{"title":"Notice of Violation of IEEE Publication Principles Comparative approach for range enhancing energy harvester (REACH) mote passive wake-up radios for wireless networks","authors":"N. Sagar, P. Reddy","doi":"10.1109/ICCCT2.2014.7066740","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066740","url":null,"abstract":"In recent world, the wireless sensor networks are used intensively in many applications fields, these are used by scientific researchers to improve and accelerate the performance features of networks. The designs are very challenging and are sustainable, on the above these energy-dependent sensors are relied to run for long periods. These Sensor nodes are usually battery-powered and thus have very shorter lifetime. Here this paper, introduces a improved approach for wake-up radio devices called REACH (Range Enhancing Energy Harvester) Mote in place of general sensor nodes, here these nodes use the energy harvesting circuit in combination with an ultra-low-power pulse generator to activate and wake-up the motes in the wireless network. And this scheme helps in reducing latency without increase in energy consumption","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"105 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83389499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quality of service (QoS) model for web service selection","authors":"Meysam Ahmadi Oskooei, S. Daud","doi":"10.1109/I4CT.2014.6914187","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914187","url":null,"abstract":"Nowadays, likewise the functionality of a web service, Quality of Service (QoS) has become an essential feature of web service characteristic for users to select the suitable web services for a distributed application by identifying which characteristics make service more qualified to be selected. Although proposed QoS models by existing works may satisfy the required quantitative measurement of QoS attributes, clustering all generic quality attributes in a same group may have a negative impact on technical QoS attributes such as Response time. Consequently, from technical point of view, lack of a comprehensive model to evaluate web services in terms of technical and non-technical QoS attributes is an important issue on topic, affecting the accuracy of the results in general, and is addressed in this paper.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"52 1","pages":"266-270"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83776846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Ammar Shafi, Mohd Saifullah Rusiman, N. Yusof
{"title":"Determinants status of patient after receiving treatment at Intensive Care Unit: A case study in Johor Bahru","authors":"Muhammad Ammar Shafi, Mohd Saifullah Rusiman, N. Yusof","doi":"10.1109/I4CT.2014.6914150","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914150","url":null,"abstract":"ICU in terms of Intensive Care Unit was established in Malaysia since 1968. The number of patients receiving treatment at ICU had been increased day by days until now. Rapid development of medical and surgical subspecialties in the last decade resulted in increasing demands for more ICU beds and provides momentum for its development. This study aims to identify the determinants of patient status (alive or died) after receiving treatment in ICU. Secondary data of 1314 patients who received ICU treatment recorded by nurses and doctors using cluster sampling was used. Binary logistic regression was applied in order to identify the determinants of patient status. Based on the results of the logistic regression, this study discovered that patient's age, days of patients in ICU, comorbid diseases and patient's discharge score are the factors contributing patients to die after received treatment in ICU.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"68 1","pages":"80-82"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85531848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-limited ant colony optimization with cooperative transmission","authors":"Mohd Hazmi Hamzah, Hadhrami Ab. Ghani","doi":"10.1109/I4CT.2014.6914167","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914167","url":null,"abstract":"Cooperative transmission utilizes the presence of multiple radio transmission equipment including base stations, antennas and mobile stations to create transmission such that capacity and performance of the transmission are improved. This paper proposes a new transmission model embedded with a modified ant colony algorithm to improve transmission performance whilst reducing computational complexity.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"95 1","pages":"161-165"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81832320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactive augmented reality art book to promote Malaysia traditional game","authors":"Shahrul Badariah Mat Sah, N. Chyan, S. Hisham","doi":"10.1109/I4CT.2014.6914175","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914175","url":null,"abstract":"Malaysia is a multicultural country and is known for its tourism industry. The uniqueness of Malaysian traditional games is one of the cultural aspects to promote tourism industry in Malaysia. This paper presents a mobile application that combines the use of printed media and marker-based augmented reality (AR) technology as an effective and engaging platform in promoting Malaysian traditional games. The mobile AR application developed in this study provides interactive features that allow users to interact and manipulate the 3D objects including videos using five assigned virtual buttons. User acceptance test was carried out with 15 users including foreigners to verify the effectiveness of the mobile AR application.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"4 1","pages":"203-208"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82434652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nurul Hafiza Idayu Mohd Paudzi, H. M. Hanum, Z. Bakar
{"title":"Evaluation of prosody-related features and word frequency for Malay speeches","authors":"Nurul Hafiza Idayu Mohd Paudzi, H. M. Hanum, Z. Bakar","doi":"10.1109/I4CT.2014.6914137","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914137","url":null,"abstract":"Changes in energy and pitch under various speaking conditions may corresponds to speaker intention and information content perceived by the speaker. In this paper, two prosody-related features which are energy and pitch of word utterances are experimented and the relationships with word frequency are investigated. Two parliamentary speeches are segmented manually into sentences and then into individual words in this experiment. Next, the maximum, minimum and mean of pitch and energy are extracted from each word to calculate word energy and pitch measure. The frequency of each word is counted to identify the relationship between word frequency with the pitch and energy measure. The study found that there is a significant relationship between word frequency and energy measure of word utterances in Malay speech but no significant relationship between word frequency and pitch measure.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"110 1","pages":"15-20"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89438025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BOKHARI-Tool for Secure Software Requirements (TSSR) Management","authors":"M. Bokhari","doi":"10.1109/ICRITO.2014.7014665","DOIUrl":"https://doi.org/10.1109/ICRITO.2014.7014665","url":null,"abstract":"This paper discusses about the requirements which should be incorporated in the development of the requirement management tools. A new-fangled Requirements Management Tool has been proposed and named as BOKHARI-Tool for Secure Software Requirements (TSSR) Managemnt which encompasses the requirement decisive factor that have been mentioned in this paper. Bokhari-TSSR manages risk analysis, security of the system and project, system requirements, users/group restriction, encrypted database, traceability and extension of the tool to interact with external requirement management tools. The aim of this paper is to describe the Bokhari-TSSR architecture and its framework, which has four components: Planner, Modeller, Prover and Documenter which will be helpful in managing requirements and interacting with arbitrary number of external tools for secure software development.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"50 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91396688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Workstations uptime analysis framework to identify opportunity for forming ad-hoc computer clusters","authors":"C. Gan, B. Ooi, S. Liew","doi":"10.1109/I4CT.2014.6914181","DOIUrl":"https://doi.org/10.1109/I4CT.2014.6914181","url":null,"abstract":"Many solutions have been proposed to harness underutilized workstations to form ad-hoc and low-cost computer clusters. The success of forming ad-hoc computer clusters greatly depends on the usage characteristic of an organization. An organization with hundreds of workstations does not necessarily imply that it has the opportunity to form an ad-hoc computer cluster because different workstations may have different turned-on durations and these workstations may not be available at the same time depending on their users' usage. The objective of this work is to devise a framework to predict when and which workstations may be turned-on and for how long based on previously monitored uptime. 97 workstations have been selected from a real environment for 42 days to test the proposed framework. From the test results, it showed that there are indeed turned-on patterns on weekly basis. Some workstations have more consistent repetitive turned-on patterns while some do not, and this work created a framework to distinguish these workstations. The contribution of this work is the creation of a framework that allows administrators to identify potential workstations for forming ad-hoc computer clusters of their environment.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"34 1","pages":"234-238"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77697624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luis Sanabria-Russo, J. Barceló, A. Faridi, B. Bellalta
{"title":"WLANs throughput improvement with CSMA/ECA","authors":"Luis Sanabria-Russo, J. Barceló, A. Faridi, B. Bellalta","doi":"10.1109/INFCOMW.2014.6849187","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849187","url":null,"abstract":"Carrier Sense Multiple Access with Enhanced Collision Avoidance (CSMA/ECA) is a distributed MAC protocol for WLANs, capable of achieving greater throughput than the current contention mechanism in WLANs. It does so by changing to a deterministic backoff after successful transmissions, which leads to a collision-free schedule that under ideal conditions can be permanently maintained. This demo shows the first implementation of CSMA/ECA using commercial hardware and OpenFWWF in a realistic network testbed. Results show how CSMA/ECA outperforms the current MAC for WLANs in terms of throughput, even through a permanent collision-free schedule cannot be maintained due to unideal practical conditions.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"39 1","pages":"125-126"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73572627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kai Sun, Zhikui Chen, Jiankang Ren, Song Yang, Jing Li
{"title":"M2C: Energy efficient mobile cloud system for deep learning","authors":"Kai Sun, Zhikui Chen, Jiankang Ren, Song Yang, Jing Li","doi":"10.1109/INFCOMW.2014.6849208","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849208","url":null,"abstract":"With the number increasing of applications and services that are available on mobile devices, mobile cloud computing has drawn a substantial amount of attention by academia and industry in the past several years. When facing the most exciting machine learning applications such as deep learning, the computing requirement is intensive. For the purpose of improving energy efficiency of mobile device and enhancing the performance of applications through reducing execution time, M2C offloads computation of its machine learning application to the cloud side. We propose the prototype of M2C with the mobile side on Android, iPad and with the cloud side on the open source cloud: Spark, a part of the Berkeley Data Analytics Stack with NVIDA GPU. M2C's distinct set of varying computational tools and mobile nodes allows for thorough implementing distributed machine learning algorithm and innovative wireless protocols with energy efficiency, verifying the theoretical research and bringing the user extremely fast experience.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"63 8 1","pages":"167-168"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77590762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}