GSTF international journal on computing最新文献

筛选
英文 中文
The Usefulness of a Simulated Environment in Ethnographic Research for Gaming and HCI 模拟环境在游戏和人机交互人种学研究中的作用
GSTF international journal on computing Pub Date : 2014-09-16 DOI: 10.1037/e527382013-009
N. Z. Abidin, Robert Wellington
{"title":"The Usefulness of a Simulated Environment in Ethnographic Research for Gaming and HCI","authors":"N. Z. Abidin, Robert Wellington","doi":"10.1037/e527382013-009","DOIUrl":"https://doi.org/10.1037/e527382013-009","url":null,"abstract":"Ethnography is now a widely used research method in information systems and gaming. It is one of the most in-depth research methods that can capture people’s feelings, behavior and opinions by the researcher getting immersed in the study. The main aspect of the research method is gathering the data by being in the ‘field’, gaining a deep insight by participating and observing the culture being studied. The authors have replaced the ‘field’ with simulated environments, and although this would tend to infer a less rich or truthful ethnographic study (from a purist’s perspective), they reflect on the usefulness in the context of two ongoing research studies. A Simulated Gaming Environment is proving to offer a suitably ‘real’ experience for the first author’s research, and a driving simulator is the only option for the second.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85341876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Developing a neighborhood-scale wireless notification prototype 开发一个社区规模的无线通知原型
GSTF international journal on computing Pub Date : 2014-09-13 DOI: 10.5176/2010-2283_1.2.63
M. Venkatesh, Bahram Attaie
{"title":"Developing a neighborhood-scale wireless notification prototype","authors":"M. Venkatesh, Bahram Attaie","doi":"10.5176/2010-2283_1.2.63","DOIUrl":"https://doi.org/10.5176/2010-2283_1.2.63","url":null,"abstract":"We outline an innovative approach to the development of a prototype of a neighborhood notification system (NNS). The NNS application residing on smart phones will use software defined radio and cognitive radio components to interface with radio frequency transceivers. Mesh networking is proposed for emergency notification and disaster response coordination using NNS. Our focus has been on the IEEE 802.15.4 and the very recent IEEE 802.15.5 mesh networking standard for low data rate connectivity among low power nodes (or nodes whose power consumption needs to be low). The innovation stems from bringing together different hardware and software components – some of which, like our Software Defined Radio (SDR) platform, are themselves still evolving and others, like the meshing platform, are very new – to propose an adaptive, reconfigurable, infrastructure-less ad hoc wireless solution to emergency communications in the unlicensed ISM RF band.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82659770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The ICT Induced Business Reconfiguration from Evolution to Revolution (A Case Study of Public Sector Banks in Sri Lanka) 信息通信技术诱导的业务重构:从进化到革命(以斯里兰卡公共部门银行为例)
GSTF international journal on computing Pub Date : 2014-09-13 DOI: 10.5176/2010-2283_1.2.51
P. Selvarajan
{"title":"The ICT Induced Business Reconfiguration from Evolution to Revolution (A Case Study of Public Sector Banks in Sri Lanka)","authors":"P. Selvarajan","doi":"10.5176/2010-2283_1.2.51","DOIUrl":"https://doi.org/10.5176/2010-2283_1.2.51","url":null,"abstract":"This paper explores the recent revolutionary levels of Business Reconfiguration in the Public Sector Banks in Sri Lanka through a Case Study exploratory analysis. This study has compared the five levels of Business Reconfiguration introduced by Venkatraman (1991) with the Sri Lankan Public Sector Banks. Findings show that rather than evolutionary levels, these banks have achieved the revolutionary levels of business Reconfiguration within a short period of time and it is believed that they will achieve the optimum capability of level five in near future.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76086827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing End-to-End Wireless Mesh Networks Ticket-Based Authentication. 保护端到端无线网状网络基于票证的认证。
GSTF international journal on computing Pub Date : 2014-09-13 DOI: 10.5176/2010-2283_1.2.64
Rushdi A. Hamamreh, Anas M. Melhem
{"title":"Securing End-to-End Wireless Mesh Networks Ticket-Based Authentication.","authors":"Rushdi A. Hamamreh, Anas M. Melhem","doi":"10.5176/2010-2283_1.2.64","DOIUrl":"https://doi.org/10.5176/2010-2283_1.2.64","url":null,"abstract":"Hybrid wireless mesh network (WMN) consists of two types of nodes: Mesh Routers which are relatively static and energy-rich devices, and Mesh Clients which are relatively dynamic and power constrained devices. In this paper we present a new model for WMN end-to-end security which divide authentication process into two phases: Mesh Access Point phase which based on asymmetric cryptography and Mesh Client phase which based on a server-side certificate such as EAP-TTLS and PEAP.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"65 4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79285129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying GPUs for Smith-Waterman Sequence Alignment Acceleration 应用gpu实现Smith-Waterman序列对齐加速
GSTF international journal on computing Pub Date : 2014-09-13 DOI: 10.5176/2010-2283_1.2.56
Phong H. Pham, N. Duong, N. M. Ta, Cuong Q.Tran, D. Nguyen, T. Nguyen, H. D. Le
{"title":"Applying GPUs for Smith-Waterman Sequence Alignment Acceleration","authors":"Phong H. Pham, N. Duong, N. M. Ta, Cuong Q.Tran, D. Nguyen, T. Nguyen, H. D. Le","doi":"10.5176/2010-2283_1.2.56","DOIUrl":"https://doi.org/10.5176/2010-2283_1.2.56","url":null,"abstract":"The Smith-Waterman algorithm is a common local sequence alignment method which gives a high accuracy. However, it needs a high capacity of computation and a large amount of storage memory, so implementations based on common computing systems are impractical. Here, we present our implementation of the Smith-Waterman algorithm on a cluster including graphics cards (GPU cluster) – swGPUCluster. The algorithm implementation is tested on a cluster of two nodes: a node is equipped with two dual graphics cards NVIDIA GeForce GTX 295, the other node includes a dual graphics cards NVIDIA GeForce 295 and a Tesla C1060 card. Depending on the length of query sequences, the swGPUCluster performance increases from 37.33 GCUPS to 46.71 GCUPS. This result demonstrates the great computing power of GPUs and their high applicability in the bioinformatics field.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"57 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91145722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Knowledge Management Approach: Business Intelligence in an Intranet Data Warehouse 知识管理方法:内部网数据仓库中的商业智能
GSTF international journal on computing Pub Date : 2014-09-13 DOI: 10.5176/2010-2283_1.2.59
Lisa Soon, C. Fraser
{"title":"A Knowledge Management Approach: Business Intelligence in an Intranet Data Warehouse","authors":"Lisa Soon, C. Fraser","doi":"10.5176/2010-2283_1.2.59","DOIUrl":"https://doi.org/10.5176/2010-2283_1.2.59","url":null,"abstract":"For contemporary businesses to stay viable, business intelligence is mission critical. Although the importance of business intelligence is recognised, there is limited research on what information contributes to business intelligence and how business intelligence is sought for use in an organisational intranet. This research discusses how business intelligence is sought, captured and used having tapped into an intranet data warehouse as a knowledge management approach. It adopts qualitative case study method using interviews and observation techniques. A case study was conducted to examine how an Intranet system was designed, how business intelligence was captured, and how it aided strategic planning and decision making in business operation. The respondents explained how structured business intelligence data was categorised and disseminated to users and how the used information empowered staff in their work performance. The intranet design successfully retains staff knowledge within the organisation. It was also successful in drawing all internal resources together, capturing resources from external sources, and forming a common repository of organisational assets for use through organisational work procedures within the intranet.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78428928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rotation independent hierarchical representation for Open and Closed Curves and its Applications 开闭曲线的旋转无关分层表示及其应用
GSTF international journal on computing Pub Date : 2014-09-04 DOI: 10.5176/2010-2283_1.2.38
Vineetha Bettaiah, Thejaswi Raya, H. Ranganath, Siddharth Shivapuja
{"title":"Rotation independent hierarchical representation for Open and Closed Curves and its Applications","authors":"Vineetha Bettaiah, Thejaswi Raya, H. Ranganath, Siddharth Shivapuja","doi":"10.5176/2010-2283_1.2.38","DOIUrl":"https://doi.org/10.5176/2010-2283_1.2.38","url":null,"abstract":"The algorithm used for the segmentation of an image, and scheme used for the representation of the segmentation result are mostly selected based on the final image analysis or interpretation objective. The boundary based image segmentation and representation system developed by Nabors segments and stores the result as a graph-tree hierarchical structure that is capable of supporting diverse applications. This paper shows that Nabors’ hierarchical representation of curves is not invariant to rotation, and proposes an enhanced representation which retains its structure and remains invariant under rotation. The curve matching algorithm which matches two curves based on their hierarchical representation makes it easy to determine if a curve is a section of a larger curve. The potential of the representation is illustrated by developing image registration and image stitching methods based on the new representation.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90546263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application Virtualization for Teaching Hospitals in Nigeria 尼日利亚教学医院的应用虚拟化
GSTF international journal on computing Pub Date : 2014-09-04 DOI: 10.5176/2010-2283_1.2.37
Desmennu Senanu Rita, I. Nicholas
{"title":"Application Virtualization for Teaching Hospitals in Nigeria","authors":"Desmennu Senanu Rita, I. Nicholas","doi":"10.5176/2010-2283_1.2.37","DOIUrl":"https://doi.org/10.5176/2010-2283_1.2.37","url":null,"abstract":"Information technology has improved operations management globally. The health sector has benefited from this revolution through the introduction of eHealth solutions. The cost-effective utilization of Information Technology and flexibility in adapting and adopting organizational changes has posed some challenges to health institutions in developing countries. In the case of Nigeria, the implementation of the National Health Policy entails the delivery of a full-packaged health care system; this package includes health education, maternal, newborn and child healthcare, nutrition and immunization. All these, require record keeping and data storage. The management of massive data storage and its availability on-demand has been sources of concern to health institutions in the country. This has brought about a slow rate in hospital-tohospital collaboration, insecure information exchange between and across institutions and lack of proper accountability in the health sector amongst other challenges. In this paper we propose a Cloud computing infrastructure which will adopt application virtualization to address the challenges in health care delivery in the country. This is an emerging technology that will provide eHealth solutions as services to tenants; a process known as Software-as-a- Service (SaaS). The infrastructure should deliver a single application through the browser to thousands of clients or stakeholders using scalable multitenant architecture. This will help to minimize cost, manage healthcare resources effectively, and help with the realization of the Millennium Development Goals (MDGs) on healthcare.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75818652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
GPUMemSort: A High Performance Graphics Co-processors Sorting Algorithm for Large Scale In-Memory Data GPUMemSort:一种用于大规模内存数据的高性能图形协处理器排序算法
GSTF international journal on computing Pub Date : 2014-09-04 DOI: 10.5176/2010-2283_1.2.34
Yin Ye, Zhihui Du, David A. Bader, Quan Yang, Weiwei Huo
{"title":"GPUMemSort: A High Performance Graphics Co-processors Sorting Algorithm for Large Scale In-Memory Data","authors":"Yin Ye, Zhihui Du, David A. Bader, Quan Yang, Weiwei Huo","doi":"10.5176/2010-2283_1.2.34","DOIUrl":"https://doi.org/10.5176/2010-2283_1.2.34","url":null,"abstract":"In this paper, we present a GPU-based sorting algorithm, GPUMemSort, which achieves high performance in sorting large-scale in-memory data by take advantage of GPU processors. It consists of two algorithms: an in-core algorithm, which is responsible for sorting data in GPU global memory efficiently, and an out-of-core algorithm, which is responsible for dividing large-scale data into multiple chunks that fit GPU global memory. GPUMemSort is implemented based on NVIDIA’s CUDA framework and some critical and detailed optimization methods are also presented. The tests of different algorithms have been run on multiple data sets. The experimental results show that our in-core sorting can outperform other comparison-based algorithms and GPUMemSort is highly effective in sorting large-scale inmemory data.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"78 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88373684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Efficient Fractal Image Coding using Fast Fourier Transform 快速傅里叶变换的高效分形图像编码
GSTF international journal on computing Pub Date : 2014-09-04 DOI: 10.5176/2010-2283_1.2.36
S. B. Dhok, R. Deshmukh, A. Keskar
{"title":"Efficient Fractal Image Coding using Fast Fourier Transform","authors":"S. B. Dhok, R. Deshmukh, A. Keskar","doi":"10.5176/2010-2283_1.2.36","DOIUrl":"https://doi.org/10.5176/2010-2283_1.2.36","url":null,"abstract":"The fractal coding is a novel technique for image compression. Though the technique has many attractive features, the large encoding time makes it unsuitable for real time applications. In this paper, an efficient algorithm for fractal encoding which operates on entire domain image instead of overlapping domain blocks is presented.The algorithm drastically reduces the encoding time as compared to classical full search method. The reduction in encoding time is mainly due to use of modified crosscorrelation based similarity measure. The implemented algorithm employs exhaustive search of domain blocks and their isometry transformations to investigate their similarity with every range block. The application of Fast Fourier Transform in similarity measure calculation speeds up the encoding process. The proposed eight isometry transformations of a domain block exploit the properties of Discrete Fourier Transform to minimize the number of Fast Fourier Transform calculations. The experimental studies on the proposed algorithm demonstrate that the encoding time is reduced drastically with average speedup factor of 538 with respect to the classical full search method with comparable values of Peak Signal To Noise Ratio.","PeriodicalId":91079,"journal":{"name":"GSTF international journal on computing","volume":"167 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88377308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信