Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623710
E. Theodoridis, Georgios Mylonas, I. Chatzigiannakis
In this paper, we discuss key findings, technological challenges and socioeconomic opportunities in Smart City era. Most of the conclusions were gathered during SmartSantander project, an EU project that is developing a city-scale testbed for IoT and Future Internet experimentation, providing an integrated framework for implementing Smart City services.
{"title":"Developing an IoT Smart City framework","authors":"E. Theodoridis, Georgios Mylonas, I. Chatzigiannakis","doi":"10.1109/IISA.2013.6623710","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623710","url":null,"abstract":"In this paper, we discuss key findings, technological challenges and socioeconomic opportunities in Smart City era. Most of the conclusions were gathered during SmartSantander project, an EU project that is developing a city-scale testbed for IoT and Future Internet experimentation, providing an integrated framework for implementing Smart City services.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114437466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623722
S. Theocharis, G. Tsihrintzis
Over the last years, the need to improve the service of public administration, has put at the center of the discussion the opening of government data to the public. The open data concern an emerging technology that is supported a lot by the scientific community and of particular interest for businesses and citizens. In this work, we shall seek the opportunities and benefits of open government data. We will also present the initiatives of the Greek government and the case study on the field of internal organization of the public administration.
{"title":"Open data for e-government the Greek case","authors":"S. Theocharis, G. Tsihrintzis","doi":"10.1109/IISA.2013.6623722","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623722","url":null,"abstract":"Over the last years, the need to improve the service of public administration, has put at the center of the discussion the opening of government data to the public. The open data concern an emerging technology that is supported a lot by the scientific community and of particular interest for businesses and citizens. In this work, we shall seek the opportunities and benefits of open government data. We will also present the initiatives of the Greek government and the case study on the field of internal organization of the public administration.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114653880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623717
Spiridon Mousouris, Georgios D. Styliaras
This paper presents the development of Digital Cultural Heritage Map (DCHM) application that is based on open source technologies and combines the power of web-mapping and multimedia. The project aspires to collect all the spatial cultural information about an area in one and only dynamic and easy to maintain and modify, website. The basic component of the website is the web-map. The user can perform textual or spatial queries, or a combination of those two and subsequently access spatial data that render on the map or relevant multimedia that render on the webpage. The application is being implemented for the Aitoloakarnania Greek county and will be also deployed for mobile devices.
{"title":"On the creation of a Digital Cultural Heritage Map","authors":"Spiridon Mousouris, Georgios D. Styliaras","doi":"10.1109/IISA.2013.6623717","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623717","url":null,"abstract":"This paper presents the development of Digital Cultural Heritage Map (DCHM) application that is based on open source technologies and combines the power of web-mapping and multimedia. The project aspires to collect all the spatial cultural information about an area in one and only dynamic and easy to maintain and modify, website. The basic component of the website is the web-map. The user can perform textual or spatial queries, or a combination of those two and subsequently access spatial data that render on the map or relevant multimedia that render on the webpage. The application is being implemented for the Aitoloakarnania Greek county and will be also deployed for mobile devices.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115006738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623729
Adamantia Psarologou, M. Virvou, N. Bourbakis
Managing and organizing the information is a difficult subject. Especially in our time with the plethora of available sources accessible to the public, basically through the Internet, the volume of these pieces of information becomes larger and larger. The purpose of this dissertation is the creation of a model of documents' categorization. Our goal is to illustrate an as possible automated way of classification that takes into consideration the meaning of the documents. The way in which a human evaluates and classifies documents is followed in this proposed methodology. We also illustrate some empirical examples of the function of our classification method.
{"title":"A NLU-based method for a first level automatic categorization of AI-based security documents","authors":"Adamantia Psarologou, M. Virvou, N. Bourbakis","doi":"10.1109/IISA.2013.6623729","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623729","url":null,"abstract":"Managing and organizing the information is a difficult subject. Especially in our time with the plethora of available sources accessible to the public, basically through the Internet, the volume of these pieces of information becomes larger and larger. The purpose of this dissertation is the creation of a model of documents' categorization. Our goal is to illustrate an as possible automated way of classification that takes into consideration the meaning of the documents. The way in which a human evaluates and classifies documents is followed in this proposed methodology. We also illustrate some empirical examples of the function of our classification method.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128846796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623681
A. A. Sioson
The codeCurator is an automatic C++ solution grader used in teaching programming to first year College students in Ateneo de Naga University. It provides programming exercises and challenge problems based on a prescribed sequence of programming topics. The exercises and challenge problems are designed to help students get a grip on formulation of functions, class methods, complete class implementation, or complete stand-alone programs in C++. Solutions are typically short and are checked using automatic testing techniques similar to online judge of ACM ICPC problems. In this paper, we present an analysis of the frequency of submissions, similarity of submitted solutions, categories of problems, and prospects on how to achieve an effective delivery of instruction.
{"title":"Experiences on the use of an automatic C++ solution grader system","authors":"A. A. Sioson","doi":"10.1109/IISA.2013.6623681","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623681","url":null,"abstract":"The codeCurator is an automatic C++ solution grader used in teaching programming to first year College students in Ateneo de Naga University. It provides programming exercises and challenge problems based on a prescribed sequence of programming topics. The exercises and challenge problems are designed to help students get a grip on formulation of functions, class methods, complete class implementation, or complete stand-alone programs in C++. Solutions are typically short and are checked using automatic testing techniques similar to online judge of ACM ICPC problems. In this paper, we present an analysis of the frequency of submissions, similarity of submitted solutions, categories of problems, and prospects on how to achieve an effective delivery of instruction.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122810555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623683
Danielle Anne F. Ayag, Ricardo C. Bautista, M. Eala, R. Feria
Permanent childhood hearing impairment (PCHI) can cause diminished communication skills and delay in language development causing a great disadvantage for children. Early identification of hearing impairment, by the hearing screening program, can lead to beneficial effects on language development. However, the program is not accessible for everyone in the Philippines. This study aims to implement the hearing screening test for children aged 2 years and above using Android mobile devices. The application was tested on Android devices from different manufacturers to find out if there is a significant difference among the sound level output. Ear doctors were asked to perform the hearing screening procedure using the application on themselves and assess its effectiveness and significance. The results of the experimentation on Android phones are as follows: the standard deviation for sound level output vary from 1.28 dB to 3.99 dB for 1 kHz making the difference insignificant. On a 5-level Likert scale, doctors rated the application 4.3 for ease of navigation, 3.8 for design, and 4.6 for the clarity of instructions.
永久性儿童听力障碍(PCHI)会导致儿童沟通能力下降和语言发展迟缓,对儿童造成很大的不利影响。通过听力筛查计划,早期识别听力障碍,可以对语言发展产生有益的影响。然而,该计划并非对菲律宾的每个人都适用。本研究旨在对使用Android移动设备的2岁及以上儿童进行听力筛查测试。该应用程序在不同制造商的安卓设备上进行了测试,以找出声音级输出之间是否存在显着差异。耳科医生被要求使用该应用程序对自己进行听力筛查,并评估其有效性和意义。在Android手机上的实验结果如下:1 kHz时声级输出的标准差在1.28 dB ~ 3.99 dB之间,差异不显著。在李克特量表(Likert scale)的5个等级中,医生对应用程序的易用性评分为4.3,设计评分为3.8,说明清晰度评分为4.6。
{"title":"Acceptability of Hear-O as a mobile hearing screening tool","authors":"Danielle Anne F. Ayag, Ricardo C. Bautista, M. Eala, R. Feria","doi":"10.1109/IISA.2013.6623683","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623683","url":null,"abstract":"Permanent childhood hearing impairment (PCHI) can cause diminished communication skills and delay in language development causing a great disadvantage for children. Early identification of hearing impairment, by the hearing screening program, can lead to beneficial effects on language development. However, the program is not accessible for everyone in the Philippines. This study aims to implement the hearing screening test for children aged 2 years and above using Android mobile devices. The application was tested on Android devices from different manufacturers to find out if there is a significant difference among the sound level output. Ear doctors were asked to perform the hearing screening procedure using the application on themselves and assess its effectiveness and significance. The results of the experimentation on Android phones are as follows: the standard deviation for sound level output vary from 1.28 dB to 3.99 dB for 1 kHz making the difference insignificant. On a 5-level Likert scale, doctors rated the application 4.3 for ease of navigation, 3.8 for design, and 4.6 for the clarity of instructions.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129215782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623705
Binbin Wang, Xinjie Hao, Lisheng Chen, Jingmin Cui, Lei Yunqi
To study the robustness of face recognition algorithms on conditions of complex illumination, facial expression and posture, three subset databases (Illumination, Expression and Posture subsets) are constructed by selecting images from several existing face databases. Advantages and disadvantages of seven typical algorithms on extracting global and local features are discussed respectively through the experiments on ORL and the three databases mentioned above. To improve the recognition rate, an algorithm of face recognition based on the feature fusion of Two-Dimensional Linear Discriminant Analysis (2DLDA) and Local Binary Pattern (LBP) is proposed in this paper. The experimental results verify both the complementarities of the two kinds of feature and the effectiveness of the proposed feature fusion algorithm.
{"title":"Face recognition based on the feature fusion of 2DLDA and LBP","authors":"Binbin Wang, Xinjie Hao, Lisheng Chen, Jingmin Cui, Lei Yunqi","doi":"10.1109/IISA.2013.6623705","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623705","url":null,"abstract":"To study the robustness of face recognition algorithms on conditions of complex illumination, facial expression and posture, three subset databases (Illumination, Expression and Posture subsets) are constructed by selecting images from several existing face databases. Advantages and disadvantages of seven typical algorithms on extracting global and local features are discussed respectively through the experiments on ORL and the three databases mentioned above. To improve the recognition rate, an algorithm of face recognition based on the feature fusion of Two-Dimensional Linear Discriminant Analysis (2DLDA) and Local Binary Pattern (LBP) is proposed in this paper. The experimental results verify both the complementarities of the two kinds of feature and the effectiveness of the proposed feature fusion algorithm.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131266520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623735
R. Kannavara
One of the major problems seen in the pre-silicon validation realm today is the lack of a unified framework for all pre-silicon validation efforts including security validation. Lack of a unified framework for pre-silicon validation presents a “communication” challenge among different validation tool teams. While each team maintains and enhances a particular tool depending on the project they support and while these projects shift geographies to keep up with the product development life cycle, keeping the tools up to date, addressing specific tool changes and communicating the tool changes among project teams and dependent tool teams is emaciating. With this perspective, this paper seeks to highlight this issue and present a high-level solution space to address this problem. Further, the paper highlights outstanding issues that need to be resolved to enable such a unified pre-silicon validation framework to be successful.
{"title":"Towards a unified framework for pre-silicon validation","authors":"R. Kannavara","doi":"10.1109/IISA.2013.6623735","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623735","url":null,"abstract":"One of the major problems seen in the pre-silicon validation realm today is the lack of a unified framework for all pre-silicon validation efforts including security validation. Lack of a unified framework for pre-silicon validation presents a “communication” challenge among different validation tool teams. While each team maintains and enhances a particular tool depending on the project they support and while these projects shift geographies to keep up with the product development life cycle, keeping the tools up to date, addressing specific tool changes and communicating the tool changes among project teams and dependent tool teams is emaciating. With this perspective, this paper seeks to highlight this issue and present a high-level solution space to address this problem. Further, the paper highlights outstanding issues that need to be resolved to enable such a unified pre-silicon validation framework to be successful.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133388819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623700
Yasser Al-Roqi, S. Papanastasiou, E. Peytchev
Recent research has highlighted the potential of equipping soldiers with portable computing devices as a means to regularly report complex and important observations to mission planners at headquarters. To realise such scenarios connectivity between disparate elements in the battlefield needs to be established and appropriate supporting algorithms developed. In MANET literature several algorithms have been proposed to this effect for topologies where infrastructure is poor or non-available but not specifically for a military setting. In this work, we present a topology derived from a battalion deployment plan suitably parametrised to account for different personnel fill-up rates. In this setting we examine the performance of three position-based routing protocols, namely the Greedy Perimeter Stateless Routing (GPSR) protocol and two optimisations; the Divisional Perimeter Routing (GPSR-DP), and Buffering Zone Greedy Forwarding Strategy (GPSR-BZGFS). Our results indicate that the default GPSR approach as well as the two optimisations do not perform adequately due to frequent network disconnections, which occur as a consequence of the large deployment area. We highlight the need for more research to discover a workable solution and discuss possible approaches to the issue.
最近的研究强调了为士兵配备便携式计算设备的潜力,作为定期向总部任务规划者报告复杂和重要观察结果的一种手段。为了实现这样的场景,需要建立战场上不同元素之间的连接,并开发适当的支持算法。在MANET文献中,针对基础设施较差或不可用的拓扑结构提出了几种算法,但不专门用于军事设置。在这项工作中,我们提出了一个来自营部署计划的拓扑结构,适当地参数化以考虑不同的人员填充率。在这种情况下,我们研究了三种基于位置的路由协议的性能,即贪婪周边无状态路由(GPSR)协议和两种优化;GPSR-DP (division Perimeter Routing)和GPSR-BZGFS (buffer Zone Greedy Forwarding Strategy)。我们的结果表明,默认的GPSR方法以及两种优化方法由于频繁的网络断开而不能充分执行,这是由于大型部署区域而发生的。我们强调需要更多的研究来发现一个可行的解决方案,并讨论可能的方法来解决这个问题。
{"title":"Performance evaluation of three GPSR-based routing protocols in a military setting","authors":"Yasser Al-Roqi, S. Papanastasiou, E. Peytchev","doi":"10.1109/IISA.2013.6623700","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623700","url":null,"abstract":"Recent research has highlighted the potential of equipping soldiers with portable computing devices as a means to regularly report complex and important observations to mission planners at headquarters. To realise such scenarios connectivity between disparate elements in the battlefield needs to be established and appropriate supporting algorithms developed. In MANET literature several algorithms have been proposed to this effect for topologies where infrastructure is poor or non-available but not specifically for a military setting. In this work, we present a topology derived from a battalion deployment plan suitably parametrised to account for different personnel fill-up rates. In this setting we examine the performance of three position-based routing protocols, namely the Greedy Perimeter Stateless Routing (GPSR) protocol and two optimisations; the Divisional Perimeter Routing (GPSR-DP), and Buffering Zone Greedy Forwarding Strategy (GPSR-BZGFS). Our results indicate that the default GPSR approach as well as the two optimisations do not perform adequately due to frequent network disconnections, which occur as a consequence of the large deployment area. We highlight the need for more research to discover a workable solution and discuss possible approaches to the issue.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"22 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134426883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-10DOI: 10.1109/IISA.2013.6623692
R. Holy, M. Kalika, J. Kalikova
Currently, when development of applications and technologies is definitely aimed at global use, such trend must be supported by unequivocal identification of users. The basic principles support safety elements (integrity, indisputableness, resistance to known and supposed forms of attacks) and do not link application to a physical carrier (plastic). The application can be hosted on a bank payment card or NFC (near field communication), etc. To reduce safety threats the concept of unequivocal identification using ID cards and conditions, which they technologically produce, are used. Individual technologies used can be defined in ISO/IEC 14443 contactless chip and infrastructure based in HSM (Hardware Security Module) and individual SAM (Secure Application Module) can be defined by key management of the chip content.
{"title":"Multi-application ID card using DESFire EV1","authors":"R. Holy, M. Kalika, J. Kalikova","doi":"10.1109/IISA.2013.6623692","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623692","url":null,"abstract":"Currently, when development of applications and technologies is definitely aimed at global use, such trend must be supported by unequivocal identification of users. The basic principles support safety elements (integrity, indisputableness, resistance to known and supposed forms of attacks) and do not link application to a physical carrier (plastic). The application can be hosted on a bank payment card or NFC (near field communication), etc. To reduce safety threats the concept of unequivocal identification using ID cards and conditions, which they technologically produce, are used. Individual technologies used can be defined in ISO/IEC 14443 contactless chip and infrastructure based in HSM (Hardware Security Module) and individual SAM (Secure Application Module) can be defined by key management of the chip content.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130114377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}