首页 > 最新文献

2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing最新文献

英文 中文
Connectivity Analysis of Mobile Ad Hoc Networks Using Destination Guided Mobility Models 基于目标导向移动模型的移动Ad Hoc网络连通性分析
M. A. Rahman, A. Aravind
Mobility models play an influential role in the simulation studies of mobile ad hoc networks (MANETs). Realism and simplicity are two attractive properties of mobility models, and achieving both together in modeling mobility has been a challenging task. Recently, a framework of moblity models called destination guided mobility (DGM) models for MANETs was proposed. This framework can be used to develop several simple DGM models with increased realism. Connectivity is a fundamental requirement for communication between nodes. In this paper, we investigate the connectivity in two basic DGM models in comparison with the widely used random waypoint (RWP) model. Specifically, first we expand the DGM models development and analysis software tool to include connectivity analysis. Second, we provide the experimental evaluation of connectivity in the two basic DGM models in comparison with RWP model. Finally, through NS2 simulation, we study the performance impact of these mobility models on the Ad-hoc On-demand Distance Vector (AODV) routing protocol - one of the most popular routing protocols for MANET.
移动性模型在移动自组网(manet)的仿真研究中起着重要的作用。现实性和简洁性是机动性模型的两个吸引人的特性,在机动性建模中同时实现这两个特性一直是一项具有挑战性的任务。近年来,提出了一种面向manet的目的地引导移动模型(DGM)。这个框架可以用来开发几个简单的DGM模型,增加真实感。连接性是节点间通信的基本要求。本文研究了两种基本DGM模型的连通性,并与广泛使用的随机路径点(RWP)模型进行了比较。具体来说,首先我们扩展了DGM模型的开发和分析软件工具,以包括连通性分析。其次,我们对两种基本DGM模型的连通性进行了实验评估,并与RWP模型进行了比较。最后,通过NS2仿真,我们研究了这些移动模型对自组织按需距离矢量(AODV)路由协议的性能影响,AODV路由协议是MANET中最流行的路由协议之一。
{"title":"Connectivity Analysis of Mobile Ad Hoc Networks Using Destination Guided Mobility Models","authors":"M. A. Rahman, A. Aravind","doi":"10.1109/MUSIC.2012.10","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.10","url":null,"abstract":"Mobility models play an influential role in the simulation studies of mobile ad hoc networks (MANETs). Realism and simplicity are two attractive properties of mobility models, and achieving both together in modeling mobility has been a challenging task. Recently, a framework of moblity models called destination guided mobility (DGM) models for MANETs was proposed. This framework can be used to develop several simple DGM models with increased realism. Connectivity is a fundamental requirement for communication between nodes. In this paper, we investigate the connectivity in two basic DGM models in comparison with the widely used random waypoint (RWP) model. Specifically, first we expand the DGM models development and analysis software tool to include connectivity analysis. Second, we provide the experimental evaluation of connectivity in the two basic DGM models in comparison with RWP model. Finally, through NS2 simulation, we study the performance impact of these mobility models on the Ad-hoc On-demand Distance Vector (AODV) routing protocol - one of the most popular routing protocols for MANET.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126376944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Convergence Time of Wang's kWTA Network with Stochastic Output Nodes Wang的随机输出节点kWTA网络的收敛时间
K. Ho, Wei-Bin Lee, Siu-Chung Lau, J. Sum
Recently, an extended Wang's kWTA network with stochastic output nodes has been studied. It is shown that this extended model converges asymptotically. In this paper, we further studies the convergence time of this model. The convergence time is defined as the time taken for the model to reach a finite region around the convergent. With this definition, an approximation of convergence time is derived and its viability is shown by simulation results.
最近,研究了一种具有随机输出节点的扩展Wang’s kWTA网络。证明了该扩展模型是渐近收敛的。本文进一步研究了该模型的收敛时间。收敛时间定义为模型到达收敛点周围的有限区域所花费的时间。在此基础上,导出了收敛时间的近似表达式,仿真结果表明了其可行性。
{"title":"Convergence Time of Wang's kWTA Network with Stochastic Output Nodes","authors":"K. Ho, Wei-Bin Lee, Siu-Chung Lau, J. Sum","doi":"10.1109/MUSIC.2012.39","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.39","url":null,"abstract":"Recently, an extended Wang's kWTA network with stochastic output nodes has been studied. It is shown that this extended model converges asymptotically. In this paper, we further studies the convergence time of this model. The convergence time is defined as the time taken for the model to reach a finite region around the convergent. With this definition, an approximation of convergence time is derived and its viability is shown by simulation results.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123542073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of Internet of Things in Smart Grid Power Transmission 物联网在智能电网输电中的应用
Q. Ou, Y. Zhen, Xiangzhen Li, Yiying Zhang, L. Zeng
Utilizing Internet of Things (IoT) technology in smart grid is an important approach to speed up the informatization of power grid system, and it is beneficial for effective management of the power grid infrastructure. Disaster prevention and reduction of power transmission line is one of the most important application fields of IoT. Advanced sensing and communication technologies of IoT can effectively avoid or reduce the damage of natural disasters to the transmission lines, improve the reliability of power transmission and reduce economic loss. Focused on the characteristic of the construction and development of smart grid, this paper introduced the application of IoT in online monitoring system of power transmission line.
在智能电网中应用物联网技术是加快电网系统信息化的重要途径,有利于电网基础设施的有效管理。输电线路的防灾减灾是物联网最重要的应用领域之一。物联网先进的传感和通信技术可以有效避免或减少自然灾害对输电线路的破坏,提高输电的可靠性,减少经济损失。针对智能电网建设和发展的特点,介绍了物联网在输电线路在线监控系统中的应用。
{"title":"Application of Internet of Things in Smart Grid Power Transmission","authors":"Q. Ou, Y. Zhen, Xiangzhen Li, Yiying Zhang, L. Zeng","doi":"10.1109/MUSIC.2012.24","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.24","url":null,"abstract":"Utilizing Internet of Things (IoT) technology in smart grid is an important approach to speed up the informatization of power grid system, and it is beneficial for effective management of the power grid infrastructure. Disaster prevention and reduction of power transmission line is one of the most important application fields of IoT. Advanced sensing and communication technologies of IoT can effectively avoid or reduce the damage of natural disasters to the transmission lines, improve the reliability of power transmission and reduce economic loss. Focused on the characteristic of the construction and development of smart grid, this paper introduced the application of IoT in online monitoring system of power transmission line.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129860839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 98
Real-Time Collaborative Video Watching on Mobile Devices with REST Services 基于REST服务的移动设备实时协同视频观看
S. Pan, Li Li, W. Chou
In this paper, we describe a mobile application that synchronizes the playback of a video stream among a group of mobile devices while the video playback is controlled (e.g. pause, resume, seek) by one of the devices. This feature allows a group of people to collaborate remotely in real-time through watching the same video on their mobile devices. To make this application work for heterogeneous mobile devices and networks, we develop synchronization protocols and time-based video position prediction algorithms on top of a REST platform that is independent of programming languages, operating systems and transport protocols. A prototype system has been developed based on Android phones connected by 3G cellular network. The preliminary experiments show the approach is feasible and promising.
在本文中,我们描述了一个移动应用程序,它在一组移动设备之间同步视频流的播放,而视频播放由其中一个设备控制(例如暂停,恢复,查找)。该功能允许一群人通过在他们的移动设备上观看相同的视频进行远程实时协作。为了使该应用程序适用于异构移动设备和网络,我们在独立于编程语言、操作系统和传输协议的REST平台上开发了同步协议和基于时间的视频位置预测算法。基于3G蜂窝网络连接的Android手机开发了一个原型系统。初步实验表明,该方法是可行的。
{"title":"Real-Time Collaborative Video Watching on Mobile Devices with REST Services","authors":"S. Pan, Li Li, W. Chou","doi":"10.1109/MUSIC.2012.13","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.13","url":null,"abstract":"In this paper, we describe a mobile application that synchronizes the playback of a video stream among a group of mobile devices while the video playback is controlled (e.g. pause, resume, seek) by one of the devices. This feature allows a group of people to collaborate remotely in real-time through watching the same video on their mobile devices. To make this application work for heterogeneous mobile devices and networks, we develop synchronization protocols and time-based video position prediction algorithms on top of a REST platform that is independent of programming languages, operating systems and transport protocols. A prototype system has been developed based on Android phones connected by 3G cellular network. The preliminary experiments show the approach is feasible and promising.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116816238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Generating OWL Ontology from Relational Database 从关系数据库生成OWL本体
Ji-Woong Choi, M. Kim
The Semantic Web aims to enrich the existing Web by building an infrastructure layer of a web of data. Three-quarters of the data on the Web come from relational databases. Thus, in the context of the Semantic Web, it has become one of the most important topics to generate OWL ontologies from the legacy databases. For this purpose, the existing approaches typically define how to map the databases to the ontologies. However, the mappings are designed to work under highly normalized database schemas and to be carried out through a batch process of dumping database contents to the ontology repository for ontology population. The approaches can't contribute usefully to the proliferation of ontologies. In this paper, we propose a new set of mapping rules based on a view-based approach, which enables ontologies to be served even without their population through the massive dump process in advance. Consequently, the ontologies out of our approach can play as the complete OWL-described view on the database because they explicitly represent the semantics of relational model objects and operations. Compared with existing approaches, our approach is applicable to a wider range of database schemas, and besides it is designed to extract more meaningful relationships between entities by reasoning.
语义网旨在通过构建数据网的基础结构层来丰富现有的Web。Web上四分之三的数据来自关系数据库。因此,在语义Web环境下,从遗留数据库生成OWL本体已成为最重要的主题之一。为此,现有的方法通常定义如何将数据库映射到本体。然而,映射被设计为在高度规范化的数据库模式下工作,并通过将数据库内容转储到本体存储库以进行本体填充的批处理过程来执行。这些方法不能有效地促进本体的扩散。本文提出了一种新的基于视图的映射规则,该映射规则可以使本体在没有预先填充的情况下通过大规模转储过程提供服务。因此,我们方法中的本体可以充当数据库上完整的owl描述视图,因为它们显式地表示关系模型对象和操作的语义。与现有方法相比,我们的方法适用于更广泛的数据库模式,并且通过推理提取实体之间更有意义的关系。
{"title":"Generating OWL Ontology from Relational Database","authors":"Ji-Woong Choi, M. Kim","doi":"10.1109/MUSIC.2012.17","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.17","url":null,"abstract":"The Semantic Web aims to enrich the existing Web by building an infrastructure layer of a web of data. Three-quarters of the data on the Web come from relational databases. Thus, in the context of the Semantic Web, it has become one of the most important topics to generate OWL ontologies from the legacy databases. For this purpose, the existing approaches typically define how to map the databases to the ontologies. However, the mappings are designed to work under highly normalized database schemas and to be carried out through a batch process of dumping database contents to the ontology repository for ontology population. The approaches can't contribute usefully to the proliferation of ontologies. In this paper, we propose a new set of mapping rules based on a view-based approach, which enables ontologies to be served even without their population through the massive dump process in advance. Consequently, the ontologies out of our approach can play as the complete OWL-described view on the database because they explicitly represent the semantics of relational model objects and operations. Compared with existing approaches, our approach is applicable to a wider range of database schemas, and besides it is designed to extract more meaningful relationships between entities by reasoning.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115370327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Database Encryption Implementation and Analysis Using Graphics Processing Unit 基于图形处理单元的数据库加密实现与分析
Inkyung Jeun, Hyun-Chul Jung, Nan Ki Lee, Dongho Won
Recently, the requirement of database encryption has increased. But many companies are not willing to adopt the use of encryption in their existing DBs due to the degradation in performance. In this paper, we proposed and implemented a high speed database encryption model using Graphics Processing Units(GPU) that can perform parallel data processing. As a result, there was a performance improvement of about 40% to 60% compared to the CPU case. We expect our paper can be used to increase the encryption performance of database.
近年来,对数据库加密的要求越来越高。但是由于性能下降,许多公司不愿意在现有的数据库中采用加密。在本文中,我们提出并实现了一种使用图形处理单元(GPU)进行并行数据处理的高速数据库加密模型。结果,与CPU情况相比,性能提高了大约40%到60%。期望本文可以用于提高数据库的加密性能。
{"title":"Database Encryption Implementation and Analysis Using Graphics Processing Unit","authors":"Inkyung Jeun, Hyun-Chul Jung, Nan Ki Lee, Dongho Won","doi":"10.1109/MUSIC.2012.26","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.26","url":null,"abstract":"Recently, the requirement of database encryption has increased. But many companies are not willing to adopt the use of encryption in their existing DBs due to the degradation in performance. In this paper, we proposed and implemented a high speed database encryption model using Graphics Processing Units(GPU) that can perform parallel data processing. As a result, there was a performance improvement of about 40% to 60% compared to the CPU case. We expect our paper can be used to increase the encryption performance of database.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121316065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Coverage-Based Placement in RFID Networks: An Overview 基于覆盖的RFID网络布局:综述
Ashraf E. Al-Fagih, F. Al-turjman, H. Hassanein, W. Alsalih
Radio Frequency IDentification (RFID) is a wireless technology that promises to facilitate many identification and tracking solutions. The placement problem, i.e. choosing the optimal locations for RFID readers, tags or both in a given RFID layout, is reviewed in this paper. Placement approaches are generally coverage-driven and vary according to the system's scopes and constraints. RFID coverage is associated with readers' interference, which requires applying redundancy elimination algorithms. In this paper, we propose a coverage-based categorization of RFID placement schemes based on the span of the readers' field. We also provide a comparative analysis of placement schemes based on their performance objectives, constraints, and potential applications. We finally discuss some open issues regarding RFID placement in terms of alternative objectives and systems' specifications.
射频识别(RFID)是一种无线技术,有望促进许多识别和跟踪解决方案。放置问题,即在给定的RFID布局中选择RFID阅读器、标签或两者的最佳位置,在本文中进行了综述。放置方法通常是覆盖驱动的,并且根据系统的范围和约束而变化。RFID的覆盖范围与读写器的干扰有关,因此需要采用冗余消除算法。在本文中,我们提出了一种基于读者领域跨度的RFID放置方案的覆盖分类。我们还提供了基于其性能目标、限制和潜在应用的安置方案的比较分析。我们最后讨论了一些关于RFID放置的开放性问题,根据可选目标和系统规范。
{"title":"Coverage-Based Placement in RFID Networks: An Overview","authors":"Ashraf E. Al-Fagih, F. Al-turjman, H. Hassanein, W. Alsalih","doi":"10.1109/MUSIC.2012.45","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.45","url":null,"abstract":"Radio Frequency IDentification (RFID) is a wireless technology that promises to facilitate many identification and tracking solutions. The placement problem, i.e. choosing the optimal locations for RFID readers, tags or both in a given RFID layout, is reviewed in this paper. Placement approaches are generally coverage-driven and vary according to the system's scopes and constraints. RFID coverage is associated with readers' interference, which requires applying redundancy elimination algorithms. In this paper, we propose a coverage-based categorization of RFID placement schemes based on the span of the readers' field. We also provide a comparative analysis of placement schemes based on their performance objectives, constraints, and potential applications. We finally discuss some open issues regarding RFID placement in terms of alternative objectives and systems' specifications.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128353099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
The Use of Artificial Neural Network in the Classification of EMG Signals 人工神经网络在肌电信号分类中的应用
M. R. Ahsan, M. Ibrahimy, O. Khalifa
This paper presents the design, optimization and performance evaluation of artificial neural network for the efficient classification of Electromyography (EMG) signals. The EMG signals are collected for different types of volunteer hand motion which are processed to extract some predefined features as inputs to the neural network. The time and time-frequency based extracted feature sets are used to train the neural network. A back-propagation neural network with Levenberg-Marquardt training algorithm has been employed for the classification of EMG signals. The results show that the designed and optimized network able to classify single channel EMG signals with an average success rate of 88.4%.
本文介绍了用于肌电信号高效分类的人工神经网络的设计、优化和性能评价。采集志愿者不同类型手部运动的肌电信号,提取预定义特征作为神经网络的输入。基于时间和时间频率提取的特征集用于训练神经网络。采用Levenberg-Marquardt训练算法的反向传播神经网络对肌电信号进行分类。结果表明,所设计和优化的神经网络能够对单通道肌电信号进行分类,平均成功率为88.4%。
{"title":"The Use of Artificial Neural Network in the Classification of EMG Signals","authors":"M. R. Ahsan, M. Ibrahimy, O. Khalifa","doi":"10.1109/MUSIC.2012.46","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.46","url":null,"abstract":"This paper presents the design, optimization and performance evaluation of artificial neural network for the efficient classification of Electromyography (EMG) signals. The EMG signals are collected for different types of volunteer hand motion which are processed to extract some predefined features as inputs to the neural network. The time and time-frequency based extracted feature sets are used to train the neural network. A back-propagation neural network with Levenberg-Marquardt training algorithm has been employed for the classification of EMG signals. The results show that the designed and optimized network able to classify single channel EMG signals with an average success rate of 88.4%.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"855 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126133381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
HIPAA and QMS Based Architectural Requirements to Cope with the OCR Audit Program 基于HIPAA和QMS的体系结构要求,以应对OCR审核程序
Syeda Uzma Gardazi, A. A. Shahid, Christine Salimbene
The United States legislation known as the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is aimed at strengthening patient rights, increasing efficiency and decreasing administrative costs in the healthcare industry. Under HIPAA all Covered Entities are required to ensure compliance with certain privacy and security rules concerned with protecting private patient health information. Building upon the objectives of HIPAA, the American Recovery and Reinvestment Act (ARRA) of 2009, in Section 13411 of the Health Information Technology for Economic and Clinical Health (HITECH) Act, required the Department of Health and Human Services (HHS) to conduct periodic audits of Covered Entities against HIPAA Security Rule. This paper presents and evaluates a new approach which might be used by Covered Entities to achieve compliance with HIPAA by adopting the ISO 9001 guidelines. A United States based Healthcare IT Company (UHITC) with a backup office in Pakistan was taken as a case study for this approach. UHITC develops software for mobile devices along with providing third party medical billing services. In connection with its achieving ISO 9001 certification since 2004, UHITC had already developed a company-wide quality audit protocol based on the ISO 9001 standard. For purposes of conforming the ISO standards to the HIPAA audit protocol in a streamlined fashion, UHITC examined the HIPAA requirements to determine whether the existing protocol could be tailored to achieve HIPAA compliance. In order to accomplish this evaluation, the two standards were compared by cross-mapping their components. The comparison revealed that the controls mentioned in the ISO 9001 guideline meet or exceed the HIPAA Security Rule for 36% of the implementation requirements. UHITC was also able to increase customer satisfaction by achieving compliance with HIPAA Security Rule using a quality management system (QMS) model. At the next level, Compliance Attributes (CA) were derived from these requirements and classified as architectural and non-architectural in nature. A new approach to define compliance oriented software architecture using compliance tactic was also proposed.
美国1996年的《健康保险流通与责任法案》(HIPAA)旨在加强患者权利,提高效率并降低医疗保健行业的管理成本。根据HIPAA,所有受保实体都必须确保遵守与保护患者私人健康信息有关的某些隐私和安全规则。基于HIPAA的目标,2009年《美国复苏与再投资法》(ARRA)在《经济与临床健康卫生信息技术法》(HITECH)第13411条中要求卫生与公众服务部(HHS)根据HIPAA安全规则对受保实体进行定期审计。本文提出并评估了一种新的方法,该方法可以被覆盖实体使用,通过采用ISO 9001指导方针来实现对HIPAA的遵守。我们以一家总部位于美国、在巴基斯坦设有备份办公室的医疗保健IT公司(UHITC)为例,对这种方法进行了研究。UHITC为移动设备开发软件,同时提供第三方医疗计费服务。自2004年取得ISO 9001认证以来,UHITC已经根据ISO 9001标准制定了全公司范围的质量审核协议。为了使ISO标准以精简的方式符合HIPAA审核协议,UHITC检查了HIPAA要求,以确定是否可以对现有协议进行调整以实现HIPAA合规性。为了完成这一评价,通过交叉映射两个标准的组成部分来进行比较。比较显示,ISO 9001指南中提到的控制达到或超过HIPAA安全规则36%的实施要求。UHITC还能够通过使用质量管理体系(QMS)模型实现对HIPAA安全规则的遵从,从而提高客户满意度。在下一层,遵从性属性(CA)是从这些需求中派生出来的,并在本质上分为体系结构和非体系结构。提出了一种利用遵从性策略定义面向遵从性的软件体系结构的新方法。
{"title":"HIPAA and QMS Based Architectural Requirements to Cope with the OCR Audit Program","authors":"Syeda Uzma Gardazi, A. A. Shahid, Christine Salimbene","doi":"10.1109/MUSIC.2012.50","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.50","url":null,"abstract":"The United States legislation known as the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is aimed at strengthening patient rights, increasing efficiency and decreasing administrative costs in the healthcare industry. Under HIPAA all Covered Entities are required to ensure compliance with certain privacy and security rules concerned with protecting private patient health information. Building upon the objectives of HIPAA, the American Recovery and Reinvestment Act (ARRA) of 2009, in Section 13411 of the Health Information Technology for Economic and Clinical Health (HITECH) Act, required the Department of Health and Human Services (HHS) to conduct periodic audits of Covered Entities against HIPAA Security Rule. This paper presents and evaluates a new approach which might be used by Covered Entities to achieve compliance with HIPAA by adopting the ISO 9001 guidelines. A United States based Healthcare IT Company (UHITC) with a backup office in Pakistan was taken as a case study for this approach. UHITC develops software for mobile devices along with providing third party medical billing services. In connection with its achieving ISO 9001 certification since 2004, UHITC had already developed a company-wide quality audit protocol based on the ISO 9001 standard. For purposes of conforming the ISO standards to the HIPAA audit protocol in a streamlined fashion, UHITC examined the HIPAA requirements to determine whether the existing protocol could be tailored to achieve HIPAA compliance. In order to accomplish this evaluation, the two standards were compared by cross-mapping their components. The comparison revealed that the controls mentioned in the ISO 9001 guideline meet or exceed the HIPAA Security Rule for 36% of the implementation requirements. UHITC was also able to increase customer satisfaction by achieving compliance with HIPAA Security Rule using a quality management system (QMS) model. At the next level, Compliance Attributes (CA) were derived from these requirements and classified as architectural and non-architectural in nature. A new approach to define compliance oriented software architecture using compliance tactic was also proposed.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123166026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Evaluating Success of Innovation Ideas in Social Computing Technologies Using Fuzzy Expert System 用模糊专家系统评价社会计算技术创新理念的成功
A. Nadali, Pouria Goldasteh, Mohammad Ghazivakili, Sami Ahmari
The purpose of this research is determining the Success of Innovation Ideas in Social Computing Technologies area by an intelligent system. Here two Fuzzy Expert Systems have been designed with the consideration of some effective variables on Ideas Barriers for first system and some other effective variables on Ideas Attractiveness for second system. The Innovation Ideas Success is determined on basis of these systems outputs. The rules of systems have been extracted from some entrepreneurship experts and the systems have been developed with the use of FIS tool of MATLAB software. The final result contains two anticipating models for evaluating level of barriers and level of attractiveness which determines level of success of innovative ideas in social computing technologies area based on two derived output variables from sub models. The presented steps have been run for idea of a new platform named WBB as the empirical study.
本研究的目的是通过一个智能系统来决定社会计算技术领域创新理念的成功。本文设计了两个模糊专家系统,考虑了第一系统思想障碍的有效变量和第二系统思想吸引力的有效变量。创新理念的成功取决于这些系统的输出。从一些创业专家那里提取了系统的规则,并利用MATLAB软件中的FIS工具开发了系统。基于子模型导出的两个输出变量,最终得到两个预测模型,分别用于评估社会计算技术领域创新理念成功程度的壁垒水平和吸引力水平。提出的步骤已经运行的想法,一个新的平台命名为WBB作为实证研究。
{"title":"Evaluating Success of Innovation Ideas in Social Computing Technologies Using Fuzzy Expert System","authors":"A. Nadali, Pouria Goldasteh, Mohammad Ghazivakili, Sami Ahmari","doi":"10.1109/MUSIC.2012.21","DOIUrl":"https://doi.org/10.1109/MUSIC.2012.21","url":null,"abstract":"The purpose of this research is determining the Success of Innovation Ideas in Social Computing Technologies area by an intelligent system. Here two Fuzzy Expert Systems have been designed with the consideration of some effective variables on Ideas Barriers for first system and some other effective variables on Ideas Attractiveness for second system. The Innovation Ideas Success is determined on basis of these systems outputs. The rules of systems have been extracted from some entrepreneurship experts and the systems have been developed with the use of FIS tool of MATLAB software. The final result contains two anticipating models for evaluating level of barriers and level of attractiveness which determines level of success of innovative ideas in social computing technologies area based on two derived output variables from sub models. The presented steps have been run for idea of a new platform named WBB as the empirical study.","PeriodicalId":260515,"journal":{"name":"2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122995589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1