Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777737
Muhammad Junaid, M. Akbar, M. Mufti
Wireless Networks call for enhanced confidentiality, integrity and authenticaton services because of their inherent weakness of ubiquitous signals. Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) has been recently employed to provide security to IEEE 802.11 Wireless LANs. It has been shown in our earlier published work that CCMP is vulnerable to Time Memory Trade off (TMTO) attack. To overcome the said vulnerability, this paper presents a design and description of strengthening the security of WLAN packets using Per-Packet security mechanism. The architecture of Per-Packet security mechanism involves introduction of Per-Packet Authentication and Secret Nonce. The proposed Per-Packet Authentication protocol is a continuous challenge response process operating throughout the session. The Per-Packet authentication promptly secures the connection against unauthorized access by immediately discarding the packet if Per-Packet Authentication fails. We have proposed to derive the Nonce from the session key and keep it secret. Since the nonce is unique and secret, it provides freshness and unpredictability. The freshness provides protection against replay attacks, the unpredictability of Nonce prevents pre-computation attack. Same Nonce is used as a challenge-text from authenticator to supplicant. Per packet Security mechanism strengthens the security of authentication mechanism and counter mode operation irrespective of the security of causal encryption algorithm.
{"title":"Per Packet Authentication for IEEE 802.11 wireless LAN","authors":"Muhammad Junaid, M. Akbar, M. Mufti","doi":"10.1109/INMIC.2008.4777737","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777737","url":null,"abstract":"Wireless Networks call for enhanced confidentiality, integrity and authenticaton services because of their inherent weakness of ubiquitous signals. Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) has been recently employed to provide security to IEEE 802.11 Wireless LANs. It has been shown in our earlier published work that CCMP is vulnerable to Time Memory Trade off (TMTO) attack. To overcome the said vulnerability, this paper presents a design and description of strengthening the security of WLAN packets using Per-Packet security mechanism. The architecture of Per-Packet security mechanism involves introduction of Per-Packet Authentication and Secret Nonce. The proposed Per-Packet Authentication protocol is a continuous challenge response process operating throughout the session. The Per-Packet authentication promptly secures the connection against unauthorized access by immediately discarding the packet if Per-Packet Authentication fails. We have proposed to derive the Nonce from the session key and keep it secret. Since the nonce is unique and secret, it provides freshness and unpredictability. The freshness provides protection against replay attacks, the unpredictability of Nonce prevents pre-computation attack. Same Nonce is used as a challenge-text from authenticator to supplicant. Per packet Security mechanism strengthens the security of authentication mechanism and counter mode operation irrespective of the security of causal encryption algorithm.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"30 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114007692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777753
A. Samreen, S. Hussain
Peer-to-Peer networks are very popular these days due to their use in data and resource sharing. Trust and reputation of a peer not only make it easy to take a decision to ask for resource from the trustworthy node but also provide a way to punish evil peers for malicious act. Incentive mechanism provokes a peer to share resource and discourage the well known free riding. In this paper we studied proposed schemes and discuss some open issues to cope as the future research work as well as we have provided solution of some problems such as to detect malicious peers, false rating problem and sudden change in the behavior of peers that can be helpful in designing a new novel and robust frame work for trust and reputation based incentive mechanism.
{"title":"Trust management and incentive mechanism for P2P networks: Survey to cope challenges","authors":"A. Samreen, S. Hussain","doi":"10.1109/INMIC.2008.4777753","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777753","url":null,"abstract":"Peer-to-Peer networks are very popular these days due to their use in data and resource sharing. Trust and reputation of a peer not only make it easy to take a decision to ask for resource from the trustworthy node but also provide a way to punish evil peers for malicious act. Incentive mechanism provokes a peer to share resource and discourage the well known free riding. In this paper we studied proposed schemes and discuss some open issues to cope as the future research work as well as we have provided solution of some problems such as to detect malicious peers, false rating problem and sudden change in the behavior of peers that can be helpful in designing a new novel and robust frame work for trust and reputation based incentive mechanism.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124048788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777791
M.S. Haleem
In this era of technology, rapid advancements are being made in the field of automation and signal processing. The developments made in digital signal processing are being applied in the field of automation, communication systems and biomedical engineering. Controlling through human speech is one of the fascinating applications of digital signal processing (DSP) and Automation Systems. This paper discusses the speech recognition and its application in control mechanism. Speech recognition can be used to automate many tasks that usually require hands-on human interaction, such as recognizing simple spoken commands to perform something like turning on lights or shutting a door or driving a motor. After speech recognition, a particular code related to spoken word is transferred through wireless communication system to 8051 microcontroller and it works accordingly. Many techniques have been used to compare the pattern of the speech signals and recent technological advancements have made recognition of more complex speech patterns possible. Despite these breakthroughs, however, current efforts are still far away from 100% recognition of natural human speech. Therefore, the project is considered involving processing of a speech signal in any form as a challenging and rewarding one.
{"title":"Voice controlled automation system","authors":"M.S. Haleem","doi":"10.1109/INMIC.2008.4777791","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777791","url":null,"abstract":"In this era of technology, rapid advancements are being made in the field of automation and signal processing. The developments made in digital signal processing are being applied in the field of automation, communication systems and biomedical engineering. Controlling through human speech is one of the fascinating applications of digital signal processing (DSP) and Automation Systems. This paper discusses the speech recognition and its application in control mechanism. Speech recognition can be used to automate many tasks that usually require hands-on human interaction, such as recognizing simple spoken commands to perform something like turning on lights or shutting a door or driving a motor. After speech recognition, a particular code related to spoken word is transferred through wireless communication system to 8051 microcontroller and it works accordingly. Many techniques have been used to compare the pattern of the speech signals and recent technological advancements have made recognition of more complex speech patterns possible. Despite these breakthroughs, however, current efforts are still far away from 100% recognition of natural human speech. Therefore, the project is considered involving processing of a speech signal in any form as a challenging and rewarding one.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115346643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777754
Wenfa Li, Miyi Duan, You Chen
Network anomaly detection is the major direction of research in intrusion detection. Aiming at some problems, which include high false alarm rate, difficulties in obtaining exactly clean data for the modeling of normal patterns and the deterioration of detection rate because of some ldquonoisyrdquo data(unclean data) in the training set, in current intrusion detection techniques, we propose a novel network anomaly detection method based on MRMHC-SVM machine learning algorithm. The experimental results show that our method can effectively detect anomalies with high true positive rate and low false positive rate than the state-of-the-art anomaly detection methods. Moreover, the proposed method retains good detection performance after employing feature selection aiming at avoiding the ldquocurse of dimensionalityrdquo. In addition, even interfered by ldquonoisyrdquo data, it is robust and effective.
{"title":"Network anomaly detection based on MRMHC-SVM algorithm","authors":"Wenfa Li, Miyi Duan, You Chen","doi":"10.1109/INMIC.2008.4777754","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777754","url":null,"abstract":"Network anomaly detection is the major direction of research in intrusion detection. Aiming at some problems, which include high false alarm rate, difficulties in obtaining exactly clean data for the modeling of normal patterns and the deterioration of detection rate because of some ldquonoisyrdquo data(unclean data) in the training set, in current intrusion detection techniques, we propose a novel network anomaly detection method based on MRMHC-SVM machine learning algorithm. The experimental results show that our method can effectively detect anomalies with high true positive rate and low false positive rate than the state-of-the-art anomaly detection methods. Moreover, the proposed method retains good detection performance after employing feature selection aiming at avoiding the ldquocurse of dimensionalityrdquo. In addition, even interfered by ldquonoisyrdquo data, it is robust and effective.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127681734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777748
Muhammd Imran Afzal, Waqar Mahmood, Ali Hammad Akbar, AI-Khawarizmi
One of the most critical limiting factor for a Wireless Sensor Network (WSN) is its battery life. Therefore, a very desirable feature of WSN would be its rechargability to remain operational over longer period of times. However, the nodes needing recharge may not be accessible. In this paper, we present a battery recharge model in WSNs for inaccessible or hard to access environments, at distances up to several hundred meters, using variable power Infrared (IR) laser. While bulk of the sensor network comprises of sensing nodes, the juncture nodes are the ones that relay data towards sink -resulting into faster battery depletion. We present a recharge mechanism for juncture nodes, that utilizes Free Space Optics (FSO) over RF-cliques using IR-laser, Corner Cube Retroreflectors (CCRs) and beam-steering lasers. A Thinfilm Corner Cube Retroreflector (TCCR) is also proposed as a variant to the standard CCR to realize selective recharging. The proposed mechanism provides recharge-ability both for on-demand recharging and scheduled recharging.
{"title":"A battery recharge model for WSNs using Free-Space Optics (FSO)","authors":"Muhammd Imran Afzal, Waqar Mahmood, Ali Hammad Akbar, AI-Khawarizmi","doi":"10.1109/INMIC.2008.4777748","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777748","url":null,"abstract":"One of the most critical limiting factor for a Wireless Sensor Network (WSN) is its battery life. Therefore, a very desirable feature of WSN would be its rechargability to remain operational over longer period of times. However, the nodes needing recharge may not be accessible. In this paper, we present a battery recharge model in WSNs for inaccessible or hard to access environments, at distances up to several hundred meters, using variable power Infrared (IR) laser. While bulk of the sensor network comprises of sensing nodes, the juncture nodes are the ones that relay data towards sink -resulting into faster battery depletion. We present a recharge mechanism for juncture nodes, that utilizes Free Space Optics (FSO) over RF-cliques using IR-laser, Corner Cube Retroreflectors (CCRs) and beam-steering lasers. A Thinfilm Corner Cube Retroreflector (TCCR) is also proposed as a variant to the standard CCR to realize selective recharging. The proposed mechanism provides recharge-ability both for on-demand recharging and scheduled recharging.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128359410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777758
R. Siddiqi, C. Harrison
A number of attempts have been made to automatically mark short-answer questions. The authors of this paper have developed and evaluated a prototype software system that provides a novel approach to automated marking. Capabilities of the recently developed Stanford Parser (such as the ability to produce phrase structure and typed dependency parses of the text of a student's answer) have been utilized in the prototype system. A new notation technique to represent the required syntactical structures has also been developed and is introduced in this paper. A number of real exam questions have been used to evaluate the prototype. The evaluation results are encouraging and the authors intend to extend the system so that it becomes capable of marking longer answers.
{"title":"A systematic approach to the automated marking of short-answer questions","authors":"R. Siddiqi, C. Harrison","doi":"10.1109/INMIC.2008.4777758","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777758","url":null,"abstract":"A number of attempts have been made to automatically mark short-answer questions. The authors of this paper have developed and evaluated a prototype software system that provides a novel approach to automated marking. Capabilities of the recently developed Stanford Parser (such as the ability to produce phrase structure and typed dependency parses of the text of a student's answer) have been utilized in the prototype system. A new notation technique to represent the required syntactical structures has also been developed and is introduced in this paper. A number of real exam questions have been used to evaluate the prototype. The evaluation results are encouraging and the authors intend to extend the system so that it becomes capable of marking longer answers.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121282617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777714
H. Ur Rahman, A. Gentle, E. Gauja, R. Ramer
Synthesis of Silicon Nitride thin films is important in the semiconductor industry. The properties of the films make them valuable for oxidation masks, protection and passivation barrier layers, etch stop layer and inter level insulators. In the present study, we prepared silicon nitride films with different refractive index. We used various conditions of PECVD atmosphere with the purpose of obtaining high quality near stoichiometric films. Different deposition routines were employed, including variable flow ratio of silane and ammonia on to a silicon substrate. The quality and stoichiometry of the film was investigated using reflectance measurements. Measured process parameters were the deposition rate, film thickness, refractive index, breakdown voltage, dielectric constant, surface morphology and film composition. The thickness of the film was measured using AFM, DEKTAK and ellipsometer measurements. Fitting of reflectance spectra with WVASE ellipsometric software provided the optical constants for silicon nitride and allowed analysis of the films. A Bruggeman effective medium approximation was utilized to model the refractive index of the films. Reflective measurements were carried out in the range 210 nm-2500 nm.
{"title":"Characterisation of dielectric properties of PECVD Silicon Nitride for RF MEMS applications","authors":"H. Ur Rahman, A. Gentle, E. Gauja, R. Ramer","doi":"10.1109/INMIC.2008.4777714","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777714","url":null,"abstract":"Synthesis of Silicon Nitride thin films is important in the semiconductor industry. The properties of the films make them valuable for oxidation masks, protection and passivation barrier layers, etch stop layer and inter level insulators. In the present study, we prepared silicon nitride films with different refractive index. We used various conditions of PECVD atmosphere with the purpose of obtaining high quality near stoichiometric films. Different deposition routines were employed, including variable flow ratio of silane and ammonia on to a silicon substrate. The quality and stoichiometry of the film was investigated using reflectance measurements. Measured process parameters were the deposition rate, film thickness, refractive index, breakdown voltage, dielectric constant, surface morphology and film composition. The thickness of the film was measured using AFM, DEKTAK and ellipsometer measurements. Fitting of reflectance spectra with WVASE ellipsometric software provided the optical constants for silicon nitride and allowed analysis of the films. A Bruggeman effective medium approximation was utilized to model the refractive index of the films. Reflective measurements were carried out in the range 210 nm-2500 nm.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"364 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121383546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.5297256
M. Dargahi, M. Rezanezhad, H. Habibnezhad
Ability of fuel cell systems to produce power is limited. So it is necessary to force the system to operate in conditions which correspond to fuel cell maximum power point (MPP). Since fuel cell MIPP is a unique and fixed point of operation, load power requirements are not taken into account and output voltage will vary with variations of load resistance. In this paper, a new configuration for Fuel cell / Battery hybrid power system with required controller is proposed and analyzed. This system works in the way that, fuel cell operates in its MIPP and output voltage is kept constant. The proposed system is simulated and results show acceptable operation of the system under different conditions.
{"title":"Correction to: maximum power point tracking for fuel cell in fuel cell/battery hybrid systems","authors":"M. Dargahi, M. Rezanezhad, H. Habibnezhad","doi":"10.1109/INMIC.2008.5297256","DOIUrl":"https://doi.org/10.1109/INMIC.2008.5297256","url":null,"abstract":"Ability of fuel cell systems to produce power is limited. So it is necessary to force the system to operate in conditions which correspond to fuel cell maximum power point (MPP). Since fuel cell MIPP is a unique and fixed point of operation, load power requirements are not taken into account and output voltage will vary with variations of load resistance. In this paper, a new configuration for Fuel cell / Battery hybrid power system with required controller is proposed and analyzed. This system works in the way that, fuel cell operates in its MIPP and output voltage is kept constant. The proposed system is simulated and results show acceptable operation of the system under different conditions.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122787184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777766
W.H. Butt, M.Y. Javed
In this article we propose a novel sorting algorithm based on comparing the arithmetic mean with each item in the list. Running cost analysis and results obtained after various implementations are also provided with the intention of comparing the efficiency of the proposed mechanism with other existing sorting methodologies.
{"title":"A new Relative sort algorithm based on arithmetic mean value","authors":"W.H. Butt, M.Y. Javed","doi":"10.1109/INMIC.2008.4777766","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777766","url":null,"abstract":"In this article we propose a novel sorting algorithm based on comparing the arithmetic mean with each item in the list. Running cost analysis and results obtained after various implementations are also provided with the intention of comparing the efficiency of the proposed mechanism with other existing sorting methodologies.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122936551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777806
S. Paracha, M.T.A. Khan, A. Mehmood, Y. Osamu
The recent researches in the realm of virtual learning environments have revealed how children can positively contribute in the design process. Comicboarding is a participatory designed method that involves the use of comic books and drawings to produce believable and engaging scenarios with children. Researchers can elicit ideas from children by leveraging known plot formats, interaction styles and characters in comics. The paper describes collaboration with children that enabled researchers to capture the stories and experiences children tell about persistently proliferating violent behaviour in the Japanese schools namely Ijime. This collaboration resulted in the design implications that helped in generating and appraising scenarios for a virtual edutainment environment populated by intelligent virtual agents for exploring the problem of Ijime. The objective was to generate comic-type summaries of these narratives for user-centered design that vocalizes children's voice in the technology process. The technique helped the investigators in examining story logs; gathering information related to personality and emotional characteristics of the characters; understanding their actions and importance in the narrative and selecting the key fabula for interactive narrative environment.
{"title":"Design implications for believable & engaging scenarios","authors":"S. Paracha, M.T.A. Khan, A. Mehmood, Y. Osamu","doi":"10.1109/INMIC.2008.4777806","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777806","url":null,"abstract":"The recent researches in the realm of virtual learning environments have revealed how children can positively contribute in the design process. Comicboarding is a participatory designed method that involves the use of comic books and drawings to produce believable and engaging scenarios with children. Researchers can elicit ideas from children by leveraging known plot formats, interaction styles and characters in comics. The paper describes collaboration with children that enabled researchers to capture the stories and experiences children tell about persistently proliferating violent behaviour in the Japanese schools namely Ijime. This collaboration resulted in the design implications that helped in generating and appraising scenarios for a virtual edutainment environment populated by intelligent virtual agents for exploring the problem of Ijime. The objective was to generate comic-type summaries of these narratives for user-centered design that vocalizes children's voice in the technology process. The technique helped the investigators in examining story logs; gathering information related to personality and emotional characteristics of the characters; understanding their actions and importance in the narrative and selecting the key fabula for interactive narrative environment.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115979853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}