Takaaki Fukuda, Hisaharu Tanaka, Kenzi Watanabe, Y. Okazaki
{"title":"Development of a Field Work Type Topographical Map Experiential Learning Support System","authors":"Takaaki Fukuda, Hisaharu Tanaka, Kenzi Watanabe, Y. Okazaki","doi":"10.1109/EIDWT.2012.39","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.39","url":null,"abstract":"We have developed a field work type topographical map learning support system using mobile terminals. Our system is a field work type system that learners move around a set up multiple check points. They enable to learn topographical map at each check point. Features are points which learners can answer characteristic quizzes according to check points about a topographical map on places. Moreover, learners can receive advices from teachers and find situations of other learners by server communication. We expect these motivate learners.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131322379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of Collaborative Tools to Improve Accessibility in Public Spaces","authors":"Javier Canadillas, F. Xhafa, S. Caballé","doi":"10.1109/EIDWT.2012.59","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.59","url":null,"abstract":"There are many factors that lower the level of accessibility in our environment, especially for citizens with special needs, examples are incorrect designs of public buildings or the lack of tools that show and generate the information in an accessible and user friendly way. These factors translate into physical and technological barriers both to citizens with disabilities and to the professionals responsible for providing solutions to these limitations. This study presents an approach on the development of collaborative tools for supporting professionals responsible for making accessibility plans. The aim is to provide support for their work on the improvement of accessibility in public spaces. Using the tool IMA (Integral Management of Accessibility) the completion and publication of the comprehensive plans of accessibility is greatly accelerated, thereby shortening the time needed to achieve more accessible towns and environments.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129211493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reza Sheyibani, Elham Sharififar, Mahsa Khosronejad, M. Mazaheri, B. Homayounfar
{"title":"A Reliable and QoS Aware Multi-path Routing Algorithm in WSNs","authors":"Reza Sheyibani, Elham Sharififar, Mahsa Khosronejad, M. Mazaheri, B. Homayounfar","doi":"10.1109/EIDWT.2012.51","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.51","url":null,"abstract":"Satisfying Quality of Service (QoS) requirements(e.g. bandwidth and delay constraints) for the different QoS based applications of WSNs raises significant challenges. Each algorithm that is used for packet routing in such applications should be able to establish tradeoffs between end to end delay parameter and energy consumption. Therefore, enabling QoS applications in sensor networks requires energy and QoS awareness in different layers of the protocol stack. In this paper, we propose a Reliable and QoS Aware Multipath routing algorithm in wireless sensor networks namely RQMP. This protocol uses control message together with a Forward Error Correction (FEC) technique to establish a reliable connection between source and destination. RQMP maximizes the network lifetime via data transmission across multiple paths as load balancing that causes energy consume uniformly throughout the network. RQMP uses the residual energy, available buffer size, Signal-to-Noise Ratio (SNR) and distance to sink to predict the best next hop through the paths construction phase. Also our proposed protocol employs a queuing model to handle both real time and non-real-time traffic. Simulation results show that our proposed protocol is more efficient than previous algorithms in providing QoS requirements and minimizing energy consumption.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115647394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparison of Opportunistic Connection Datasets","authors":"Pedro Vieira, António D. Costa, Joaquim Macedo","doi":"10.4018/jdst.2013070103","DOIUrl":"https://doi.org/10.4018/jdst.2013070103","url":null,"abstract":"Opportunistic networking differs from more conventional architectures by the lack of existing network infrastructure, which can cause intermittent connectivity or increased communication delay between nodes. From a message routing perspective, solving these problems require a different set of techniques than those used in more traditional network schemes. Forwarding algorithms in these scenarios aim to improve performance metrics such as message delivery ratio and message delay time, while trying to keep the number of message copies small. A common approach used for testing the performance of opportunistic protocols relies on existing opportunistic contact traces. These datasets are widely available on the Internet, and provide a convenient way of simulating realistic usage scenarios. As such, studying the contact patterns between nodes can lead to useful observations to take into account on future experiments. This paper presents the results of a study on four different datasets. First, we describe the main characteristics of each trace. Then, we propose a graphical representation of the contact behavior for each pair of nodes. The next step was to perform an analysis in terms of the distribution of connectivity among nodes, having found that the contacts follow a roughly lognormal distribution and noting that a small group of nodes is usually much more popular than the rest. We have also made a temporal analysis over the duration of each collection experiment. It was noticeable that individual nodes have very similar contact patterns over time, as well as revealing some cyclic variation over time (namely over weekends). Using dataset derived time-varying graph models, a significant performance decrease was achieved with simple remotion of few critical nodes.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"518 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116241106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
John Panneerselvam, Stelios Sotiriadis, N. Bessis, N. Antonopoulos
{"title":"Securing Authentication and Trusted Migration of Weblets in the Cloud with Reduced Traffic","authors":"John Panneerselvam, Stelios Sotiriadis, N. Bessis, N. Antonopoulos","doi":"10.1109/EIDWT.2012.20","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.20","url":null,"abstract":"Cloud computing is making a new revolution in the computing world. Elasticity is one of the key features of the cloud which makes cloud computing further fashionable. Cloud is still in its infant stages and it faces a wide range of security threats. The security downtime of cloud is relatively slowing down the spreading up of cloud computing. This paper focuses on the security threats faced by the web lets during their migration between the cloud and the mobile devices. Web let migration is an important task during the implementation of elasticity in the cloud. As a primary step, a secure communication channel is designed for the web let migration by deploying secure shell protocol. Herein, the vulnerabilities in some authentication mechanisms are highlighted and a better way of authenticating the web lets with SFTP (Secure File Transfer Protocol) is suggested. Finally, managing the traffic effectively in the designed channel with the aid of back pressure technique is also covered in this paper.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121421384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Proposed Framework for the Active Detection of Security Vulnerabilities in Multi-tenancy Cloud Systems","authors":"J. Flood, Anthony Keane","doi":"10.1109/EIDWT.2012.43","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.43","url":null,"abstract":"The detection of cyber attacks before they are successful represents an essential stage in the evolution of an attack vector centric security framework. Anti-virus, Malware and Firewalls detection & protection ideologies are proving to be ineffective and they were never designed with multi-tenant cloud environments in mind. The current security solution development is driven by the complexity of the gap analysis performed by hacker groups and multi-tenant cloud solutions represent a significant target to hacker groups so it is important for Cloud providers to take pre-emptive steps to ensure the total security of their services. A multi-tenant environment irrespective of the number of users is still an individual system and multi-tenant cloud solutions require active protection as the individual system components can still be compromised with a previously unknown attack vector. One possible solution to this growing security concern is an approach that continuously validates user interactions within a system and takes automated preemptive steps to promote the protection of the system users. By gathering information on the attack vector and the attacker themselves it is possible to predict the aim of the attack, gauging the risk and making assumptions. The ultimate goal is to identify and close the attack vector during the attackers gap analysis while ensuring at all time that the information gathered can be isolated to a legal forensic standard. With the ultimate goal being the ability to share malicious user activity information with authorities without the risk of accidental data leakage of other tenants data. This paper describes a possible system and methodology that would prevent the gap analysis phase of a cyber-attack.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121958373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Failure Resilient Criteria for Mobile Web Services Transactions","authors":"M. Younas, L. Barolli, Makoto Ikeda","doi":"10.1109/EIDWT.2012.54","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.54","url":null,"abstract":"This paper investigates into the transaction management of mobile web services, which is crucial to maintaining execution correctness of services and consistency of their underlying data. We propose a relaxed set of transaction correctness criteria, called Sacred (Semantic Atomicity, Consistency, Resiliency, Durability) and design protocols for enforcing these criteria in the execution of transactions. We evaluate the proposed criteria and present results in order to show that these criteria enhance the failure resilience of mobile web services transactions.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114666703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Metamodeling for Assigning Specific Roles in the Migration to Service-Oriented Architecture","authors":"A. Ionita, S. Radulescu","doi":"10.1109/EIDWT.2012.33","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.33","url":null,"abstract":"Many organizations have to align their software systems to new technologies and paradigms, for facing the challenges of interoperation and flexibility. Migration to Service-Oriented Architectures (SOA) represents one of the most important approaches of modernization. The state-of-the-art strategies usually take into account technical issues and implications regarding the business costs and efficiency. Still, these changes also involve challenges at the level of human resources, or even of the organizational structures, because new roles have to be defined and assigned to new or existing job positions. For supporting this management task, the paper proposes a meta modeling paradigm that adds SOA-based roles to traditional organizational structures, and supports the definition of mappings specific for migration.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131910714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Olivier Curé, Fadhela Kerdjoudj, David C. Faye, C. L. Duc, M. Lamolle
{"title":"On the Potential Integration of an Ontology-Based Data Access Approach in NoSQL Stores","authors":"Olivier Curé, Fadhela Kerdjoudj, David C. Faye, C. L. Duc, M. Lamolle","doi":"10.4018/jdst.2013070102","DOIUrl":"https://doi.org/10.4018/jdst.2013070102","url":null,"abstract":"No SQL stores are emerging as an efficient alternative to relational database management systems in the context of big data. Many actors in this domain consider that to gain a wider adoption, several extensions have to be integrated. Some of them focus on the ways of proposing more schema, supporting adapted declarative query languages and providing integrity constraints in order to control data consistency and enhance data quality. We consider that these issues can be dealt with in the context of Ontology Based Data Access (OBDA). OBDA is a new data management paradigm that exploits the semantic knowledge represented in ontologies when querying data stored in a database. We provide a proof of concept of OBDA's ability to tackle these three issues in a social application related to the medical domain.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130759885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Test Data Generation for Software Path Testing Using Evolutionary Algorithms","authors":"G. Latiu, O. Creţ, L. Văcariu","doi":"10.1109/EIDWT.2012.25","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.25","url":null,"abstract":"Software testing is a very expensive and time consuming process. Test methods which generate test data based on the program's internal structure are intensively used. This paper presents a comparison between three important Evolutionary Algorithms used for automatic test data generation, a technique that forces the execution of a desired path of the program called target path. Two new approaches, based on Particle Swarm Optimization and Simulated Annealing algorithms, used in conjunction with the approximation level and branch distance metrics, are compared with Genetic Algorithms for generating test data. The results obtained based on the proposed approaches suggest that evolutionary testing strategies are very well suited to generate test data which cover a target path inside a software program.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121817839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}