IISA 2013Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623710
E. Theodoridis, Georgios Mylonas, I. Chatzigiannakis
{"title":"Developing an IoT Smart City framework","authors":"E. Theodoridis, Georgios Mylonas, I. Chatzigiannakis","doi":"10.1109/IISA.2013.6623710","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623710","url":null,"abstract":"In this paper, we discuss key findings, technological challenges and socioeconomic opportunities in Smart City era. Most of the conclusions were gathered during SmartSantander project, an EU project that is developing a city-scale testbed for IoT and Future Internet experimentation, providing an integrated framework for implementing Smart City services.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114437466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IISA 2013Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623722
S. Theocharis, G. Tsihrintzis
{"title":"Open data for e-government the Greek case","authors":"S. Theocharis, G. Tsihrintzis","doi":"10.1109/IISA.2013.6623722","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623722","url":null,"abstract":"Over the last years, the need to improve the service of public administration, has put at the center of the discussion the opening of government data to the public. The open data concern an emerging technology that is supported a lot by the scientific community and of particular interest for businesses and citizens. In this work, we shall seek the opportunities and benefits of open government data. We will also present the initiatives of the Greek government and the case study on the field of internal organization of the public administration.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114653880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IISA 2013Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623717
Spiridon Mousouris, Georgios D. Styliaras
{"title":"On the creation of a Digital Cultural Heritage Map","authors":"Spiridon Mousouris, Georgios D. Styliaras","doi":"10.1109/IISA.2013.6623717","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623717","url":null,"abstract":"This paper presents the development of Digital Cultural Heritage Map (DCHM) application that is based on open source technologies and combines the power of web-mapping and multimedia. The project aspires to collect all the spatial cultural information about an area in one and only dynamic and easy to maintain and modify, website. The basic component of the website is the web-map. The user can perform textual or spatial queries, or a combination of those two and subsequently access spatial data that render on the map or relevant multimedia that render on the webpage. The application is being implemented for the Aitoloakarnania Greek county and will be also deployed for mobile devices.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115006738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IISA 2013Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623729
Adamantia Psarologou, M. Virvou, N. Bourbakis
{"title":"A NLU-based method for a first level automatic categorization of AI-based security documents","authors":"Adamantia Psarologou, M. Virvou, N. Bourbakis","doi":"10.1109/IISA.2013.6623729","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623729","url":null,"abstract":"Managing and organizing the information is a difficult subject. Especially in our time with the plethora of available sources accessible to the public, basically through the Internet, the volume of these pieces of information becomes larger and larger. The purpose of this dissertation is the creation of a model of documents' categorization. Our goal is to illustrate an as possible automated way of classification that takes into consideration the meaning of the documents. The way in which a human evaluates and classifies documents is followed in this proposed methodology. We also illustrate some empirical examples of the function of our classification method.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128846796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IISA 2013Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623681
A. A. Sioson
{"title":"Experiences on the use of an automatic C++ solution grader system","authors":"A. A. Sioson","doi":"10.1109/IISA.2013.6623681","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623681","url":null,"abstract":"The codeCurator is an automatic C++ solution grader used in teaching programming to first year College students in Ateneo de Naga University. It provides programming exercises and challenge problems based on a prescribed sequence of programming topics. The exercises and challenge problems are designed to help students get a grip on formulation of functions, class methods, complete class implementation, or complete stand-alone programs in C++. Solutions are typically short and are checked using automatic testing techniques similar to online judge of ACM ICPC problems. In this paper, we present an analysis of the frequency of submissions, similarity of submitted solutions, categories of problems, and prospects on how to achieve an effective delivery of instruction.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122810555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IISA 2013Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623683
Danielle Anne F. Ayag, Ricardo C. Bautista, M. Eala, R. Feria
{"title":"Acceptability of Hear-O as a mobile hearing screening tool","authors":"Danielle Anne F. Ayag, Ricardo C. Bautista, M. Eala, R. Feria","doi":"10.1109/IISA.2013.6623683","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623683","url":null,"abstract":"Permanent childhood hearing impairment (PCHI) can cause diminished communication skills and delay in language development causing a great disadvantage for children. Early identification of hearing impairment, by the hearing screening program, can lead to beneficial effects on language development. However, the program is not accessible for everyone in the Philippines. This study aims to implement the hearing screening test for children aged 2 years and above using Android mobile devices. The application was tested on Android devices from different manufacturers to find out if there is a significant difference among the sound level output. Ear doctors were asked to perform the hearing screening procedure using the application on themselves and assess its effectiveness and significance. The results of the experimentation on Android phones are as follows: the standard deviation for sound level output vary from 1.28 dB to 3.99 dB for 1 kHz making the difference insignificant. On a 5-level Likert scale, doctors rated the application 4.3 for ease of navigation, 3.8 for design, and 4.6 for the clarity of instructions.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129215782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IISA 2013Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623705
Binbin Wang, Xinjie Hao, Lisheng Chen, Jingmin Cui, Lei Yunqi
{"title":"Face recognition based on the feature fusion of 2DLDA and LBP","authors":"Binbin Wang, Xinjie Hao, Lisheng Chen, Jingmin Cui, Lei Yunqi","doi":"10.1109/IISA.2013.6623705","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623705","url":null,"abstract":"To study the robustness of face recognition algorithms on conditions of complex illumination, facial expression and posture, three subset databases (Illumination, Expression and Posture subsets) are constructed by selecting images from several existing face databases. Advantages and disadvantages of seven typical algorithms on extracting global and local features are discussed respectively through the experiments on ORL and the three databases mentioned above. To improve the recognition rate, an algorithm of face recognition based on the feature fusion of Two-Dimensional Linear Discriminant Analysis (2DLDA) and Local Binary Pattern (LBP) is proposed in this paper. The experimental results verify both the complementarities of the two kinds of feature and the effectiveness of the proposed feature fusion algorithm.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131266520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IISA 2013Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623735
R. Kannavara
{"title":"Towards a unified framework for pre-silicon validation","authors":"R. Kannavara","doi":"10.1109/IISA.2013.6623735","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623735","url":null,"abstract":"One of the major problems seen in the pre-silicon validation realm today is the lack of a unified framework for all pre-silicon validation efforts including security validation. Lack of a unified framework for pre-silicon validation presents a “communication” challenge among different validation tool teams. While each team maintains and enhances a particular tool depending on the project they support and while these projects shift geographies to keep up with the product development life cycle, keeping the tools up to date, addressing specific tool changes and communicating the tool changes among project teams and dependent tool teams is emaciating. With this perspective, this paper seeks to highlight this issue and present a high-level solution space to address this problem. Further, the paper highlights outstanding issues that need to be resolved to enable such a unified pre-silicon validation framework to be successful.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133388819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IISA 2013Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623700
Yasser Al-Roqi, S. Papanastasiou, E. Peytchev
{"title":"Performance evaluation of three GPSR-based routing protocols in a military setting","authors":"Yasser Al-Roqi, S. Papanastasiou, E. Peytchev","doi":"10.1109/IISA.2013.6623700","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623700","url":null,"abstract":"Recent research has highlighted the potential of equipping soldiers with portable computing devices as a means to regularly report complex and important observations to mission planners at headquarters. To realise such scenarios connectivity between disparate elements in the battlefield needs to be established and appropriate supporting algorithms developed. In MANET literature several algorithms have been proposed to this effect for topologies where infrastructure is poor or non-available but not specifically for a military setting. In this work, we present a topology derived from a battalion deployment plan suitably parametrised to account for different personnel fill-up rates. In this setting we examine the performance of three position-based routing protocols, namely the Greedy Perimeter Stateless Routing (GPSR) protocol and two optimisations; the Divisional Perimeter Routing (GPSR-DP), and Buffering Zone Greedy Forwarding Strategy (GPSR-BZGFS). Our results indicate that the default GPSR approach as well as the two optimisations do not perform adequately due to frequent network disconnections, which occur as a consequence of the large deployment area. We highlight the need for more research to discover a workable solution and discuss possible approaches to the issue.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"22 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134426883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IISA 2013Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623692
R. Holy, M. Kalika, J. Kalikova
{"title":"Multi-application ID card using DESFire EV1","authors":"R. Holy, M. Kalika, J. Kalikova","doi":"10.1109/IISA.2013.6623692","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623692","url":null,"abstract":"Currently, when development of applications and technologies is definitely aimed at global use, such trend must be supported by unequivocal identification of users. The basic principles support safety elements (integrity, indisputableness, resistance to known and supposed forms of attacks) and do not link application to a physical carrier (plastic). The application can be hosted on a bank payment card or NFC (near field communication), etc. To reduce safety threats the concept of unequivocal identification using ID cards and conditions, which they technologically produce, are used. Individual technologies used can be defined in ISO/IEC 14443 contactless chip and infrastructure based in HSM (Hardware Security Module) and individual SAM (Secure Application Module) can be defined by key management of the chip content.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130114377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}