Over the last decade, Quality of Experience (QoE) has become the guiding paradigm for enabling a more user-centric understanding of quality of communication networks and services. The intensifying competition among ISPs and the exponentially increasing traffic volumes caused by online video platforms like YouTube is forcing service providers to integrate QoE into their corporate DNA. This paper investigates the problem of YouTube QoE monitoring from an access provider's perspective. To this end, we present three novel methods for in-network measurement of the QoE impairment that dominates user perception in the context of HTTP video-streaming: stalling of playback. Our evaluation results show that it is possible to detect application-level stalling events at high accuracy by using network-level passive probing only. However, only the most complex and most accurate approach can be used for QoE prediction due to the non-linear ties inherent in human quality perception.
在过去十年中,体验质量(Quality of Experience, QoE)已经成为一种指导范例,使人们能够更加以用户为中心地理解通信网络和服务的质量。互联网服务提供商之间的竞争日益激烈,YouTube等在线视频平台带来的流量呈指数级增长,迫使服务提供商将QoE整合到他们的企业DNA中。本文从接入提供商的角度研究了YouTube QoE监控问题。为此,我们提出了三种新的方法来测量在HTTP视频流环境中主导用户感知的QoE损伤:播放延迟。我们的评估结果表明,仅使用网络级被动探测就可以高精度地检测应用程序级的停机事件。然而,由于人类质量感知固有的非线性关系,只有最复杂和最准确的方法才能用于QoE预测。
{"title":"Passive YouTube QoE Monitoring for ISPs","authors":"R. Schatz, T. Hossfeld, P. Casas","doi":"10.1109/IMIS.2012.12","DOIUrl":"https://doi.org/10.1109/IMIS.2012.12","url":null,"abstract":"Over the last decade, Quality of Experience (QoE) has become the guiding paradigm for enabling a more user-centric understanding of quality of communication networks and services. The intensifying competition among ISPs and the exponentially increasing traffic volumes caused by online video platforms like YouTube is forcing service providers to integrate QoE into their corporate DNA. This paper investigates the problem of YouTube QoE monitoring from an access provider's perspective. To this end, we present three novel methods for in-network measurement of the QoE impairment that dominates user perception in the context of HTTP video-streaming: stalling of playback. Our evaluation results show that it is possible to detect application-level stalling events at high accuracy by using network-level passive probing only. However, only the most complex and most accurate approach can be used for QoE prediction due to the non-linear ties inherent in human quality perception.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133138837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Parvin, Song Han, Z. Rehman, M. A. Faruque, F. Hussain
Elliptic curve cryptography (ECC) is a way to provide security for exchanging keys among communicating parties using the Diffie Hellman key exchange algorithm. This paper presents the ECC implementation for identity-based signature authentication and then applies the knapsack algorithm on ECC for signing a message. The group signature is the concatenation of the identity-based signature with the user's public key. In this paper, we attempt to provide a secure ID-based group signature scheme by using knapsack based ECC.
{"title":"A New Identity-Based Group Signature Scheme Based on Knapsack ECC","authors":"S. Parvin, Song Han, Z. Rehman, M. A. Faruque, F. Hussain","doi":"10.1109/IMIS.2012.88","DOIUrl":"https://doi.org/10.1109/IMIS.2012.88","url":null,"abstract":"Elliptic curve cryptography (ECC) is a way to provide security for exchanging keys among communicating parties using the Diffie Hellman key exchange algorithm. This paper presents the ECC implementation for identity-based signature authentication and then applies the knapsack algorithm on ECC for signing a message. The group signature is the concatenation of the identity-based signature with the user's public key. In this paper, we attempt to provide a secure ID-based group signature scheme by using knapsack based ECC.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127870000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Jeong, S. Kim, Minkeun Ha, Taehong Kim, Jinyoung Yang, N. Giang, Daeyoung Kim
Enabling the Internet of Things (IoT) requires a global identification system for things to be distinguished from trillions of things and to make them globally accessible from the Internet. Unfortunately, the current Internet architecture using an IP address as both ID and locator (i.e., address) makes it difficult to improve networking solutions for the IoT. To solve this, we newly design novel IoT architecture composed of Things' Identification Service (TIDS) and Things' Profile Service (TPS), enabling things to use both a domain name and a global ID in globally accessing other things in the world. It also exploits existing Domain Name Service (DNS) and Dynamic DNS (DDNS) to trace of mobile thing's changing IP address. In addition to this, we develop Things' Application-level Protocol (TALP) to provide users with transparent access to the things over heterogeneous networks. To show the feasibility, we implement TIDS, TPS, and TALP and construct the test-bed for the proposed IoT architecture. Based on this, we prove the feasibility of the proposed IoT architecture.
{"title":"Enabling Transparent Communication with Global ID for the Internet of Things","authors":"S. Jeong, S. Kim, Minkeun Ha, Taehong Kim, Jinyoung Yang, N. Giang, Daeyoung Kim","doi":"10.1109/IMIS.2012.91","DOIUrl":"https://doi.org/10.1109/IMIS.2012.91","url":null,"abstract":"Enabling the Internet of Things (IoT) requires a global identification system for things to be distinguished from trillions of things and to make them globally accessible from the Internet. Unfortunately, the current Internet architecture using an IP address as both ID and locator (i.e., address) makes it difficult to improve networking solutions for the IoT. To solve this, we newly design novel IoT architecture composed of Things' Identification Service (TIDS) and Things' Profile Service (TPS), enabling things to use both a domain name and a global ID in globally accessing other things in the world. It also exploits existing Domain Name Service (DNS) and Dynamic DNS (DDNS) to trace of mobile thing's changing IP address. In addition to this, we develop Things' Application-level Protocol (TALP) to provide users with transparent access to the things over heterogeneous networks. To show the feasibility, we implement TIDS, TPS, and TALP and construct the test-bed for the proposed IoT architecture. Based on this, we prove the feasibility of the proposed IoT architecture.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115954656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Image retrieval is one of the most exciting and fastest growing research areas in the field of multimedia technology. This paper proposes a new efficient image retrieval method that applies a weighted combination of color and texture to the wavelet transform, based on spatial-color and second order statistics, respectively. To evaluate the performance of the proposed algorithm, we assess the simulation's performance in terms of average precision and Fscore using several image databases, and perform comparative analysis with existing methods such as MPEG-7. The experimental results show that the proposed approach significantly improves the effectiveness of image retrieval. The proposed descriptor is particularly useful for multi-resolution image search and retrieval.
{"title":"Content-Based Image Retrieval Using Wavelet Spatial-Color and Gabor Normalized Texture in Multi-resolution Database","authors":"Yong-Hwan Lee, Sang-Burm Rhee, Bonam Kim","doi":"10.1109/IMIS.2012.98","DOIUrl":"https://doi.org/10.1109/IMIS.2012.98","url":null,"abstract":"Image retrieval is one of the most exciting and fastest growing research areas in the field of multimedia technology. This paper proposes a new efficient image retrieval method that applies a weighted combination of color and texture to the wavelet transform, based on spatial-color and second order statistics, respectively. To evaluate the performance of the proposed algorithm, we assess the simulation's performance in terms of average precision and Fscore using several image databases, and perform comparative analysis with existing methods such as MPEG-7. The experimental results show that the proposed approach significantly improves the effectiveness of image retrieval. The proposed descriptor is particularly useful for multi-resolution image search and retrieval.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116973575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Byeongkyu Ko, Dongjin Choi, Chang Choi, Junho Choi, Pankoo Kim
This paper proposed a method to classify textural documents using specified n-gram data set. Human lives in the world where web documents have a great potential and the amount of valuable information has been consistently growing over the year. There is a problem that finding relevant web documents corresponding to what users want is more difficult due to the huge amount of web size. For this reason, many approaches have been suggested to overcome this obstacle. The most important task is classifying textural documents into predefined categories. Over the years, many statistical approaches were introduced though, no one can find perfect solution yet. In this paper, we suggest a method for textural document classification using n-gram model. The n-gram data frequency has a great potential to find similarities between documents. For this reason, we construct our own n-gram data sets from research papers. If an unknown document comes to the system, the system will extract n-grams from the given unknown documents. After this step, n-grams from unknown document and n-grams in previous data sets will be compared by proposed similarity measurement. The precision rate of this method comes to 86%.
{"title":"Document Classification through Building Specified N-Gram","authors":"Byeongkyu Ko, Dongjin Choi, Chang Choi, Junho Choi, Pankoo Kim","doi":"10.1109/IMIS.2012.142","DOIUrl":"https://doi.org/10.1109/IMIS.2012.142","url":null,"abstract":"This paper proposed a method to classify textural documents using specified n-gram data set. Human lives in the world where web documents have a great potential and the amount of valuable information has been consistently growing over the year. There is a problem that finding relevant web documents corresponding to what users want is more difficult due to the huge amount of web size. For this reason, many approaches have been suggested to overcome this obstacle. The most important task is classifying textural documents into predefined categories. Over the years, many statistical approaches were introduced though, no one can find perfect solution yet. In this paper, we suggest a method for textural document classification using n-gram model. The n-gram data frequency has a great potential to find similarities between documents. For this reason, we construct our own n-gram data sets from research papers. If an unknown document comes to the system, the system will extract n-grams from the given unknown documents. After this step, n-grams from unknown document and n-grams in previous data sets will be compared by proposed similarity measurement. The precision rate of this method comes to 86%.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115153881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this modern-day society, people get information by using a search engine, and this is a very ordinary part of our lives. When users, however, begin to retrieve some information after their login on the portal sites, the data related to the user and the query information may be sent to the portal server to enhance the users' comfort. Here, the information that the user does not want to expose can be included. So, an invasion of privacy can occur and we have to protect this kind of incident. In this case, if the user hides all the information, the server can not show the customized result for the user, which can influence the advertising revenue. Moreover, there may be a general downward trend in the portal sites field. Thus, in this paper, we propose a user privacy preserving model in a search engine by using a homomorphic encryption algorithm on the user's policy to solve this problem. This can provide information on what the user wants to know with encrypted user information and targeted advertising service from the portal sites.
{"title":"A Privacy Preserving Model for Personal Information in Search Engine","authors":"Eun-Ae Cho, Kyungroul Lee, Kangbin Yim","doi":"10.1109/IMIS.2012.191","DOIUrl":"https://doi.org/10.1109/IMIS.2012.191","url":null,"abstract":"In this modern-day society, people get information by using a search engine, and this is a very ordinary part of our lives. When users, however, begin to retrieve some information after their login on the portal sites, the data related to the user and the query information may be sent to the portal server to enhance the users' comfort. Here, the information that the user does not want to expose can be included. So, an invasion of privacy can occur and we have to protect this kind of incident. In this case, if the user hides all the information, the server can not show the customized result for the user, which can influence the advertising revenue. Moreover, there may be a general downward trend in the portal sites field. Thus, in this paper, we propose a user privacy preserving model in a search engine by using a homomorphic encryption algorithm on the user's policy to solve this problem. This can provide information on what the user wants to know with encrypted user information and targeted advertising service from the portal sites.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123474325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chu-Hsing Lin, Jung-Chun Liu, W. Wu, T. You, Ming Liu
In this paper, motion detection with the web cam can determine current conditions around mobile computers, which act accordingly with a variety of response methods. A good balance is achieved between sensitivity of machines and experiences of users. Many practical applications are investigated, and this paper is primarily focused on two main points: user-friendly operations and security. Our system provides dynamic detection features for suspicious objects: photos of suspected thieves are taken, saved, and uploaded to the Internet, and when necessary, warning Short Message Service messages are sent to mobile phone users. Apart from this application, many other applications are feasible, for example, connection of alternative current power cords of laptops can be used to determine whether they are at a risk of being stolen.
{"title":"Mobile Computer System with User Friendly Environment and Security Protection","authors":"Chu-Hsing Lin, Jung-Chun Liu, W. Wu, T. You, Ming Liu","doi":"10.1109/IMIS.2012.11","DOIUrl":"https://doi.org/10.1109/IMIS.2012.11","url":null,"abstract":"In this paper, motion detection with the web cam can determine current conditions around mobile computers, which act accordingly with a variety of response methods. A good balance is achieved between sensitivity of machines and experiences of users. Many practical applications are investigated, and this paper is primarily focused on two main points: user-friendly operations and security. Our system provides dynamic detection features for suspicious objects: photos of suspected thieves are taken, saved, and uploaded to the Internet, and when necessary, warning Short Message Service messages are sent to mobile phone users. Apart from this application, many other applications are feasible, for example, connection of alternative current power cords of laptops can be used to determine whether they are at a risk of being stolen.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121841419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The work introduces a linguistic based model designed for distorted or ambiguous patterns where a graph based approach is used for structure representation. The knowledge about unevenness is usually created on the basis of finite number of patterns treated as positive samples of unknown language. The IE graphs are used as the base. Single pattern can be represented using deterministic IE graph. Subsequently, the collection of patterns, represented by deterministic graph is transformed into equivalent random graph language. Utilization of the grammatical inference mechanisms gives the possibility to perform this process in automatic way. Using the IE graphs and imposing some simple limitations on graph structures allows to obtain a polynomial complexity of knowledge inference. In the work it is described how to use the proposed model for collecting the knowledge in handwritten signatures recognition and analysis systems. Information about graphemes (solid fragment of handwritten signature) variability is stored in the form of random IE graphs and stochastic ETPL(k) graph grammars. Instead of an ordinary the IE graph, an attributed one is used in order to increase a descriptive power of the proposed schema. The parametrical data embedded in the graph carries some additional semantic information associated with the structure of pattern. The work presents discussion about inference scheme and computational complexity of the proposed linguistic representation scheme. Described methodology can be especially suited for creating the knowledge representation of the handwritten signatures, signs and ideograms (e.g. kanji) in offline recognition systems.
{"title":"Random Graph Languages for Distorted and Ambiguous Patterns: Single Layer Model","authors":"M. Ogiela, M. Piekarczyk","doi":"10.1109/IMIS.2012.147","DOIUrl":"https://doi.org/10.1109/IMIS.2012.147","url":null,"abstract":"The work introduces a linguistic based model designed for distorted or ambiguous patterns where a graph based approach is used for structure representation. The knowledge about unevenness is usually created on the basis of finite number of patterns treated as positive samples of unknown language. The IE graphs are used as the base. Single pattern can be represented using deterministic IE graph. Subsequently, the collection of patterns, represented by deterministic graph is transformed into equivalent random graph language. Utilization of the grammatical inference mechanisms gives the possibility to perform this process in automatic way. Using the IE graphs and imposing some simple limitations on graph structures allows to obtain a polynomial complexity of knowledge inference. In the work it is described how to use the proposed model for collecting the knowledge in handwritten signatures recognition and analysis systems. Information about graphemes (solid fragment of handwritten signature) variability is stored in the form of random IE graphs and stochastic ETPL(k) graph grammars. Instead of an ordinary the IE graph, an attributed one is used in order to increase a descriptive power of the proposed schema. The parametrical data embedded in the graph carries some additional semantic information associated with the structure of pattern. The work presents discussion about inference scheme and computational complexity of the proposed linguistic representation scheme. Described methodology can be especially suited for creating the knowledge representation of the handwritten signatures, signs and ideograms (e.g. kanji) in offline recognition systems.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121576634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Due to the vast volume of publications in nowadays research environment, methods for analyzing, organizing, and accessing information from large databases are in great need. Through appropriate analytic tools, competitive intelligence can be revealed to enhance the organization or individual performance. This article will show how a free software package called CATAR carry on the analysis about the literature of the Adult Education science. Adult Education Quarterly (AEQ) is a scholarly forum of research and theory in adult education. The field of adult education is broad-based and inter disciplinary, during 1990 to 2010 having 672 papers from the ISI Web of Knowledge database was collected. The data analyzed include the distribution of authors' countries, topical clusters, the most cited references, the productivity rankings, and others to provide information for further study. Our analysis scenario also suggests a feasible way of analyzing other similar data for readers interesting in literature mining applications.
在当今的研究环境中,由于出版物数量庞大,对大型数据库中的信息进行分析、组织和获取的方法是非常需要的。通过适当的分析工具,可以揭示竞争情报,以提高组织或个人的绩效。本文将展示一个名为CATAR的免费软件包如何对成人教育科学文献进行分析。成人教育季刊(AEQ)是一个关于成人教育研究和理论的学术论坛。成人教育领域是一个基础广泛和跨学科的领域,在1990年至2010年期间,从ISI Web of Knowledge数据库中收集了672篇论文。分析的数据包括作者所在国家的分布、主题集群、被引用最多的参考文献、生产率排名等,为进一步研究提供信息。我们的分析场景也为对文献挖掘应用感兴趣的读者提供了一种分析其他类似数据的可行方法。
{"title":"Automatic Bibliometric Analysis of Research Literature in Adult Education","authors":"Yao-Hua Wang, Yuen-Hsien Tseng","doi":"10.1109/IMIS.2012.69","DOIUrl":"https://doi.org/10.1109/IMIS.2012.69","url":null,"abstract":"Due to the vast volume of publications in nowadays research environment, methods for analyzing, organizing, and accessing information from large databases are in great need. Through appropriate analytic tools, competitive intelligence can be revealed to enhance the organization or individual performance. This article will show how a free software package called CATAR carry on the analysis about the literature of the Adult Education science. Adult Education Quarterly (AEQ) is a scholarly forum of research and theory in adult education. The field of adult education is broad-based and inter disciplinary, during 1990 to 2010 having 672 papers from the ISI Web of Knowledge database was collected. The data analyzed include the distribution of authors' countries, topical clusters, the most cited references, the productivity rankings, and others to provide information for further study. Our analysis scenario also suggests a feasible way of analyzing other similar data for readers interesting in literature mining applications.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"47 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120995961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Anjum, N. Bessis, R. McClatchey, K. Munir, I. Habib, A. Branson, Jetendr Shamdasani
neuGRID is an EC-funded project driven by the needs of the Alzheimer's disease research community that aims to facilitate the collection and archiving of large amounts of imaging data coupled with a set of generalized services and algorithms. By taking Alzheimer's disease as an exemplar, the neuGRID project has developed a set of generic analysis services and a Grid infrastructure that enables the European neuroscience community to carry out research required for the study of degenerative brain diseases. Using the services and the infrastructure, neuroscientists should be able to more easily identify neurodegenerative disease markers through the analysis of magnetic resonance and other brain imaging. The availability of such image-based disease markers will allow earlier diagnosis and foster the development of new drugs. This paper reports our work on the service oriented analysis environment that has been developed from a study of user requirements and that enables the neuroscience community to conduct and trace analyses for the study of Alzheimer's and other neurodegenerative diseases. We present the salient features, architecture and implementation details of the services that will form an analysis environment. We also describe the functionality and benefits that these services will offer to the medical community in general and neuroimaging analysis in particular.
{"title":"A Service Oriented Analysis Environment for Neuroimaging Studies","authors":"A. Anjum, N. Bessis, R. McClatchey, K. Munir, I. Habib, A. Branson, Jetendr Shamdasani","doi":"10.1109/IMIS.2012.140","DOIUrl":"https://doi.org/10.1109/IMIS.2012.140","url":null,"abstract":"neuGRID is an EC-funded project driven by the needs of the Alzheimer's disease research community that aims to facilitate the collection and archiving of large amounts of imaging data coupled with a set of generalized services and algorithms. By taking Alzheimer's disease as an exemplar, the neuGRID project has developed a set of generic analysis services and a Grid infrastructure that enables the European neuroscience community to carry out research required for the study of degenerative brain diseases. Using the services and the infrastructure, neuroscientists should be able to more easily identify neurodegenerative disease markers through the analysis of magnetic resonance and other brain imaging. The availability of such image-based disease markers will allow earlier diagnosis and foster the development of new drugs. This paper reports our work on the service oriented analysis environment that has been developed from a study of user requirements and that enables the neuroscience community to conduct and trace analyses for the study of Alzheimer's and other neurodegenerative diseases. We present the salient features, architecture and implementation details of the services that will form an analysis environment. We also describe the functionality and benefits that these services will offer to the medical community in general and neuroimaging analysis in particular.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"10 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125741414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}