Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623722
S. Theocharis, G. Tsihrintzis
Over the last years, the need to improve the service of public administration, has put at the center of the discussion the opening of government data to the public. The open data concern an emerging technology that is supported a lot by the scientific community and of particular interest for businesses and citizens. In this work, we shall seek the opportunities and benefits of open government data. We will also present the initiatives of the Greek government and the case study on the field of internal organization of the public administration.
{"title":"Open data for e-government the Greek case","authors":"S. Theocharis, G. Tsihrintzis","doi":"10.1109/IISA.2013.6623722","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623722","url":null,"abstract":"Over the last years, the need to improve the service of public administration, has put at the center of the discussion the opening of government data to the public. The open data concern an emerging technology that is supported a lot by the scientific community and of particular interest for businesses and citizens. In this work, we shall seek the opportunities and benefits of open government data. We will also present the initiatives of the Greek government and the case study on the field of internal organization of the public administration.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114653880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623710
E. Theodoridis, Georgios Mylonas, I. Chatzigiannakis
In this paper, we discuss key findings, technological challenges and socioeconomic opportunities in Smart City era. Most of the conclusions were gathered during SmartSantander project, an EU project that is developing a city-scale testbed for IoT and Future Internet experimentation, providing an integrated framework for implementing Smart City services.
{"title":"Developing an IoT Smart City framework","authors":"E. Theodoridis, Georgios Mylonas, I. Chatzigiannakis","doi":"10.1109/IISA.2013.6623710","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623710","url":null,"abstract":"In this paper, we discuss key findings, technological challenges and socioeconomic opportunities in Smart City era. Most of the conclusions were gathered during SmartSantander project, an EU project that is developing a city-scale testbed for IoT and Future Internet experimentation, providing an integrated framework for implementing Smart City services.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114437466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623697
Sam Ferguson, Emery Schubert, Doheon Lee, D. Cabrera, G. McPherson
This paper investigates the use of psychoacoustic loudness analysis as a method for determining the likely emotional responses of listeners to musical excerpts. 19 excerpts of music were presented to 86 participants (7 randomly chosen excerpts per participant) who were asked to rate the emotion category using the emotion-clock-face continuous response interface. The same excerpts were analysed with a loudness model, and time series results were summarised as both loudness median and standard deviation. Comparisons indicate that the median and standard deviation of loudness plays an important role in determining the emotion category responses.
{"title":"A comparison between continuous categorical emotion responses and Stimulus loudness parameters","authors":"Sam Ferguson, Emery Schubert, Doheon Lee, D. Cabrera, G. McPherson","doi":"10.1109/IISA.2013.6623697","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623697","url":null,"abstract":"This paper investigates the use of psychoacoustic loudness analysis as a method for determining the likely emotional responses of listeners to musical excerpts. 19 excerpts of music were presented to 86 participants (7 randomly chosen excerpts per participant) who were asked to rate the emotion category using the emotion-clock-face continuous response interface. The same excerpts were analysed with a loudness model, and time series results were summarised as both loudness median and standard deviation. Comparisons indicate that the median and standard deviation of loudness plays an important role in determining the emotion category responses.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127733449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623723
M. Virvou, S. Sidiropoulos
Nowadays, children are becoming familiar with the computer technology at a very early age. Moreover the wide availability of the internet gives a new perspective in distance education making e-learning environments crucial to the future of education. Intelligent Tutoring Systems (ITSs) provide sophisticated tutoring systems using artificial intelligence techniques in computer programs to facilitate instruction. An ITS is able to provide personalized suggestions and adapt to each individual student's knowledge and skills. Furthermore social networking is becoming a part of everyday life for almost every student. Students can benefit from collaboration in e-learning environments especially when this is combined with an ITS. In this paper we describe a novel e-learning system that uses an open-source social network platform for mathematics tutoring.
{"title":"An Intelligent Tutoring System over a social network for mathematics learning","authors":"M. Virvou, S. Sidiropoulos","doi":"10.1109/IISA.2013.6623723","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623723","url":null,"abstract":"Nowadays, children are becoming familiar with the computer technology at a very early age. Moreover the wide availability of the internet gives a new perspective in distance education making e-learning environments crucial to the future of education. Intelligent Tutoring Systems (ITSs) provide sophisticated tutoring systems using artificial intelligence techniques in computer programs to facilitate instruction. An ITS is able to provide personalized suggestions and adapt to each individual student's knowledge and skills. Furthermore social networking is becoming a part of everyday life for almost every student. Students can benefit from collaboration in e-learning environments especially when this is combined with an ITS. In this paper we describe a novel e-learning system that uses an open-source social network platform for mathematics tutoring.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124833537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623714
C. Troussas, M. Virvou, Efthymios Alepis
In this paper, we present our multiple parameter cluster analysis in our multiple language learning system. Towards this direction, we have used algorithmic approaches residing in the field of machine learning. Multiple parameter cluster analysis is conducted by the k-means clustering algorithm which takes as input seven important users' characteristics in order to initialize the process. The clustering is conducted by k-means clustering algorithm, which takes as input multiple user characteristics. The incorporation of k-means clustering is used to address several barriers posed by the heterogeneous learning audience of educational systems. After determining in which cluster each new student belongs, the system can reason about this specific student, adapting its behavior to the student's needs, performance and preferences.
{"title":"Multiple parameter cluster analysis in a multiple language learning system","authors":"C. Troussas, M. Virvou, Efthymios Alepis","doi":"10.1109/IISA.2013.6623714","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623714","url":null,"abstract":"In this paper, we present our multiple parameter cluster analysis in our multiple language learning system. Towards this direction, we have used algorithmic approaches residing in the field of machine learning. Multiple parameter cluster analysis is conducted by the k-means clustering algorithm which takes as input seven important users' characteristics in order to initialize the process. The clustering is conducted by k-means clustering algorithm, which takes as input multiple user characteristics. The incorporation of k-means clustering is used to address several barriers posed by the heterogeneous learning audience of educational systems. After determining in which cluster each new student belongs, the system can reason about this specific student, adapting its behavior to the student's needs, performance and preferences.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125214115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623683
Danielle Anne F. Ayag, Ricardo C. Bautista, M. Eala, R. Feria
Permanent childhood hearing impairment (PCHI) can cause diminished communication skills and delay in language development causing a great disadvantage for children. Early identification of hearing impairment, by the hearing screening program, can lead to beneficial effects on language development. However, the program is not accessible for everyone in the Philippines. This study aims to implement the hearing screening test for children aged 2 years and above using Android mobile devices. The application was tested on Android devices from different manufacturers to find out if there is a significant difference among the sound level output. Ear doctors were asked to perform the hearing screening procedure using the application on themselves and assess its effectiveness and significance. The results of the experimentation on Android phones are as follows: the standard deviation for sound level output vary from 1.28 dB to 3.99 dB for 1 kHz making the difference insignificant. On a 5-level Likert scale, doctors rated the application 4.3 for ease of navigation, 3.8 for design, and 4.6 for the clarity of instructions.
永久性儿童听力障碍(PCHI)会导致儿童沟通能力下降和语言发展迟缓,对儿童造成很大的不利影响。通过听力筛查计划,早期识别听力障碍,可以对语言发展产生有益的影响。然而,该计划并非对菲律宾的每个人都适用。本研究旨在对使用Android移动设备的2岁及以上儿童进行听力筛查测试。该应用程序在不同制造商的安卓设备上进行了测试,以找出声音级输出之间是否存在显着差异。耳科医生被要求使用该应用程序对自己进行听力筛查,并评估其有效性和意义。在Android手机上的实验结果如下:1 kHz时声级输出的标准差在1.28 dB ~ 3.99 dB之间,差异不显著。在李克特量表(Likert scale)的5个等级中,医生对应用程序的易用性评分为4.3,设计评分为3.8,说明清晰度评分为4.6。
{"title":"Acceptability of Hear-O as a mobile hearing screening tool","authors":"Danielle Anne F. Ayag, Ricardo C. Bautista, M. Eala, R. Feria","doi":"10.1109/IISA.2013.6623683","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623683","url":null,"abstract":"Permanent childhood hearing impairment (PCHI) can cause diminished communication skills and delay in language development causing a great disadvantage for children. Early identification of hearing impairment, by the hearing screening program, can lead to beneficial effects on language development. However, the program is not accessible for everyone in the Philippines. This study aims to implement the hearing screening test for children aged 2 years and above using Android mobile devices. The application was tested on Android devices from different manufacturers to find out if there is a significant difference among the sound level output. Ear doctors were asked to perform the hearing screening procedure using the application on themselves and assess its effectiveness and significance. The results of the experimentation on Android phones are as follows: the standard deviation for sound level output vary from 1.28 dB to 3.99 dB for 1 kHz making the difference insignificant. On a 5-level Likert scale, doctors rated the application 4.3 for ease of navigation, 3.8 for design, and 4.6 for the clarity of instructions.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129215782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623705
Binbin Wang, Xinjie Hao, Lisheng Chen, Jingmin Cui, Lei Yunqi
To study the robustness of face recognition algorithms on conditions of complex illumination, facial expression and posture, three subset databases (Illumination, Expression and Posture subsets) are constructed by selecting images from several existing face databases. Advantages and disadvantages of seven typical algorithms on extracting global and local features are discussed respectively through the experiments on ORL and the three databases mentioned above. To improve the recognition rate, an algorithm of face recognition based on the feature fusion of Two-Dimensional Linear Discriminant Analysis (2DLDA) and Local Binary Pattern (LBP) is proposed in this paper. The experimental results verify both the complementarities of the two kinds of feature and the effectiveness of the proposed feature fusion algorithm.
{"title":"Face recognition based on the feature fusion of 2DLDA and LBP","authors":"Binbin Wang, Xinjie Hao, Lisheng Chen, Jingmin Cui, Lei Yunqi","doi":"10.1109/IISA.2013.6623705","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623705","url":null,"abstract":"To study the robustness of face recognition algorithms on conditions of complex illumination, facial expression and posture, three subset databases (Illumination, Expression and Posture subsets) are constructed by selecting images from several existing face databases. Advantages and disadvantages of seven typical algorithms on extracting global and local features are discussed respectively through the experiments on ORL and the three databases mentioned above. To improve the recognition rate, an algorithm of face recognition based on the feature fusion of Two-Dimensional Linear Discriminant Analysis (2DLDA) and Local Binary Pattern (LBP) is proposed in this paper. The experimental results verify both the complementarities of the two kinds of feature and the effectiveness of the proposed feature fusion algorithm.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131266520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623735
R. Kannavara
One of the major problems seen in the pre-silicon validation realm today is the lack of a unified framework for all pre-silicon validation efforts including security validation. Lack of a unified framework for pre-silicon validation presents a “communication” challenge among different validation tool teams. While each team maintains and enhances a particular tool depending on the project they support and while these projects shift geographies to keep up with the product development life cycle, keeping the tools up to date, addressing specific tool changes and communicating the tool changes among project teams and dependent tool teams is emaciating. With this perspective, this paper seeks to highlight this issue and present a high-level solution space to address this problem. Further, the paper highlights outstanding issues that need to be resolved to enable such a unified pre-silicon validation framework to be successful.
{"title":"Towards a unified framework for pre-silicon validation","authors":"R. Kannavara","doi":"10.1109/IISA.2013.6623735","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623735","url":null,"abstract":"One of the major problems seen in the pre-silicon validation realm today is the lack of a unified framework for all pre-silicon validation efforts including security validation. Lack of a unified framework for pre-silicon validation presents a “communication” challenge among different validation tool teams. While each team maintains and enhances a particular tool depending on the project they support and while these projects shift geographies to keep up with the product development life cycle, keeping the tools up to date, addressing specific tool changes and communicating the tool changes among project teams and dependent tool teams is emaciating. With this perspective, this paper seeks to highlight this issue and present a high-level solution space to address this problem. Further, the paper highlights outstanding issues that need to be resolved to enable such a unified pre-silicon validation framework to be successful.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133388819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623700
Yasser Al-Roqi, S. Papanastasiou, E. Peytchev
Recent research has highlighted the potential of equipping soldiers with portable computing devices as a means to regularly report complex and important observations to mission planners at headquarters. To realise such scenarios connectivity between disparate elements in the battlefield needs to be established and appropriate supporting algorithms developed. In MANET literature several algorithms have been proposed to this effect for topologies where infrastructure is poor or non-available but not specifically for a military setting. In this work, we present a topology derived from a battalion deployment plan suitably parametrised to account for different personnel fill-up rates. In this setting we examine the performance of three position-based routing protocols, namely the Greedy Perimeter Stateless Routing (GPSR) protocol and two optimisations; the Divisional Perimeter Routing (GPSR-DP), and Buffering Zone Greedy Forwarding Strategy (GPSR-BZGFS). Our results indicate that the default GPSR approach as well as the two optimisations do not perform adequately due to frequent network disconnections, which occur as a consequence of the large deployment area. We highlight the need for more research to discover a workable solution and discuss possible approaches to the issue.
最近的研究强调了为士兵配备便携式计算设备的潜力,作为定期向总部任务规划者报告复杂和重要观察结果的一种手段。为了实现这样的场景,需要建立战场上不同元素之间的连接,并开发适当的支持算法。在MANET文献中,针对基础设施较差或不可用的拓扑结构提出了几种算法,但不专门用于军事设置。在这项工作中,我们提出了一个来自营部署计划的拓扑结构,适当地参数化以考虑不同的人员填充率。在这种情况下,我们研究了三种基于位置的路由协议的性能,即贪婪周边无状态路由(GPSR)协议和两种优化;GPSR-DP (division Perimeter Routing)和GPSR-BZGFS (buffer Zone Greedy Forwarding Strategy)。我们的结果表明,默认的GPSR方法以及两种优化方法由于频繁的网络断开而不能充分执行,这是由于大型部署区域而发生的。我们强调需要更多的研究来发现一个可行的解决方案,并讨论可能的方法来解决这个问题。
{"title":"Performance evaluation of three GPSR-based routing protocols in a military setting","authors":"Yasser Al-Roqi, S. Papanastasiou, E. Peytchev","doi":"10.1109/IISA.2013.6623700","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623700","url":null,"abstract":"Recent research has highlighted the potential of equipping soldiers with portable computing devices as a means to regularly report complex and important observations to mission planners at headquarters. To realise such scenarios connectivity between disparate elements in the battlefield needs to be established and appropriate supporting algorithms developed. In MANET literature several algorithms have been proposed to this effect for topologies where infrastructure is poor or non-available but not specifically for a military setting. In this work, we present a topology derived from a battalion deployment plan suitably parametrised to account for different personnel fill-up rates. In this setting we examine the performance of three position-based routing protocols, namely the Greedy Perimeter Stateless Routing (GPSR) protocol and two optimisations; the Divisional Perimeter Routing (GPSR-DP), and Buffering Zone Greedy Forwarding Strategy (GPSR-BZGFS). Our results indicate that the default GPSR approach as well as the two optimisations do not perform adequately due to frequent network disconnections, which occur as a consequence of the large deployment area. We highlight the need for more research to discover a workable solution and discuss possible approaches to the issue.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"22 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134426883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623692
R. Holy, M. Kalika, J. Kalikova
Currently, when development of applications and technologies is definitely aimed at global use, such trend must be supported by unequivocal identification of users. The basic principles support safety elements (integrity, indisputableness, resistance to known and supposed forms of attacks) and do not link application to a physical carrier (plastic). The application can be hosted on a bank payment card or NFC (near field communication), etc. To reduce safety threats the concept of unequivocal identification using ID cards and conditions, which they technologically produce, are used. Individual technologies used can be defined in ISO/IEC 14443 contactless chip and infrastructure based in HSM (Hardware Security Module) and individual SAM (Secure Application Module) can be defined by key management of the chip content.
{"title":"Multi-application ID card using DESFire EV1","authors":"R. Holy, M. Kalika, J. Kalikova","doi":"10.1109/IISA.2013.6623692","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623692","url":null,"abstract":"Currently, when development of applications and technologies is definitely aimed at global use, such trend must be supported by unequivocal identification of users. The basic principles support safety elements (integrity, indisputableness, resistance to known and supposed forms of attacks) and do not link application to a physical carrier (plastic). The application can be hosted on a bank payment card or NFC (near field communication), etc. To reduce safety threats the concept of unequivocal identification using ID cards and conditions, which they technologically produce, are used. Individual technologies used can be defined in ISO/IEC 14443 contactless chip and infrastructure based in HSM (Hardware Security Module) and individual SAM (Secure Application Module) can be defined by key management of the chip content.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130114377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}