Abstract: P2P Networks are highly dynamic structures since
their nodes – peer users keep joining and leaving continuously. In the
paper, we study the effects of network change rates on query routing
efficiency. First we describe some background and an abstract system
model. The chosen routing technique makes use of cached metadata
from previous answer messages and also employs a mechanism for
broken path detection and metadata maintenance. Several metrics are
used to show that the protocol behaves quite well even with high rate
of node departures, but above a certain threshold it literally breaks
down and exhibits considerable efficiency degradation.
Abstract: The information on the Web increases tremendously.
A number of search engines have been developed for searching Web
information and retrieving relevant documents that satisfy the
inquirers needs. Search engines provide inquirers irrelevant
documents among search results, since the search is text-based rather
than semantic-based. Information retrieval research area has
presented a number of approaches and methodologies such as
profiling, feedback, query modification, human-computer interaction,
etc for improving search results. Moreover, information retrieval has
employed artificial intelligence techniques and strategies such as
machine learning heuristics, tuning mechanisms, user and system
vocabularies, logical theory, etc for capturing user's preferences and
using them for guiding the search based on the semantic analysis
rather than syntactic analysis. Although a valuable improvement has
been recorded on search results, the survey has shown that still
search engines users are not really satisfied with their search results.
Using ontologies for semantic-based searching is likely the key
solution. Adopting profiling approach and using ontology base
characteristics, this work proposes a strategy for finding the exact
meaning of the query terms in order to retrieve relevant information
according to user needs. The evaluation of conducted experiments
has shown the effectiveness of the suggested methodology and
conclusion is presented.
Abstract: Due to adverse pressure gradient along the diverging
walls of wide-angled diffusers, the attached flow separates from
one wall and remains attached permanently to the other wall in a
process called stalling. Stalled diffusers render the whole fluid flow
system, in which they are part of, very inefficient. There is then an
engineering need to try to understand the whole process of diffuser
stall if any meaningful attempts to improve on diffuser efficiency
are to be made. In this regard, this paper provides a data bank
contribution for the mean flow-field in wide-angled diffusers where
the complete velocity and static pressure fields, and pressure recovery
data for diffusers in the fully stalled flow regime are experimentally
measured. The measurements were carried out at Reynolds numbers
between 1.07×105 and 2.14×105 based on inlet hydraulic diameter
and centreline velocity for diffusers whose divergence angles were
between 30Ôùª and 50Ôùª. Variation of Reynolds number did not significantly
affect the velocity and static pressure profiles. The wall static
pressure recovery was found to be more sensitive to changes in the
Reynolds number. By increasing the velocity from 10 m/s to 20 m/s,
the wall static pressure recovery increased by 8.31%. However, as the
divergence angle was increased, a similar increase in the Reynolds
number resulted in a higher percentage increase in pressure recovery.
Experimental results showed that regardless of the wall to which
the flow was attached, both the velocity and pressure fields were
replicated with discrepancies below 2%.
Abstract: Grid environments consist of the volatile integration
of discrete heterogeneous resources. The notion of the Grid is to
unite different users and organisations and pool their resources into
one large computing platform where they can harness, inter-operate,
collaborate and interact. If the Grid Community is to achieve this
objective, then participants (Users and Organisations) need to be
willing to donate or share their resources and permit other
participants to use their resources. Resources do not have to be
shared at all times, since it may result in users not having access to
their own resource. The idea of reward-based computing was
developed to address the sharing problem in a pragmatic manner.
Participants are offered a reward to donate their resources to the
Grid. A reward may include monetary recompense or a pro rata share
of available resources when constrained. This latter point may imply
a quality of service, which in turn may require some globally agreed
reservation mechanism. This paper presents a platform for economybased
computing using the WebCom Grid middleware. Using this
middleware, participants can configure their resources at times and
priority levels to suit their local usage policy. The WebCom system
accounts for processing done on individual participants- resources
and rewards them accordingly.
Abstract: Website plays a significant role in success of an e-business. It is the main start point of any organization and corporation for its customers, so it's important to customize and design it according to the visitors' preferences. Also, websites are a place to introduce services of an organization and highlight new service to the visitors and audiences. In this paper, we will use web usage mining techniques, as a new field of research in data mining and knowledge discovery, in an Iranian government website. Using the results, a framework for web content layour is proposed. An agent is designed to dynamically update and improve web links locations and layout. Then, we will explain how it is used to directly enable top managers of the organization to influence on the arrangement of web contents and also to enhance customization of web site navigation due to online users' behaviors.
Abstract: WikID is a wiki for industrial design engineers. An
important aspect for the viability of a wiki is the loyalty of the user
community to share their information and knowledge by adding this
knowledge to the wiki. For the initiators of a wiki it is therefore
important to use every aspect to stimulate the user community to
actively participate. In this study the focus is on the styling of the
website. The central question is: How could the WikID website be
visually designed to achieve a user experience which will incite the
user to actively participate in the WikID community? After a
literature study on the influencing factors of a website, a new
interface has been designed by applying the rules found, in order to
expand this website-s active user community. An online
questionnaire regarding the old or the new website gave insights in
the opinions of users. As expected, the new website was rated more
positively than the old website. However, the differences are limited.
Abstract: A new Feed-Forward/Feedback Generalized
Minimum Variance Pole-placement Controller to incorporate the
robustness of classical pole-placement into the flexibility of
generalized minimum variance self-tuning controller for Single-Input
Single-Output (SISO) has been proposed in this paper. The design,
which provides the user with an adaptive mechanism, which ensures
that the closed loop poles are, located at their pre-specified positions.
In addition, the controller design which has a feed-forward/feedback
structure overcomes the certain limitations existing in similar poleplacement
control designs whilst retaining the simplicity of
adaptation mechanisms used in other designs. It tracks set-point
changes with the desired speed of response, penalizes excessive
control action, and can be applied to non-minimum phase systems.
Besides, at steady state, the controller has the ability to regulate the
constant load disturbance to zero. Example simulation results using
both simulated and real plant models demonstrate the effectiveness of
the proposed controller.
Abstract: In this paper we are interested in classification problems
with a performance constraint on error probability. In such
problems if the constraint cannot be satisfied, then a rejection option
is introduced. For binary labelled classification, a number of SVM
based methods with rejection option have been proposed over the
past few years. All of these methods use two thresholds on the SVM
output. However, in previous works, we have shown on synthetic data
that using thresholds on the output of the optimal SVM may lead to
poor results for classification tasks with performance constraint. In
this paper a new method for supervised classification with rejection
option is proposed. It consists in two different classifiers jointly
optimized to minimize the rejection probability subject to a given
constraint on error rate. This method uses a new kernel based linear
learning machine that we have recently presented. This learning
machine is characterized by its simplicity and high training speed
which makes the simultaneous optimization of the two classifiers
computationally reasonable. The proposed classification method with
rejection option is compared to a SVM based rejection method
proposed in recent literature. Experiments show the superiority of
the proposed method.
Abstract: The objective of this paper is to investigate a new
approach based on the idea of pictograms for food portion size. This
approach adopts the model of the United States Pharmacopeia- Drug
Information (USP-DI). The representation of each food portion size
composed of three parts: frame, the connotation of dietary portion
sizes and layout. To investigate users- comprehension based on this
approach, two experiments were conducted, included 122 Taiwanese
people, 60 male and 62 female with ages between 16 and 64 (divided
into age groups of 16-30, 31-45 and 46-64). In Experiment 1, the mean
correcting rate of the understanding level of food items is 48.54%
(S.D.= 95.08) and the mean response time 2.89sec (S.D.=2.14). The
difference on the correct rates for different age groups is significant
(P*=0.00
Abstract: So much energy is used in high rise buildings to fulfill
the basic needs of users such as lighting and thermal comfort.
Malaysia has hot and humid climate, buildings especially high rise
buildings receive unnecessary solar radiation that cause more solar
heat gain. Energy use specially electricity consumption in high rise
buildings has increased. There have been growing concerns about
energy consumption and its effect on environment. Building, energy
and the environment are important issues that the designers should
consider to them. Self protected form is one of possible ways against
the impact of solar radiation in high rise buildings. The Energy
performance of building envelopes was investigated in term of the
Overall Thermal Transfer Value (OTTV ).In this paper, the amount
of OTTV reduction was calculated through OTTV Equations to
clear the effectiveness of self shading strategy on minimizing energy
consumption for cooling interior spaces in high rise buildings which
has considerable envelope areas against solar radiation. Also increasing
the optimum window area was investigated using self-shading
strategy in designing high rise buildings. As result, the significant
reduction in OTTV was shown based on WWR.In addition slight
increase was demonstrated in WWR that can influence on visible
comfort interior spaces.
Abstract: This paper investigates the problem of tracking spa¬tiotemporal changes of a satellite image through the use of Knowledge Discovery in Database (KDD). The purpose of this study is to help a given user effectively discover interesting knowledge and then build prediction and decision models. Unfortunately, the KDD process for spatiotemporal data is always marked by several types of imperfections. In our paper, we take these imperfections into consideration in order to provide more accurate decisions. To achieve this objective, different KDD methods are used to discover knowledge in satellite image databases. Each method presents a different point of view of spatiotemporal evolution of a query model (which represents an extracted object from a satellite image). In order to combine these methods, we use the evidence fusion theory which considerably improves the spatiotemporal knowledge discovery process and increases our belief in the spatiotemporal model change. Experimental results of satellite images representing the region of Auckland in New Zealand depict the improvement in the overall change detection as compared to using classical methods.
Abstract: XML is a markup language which is becoming the
standard format for information representation and data exchange. A
major purpose of XML is the explicit representation of the logical
structure of a document. Much research has been performed to
exploit logical structure of documents in information retrieval in
order to precisely extract user information need from large
collections of XML documents. In this paper, we describe an XML
information retrieval weighting scheme that tries to find the most
relevant elements in XML documents in response to a user query.
We present this weighting model for information retrieval systems
that utilize plausible inferences to infer the relevance of elements in
XML documents. We also add to this model the Dempster-Shafer
theory of evidence to express the uncertainty in plausible inferences
and Dempster-Shafer rule of combination to combine evidences
derived from different inferences.
Abstract: As the Internet technology has developed rapidly, the
number of identities (IDs) managed by each individual person has
increased and various ID management technologies have been
developed to assist users. However, most of these technologies are
vulnerable to the existing hacking methods such as phishing attacks
and key-logging. If the administrator-s password is exposed, an
attacker can access the entire contents of the stolen user-s data files in
other devices. To solve these problems, we propose here a new ID
management scheme based on a Single Password Protocol. The paper
presents the details of the new scheme as well as a formal analysis of
the method using BAN Logic.
Abstract: The availability of broadband internet and increased
access to computers has been instrumental in the rise of internet
literacy in Malaysia. This development has led to the adoption of
online shopping by many Malaysians. On another note, the
Government has supported the development and production of local
herbal products. This has resulted in an increase in the production and
diversity of products by SMEs. The purpose of this study is to
evaluate the influence of the Malaysian demographic factors and
selected attitudinal characteristics in relation to the online purchasing
of herbal products. In total, 1054 internet users were interviewed
online and Chi-square analysis was used to determine the relationship
between demographic variables and different aspects of online
shopping for herbal products. The overall results show that the
demographic variables such as age, gender, education level, income
and ethnicity were significant when considering the online shopping
antecedents of trust, quality of herbal products, perceived risks and
perceived benefits.
Abstract: The efficient knowledge management system (KMS)
is one of the important strategies to help firms to achieve sustainable
competitive advantages, but little research has been conducted to
understand what contributes to the KMS success. This study thus set
to investigate the determinants of KMS success in the context of Thai
banking industry. A questionnaire survey was conducted in four
major Thai Banks to test the proposed KMS Success model.
The result of this study shows that KMS use and user satisfaction
relate significantly to the success of KMS, and knowledge quality,
service quality and trust lead to system use, and knowledge quality,
system quality and trust lead to user satisfaction. However, this
research focuses only on system and user-related factors. Future
research thus can extend to study factors such as management support
and organization readiness.
Abstract: This paper describes a 3D modeling system in
Augmented Reality environment, named 3DARModeler. It can be
considered a simple version of 3D Studio Max with necessary
functions for a modeling system such as creating objects, applying
texture, adding animation, estimating real light sources and casting
shadows. The 3DARModeler introduces convenient, and effective
human-computer interaction to build 3D models by combining both
the traditional input method (mouse/keyboard) and the tangible input
method (markers). It has the ability to align a new virtual object with
the existing parts of a model. The 3DARModeler targets nontechnical
users. As such, they do not need much knowledge of
computer graphics and modeling techniques. All they have to do is
select basic objects, customize their attributes, and put them together
to build a 3D model in a simple and intuitive way as if they were
doing in the real world. Using the hierarchical modeling technique,
the users are able to group several basic objects to manage them as a
unified, complex object. The system can also connect with other 3D
systems by importing and exporting VRML/3Ds Max files. A
module of speech recognition is included in the system to provide
flexible user interfaces.
Abstract: Encryption protects communication partners from
disclosure of their secret messages but cannot prevent traffic analysis
and the leakage of information about “who communicates with
whom". In the presence of collaborating adversaries, this linkability
of actions can danger anonymity. However, reliably providing
anonymity is crucial in many applications. Especially in contextaware
mobile business, where mobile users equipped with PDAs
request and receive services from service providers, providing
anonymous communication is mission-critical and challenging at the
same time. Firstly, the limited performance of mobile devices does
not allow for heavy use of expensive public-key operations which are
commonly used in anonymity protocols. Moreover, the demands for
security depend on the application (e.g., mobile dating vs. pizza
delivery service), but different users (e.g., a celebrity vs. a normal
person) may even require different security levels for the same
application. Considering both hardware limitations of mobile devices
and different sensitivity of users, we propose an anonymity
framework that is dynamically configurable according to user and
application preferences. Our framework is based on Chaum-s mixnet.
We explain the proposed framework, its configuration
parameters for the dynamic behavior and the algorithm to enforce
dynamic anonymity.
Abstract: Within the last years, several technologies have been developed to help building e-learning portals. Most of them follow approaches that deliver a vast amount of functionalities, suitable for class-like learning. The SuGI project, as part of the D-Grid (funded by the BMBF), targets on delivering a highly scalable and sustainable learning solution to provide materials (e.g. learning modules, training systems, webcasts, tutorials, etc.) containing knowledge about Grid computing to the D-Grid community. In this article, the process of the development of an e-learning portal focused on the requirements of this special user group is described. Furthermore, it deals with the conceptual and technical design of an e-learning portal, addressing the special needs of heterogeneous target groups. The main focus lies on the quality management of the software development process, Web templates for uploading new contents, the rich search and filter functionalities which will be described from a conceptual as well as a technical point of view. Specifically, it points out best practices as well as concepts to provide a sustainable solution to a relatively unknown and highly heterogeneous community.
Abstract: The number of users supported in a DS-CDMA
cellular system is typically less than spreading factor (N), and the
system is said to be underloaded. Overloading is a technique to
accommodate more number of users than the spreading factor N. In
O/O overloading scheme, the first set is assigned to the N
synchronous users and the second set is assigned to the additional
synchronous users. An iterative multistage soft decision interference
cancellation (SDIC) receiver is used to remove high level of
interference between the two sets. Performance is evaluated in terms
of the maximum number acceptable users so that the system
performance is degraded slightly compared to the single user
performance at a specified BER. In this paper, the capacity of CDMA
based O/O overloading scheme is evaluated with SDIC receiver. It is
observed that O/O scheme using orthogonal Gold codes provides
25% channel overloading (N=64) for synchronous DS-CDMA
system on an AWGN channel in the uplink at a BER of 1e-5.For a
Rayleigh faded channel, the critical capacity is 40% at a BER of 5e-5
assuming synchronous users. But in practical systems, perfect chip
timing is very difficult to maintain in the uplink.. We have shown that
the overloading performance reduces to 11% for a timing
synchronization error of 0.02Tc for a BER of 1e-5.
Abstract: Recently, Jia et al. proposed a remote user authentication scheme using bilinear pairings and an Elliptic Curve Cryptosystem (ECC). However, the scheme is vulnerable to privileged insider attack at their proposed registration phase and to forgery attack at their proposed authentication phase. In addition, the scheme can be vulnerable to server spoofing attack because it does not provide mutual authentication between the user and the remote server. Therefore, this paper points out that the Jia et al. scheme is vulnerable to the above three attacks.