{"title":"Assessment metrics for intelligence level of human-computer interface","authors":"Ahmed El Zarka, T. Ozkul","doi":"10.1109/ICCSII.2012.6454413","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454413","url":null,"abstract":"The Quality of human computer interface is increasingly getting more important as embedded computers and mobile computing are becoming an important part of our lives. The user friendly human computer interface is what trumps the commercial success of the device. Machine intelligence quotient describes the intelligence level of machines, and this intelligence is complemented with the user interface level of intelligence. This relationship arises from the position of the interface that mediates the interaction between human and machines. The intelligent interface makes it easy for users to tell the device what they want to do. This communication between the user and the device provides insights into quantitatively assess the user interface intelligence quotient. This study investigates the user interface intelligence of several Smartphone interfaces by proposing a framework for assessing the intelligence quotient.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122541599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Can Android be used for real-time purposes?","authors":"Luc Perneel, Hasan Fayyad-Kazan, M. Timmerman","doi":"10.1109/ICCSII.2012.6454350","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454350","url":null,"abstract":"Android is thought as being yet another operating system! In reality, it is a software platform rather than just an OS; in practical terms, it is an application framework on top of Linux, which facilitates its rapid deployment in many domains. Android was originally designed to be used in mobile computing applications, from handsets to tablets to e-books. But developers are also looking to employ Android in a variety of other embedded systems that have traditionally relied on the benefits of true real-time operating systems performance, boot-up time, real-time response, reliability, and no hidden maintenance costs. In this paper, we present a preliminary conclusion about Android's real-time behavior and performance based on experimental measurements such as thread switch latency, interrupt latency, sustained interrupt frequency, and finally the behavior of mutex and semaphore. All these measurements were done on the same ARM platform (Beagleboard-XM). Our testing results showed that Android in its current state cannot be qualified to be used in real-time environments.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122843711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Teemu Alapaholuoma, T. Seppala, J. Nieminen, J. Ylinen, P. Loula
{"title":"Concurrent monitoring environment for obtaining IPFIX flow and signature based IDS alert data","authors":"Teemu Alapaholuoma, T. Seppala, J. Nieminen, J. Ylinen, P. Loula","doi":"10.1109/ICCSII.2012.6454305","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454305","url":null,"abstract":"The aim of this paper is to introduce and untangle the operating model of a network monitoring environment that handles flow and signature based techniques side by side on a large-scale campus network. This paper introduces one approach for solving the problematic creation of standard-based flow information and signature alarms in tandem from large-scale network traffic. The operating model takes into account cost efficiency, trustworthy and privacy protection. Due to the Privacy Protection Act and local laws, data analysis is made after traffic anonymization.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126269755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An experimental analysis of energy consumption in milling strategies","authors":"S. Pervaiz, I. Deiab, A. Rashid, M. Nicolescu","doi":"10.1109/ICCSII.2012.6454527","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454527","url":null,"abstract":"Pocket milling operation is one of the widely used milling operations. CAM packages offer different tool path strategies to execute a machining operation. In the presented work zigzag, constant overlap spiral, parallel spiral and oneway tool path strategies were compared in terms of power and energy consumption for pocket milling of Al 6061 aluminum alloy. All pocketing operations were conducted using 8 mm diameter High Speed Steel (HSS) end milling cutters. Energy utilization was analysed for all tool path strategies. This work aims to develop better understanding towards sustainability concept in core machining phase.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128045299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Marrington, I. Baggili, T. Al Ismail, A. Al Kaf
{"title":"Portable web browser forensics: A forensic examination of the privacy benefits of portable web browsers","authors":"A. Marrington, I. Baggili, T. Al Ismail, A. Al Kaf","doi":"10.1109/ICCSII.2012.6454516","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454516","url":null,"abstract":"Portable web browsers are installed on removable storage devices which can be taken by a user from computer to computer. One of the claimed benefits of portable web browsers is enhanced privacy, through minimization of the traces of browsing activity left on the host's hard disk. On the basis of this claim, it would appear that portable web browsers pose a challenge to forensic examiners trying to reconstruct past web browsing activity in the context of a digital investigation. The research examines one popular portable web browser, Google Chrome in both normal and private browsing mode, and compares the forensic traces of its use to forensic traces of the installed version of the same browser. The results show that Google Chrome Portable leaves traces of web browsing activity on the host computer's hard disk, and demonstrate a need for forensic testing of the privacy claims made for the use of portable web browsers.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126893904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual laser keyboards: A giant leap towards human-computer interaction","authors":"Z. AlKassim","doi":"10.1109/ICCSII.2012.6454614","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454614","url":null,"abstract":"This paper provides an alternative solution to the traditional physical-button keyboards. With implementation of laser technology, this virtual keyboard solves many problems faced with traditional keyboards, making it more practical. The keyboard consists of three modules respectively; the illuminating, sensing, and projecting module. The projecting module projects an image of a keyboard onto any surface, then the sensing module senses the user's fingers in coordination with the illuminating module, after which typed keys are displayed on the screen.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133569737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perception based adaptive haptic communication protocol (PAHCP)","authors":"Q. Nasir, Enas Khalil","doi":"10.1109/ICCSII.2012.6454426","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454426","url":null,"abstract":"Packet-switched communication of haptic data telepresence systems is characterized by high packet rates on the communication channel. The quality of the internet-based telepresence systems depend on the quality of the communication channel between the operator and the remote site, and the delay jitter in the data exchange. Perceptual based data reduction for haptic data is used to reduce packet rate. It is proved and through experimental studies that the implementing the perception thresholds and additional buffering techniques can significantly reduce haptic data traffic with little or no influence on the quality of collaborative haptic-enabled (C-HE) or Tele-Operation/Tele-Presence, and Tele-Interaction (TPTA). In this paper, an adaptive size of the dead-band (Just Noticeable Difference - JND) technique for feedback forces received from remote side is presented, while keeping fixed JND for movements velocities for the transmitted haptic data from the operator side, to reduces the packet rate without perceptible disturbance.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":"55 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132511108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Al-Ali, N. A. Tubaiz, A. Al-Radaideh, J. Al-Dmour, L. Murugan
{"title":"Smart grid controller for optimizing HVAC energy consumption","authors":"A. Al-Ali, N. A. Tubaiz, A. Al-Radaideh, J. Al-Dmour, L. Murugan","doi":"10.1109/ICCSII.2012.6454548","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454548","url":null,"abstract":"As the smart grid emerges from concept to implementation, power utilities start to optimize power consumed by Heating, Ventilation and Air-Conditioning Systems (HVACs). Engineers started to design controllers that better manage the power consumption of the HVAC systems. HVACs consume more than 50% of generated power in many countries that have hot and/or cold weather. Such huge power loads may exceed the generated power. Due to this large power demands, some utilities have to resort to rationalize the available electricity to its consumers randomly. This paper presents a fuzzy logic based system that monitors and controls residential HVACs units, where demand exceeds the supplied electrical power. The proposed system reads the rooms temperature and turns ON/OFF the units alternatively to maintain the cooling/heating based on the available supplied power; i.e. shedding the load without compromising the residents comfort. The proposed fuzzy logic rule-based system was designed, simulated and tested.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124333161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new traceable software requirements specification based on IEEE 830","authors":"A. Chikh, M. Aldayel","doi":"10.1109/ICCSII.2012.6454481","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454481","url":null,"abstract":"This paper aims to enrich software requirements specification by integrating the concept of traceability. This integration, which will allow a more helpful reading of that specification, will provide a critical support to different requirements stakeholders. Indeed traceability will help for example designers in refining requirements into lower-level design components and analysts in understanding the implications of a proposed change, to ensure that no extraneous code exists and to minimize or eliminate the presence of faked or frivolous requirements that lack any justification. The main contribution of this paper is building a schema for software requirements specification that make it easily traceable by linking each requirement to real-world dimensions such as detail design deliverables, related system requirements and sources such as user requirement, analyst, regulation and standard.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123003961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A client privacy preserving discovery service scheme","authors":"Zhipeng Wang, Hong Zhu","doi":"10.1109/ICCSII.2012.6454610","DOIUrl":"https://doi.org/10.1109/ICCSII.2012.6454610","url":null,"abstract":"The EPCglobal Network is a global information architecture for objects carrying RFID tags with Electronic Product Codes (EPC) in supply chains. Discovery Service (DS) is an important component storing large amounts of indices from EPCs to detailed information in EPCISes. However, to the client, DS is a third-party server which can easily get clients' privacy when they send queries. In this paper, using the policy of Private Information Retrieval (PIR), we propose a client privacy preserving DS scheme that can meet both basic functional requirement and client privacy requirement. Compared to existing privacy preserving DS schemes, our work is more concise in architecture and can completely guarantee the client privacy.","PeriodicalId":281140,"journal":{"name":"2012 International Conference on Computer Systems and Industrial Informatics","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128638123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}