E. Dimopoulos, Athanasios Panousis, E. Sakkopoulos, A. Tsakalidis
Wireless network communities face a number of difficulties due to lack of integration between network and community resources management. In this work, we present a novel solution and we outline the architecture, design and implementation of an intelligent Web based management system for metropolitan area wireless network communities. The system supports multi-user and personalization features combined with wireless node configuration and monitoring, in a portal-like environment. Additionally to the software discussed, a test-bed implementation is presented to confirm platform and software robustness and cost-effectiveness of the proposed solutions. The overall environment is already operational for two years, while user and administrators' feedback has been incorporated into the system in a regular manner. Evaluation of the work has been performed in the online wireless network environment by computer and communication engineers and it strongly indicates that the proposed mechanism is both effective and efficient. Finally, future steps and enhancements are discussed.
{"title":"WiFiAdmin: an intelligent Web-based management environment for wireless networks","authors":"E. Dimopoulos, Athanasios Panousis, E. Sakkopoulos, A. Tsakalidis","doi":"10.1109/ICITA.2005.311","DOIUrl":"https://doi.org/10.1109/ICITA.2005.311","url":null,"abstract":"Wireless network communities face a number of difficulties due to lack of integration between network and community resources management. In this work, we present a novel solution and we outline the architecture, design and implementation of an intelligent Web based management system for metropolitan area wireless network communities. The system supports multi-user and personalization features combined with wireless node configuration and monitoring, in a portal-like environment. Additionally to the software discussed, a test-bed implementation is presented to confirm platform and software robustness and cost-effectiveness of the proposed solutions. The overall environment is already operational for two years, while user and administrators' feedback has been incorporated into the system in a regular manner. Evaluation of the work has been performed in the online wireless network environment by computer and communication engineers and it strongly indicates that the proposed mechanism is both effective and efficient. Finally, future steps and enhancements are discussed.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124310401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There is an overwhelming number of digital media supported projects in the cultural sciences on the Internet. Project managers and participants face the question if they are doing the right things right. Most of them are not trained digital media designers nor are they trained computer and network specialists. Costly consultancy is not an alternative due to the lack of financial support for such activities. The answer on these problems is as in many other cases to get support from the community. Therefore, it is crucial to find people doing similar things. In this paper we introduce MAVIS, an Internet based community information system currently containing information about more than 1,500 projects, Web sites, discussion groups and newsletters all originated in the cultural sciences. Within a theoretic framework of working and learning in the cultural sciences we try to identify different levels of similarities for cultural science projects that may be useful for the community.
{"title":"\"Do you know a similar project I can learn from?\" Self-monitoring of communities of practice in the cultural sciences","authors":"R. Klamma, M. Spaniol, M. Jarke","doi":"10.1109/ICITA.2005.1","DOIUrl":"https://doi.org/10.1109/ICITA.2005.1","url":null,"abstract":"There is an overwhelming number of digital media supported projects in the cultural sciences on the Internet. Project managers and participants face the question if they are doing the right things right. Most of them are not trained digital media designers nor are they trained computer and network specialists. Costly consultancy is not an alternative due to the lack of financial support for such activities. The answer on these problems is as in many other cases to get support from the community. Therefore, it is crucial to find people doing similar things. In this paper we introduce MAVIS, an Internet based community information system currently containing information about more than 1,500 projects, Web sites, discussion groups and newsletters all originated in the cultural sciences. Within a theoretic framework of working and learning in the cultural sciences we try to identify different levels of similarities for cultural science projects that may be useful for the community.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124376768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dynamic trust domains (DTDs) are resource collections of servers and clients distributed over multiple policy domains. These DTDs often wish to define and enforce consistent policies over their underlying domain policies. But there are many problems in distributing the policy to the domains, and these domains may each have different capabilities for enforcing the policy. In this paper, we present a solution to this problem through the authorization service in dynamic trust domains (ASDTD).
{"title":"The authorization service in dynamic trust domains","authors":"Wu Liu, Jianping Wu, Haixin Duan, Xing Li","doi":"10.1109/ICITA.2005.269","DOIUrl":"https://doi.org/10.1109/ICITA.2005.269","url":null,"abstract":"Dynamic trust domains (DTDs) are resource collections of servers and clients distributed over multiple policy domains. These DTDs often wish to define and enforce consistent policies over their underlying domain policies. But there are many problems in distributing the policy to the domains, and these domains may each have different capabilities for enforcing the policy. In this paper, we present a solution to this problem through the authorization service in dynamic trust domains (ASDTD).","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123737336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The knowledgebase constitutes a new independent European framework for disseminating and deploying pedagogical use of high quality real time audio, video and data communication services into distance learning environments at a larger scale. It is completed in 2006. The information base is supported by an educational network in order to provide effective dissemination of new pedagogical methodologies and new didactical frameworks. It offer improved learning experiences, technical advise based on expert knowledge, good practice based on collective end-user knowledge, train-the-trainer program for teaching personnel, and model recommendations for the wide adoption and effective integration of visual communication into distance training programs. A possible extension of the educational network and the knowledgebase, targeting user groups outside Europe, is discussed.
{"title":"A European knowledgebase framework for deployment of real time AV-communication in distance teaching","authors":"J. Stav, H. Tsalapatas","doi":"10.1109/ICITA.2005.13","DOIUrl":"https://doi.org/10.1109/ICITA.2005.13","url":null,"abstract":"The knowledgebase constitutes a new independent European framework for disseminating and deploying pedagogical use of high quality real time audio, video and data communication services into distance learning environments at a larger scale. It is completed in 2006. The information base is supported by an educational network in order to provide effective dissemination of new pedagogical methodologies and new didactical frameworks. It offer improved learning experiences, technical advise based on expert knowledge, good practice based on collective end-user knowledge, train-the-trainer program for teaching personnel, and model recommendations for the wide adoption and effective integration of visual communication into distance training programs. A possible extension of the educational network and the knowledgebase, targeting user groups outside Europe, is discussed.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121599167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To design a software system, many architecture styles have to be combined to construct the overall architecture of the system. What to choose among various architecture styles or architectural approaches depends on the fact of what kind of functional or non-functional quality requirements the system should satisfy. In this study, the satisfaction level of system requirements is evaluated through estimation about technical parts of architectural approach, so designers can use the information when they choose architectural approaches in the designing process.
{"title":"The method to choose architectural approaches in the software architecture design phase","authors":"HyonHee Koh, S. Kung, Jae-Nyon Park","doi":"10.1109/ICITA.2005.271","DOIUrl":"https://doi.org/10.1109/ICITA.2005.271","url":null,"abstract":"To design a software system, many architecture styles have to be combined to construct the overall architecture of the system. What to choose among various architecture styles or architectural approaches depends on the fact of what kind of functional or non-functional quality requirements the system should satisfy. In this study, the satisfaction level of system requirements is evaluated through estimation about technical parts of architectural approach, so designers can use the information when they choose architectural approaches in the designing process.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121942516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Contemporary steganographic systems encode hidden messages inside the least significant bit layers of colour natural images. The presence of these messages is difficult to detect through statistical attacks. This study examined whether humans could detect steganography in natural images using a controlled 2AFC discrimination task. While d'>l was observed for colour layers 3-8, layer 1 had a negative d'. Thus, layer 1 embedding is highly resistant to visual attack, since observers were more likely to indicate the presence of steganography in the control image than the embedded image.
{"title":"Visual steganalysis of LSB-encoded natural images","authors":"P. Watters, F. Martin, H. S. Stripf","doi":"10.1109/ICITA.2005.308","DOIUrl":"https://doi.org/10.1109/ICITA.2005.308","url":null,"abstract":"Contemporary steganographic systems encode hidden messages inside the least significant bit layers of colour natural images. The presence of these messages is difficult to detect through statistical attacks. This study examined whether humans could detect steganography in natural images using a controlled 2AFC discrimination task. While d'>l was observed for colour layers 3-8, layer 1 had a negative d'. Thus, layer 1 embedding is highly resistant to visual attack, since observers were more likely to indicate the presence of steganography in the control image than the embedded image.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122783949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A new remote laboratory system for hardware experiment has been developed. It employs shared resources and enhanced service management scheme based on the Web services. Wide spread use of the Internet and broadband remote network access capability to the home, motivated us to develop a seamless remote and actual hardware laboratory for hardware design laboratory course. The combinatorial use of FPGA/PC connected test hardware and PC-based measurement equipments such as logic analyzer or pattern generator has make it possible to develop a remote multi-user time-sharing hardware experiment system, where students can perform actual experiments using actual hardware equipments and tools concurrently. The Web-services-based course material distribution, course guidance and report collection system are also developed to realize the remote-laboratory self e-learning system
{"title":"A New Remote Laboratory for Hardware Experiment with Shared Resources and Service Management","authors":"N. Fujii, N. Koike","doi":"10.1109/ICITA.2005.34","DOIUrl":"https://doi.org/10.1109/ICITA.2005.34","url":null,"abstract":"A new remote laboratory system for hardware experiment has been developed. It employs shared resources and enhanced service management scheme based on the Web services. Wide spread use of the Internet and broadband remote network access capability to the home, motivated us to develop a seamless remote and actual hardware laboratory for hardware design laboratory course. The combinatorial use of FPGA/PC connected test hardware and PC-based measurement equipments such as logic analyzer or pattern generator has make it possible to develop a remote multi-user time-sharing hardware experiment system, where students can perform actual experiments using actual hardware equipments and tools concurrently. The Web-services-based course material distribution, course guidance and report collection system are also developed to realize the remote-laboratory self e-learning system","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122111263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper presents a two level lexical stress assignment model for out of vocabulary Slovenian words used in our text-to-speech system. First, each vowel is determined, whether it is stressed or unstressed, and a type of lexical stress is assigned for every stressed vowel. Then, some corrections are made on the word level, according the number of stressed vowels and the length of the word. We applied a machine-learning technique (decision trees or boosted decision trees). The accuracy achieved by decision trees significantly outperforms all previous results. However, the sizes of the trees indicate that the accentuation in the Slovenian language is a very complex problem and a simple solution in the form of relatively simple rules is not possible.
{"title":"A two level lexical stress assignment model for highly inflected Slovenian language","authors":"T. Sef","doi":"10.1109/ICITA.2005.48","DOIUrl":"https://doi.org/10.1109/ICITA.2005.48","url":null,"abstract":"The paper presents a two level lexical stress assignment model for out of vocabulary Slovenian words used in our text-to-speech system. First, each vowel is determined, whether it is stressed or unstressed, and a type of lexical stress is assigned for every stressed vowel. Then, some corrections are made on the word level, according the number of stressed vowels and the length of the word. We applied a machine-learning technique (decision trees or boosted decision trees). The accuracy achieved by decision trees significantly outperforms all previous results. However, the sizes of the trees indicate that the accentuation in the Slovenian language is a very complex problem and a simple solution in the form of relatively simple rules is not possible.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128316686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Many protocols are designed to guarantee fairness in electronic exchange that is widely used in e-commerce and e-government systems. In spite of the cryptographic view, we tend to view the fairness problem in a more complete vision. First we present a renewed set of requirement definitions for fair protocols. Second we study the encrypted item validation problem and present a simple and effective solution. With these preliminary discussions, we present our new item-item exchange protocol that is the first one to satisfy those newly introduced requirements
{"title":"A Fair Item-Item Exchange Protocol Satisfying Newly Introduced Requirements","authors":"Hao Wang, He-qing Guo, Manshan Lin, Jianfei Yin","doi":"10.1109/ICITA.2005.14","DOIUrl":"https://doi.org/10.1109/ICITA.2005.14","url":null,"abstract":"Many protocols are designed to guarantee fairness in electronic exchange that is widely used in e-commerce and e-government systems. In spite of the cryptographic view, we tend to view the fairness problem in a more complete vision. First we present a renewed set of requirement definitions for fair protocols. Second we study the encrypted item validation problem and present a simple and effective solution. With these preliminary discussions, we present our new item-item exchange protocol that is the first one to satisfy those newly introduced requirements","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130456134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A nonlinear detection structure is systematically developed for sinusoid in additive unknown colored Gaussian noise. The proposed scheme has made use of the difference of the spectral peakedness of the observation data. Nonlinear spectrum estimator is employed to evaluate the peakedness of the spectrum. Simulation results indicate that, in addition to some attractive robust features, the proposed scheme also achieves considerably better performance than the conventional energy detector in terms of the error probabilities.
{"title":"A nonlinear detection scheme for sinusoid in additive unknown colored Gaussian noise","authors":"J. Weng","doi":"10.1109/ICITA.2005.36","DOIUrl":"https://doi.org/10.1109/ICITA.2005.36","url":null,"abstract":"A nonlinear detection structure is systematically developed for sinusoid in additive unknown colored Gaussian noise. The proposed scheme has made use of the difference of the spectral peakedness of the observation data. Nonlinear spectrum estimator is employed to evaluate the peakedness of the spectrum. Simulation results indicate that, in addition to some attractive robust features, the proposed scheme also achieves considerably better performance than the conventional energy detector in terms of the error probabilities.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132437016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}