to the users after applying a security technique on a table. Inference is the proportion of information leakage after suppressing a cell containing secret data. A row containing a secret cell which is suppressed can become a security threat if an intruder generates useful information from the related visible information of the same row. This paper measures data accessibility and inference associated with row, cell, and column level security techniques. Cell level security offers greatest data accessibility as it suppresses secret data only. But on the other hand, there is a high probability of inference in cell level security. Row and column level security techniques have least data accessibility and inference. This paper introduces cell plus innocent security technique that utilizes the cell level security method but suppresses some innocent data to dodge an intruder that a suppressed cell may not necessarily contain secret data. Four variations of the technique namely cell plus innocent 1/4, cell plus innocent 2/4, cell plus innocent 3/4, and cell plus innocent 4/4 respectively have been introduced to suppress innocent data equal to 1/4, 2/4, 3/4, and 4/4 percent of the true secret data inside the database. Results show that the new technique offers better control over data accessibility and inference as compared to the state-of-theart security techniques. This paper further discusses the combination of techniques together to be used. The paper shows that cell plus innocent 1/4, 2/4, and 3/4 techniques can be used as a replacement for the cell level security.
Abstract: Web services are pieces of software that can be invoked via a standardized protocol. They can be combined via formalized taskflow languages. The Open Knowledge system is a fully distributed system using P2P technology, that allows users to publish the setaskflows, and programmers to register their web services or publish implementations of them, for the roles described in these workflows.Besides this, the system offers the functionality to select a peer that could coordinate such an interaction model and inform web services when it is their 'turn'. In this paper we describe the architecture and implementation of the Open Knowledge Kernel which provides the core functionality of the Open Knowledge system.
Abstract: Proprietary sensor network systems are typically expensive, rigid and difficult to incorporate technologies from other vendors. When using competing and incompatible technologies, a non-proprietary system is complex to create because it requires significant technical expertise and effort, which can be more expensive than a proprietary product. This paper presents the Sensor Abstraction Layer (SAL) that provides middleware architectures with a consistent and uniform view of heterogeneous sensor networks, regardless of the technologies involved. SAL abstracts and hides the hardware disparities and specificities related to accessing, controlling, probing and piloting heterogeneous sensors. SAL is a single software library containing a stable hardware-independent interface with consistent access and control functions to remotely manage the network. The end-user has near-real-time access to the collected data via the network, which results in a cost-effective, flexible and simplified system suitable for novice users. SAL has been used for successfully implementing several low-cost sensor network systems.
Abstract: This study investigates the use of genetic algorithms
in information retrieval. The method is shown to be applicable to
three well-known documents collections, where more relevant
documents are presented to users in the genetic modification. In this
paper we present a new fitness function for approximate information
retrieval which is very fast and very flexible, than cosine similarity
fitness function.
Abstract: A model of user behaviour based automated planning
is introduced in this work. The behaviour of users of web interactive
systems can be described in term of a planning domain encapsulating
the timed actions patterns representing the intended user profile. The
user behaviour recognition is then posed as a planning problem
where the goal is to parse a given sequence of user logs of the
observed activities while reaching a final state.
A general technique for transforming a timed finite state automata
description of the behaviour into a numerical parameter planning
model is introduced.
Experimental results show that the performance of a planning
based behaviour model is effective and scalable for real world
applications. A major advantage of the planning based approach is to
represent in a single automated reasoning framework problems of
plan recognitions, plan synthesis and plan optimisation.
Abstract: In this paper, we evaluate the performance of the
Hybrid-MIMO Receiver Scheme (HMRS) in Cognitive Radio
network (CR-network). We investigate the efficiency of the proposed
scheme which the energy level and user number of primary user are
varied according to the characteristic of CR-network. HMRS can
allow users to transmit either Space-Time Block Code (STBC) or
Spatial-Multiplexing (SM) streams simultaneously by using
Successive Interference Cancellation (SIC) and Maximum Likelihood
Detection (MLD). From simulation, the results indicate that the
interference level effects to the performance of HMRS. Moreover,
the exact closed-form capacity of the proposed scheme is derived and
compared with STBC scheme.
Abstract: Perceptions of quality from both designers and users
perspective have now stretched beyond the traditional usability,
incorporating abstract and subjective concepts. This has led to a shift
in human computer interaction research communities- focus; a shift
that focuses on achieving user experience (UX) by not only fulfilling
conventional usability needs but also those that go beyond them. The
term UX, although widely spread and given significant importance,
lacks consensus in its unified definition. In this paper, we survey
various UX definitions and modeling frameworks and examine them
as the foundation for proposing a UX evolution lifecycle framework
for understanding UX in detail. In the proposed framework we identify
the building blocks of UX and discuss how UX evolves in various
phases. The framework can be used as a tool to understand experience
requirements and evaluate them, resulting in better UX design and
hence improved user satisfaction.
Abstract: Blind signatures enable users to obtain valid signatures for a message without revealing its content to the signer. This paper presents a new blind signature scheme, i.e. identity-based blind signature scheme with message recovery. Due to the message recovery property, the new scheme requires less bandwidth than the identitybased blind signatures with similar constructions. The scheme is based on modified Weil/Tate pairings over elliptic curves, and thus requires smaller key sizes for the same level of security compared to previous approaches not utilizing bilinear pairings. Security and efficiency analysis for the scheme is provided in this paper.
Abstract: The aim of this paper is to know the sociodemographic
and operational-financial determinants of the services
quality perceived by users of the national health services. Through
the use of an inquiry conducted by the Ministry of Health,
comprehending 16.936 interviews in 2006, we intend to find out if
there is any characteristic that determines the 2006 inquiry results.
With the revision of the literature we also want to know if the
operational-financial results have implications in hospitals users-
perception on the quality of the received services. In order to achieve
our main goals we will make use of the regression analysis to find out
the possible dimensions that determine those results.
Abstract: Recently, grid computing has been widely focused on
the science, industry, and business fields, which are required a vast
amount of computing. Grid computing is to provide the environment
that many nodes (i.e., many computers) are connected with each
other through a local/global network and it is available for many
users. In the environment, to achieve data processing among nodes
for any applications, each node executes mutual authentication by
using certificates which published from the Certificate Authority
(for short, CA). However, if a failure or fault has occurred in the
CA, any new certificates cannot be published from the CA. As
a result, a new node cannot participate in the gird environment.
In this paper, an off-the-shelf scheme for dependable grid systems
using virtualization techniques is proposed and its implementation is
verified. The proposed approach using the virtualization techniques
is to restart an application, e.g., the CA, if it has failed. The system
can tolerate a failure or fault if it has occurred in the CA. Since
the proposed scheme is implemented at the application level easily,
the cost of its implementation by the system builder hardly takes
compared it with other methods. Simulation results show that the
CA in the system can recover from its failure or fault.
Abstract: The ARMrayan Multimedia Mobile CMS (Content
Management System) is the first mobile CMS that gives the
opportunity to users for creating multimedia J2ME mobile
applications with their desired content, design and logo; simply,
without any need for writing even a line of code. The low-level
programming and compatibility problems of the J2ME, along with
UI designing difficulties, makes it hard for most people –even
programmers- to broadcast their content to the widespread mobile
phones used by nearly all people. This system provides user-friendly,
PC-based tools for creating a tree index of pages and inserting
multiple multimedia contents (e.g. sound, video and picture) in each
page for creating a J2ME mobile application. The output is a standalone
Java mobile application that has a user interface, shows texts
and pictures and plays music and videos regardless of the type of
devices used as long as the devices support the J2ME platform.
Bitmap fonts have also been used thus Middle Eastern languages can
be easily supported on all mobile phone devices. We omitted
programming concepts for users in order to simplify multimedia
content-oriented mobile applictaion designing for use in educational,
cultural or marketing centers. Ordinary operators can now create a
variety of multimedia mobile applications such as tutorials,
catalogues, books, and guides in minutes rather than months.
Simplicity and power has been the goal of this CMS. In this paper,
we present the software engineered-designed concepts of the
ARMrayan MCMS along with the implementation challenges faces
and solutions adapted.
Abstract: Systems Analysis and Design is a key subject in
Information Technology courses, but students do not find it easy to
cope with, since it is not “precise" like programming and not exact
like Mathematics. It is a subject working with many concepts,
modeling ideas into visual representations and then translating the
pictures into a real life system. To complicate matters users who are
not necessarily familiar with computers need to give their inputs to
ensure that they get the system the need. Systems Analysis and
Design also covers two fields, namely Analysis, focusing on the
analysis of the existing system and Design, focusing on the design of
the new system. To be able to test the analysis and design of a
system, it is necessary to develop a system or at least a prototype of
the system to test the validity of the analysis and design. The skills
necessary in each aspect differs vastly. Project Management Skills,
Database Knowledge and Object Oriented Principles are all
necessary. In the context of a developing country where students
enter tertiary education underprepared and the digital divide is alive
and well, students need to be motivated to learn the necessary skills,
get an opportunity to test it in a “live" but protected environment –
within the framework of a university. The purpose of this article is to
improve the learning experience in Systems Analysis and Design
through reviewing the underlying teaching principles used, the
teaching tools implemented, the observations made and the
reflections that will influence future developments in Systems
Analysis and Design. Action research principles allows the focus to
be on a few problematic aspects during a particular semester.
Abstract: Not all types of mobile phone are successful in entering the market because some types of the mobile phone have a negative perception of user. Therefore, it is important to understand the influence of mobile phone's characteristics in the local user perception. This research investigates the influence of QWERTY mobile phone's forms in the perception of Indonesian user. First, some alternatives of mobile phone-s form are developed based on a certain number of mobile phone's models. At the second stage, some word pairs as design attributes of the mobile phone are chosen to represent the user perception of mobile phone. At the final stage, a survey is conducted to investigate the influence of the developed form alternatives to the user perception. Based on the research, users perceive mobile phone's form with curved top and straight bottom shapes and mobile phone's form with slider and antenna as the most negative form. Meanwhile, mobile phone's form with curved top and bottom shapes and mobile phone-s form without slider and antenna are perceived by the user as the most positive form.
Abstract: The Ad Hoc on demand distance vector (AODV) routing protocol is designed for mobile ad hoc networks (MANETs). AODV offers quick adaptation to dynamic link conditions; it is characterized by low memory overhead and low network utilization. The security issues related to the protocol remain challenging for the wireless network designers. Numerous schemes have been proposed for establishing secure communication between end users, these schemes identify that the secure operation of AODV is a bi tier task (routing and secure exchange of information at separate levels). Our endeavor in this paper would focus on achieving the routing and secure data exchange in a single step. This will facilitate the user nodes to perform routing, mutual authentications, generation and secure exchange of session key in one step thus ensuring confidentiality, integrity and authentication of data exchange in a more suitable way.