Azza Al Houqani, H. Hildmann, S. Nicolas, F. Saffre
{"title":"Supporting environmental awareness using mobile clients","authors":"Azza Al Houqani, H. Hildmann, S. Nicolas, F. Saffre","doi":"10.1109/INNOVATIONS.2013.6544398","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544398","url":null,"abstract":"We present an android application for mobile clients, which is designed to raise awareness for - and support the reduction of - the individual consumption of natural resources like water and electricity. The presented implementation is interfacing with existing services offered by the utility provides in the emirate of Abu Dhabi and provides a number of functionalities. Climate change and the detrimental effect it has on life everywhere on the planet is receiving increasing attention. There is an urgent need to raise awareness for a number of environmental issues. The ambitious sustainability targets set forth in the Abu Dhabi 2030 vision clearly acknowledges the relevance of preserving our environment. This paper presents a functioning and feasible contribution to this effort.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115119228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Alahmad, Yuye Peng, E. Sordiashie, L. El Chaar, N. Aljuhaishi, H. Sharif
{"title":"Information technology and the smart grid - A pathway to conserve energy in buildings","authors":"M. Alahmad, Yuye Peng, E. Sordiashie, L. El Chaar, N. Aljuhaishi, H. Sharif","doi":"10.1109/INNOVATIONS.2013.6544394","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544394","url":null,"abstract":"Through combining Information and Communication Technologies (ICT), advanced instrumentation, system intelligence, and information on the end user, the smart grid will increase building energy efficiency and conservation. Demand Side Management (DSM) programs serve as an aid in energy conservation and management strategies as well as in the collection of real-time consumption information data. Specifically, as proposed in this paper, real-time, fine-grain consumption data at the point of use in buildings can be used by building energy managers, utilities, and the end user for planning, load forecasting, and feedback for providing information that may lead to end user behavior change. This paper focuses on the development of node-level very short time load forecasting (NL-VSTLF), and specifically on a framework for the utilization of real-time data at the point of use for advancing research in the area of building-very short term load forecasting. This proposed framework will be the foundation for variable one minute to hourly and daily load forecasting using an aggregate of all active nodes in real-time.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116390305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identity management framework for cloud networking infrastructure","authors":"R. Dhungana, A. Mohammad, A. Sharma, I. Schoen","doi":"10.1109/INNOVATIONS.2013.6544386","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544386","url":null,"abstract":"The Cloud Networking(CloNe) infrastructure provisions elastic, secure, and on-demand virtualized network resources to the end user. It incorporates the Network-as-a-Service(NaaS) provisioning model, which enhances network-level scalability, throughput, and performance. In this paper, we extend the CloNe architecture by designing, deploying, and integrating an identity management framework, customized for the CloNe infrastructure. The identity management framework proposed in this paper, is based on the User Managed Access(UMA) protocol. The framework supports authentication, authorization, and identity management of entities in the CloNe infrastructure. Furthermore it enables federated identity management and management of access control policies across different infrastructure providers.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132941509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An empirical study on the robustness of a fragile watermark for relational databases","authors":"I. Kamel, Waheeb Yaqub, K. Kamel","doi":"10.1109/INNOVATIONS.2013.6544423","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544423","url":null,"abstract":"Databases most often contain critical information. Unauthorized changes to databases can have serious consequences and may result in significant losses for the organization. This paper presents a viable solution for protecting the integrity of the data stored in relational databases using fragile watermarking. Prior techniques introduce distortions to the watermarked values and thus cannot be applied to all attributes. Our technique protects relational tables by reordering tuples relative to each other according to a secrete value (watermark). This paper introduces empirical study on the effect of data distribution and other data measures like the mean and standard deviation on the attack detection rates. A study on the cost, in terms of the execution time, of the proposed watermark insertion and data verification algorithms is also presented.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127670283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Portable wireless biomedical temperature monitoring system: Architecture and implementation","authors":"B. Mohammad, H. Elgabra, R. Ashour, H. Saleh","doi":"10.1109/INNOVATIONS.2013.6544400","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544400","url":null,"abstract":"This paper demonstrates the design and implementation of a portable embedded system targeting continuous temperature monitoring with wireless interface capability. Our main motive is to provide a solution for monitoring babies', disable or elderly population body temperature and initiate immediate alarm in case of hazardous cases. Such cases include overheating (fever), under heating, and a high temperature change over a predefined time period. The advantage of the system is its effectiveness as preventive measure against febrile seizures or any other fever condition. The system is extended for interfacing with other devices such as cell phones to enable remote monitoring; an android application to showcase the concept was developed. The system architecture consist of temperature sensors, LCD screen, Bluetooth interface, memory, a sound buzzer all controlled by a single microcontroller core. Even though the system is concentrated on temperature monitoring but the architecture can be expanded to monitor other vital signs like pulse rate, Oxygen saturation or any other interested parameter.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115238689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nazar Zaki, A. A. Dhaheri, Kalthoom A Alawar, Saad Harous
{"title":"Protein-protein Interaction Prediction using Arabic semantic analysis","authors":"Nazar Zaki, A. A. Dhaheri, Kalthoom A Alawar, Saad Harous","doi":"10.1109/INNOVATIONS.2013.6544426","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544426","url":null,"abstract":"Scientists are still far from unraveling the molecular mechanisms of most relevant diseases such as cancer and diabetes. A better understanding of protein interactions could provide a clue about the molecular mechanism of the processes leading to such diseases. Novel methodologies to understand diseases through their primary protein interactions are highly desired. In this paper we propose a simple method to predict protein-protein interaction based on Arabic semantic analysis model. The Arabic semantic model is an effective feature extraction method based on natural language processing. Two protein sequences may interact if they contain similar or related Arabic words. The semantic meaning will most likely provide us with a clue on how or why two proteins interact. To evaluate the ability of the proposed method to distinguish between “interacted” and “non-interacted” proteins pairs, we applied it on a dataset of 200 protein pairs from the available yeast saccharomyces cerevisiae protein interaction. The proposed method managed to get 100% sensitivity, 0.84% sensitivity and 92% overall accuracy. The method also showed moderate improvement over the existing well-known methods for PPI prediction such as PPI-PS and PIPE.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124811158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attitude towards Robot Assisted Surgery: UAE context","authors":"M. Zineddine, N. Arafa","doi":"10.1109/INNOVATIONS.2013.6544414","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544414","url":null,"abstract":"Information and communication technology (ICT) has become a core part of every business. Industries form all areas have been taking advantage of ICT. Healthcare sector is no exception. Robots have been playing a pivotal role in assisting surgeons in many types of surgeries in the recent years. Robotic assisted surgery led to the possibility of remote procedures by surgeons on remote patients. This study investigates the perception of patients towards the use of Robots in surgery locally and remotely. A survey method was adopted in this research. Data reveals that the majority of respondents from a random sample (140 participants) believe that the use of robots during surgeries is neither safe and controllable, nor beneficial. The acceptance of the use of this surgical technology in all cases is still questionable within this research sample.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120991220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A path generation algorithm for mobile sinks in wireless sensor networks","authors":"E. Taqieddin, O. Banimelhem, I. Shatnawi","doi":"10.1109/INNOVATIONS.2013.6544412","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544412","url":null,"abstract":"With the energy constraints present in wireless sensor networks, it is essential to find energy-efficient approaches that would result in enhanced network lifetime. One approach is to exploit the sink mobility, by moving it randomly or through a predefined path, to the vicinity of the sensor nodes. By doing so, the communication distance will be reduced, leading to a reduction in the consumed transmission energy. In this paper, a path generation algorithm based on the Principal Component Analysis is presented. The main goal is to find a fixed path for a single mobile sink with the minimum average distance to the sensor nodes. Simulation results indicate that this approach leads to extended network lifetime and results in an increased average energy per live node.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127357682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing visual haptic application for learning Jawi handwriting skills","authors":"M. M. Amin, Halimah Badioze Zaman, A. Ahmad","doi":"10.1109/INNOVATIONS.2013.6544410","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544410","url":null,"abstract":"The visual haptic approach is considered as a very promising potential to aid primary school pupils in teaching and learning method of Jawi handwriting skills. An effort to help pupils in learning Jawi handwriting skills has prompted this study. This paper explores the related literatures and previous studies on visual haptic in handwriting. It also summarizes the findings of the preliminary study on the current approach of teaching and learning of Jawi handwriting skills, and the potential of the visual haptic approach in the Malaysian educational setting. This paper also discusses two main phases involved in this study, which are the development and the usability testing of Visual Haptic Jawi (HV-Jawi). The proposed conceptual framework hopefully can be a guide in developing a visual haptic application such as HV-Jawi.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123935358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi watermarking algorithm based on DCT and hash functions for color satellite images","authors":"A. Kunhu, H. Al-Ahmad","doi":"10.1109/INNOVATIONS.2013.6544389","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2013.6544389","url":null,"abstract":"This paper deals with a multi watermarking algorithm which embeds robust ownership watermark and fragile authentication information into satellite images to protect the copyright ownership and integrity of the images. This new watermarking technique is totally blind and does not require the original satellite image for the extraction process of the embedded information. The robust watermark is embedded first in the discrete cosine transform (DCT) and the second hash authentication code is embedded in the spatial domain. The new technique offers high peak signal to noise ratio (PSNR) and similarity structure index measure (SSIM) values. The technique was successfully tested on a variety of satellite images. The fragile watermark is sensitive to any slight tampering and can locate the area of the editing. The robust watermark survived many intentional and non intentional attacks.","PeriodicalId":438270,"journal":{"name":"2013 9th International Conference on Innovations in Information Technology (IIT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122491371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}