{"title":"Relative suitability of router based traffic monitoring techniques for WLAN (Wireless local area network) environment","authors":"M. Uma, G. Padmavathi","doi":"10.1109/ICOS.2012.6417638","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417638","url":null,"abstract":"The wireless communications has revolutionized human life, but has also created several issues relating to its usage. One of the biggest issues involved in use of the wireless communications is related to network performance. The process of refining the network routine by changing activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems is network management. Network operations will be executed by authenticated authorities like administrator. The increasing complexity of networks has promulgated a dire need for monitoring the traffic of the network which helps to identify any failure in the performance of the network. It also helps to identify attacks in the network and predicts the network status. This paper evaluates the performance of router based network traffic monitoring techniques such as SNMP, RMON and Netflow and the implementation of these techniques is carried out to ascertain the most effective monitoring technique among the three. The NS-2 simulator is used for implementation. SNMP performs better than the other two methods for WLAN.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127820744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for extending usability engineering: API usability essentials: Extending usability via component-based platform","authors":"Muhammad Bilal Munir, Arif Mushtaq","doi":"10.1109/ICOS.2012.6417654","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417654","url":null,"abstract":"Application Programming Interface (API) in software development acts as an important milestone for software productions. It is believed that API usability impacts upon ease-in-use, operationability and acceptability among its audience. Likewise, an ever increasing need for extending and integrating Usability Engineering (UE) has become vital for the success of software products. Earlier researches within this domain do not address API's usability via a component-based framework approach. The proposed framework emphasizes on consolidated formulation of various usability and quality models to derive chunks of dimensional variables. Further the paper highlights API usability practices and heuristics applied in API development process and discusses API product's artifacts component to be used in deriving further product-related components to support enhancing usability.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121421339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sense of presence on Image based Virtual Reality determines user's mental imagery","authors":"M. N. Diyana, D. R. A. Rambli","doi":"10.1109/ICOS.2012.6417647","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417647","url":null,"abstract":"Non-interactive or low interactive media such as radio can become highly immersive and realistic, engendering a compelling sense of presence for the participant. An example of low interactive technology is a simple Image-based Virtual Reality (IBVR) environment which has no perceptual characteristics of the interaction with haptic sensations which can provide high user's presence. Therefore, the study investigates whether IBVR environment can elicit user's presence even without computer animation? Furthermore, the three pole model of presence”, “mental imagery space” is discussed in this study. One hundred participants were involved in the study. Established Presence Questionnaires (PQ) was used to critically appraise the study. The result is discussed in qualitative analysis. As predicted, user's imagery exists as the effect of user's presence in IBVR environment. Results also suggest that the users interact with the IBVR environment through non-symbolic systems, such as the perceptual and the motor system which is similar with the three pole model of presence. Furthermore, this study has important implications for both our understanding of sense of presence exists in IBVR environment even without animation or haptic sensation.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123048933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An adaptation of the web-based system architecture in the development of the online attendance system","authors":"M. Othman, S. N. Ismail, H. Noradzan","doi":"10.1109/ICOS.2012.6417619","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417619","url":null,"abstract":"Students' attendance records are important documents for academic institutions that reflect the students' performances and the credibility of the academic institutions. Nevertheless, the process of managing these documents had been done manually, by pen and papers thus making it less efficient. This paper discusses about the development of the new Online Attendance System as the enhancement of the previous developed system named Attendance Register System for higher academic institutions in Malaysia. The new online system is being developed by adapting the concept of the web-based system architecture. The web-based system architecture used in the development of this system involves integration of various open source web-based technologies such as MySQL, PHP and Apache Web Server hence making the Online Attendance System more efficient and cost effective. The development of the Online Attendance System involves four main phases which are the construction of the conceptual framework where the scopes and requirements as well as the target users of the system had been identified, developing the proposed system's architecture by adapting to the web-based architecture, and the construction of the logical design and the physical design. The Online Attendance System consists of automated processes such as able to generate online attendance reports, warning letters and graph charts thus making the processes of recording and reporting the students' attendances more efficient and well-organized.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132764571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Validation of measurement tools to extract metrics from open source projects","authors":"N. S. A. Bakar, C. Boughton","doi":"10.1109/ICOS.2012.6417648","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417648","url":null,"abstract":"Software measurement can play a major role in ensuring the quality and reliability of software products. The measurement activities require appropriate tools to collect relevant metric data. Currently, there are several such tools available for software measurement. The main objective of this paper is to discuss the validation of results when using a combination of multiple measurement tools especially for products built using object-oriented techniques and languages. In this paper, we highlight four tools for collecting metric data, in our case from several Java-based open source projects. Our findings show that the tools provide different results for similar metrics and we discuss the methods used to validate the results reported by the tools. Our research is currently based on the work of Card and Glass, who argue that design complexity measures (data complexity and structural complexity) are indicators/predictors of procedural/cyclomatic complexity (decision counts) and errors (discovered from system tests).","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133028209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interoperable SOA-based architecture for e-government portal","authors":"Khairul Anwar Sedek, M. A. Omar, Shahida Sulaiman","doi":"10.1109/ICOS.2012.6417636","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417636","url":null,"abstract":"An effective e-government platform provides greater access to government services among citizens, businesses, and tourists. However, most e-government portals are not integrated as each government agency has its own portal. This may cause confusion and becomes a cumbersome task among stakeholders. This paper proposes a one-stop e-government architecture that integrates one-stop portal, e-government service application, and e-government service provider. The architecture provides seamless interoperability of e-government services among different government agencies. This work exploits various Web technologies and service oriented architecture approaches such as Web portal, portlet, service component architecture, Web services, and BPEL. Finally, this work presents the proof-of-concept of the proposed architecture and a case study in an e-government service environment.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125139541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards successful design of context-aware application frameworks to develop Mobile Patient Monitoring Systems using wireless sensors","authors":"M. Al-Bashayreh, N. Hashim, O. T. Khorma","doi":"10.1109/ICOS.2012.6417652","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417652","url":null,"abstract":"This paper is a study of; software framework designs, context awareness computing, and Mobile Patient Monitoring Systems (MPMS) using wireless sensors, to find out the lacks and the gaps in the literature. To achieve this, a set of success factors are used to characterize and analyze these frameworks. These success factors are introduced in this paper as a set of designs and domain requirements that must be addressed to design extensible and reusable context-aware application frameworks to develop MPMS using wireless sensors. To enhance the existing frameworks design, a research agenda is presented as the primary objective of this paper. This research agenda is expected to help researchers fill the gaps in the designed frameworks.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127343579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Appavoo, Anuja Meetoo-Appavoo, A. Chutoo, B. Durgahee
{"title":"Using network protocols' fingerprints to efficiently determine the penetration level of open source software in online businesses","authors":"P. Appavoo, Anuja Meetoo-Appavoo, A. Chutoo, B. Durgahee","doi":"10.1109/ICOS.2012.6417608","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417608","url":null,"abstract":"The Open Source Software (OSS) philosophy has revolutionized the world of software usage and development by opening the codes. It was accompanied with a number of freedoms that definitely leads to a continuous enhancement and advancement in these software. At the same time, a benefit of this philosophy is that its adoption implies a reduction of software piracy and, in a few decades, perhaps the near extinction of this crime. Furthermore, the evaluation of adoption of OSS by different companies remains a fuzzy one as the most common approach is the use of questionnaires for a survey. In this paper, an automated methodology is proposed so as to evaluate the level of OSS adoption by online businesses. We also demonstrated how network protocols can be used as fingerprints to determine the penetration level of OSS in public hosts. The study was conducted on the public network underlying Mauritius and revealed the extent to which OSS is adopted. The methodology used can be applied to other territories for a similar assessment.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124202612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The embedding of Arabic characters in QR code","authors":"M. Kamil, K. A. Jalil","doi":"10.1109/ICOS.2012.6417626","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417626","url":null,"abstract":"Since the introduction of QR Codes in the 90's, many companies have developed QR Code generators and mobile applications to read QR Codes. Despite the obvious benefits of next-generation data transfers, they have yet to be widely accepted and practiced. One of the main reasons is the use of unique language characters such as Arabic characters, Japanese Kanji, Thai Abugida and so forth. An attempt at embedding Arabic characters into QR Code for example, will result in the character's Unicode representation to be automatically encoded and/or decoded by default, instead of the original alphabet as a result of a method called Romanization. Thus, the intended use of the generated code has been useless. It is also noted that Romanization causes each character to be encoded in its own unique codeword which devours more space than encoding it with codeword for character combinations. In order to help solve this problem, this paper proposes the use of an algorithm that compares each word from an Arabic input with an internal codeword library that will then select the shortest codeword possible for single character and two-character combinations to replace the default Unicode representation, which also serves as a space saving method that allows longer messages to be encoded in a single QR Code. In return, the same method is also used to properly decode the message.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132453736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahmood Al-khassaweneh, Bashar Smeirat, Talal Bin Ali
{"title":"A hybrid system of Iris and Fingerprint recognition for security applications","authors":"Mahmood Al-khassaweneh, Bashar Smeirat, Talal Bin Ali","doi":"10.1109/ICOS.2012.6417639","DOIUrl":"https://doi.org/10.1109/ICOS.2012.6417639","url":null,"abstract":"The increase in security level due to the use of biometric recognition systems compared to traditional identification systems is helping in the rapid advancement of such systems. The use of Fingerprint or Iris recognition systems is considered to be reliable and accurate. Both systems do have some drawbacks and errors. In order to minimize the error and increase the accuracy, we propose a hybrid system for identification by using both fingerprint recognition and Iris recognition systems. In this paper, the algorithm used for identification for Iris image was based on Ng et al algorithm using Rapid Haar Wavelet Decomposition while the algorithm used for fingerprint identification presented by Porpanomchai et al is based on the Euclidean distance from the bifurcation point to the core point. Both algorithms were modified and then combined for the hybrid system. The simulation results show the improvement in performance of the proposed method and the added advantages of combining both identifications systems.","PeriodicalId":319770,"journal":{"name":"2012 IEEE Conference on Open Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132016998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}