Doreen Orishaba, R. Besiga, A. T. Asiimwe, S. S. Tickodri-Togboa, P. I. Musasizi, Cosmas Mwikirize
An online laboratory that handles two critical concepts in Fiber Optic Communications: Bi-Directional Optic Fiber Link and Wavelength Division Multiplexing phenomena was developed at Makerere University. Designed using the EMONA Fiber Optics Telecommunications Experimenter (FOTEx), an add-on board for the National Instruments Educational Laboratory Virtual Instrumentation Suite (NI ELVIS II™) platform, it was deployed on the Interactive iLabs Shared Architecture (ISA). The laboratory supports curricula of Bachelor of Science in Computer, Electrical and Telecommunication Engineering Programmes.
马凯雷雷大学开发了一个在线实验室,处理光纤通信中的两个关键概念:双向光纤链路和波分复用现象。使用EMONA光纤通信实验员(FOTEx)设计,该实验员是国家仪器教育实验室虚拟仪器套件(NI ELVIS II™)平台的附加板,部署在交互式实验室共享架构(ISA)上。该实验室支持计算机、电气和电信工程理学学士课程。
{"title":"Implementation of a Wavelength Division Multiplexing and Bidirectional Optic Fiber Link iLab","authors":"Doreen Orishaba, R. Besiga, A. T. Asiimwe, S. S. Tickodri-Togboa, P. I. Musasizi, Cosmas Mwikirize","doi":"10.1109/ITNG.2012.173","DOIUrl":"https://doi.org/10.1109/ITNG.2012.173","url":null,"abstract":"An online laboratory that handles two critical concepts in Fiber Optic Communications: Bi-Directional Optic Fiber Link and Wavelength Division Multiplexing phenomena was developed at Makerere University. Designed using the EMONA Fiber Optics Telecommunications Experimenter (FOTEx), an add-on board for the National Instruments Educational Laboratory Virtual Instrumentation Suite (NI ELVIS II™) platform, it was deployed on the Interactive iLabs Shared Architecture (ISA). The laboratory supports curricula of Bachelor of Science in Computer, Electrical and Telecommunication Engineering Programmes.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124289180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile computing is considered as low-end computing systems. It currently dominates almost all aspects of our lives from mobile banking to mobile purchasing to mobile skypeing, etc. With the increasing demand of smart phones in today's world, making the system secure is very important. Software architecture plays an important role to achieve both functionalities and quality (e.g., security) of a system. This paper surveys the software architecture of five of the leading mobile operating systems such as Android (Linux), Blackberry, iPhone (Mac OS X), Symbian, and Windows Mobile. Our survey study indicates that Android is the most promising of al and identifies security issues with Android. The paper then proposes improved software architecture to resolve these issues. More specifically, our proposed software architecture attempts to enhance the security of Android without comprising it performance.
移动计算被认为是低端计算系统。它目前几乎支配着我们生活的方方面面,从手机银行到手机购物,再到手机通话等等。随着当今世界对智能手机的需求越来越大,确保系统的安全是非常重要的。软件架构在实现系统的功能和质量(例如,安全性)方面起着重要的作用。本文调查了五个领先的移动操作系统的软件架构,如Android (Linux),黑莓,iPhone (Mac OS X),塞班和Windows mobile。我们的调查研究表明,Android是最有前途的,并指出了Android的安全问题。然后提出了改进的软件体系结构来解决这些问题。更具体地说,我们提出的软件架构试图在不影响其性能的情况下增强Android的安全性。
{"title":"A Secure Software Architecture for Mobile Computing","authors":"H. Reza, Narayana Mazumder","doi":"10.1109/ITNG.2012.122","DOIUrl":"https://doi.org/10.1109/ITNG.2012.122","url":null,"abstract":"Mobile computing is considered as low-end computing systems. It currently dominates almost all aspects of our lives from mobile banking to mobile purchasing to mobile skypeing, etc. With the increasing demand of smart phones in today's world, making the system secure is very important. Software architecture plays an important role to achieve both functionalities and quality (e.g., security) of a system. This paper surveys the software architecture of five of the leading mobile operating systems such as Android (Linux), Blackberry, iPhone (Mac OS X), Symbian, and Windows Mobile. Our survey study indicates that Android is the most promising of al and identifies security issues with Android. The paper then proposes improved software architecture to resolve these issues. More specifically, our proposed software architecture attempts to enhance the security of Android without comprising it performance.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117003883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Evidences from current events have shown that, in addition to virus and hacker attacks, many software systems have been embedded with "agents" that pose security threats such as allowing someone to "invade" into computers with such software installed. This will eventually grow into a more serious problem when Cluster and Cloud Computing becomes popular. As this is an area that few have been exploring, we discuss in this paper the issue of software security breaches resulting from embedded sleeping agents. We also investigate some patterns of embedded sleeping agents utilized in software industry. In addition, we review these patterns and propose a security model that identifies different scenarios. This security model will provide a foundation for further study on how to detect and prevent such patterns from becoming security breaches.
{"title":"When the Software Goes Beyond its Requirements -- A Software Security Perspective","authors":"Jing-Chiou Liou","doi":"10.1109/ITNG.2012.98","DOIUrl":"https://doi.org/10.1109/ITNG.2012.98","url":null,"abstract":"Evidences from current events have shown that, in addition to virus and hacker attacks, many software systems have been embedded with \"agents\" that pose security threats such as allowing someone to \"invade\" into computers with such software installed. This will eventually grow into a more serious problem when Cluster and Cloud Computing becomes popular. As this is an area that few have been exploring, we discuss in this paper the issue of software security breaches resulting from embedded sleeping agents. We also investigate some patterns of embedded sleeping agents utilized in software industry. In addition, we review these patterns and propose a security model that identifies different scenarios. This security model will provide a foundation for further study on how to detect and prevent such patterns from becoming security breaches.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122659199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Information overload is an increasing problem, and as information available continues to grow in volume, current filtering techniques are proving inefficient. Social network users, and people in general, tend to prioritize recommendations coming from people they are acquainted to. This research proposes a trust model that will estimate a trust value for content creators on an online rating system with social network capabilities. This research introduces the concept of social distance, which is drawn from clustering methods applied to the social network user base, and incorporates said distance in the estimation of trust, as well as user generated ratings. The trust value estimated will serve as a metric for filtering and sorting content of any kind based on the trustworthiness of the creator.
{"title":"How Can Social Networks Help Us Measure Trust Online?","authors":"Wei-Lun Chang, Arleen N. Diaz","doi":"10.1109/ITNG.2012.76","DOIUrl":"https://doi.org/10.1109/ITNG.2012.76","url":null,"abstract":"Information overload is an increasing problem, and as information available continues to grow in volume, current filtering techniques are proving inefficient. Social network users, and people in general, tend to prioritize recommendations coming from people they are acquainted to. This research proposes a trust model that will estimate a trust value for content creators on an online rating system with social network capabilities. This research introduces the concept of social distance, which is drawn from clustering methods applied to the social network user base, and incorporates said distance in the estimation of trust, as well as user generated ratings. The trust value estimated will serve as a metric for filtering and sorting content of any kind based on the trustworthiness of the creator.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"35 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122453094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper reports the results of focus groups obtained as part of a full study that uses a mixed method approach to answer the following question: what are the cultural values that impact on e-service use in Saudi Arabia? In order to answer this question we reviewed culture theories, dimensions, and models that have been identified in the literature. Four focus groups interviewing experts and general users (customers) of online services in Saudi Arabia have been completed aiming at the end to identify the uncovered elements of Saudi culture in the literature, which hopefully will result in developing a framework of cultural values that affect e-service use in Saudi context. This paper will firstly, introduce the importance of culture and define the aspects of Saudi culture. It will then describe the method used, and finally discussing the findings of the focus groups. Findings revealed four factors that have not been covered in the literature and need to be investigated namely: nepotism, the lack of human interaction, services oriented culture, and the career path.
{"title":"Cultural Impact on e-service Use in Saudi Arabia: Results from Focus Groups","authors":"M. Aldraehim, Sylvia Lauretta Edwards, J. Watson","doi":"10.1109/ITNG.2012.146","DOIUrl":"https://doi.org/10.1109/ITNG.2012.146","url":null,"abstract":"This paper reports the results of focus groups obtained as part of a full study that uses a mixed method approach to answer the following question: what are the cultural values that impact on e-service use in Saudi Arabia? In order to answer this question we reviewed culture theories, dimensions, and models that have been identified in the literature. Four focus groups interviewing experts and general users (customers) of online services in Saudi Arabia have been completed aiming at the end to identify the uncovered elements of Saudi culture in the literature, which hopefully will result in developing a framework of cultural values that affect e-service use in Saudi context. This paper will firstly, introduce the importance of culture and define the aspects of Saudi culture. It will then describe the method used, and finally discussing the findings of the focus groups. Findings revealed four factors that have not been covered in the literature and need to be investigated namely: nepotism, the lack of human interaction, services oriented culture, and the career path.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115793979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper reports on the methodology of building an electronic digital library. In particular, it addresses the issues involving OCR errors and conversion. It also reports on data mining applications required for filtering sensitive information.
{"title":"The Building of a Large Government Digital Library","authors":"K. Taghva","doi":"10.1109/ITNG.2012.176","DOIUrl":"https://doi.org/10.1109/ITNG.2012.176","url":null,"abstract":"This paper reports on the methodology of building an electronic digital library. In particular, it addresses the issues involving OCR errors and conversion. It also reports on data mining applications required for filtering sensitive information.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126298612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To understand the notion of perceived privacy, this paper explores and proposes a model of the relationship between privacy and security. Security is measured in terms of the preparedness required to meet a certain level of threat. Privacy is measured in terms of level of exposure at a certain point of threat. With this understanding, perceived privacy is viewed as a proprietor (the person the information is about) perceiving the broker (handler of information) in his/her place with respect to valuing the sensitivity of the information, and taking care when handling this information. Transparency between proprietor and broker leads to trust.
{"title":"Perceived Privacy","authors":"S. Al-Fedaghi","doi":"10.1109/ITNG.2012.90","DOIUrl":"https://doi.org/10.1109/ITNG.2012.90","url":null,"abstract":"To understand the notion of perceived privacy, this paper explores and proposes a model of the relationship between privacy and security. Security is measured in terms of the preparedness required to meet a certain level of threat. Privacy is measured in terms of level of exposure at a certain point of threat. With this understanding, perceived privacy is viewed as a proprietor (the person the information is about) perceiving the broker (handler of information) in his/her place with respect to valuing the sensitivity of the information, and taking care when handling this information. Transparency between proprietor and broker leads to trust.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127408467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Every game in the market is made in an effort to play, produce, teach, motivate, socialize, communicate and educate different cultures. The gamer is exposed to different types of games that can be categorized into a casual game, serious game and advergame. Serious games include games for training, games for education, games for science and research, games for production and games for work. Serious games do not necessarily lead to the production of a game [1]. They are mainly used to ensure better health and educational environment. They also provide a tool for creating jobs and making life easier in arts, design, therapy, generic software engineering, healthcare and more. Serious games are made intentionally for learning. In this paper, I will be discussing in-depth the two most crucial categories of serious games namely games for education and games for health.
{"title":"Serious Video Games: Games for Education and Health","authors":"V. Janarthanan","doi":"10.1109/ITNG.2012.79","DOIUrl":"https://doi.org/10.1109/ITNG.2012.79","url":null,"abstract":"Every game in the market is made in an effort to play, produce, teach, motivate, socialize, communicate and educate different cultures. The gamer is exposed to different types of games that can be categorized into a casual game, serious game and advergame. Serious games include games for training, games for education, games for science and research, games for production and games for work. Serious games do not necessarily lead to the production of a game [1]. They are mainly used to ensure better health and educational environment. They also provide a tool for creating jobs and making life easier in arts, design, therapy, generic software engineering, healthcare and more. Serious games are made intentionally for learning. In this paper, I will be discussing in-depth the two most crucial categories of serious games namely games for education and games for health.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130626059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Online discussion forum is becoming an important part in college education nowadays. To evaluate student's online discussion performance is essential since more and more professors have included online participation as a part of their class grade. In this paper, we use social network analysis methods to help professors in evaluating individual student's online discussion performance. By applying degree centrality (out-Degree and in-Degree) and density metrics, we can identify students who have been actively involved in the discussion board and find out those who need to be encouraged to participate in. Also, SNA software tools are used to visualize students' online discussion participation networks and help to identify these active nodes. In addition, Page Rank algorithm has been applied to the same data to rank the prestige nodes in this social network and the results are compared with degree centrality metric one. The experimental data of students' online discussion threads are collected from one undergraduate course MIS at our University and results show that students who actively participate in online discussion have good academic performances.
{"title":"Evaluating Students Online Discussion Performance by Using Social Network Analysis","authors":"Peng He","doi":"10.1109/ITNG.2012.72","DOIUrl":"https://doi.org/10.1109/ITNG.2012.72","url":null,"abstract":"Online discussion forum is becoming an important part in college education nowadays. To evaluate student's online discussion performance is essential since more and more professors have included online participation as a part of their class grade. In this paper, we use social network analysis methods to help professors in evaluating individual student's online discussion performance. By applying degree centrality (out-Degree and in-Degree) and density metrics, we can identify students who have been actively involved in the discussion board and find out those who need to be encouraged to participate in. Also, SNA software tools are used to visualize students' online discussion participation networks and help to identify these active nodes. In addition, Page Rank algorithm has been applied to the same data to rank the prestige nodes in this social network and the results are compared with degree centrality metric one. The experimental data of students' online discussion threads are collected from one undergraduate course MIS at our University and results show that students who actively participate in online discussion have good academic performances.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131404214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we focus on intrusion detection in the mobile ad hoc networks (MANETs). Starting by an overview of the existing work in this field, and ending up with the proposal of a new distributed and cooperative architecture for intrusion detection. In order to overcome the weaknesses and flaws of the existing MANET intrusion detection systems (IDSs), this architecture integrates an agent-based detection process. So, the main principle of the proposed architecture is based on: (a) the distribution which is achieved through the implementation of a local intrusion detection system on each network node, and (b) the cooperation that is guaranteed by mobile and stationary agents' collaboration. In that way we were able to have an IDS with so many interesting features such as: flexibility, distribution and cooperation, autonomy, lightweight, reactivity and fault tolerance which are extremely desired for any MANET intrusion detection system.
{"title":"MASID: Multi-Agent System for Intrusion Detection in MANET","authors":"Leila Mechtri, Fatiha Djemili Tolba, S. Ghanemi","doi":"10.1109/ITNG.2012.18","DOIUrl":"https://doi.org/10.1109/ITNG.2012.18","url":null,"abstract":"In this paper we focus on intrusion detection in the mobile ad hoc networks (MANETs). Starting by an overview of the existing work in this field, and ending up with the proposal of a new distributed and cooperative architecture for intrusion detection. In order to overcome the weaknesses and flaws of the existing MANET intrusion detection systems (IDSs), this architecture integrates an agent-based detection process. So, the main principle of the proposed architecture is based on: (a) the distribution which is achieved through the implementation of a local intrusion detection system on each network node, and (b) the cooperation that is guaranteed by mobile and stationary agents' collaboration. In that way we were able to have an IDS with so many interesting features such as: flexibility, distribution and cooperation, autonomy, lightweight, reactivity and fault tolerance which are extremely desired for any MANET intrusion detection system.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"112 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131811620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}