{"title":"A comparative study on client server technology and web technology in design and implementation of an embedded system used for monitoring and controlling of physical parameters","authors":"S. Baruah, A. Mahanta, K. Sarma","doi":"10.1109/ICITST.2009.5402544","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402544","url":null,"abstract":"System developed for the stated study is a microcontroller based embedded system for monitoring and controlling of parameters like temperature and humidity. It can be implemented using simple client server technology as well as web technology. Users belong to the organizational domain can use their own Intranet for monitoring and controlling of parameters designed on simple client server technology whereas users beyond the scope of Intranet can use Internet interface designed using web technology. Both the technologies are having its own advantages as well as disadvantages. This paper explores the technological implications of the system using client server as well as web technology. Embedded hardware circuit is fabricated in to two separate digital circuits connecting two COM ports of Embedded server. First circuit will monitor temperature and humidity and display same in LCD. Application program executed in computer reads COM port and display the same in monitor and store in database. Second digital circuit will provide necessary hardware control of devices for controlling of temperature and humidity automatically. It is implemented through relay based on the user entered set value of temperature and humidity which is stored in database of computer. Developed system enable its both Intranet as well as or Internet users for monitoring and setting new values of temperature and humidity through the respective front end.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131786465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Prangchumpol, S. Sanguansintukul, P. Tantasanawong
{"title":"Server virtualization by user behaviour model using a data mining technique — A preliminary study","authors":"D. Prangchumpol, S. Sanguansintukul, P. Tantasanawong","doi":"10.1109/ICITST.2009.5402611","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402611","url":null,"abstract":"Server virtualization is the masking of server resources, including the number and identity of individual physical servers, processors, and operating systems, from server users. However, the problem of tuning dynamic resource allocation is a novelty. Managing heterogeneous workloads running within virtual machines is an interesting and challenging topic of server virtualization. This research applied association rule discovery, which is one of the data mining techniques to predict level of user access. The results illustrate that performance of the predictive model for a proxy server is 86.86%. The performance of the predictive model for a web server is 87.18%. Additionally, user behaviors for proxy and web servers are visualized. The results suggest that user behaviors are different in term of workload, day and time usage. This preliminary study may be an approach to improve management of data centers running heterogeneous workloads using server virtualization.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122338080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross-domain classification: Trade-off between complexity and accuracy","authors":"E. Lex, C. Seifert, M. Granitzer, A. Juffinger","doi":"10.1109/ICITST.2009.5402559","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402559","url":null,"abstract":"Text classification is one of the core applications in data mining due to the huge amount of not categorized digital data available. Training a text classifier generates a model that reflects the characteristics of the domain. However, if no training data is available, labeled data from a related but different domain might be exploited to perform cross-domain classification. In our work, we aim to accurately classify unlabeled blogs into commonly agreed newspaper categories using labeled data from the news domain. The labeled news and the unlabeled blog corpus are highly dynamic and hourly growing with a topic drift, so a trade-off between accuracy and performance is required. Our approach is to apply a fast novel centroid-based algorithm, the Class-Feature-Centroid Classifier (CFC), to perform efficient cross-domain classification. Experiments showed that this algorithm achieves a comparable accuracy than k-NN and is slightly better than Support Vector Machines (SVM), yet at linear time cost for training and classification. The benefit of this approach is that the linear time complexity enables us to efficiently generate an accurate classifier, reflecting the topic drift, several times per day on a huge dataset.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121151892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Metrics for network forensics conviction evidence","authors":"A. Amran, R. Phan, D. Parish","doi":"10.1109/ICITST.2009.5402640","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402640","url":null,"abstract":"Evaluation of forensics evidence is an essential step in proving the malicious intents of an attacker or adversary and the severity of the damages caused to any network. This paper takes a step forward showing how security metrics can be used to sustain a sense of credibility to network evidence gathered as an elaboration and extension to an embedded feature of Network Forensic Readiness (NFR) — Redress that is defined as holding intruders responsible. We propose a procedure of evidence acquisition in network forensics where we then analyse sample of packet data in order to extract useful information as evidence through a formalised intuitive model, based on capturing adversarial behaviour and layer analysis. We then apply the Common Vulnerability Scoring System (CVSS) metrics to show that a forensics metrics system could assess the severity of network attacks committed, thus giving a degree of credibility to the evidence gathered. This way, hard evidence could be objectively collected to lend support to the resource-intensive process of investigation and litigation, leading to successful conviction, while reducing effort expended on the process.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128979572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An extended multi-layered blackboard approach for the optimization of world-spanning query execution plans","authors":"P. Beran, E. Schikuta","doi":"10.1109/ICITST.2009.5402518","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402518","url":null,"abstract":"New application domains ranging from the area of computational science (e.g. CERN Datagrid) to international business processes (e.g. Wal-Mart logistics) demand ever increasing storage capacities on a global scale. Therefore the ability to query and access data efficiently is one of the major challenges that drive research and development in the area of wide distributed data management. Due to the situation of a huge variety of underlying heterogeneous and homogenous infrastructures, where each showing specific hard- and software resources and a number of possible data sources, the optimization of the access process to the desired data is a challenging task. Hence, this paper introduces a novel heuristic approach for the optimization of query execution plans (QEP) on a global scale based on an extended multi-layered blackboard mechanism to determine which available (1) data, (2) resources, and (3) operations to use. The proposed method is illustrated by an application scenario of finding an optimal QEP for the retrieval of music information from an online music store.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129122860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Boldyrev, I. Oliver, Ronald Brown, Juha-Matti Tuupola, A. Palin, Antti Lappeteläinen
{"title":"Network and content aware information management","authors":"S. Boldyrev, I. Oliver, Ronald Brown, Juha-Matti Tuupola, A. Palin, Antti Lappeteläinen","doi":"10.1109/ICITST.2009.5402569","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402569","url":null,"abstract":"The presented approach addresses the problem of query and persistent query (subscription) resolution, taking into consideration distribution across multi-domains, network infrastructure and content management. This approach is particularly suitable for information-centric and cloud computing applications based around a mobile-device infrastructure.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115521610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An integrated framework For modelling the adoptive behaviour of online product recommendations","authors":"W. Lin","doi":"10.1109/ICITST.2009.5402552","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402552","url":null,"abstract":"A new-product recommendation system supports users in making buying decisions. The method representing recommending results in accordance with users' preferences is one of the crucial technologies for persuading users to adopt the recommendations. A body of literature proposes technical improvements in recommendation systems (RS). However, the research that investigates users' behaviour toward adopting results presented by the RS is scarce. This paper targets the online scenario that customers provide post-purchase opinions; in this case, e-word-of-mouth (eWOMs). It investigates the choice model in terms of adoptive and evaluative behaviour of the eWOMs receivers (users of the recommendation systems). This paper presents ongoing research that proposes an integrated framework that links literature on the use of product recommendation systems.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126148525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simplified link reliability enhancement schemes for wireless networks","authors":"Boon Hoi Lim, C. Tan","doi":"10.1109/ICITST.2009.5402599","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402599","url":null,"abstract":"Today's Internet uses the IP protocol suite that was primarily designed for the transport of data and provides best-effort data delivery. Thus, it does not guarantee the quality of voice transmission that is highly sensitive to error and delay. The situation is even more severe in wireless networks which experience even more distortion and attenuation. Therefore, enhancing the voice traffic quality in the wireless network is essentials for users to experience the lowest erroneous voice traffic. The objective of this paper is to propose an enhanced link reliability scheme and a low level frame prioritize scheme where they are able to improve the QoS in voice traffic especially in wireless networks. Each scheme utilized the wireless environment to tackle the time sensitive traffic. The two schemes have been proven to be able to performance well in enhancing voice quality under specified circumstances via network simulations.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123418084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Yet another approach for dynamic web service composition","authors":"Kaouthar Boumhamdi, Zahi Jarir","doi":"10.1109/ICITST.2009.5435098","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5435098","url":null,"abstract":"Web services have received much interest due to their potential to design and build complex interenterprise business applications. A particular interest concerns dynamic web services composition that offers the opportunity for creating new web services at runtime from those already published in uddi registry. However, this composition requires necessarily quantifying criteria for web service selection to build a more appropriated one. The objective of this paper is to suggest an answer of this challenge by proposing a flexible architecture for dynamic web services composition related to user's requirements and to the availability of critical resources. In addition, this architecture has the ability to re-configure at runtime the created composite service, if some failures happen, in order to maintain a better quality of composite service.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124975483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How does politics affect electronic healthcare adoption","authors":"Zanifa Omary, F. Mtenzi, Bing Wu","doi":"10.1109/ICITST.2009.5402502","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402502","url":null,"abstract":"In the 21 century, the term e-healthcare has become the common buzzword in the world. Its popularity is directly related to the rate of its adoption and benefits that it offers to individuals and governments. Among the common benefits include reduction in medical errors, improvements on physician efficiency, improvement in physician-patient relationship and an increase in the quality of care delivered. Despite all these benefits, politics is one among the obstacles hindering its adoption. In this paper we analyse how politics at local, national and international levels affect e-healthcare adoption and thereafter we suggest appropriate alternatives to overcome these obstacles.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123828048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}