首页 > 最新文献

Proceedings of the 6th International Conference on Information Technology and Multimedia最新文献

英文 中文
A biometric based authentication and encryption Framework for Sensor Health Data in Cloud 基于生物特征的云传感器健康数据认证与加密框架
S. Sharma, V. Balasubramanian
Use of remote healthcare monitoring application (HMA) can not only enable healthcare seeker to live a normal life while receiving treatment but also prevent critical healthcare situation through early intervention. For this to happen, the HMA have to provide continuous monitoring through sensors attached to the patient's body or in close proximity to the patient. Owing to elasticity nature of the cloud, recently, the implementation of HMA in cloud is of intense research. Although, cloud-based implementation provides scalability for implementation, the health data of patient is super-sensitive and requires high level of privacy and security for cloud-based shared storage. In addition, protection of real-time arrival of large volume of sensor data from continuous monitoring of patient poses bigger challenge. In this work, we propose a self-protective security framework for our cloud-based HMA. Our framework enable the sensor data in the cloud from (1) unauthorized access and (2) self-protect the data in case of breached access using biometrics. The framework is detailed in the paper using mathematical formulation and algorithms.
使用远程医疗监控应用程序(HMA)不仅可以使求诊者在接受治疗的同时过上正常的生活,而且可以通过早期干预防止出现严重的医疗状况。为了实现这一点,HMA必须通过连接在患者身上或靠近患者的传感器提供持续监测。由于云的弹性特性,HMA在云中的实现成为近年来研究的热点。尽管基于云的实现为实现提供了可扩展性,但患者的健康数据非常敏感,需要基于云的共享存储的高度隐私和安全性。此外,保护大量传感器数据的实时到达对患者的持续监测提出了更大的挑战。在这项工作中,我们为基于云的HMA提出了一个自我保护的安全框架。我们的框架使云中的传感器数据免受(1)未经授权的访问和(2)在使用生物识别技术进行违规访问时对数据进行自我保护。本文使用数学公式和算法详细介绍了该框架。
{"title":"A biometric based authentication and encryption Framework for Sensor Health Data in Cloud","authors":"S. Sharma, V. Balasubramanian","doi":"10.1109/ICIMU.2014.7066602","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066602","url":null,"abstract":"Use of remote healthcare monitoring application (HMA) can not only enable healthcare seeker to live a normal life while receiving treatment but also prevent critical healthcare situation through early intervention. For this to happen, the HMA have to provide continuous monitoring through sensors attached to the patient's body or in close proximity to the patient. Owing to elasticity nature of the cloud, recently, the implementation of HMA in cloud is of intense research. Although, cloud-based implementation provides scalability for implementation, the health data of patient is super-sensitive and requires high level of privacy and security for cloud-based shared storage. In addition, protection of real-time arrival of large volume of sensor data from continuous monitoring of patient poses bigger challenge. In this work, we propose a self-protective security framework for our cloud-based HMA. Our framework enable the sensor data in the cloud from (1) unauthorized access and (2) self-protect the data in case of breached access using biometrics. The framework is detailed in the paper using mathematical formulation and algorithms.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132680391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Congestion control scheduling scheme for vehicular networks 车辆网络拥塞控制调度方案
K. Qureshi, A. Abdullah, R. W. Anwar
The vehicular Ad hoc network is new emerging technology to enhance traffic safety and comfort for automotive users. Most of the safety applications in this field need real time information with high reliability and in time delivery. In dense network a large number of vehicles nodes disseminate the messages to all accessible nodes with high frequency and control channels will be easily congested and cause of broadcast storm. There is a need to prevent control channels from these types of storms and ensure the reliable and in time devilry of messages for safety applications. The congestion control mechanism is one of the most popular approach to control the load and ensure in time and efficient delivery of messages. We proposed a congestion control scheduling scheme to provide an efficient operation, congestion avoidance or mitigation. The performance of proposed scheme is evaluated in different congested scenarios and compared with existing congestion control scheduling schemes and improve packet loss rate and packet delay.
车载自组织网络是一种新兴技术,旨在提高汽车用户的交通安全性和舒适性。该领域的大多数安全应用都需要高可靠性和及时传递的实时信息。在密集的网络中,大量的车辆节点以高频率向所有可访问的节点传播信息,控制信道容易出现拥塞,引起广播风暴。有必要防止控制通道受到这些类型的风暴的影响,并确保可靠和及时地传送信息,以实现安全应用。拥塞控制机制是控制负载和确保及时有效地传递消息的最常用方法之一。我们提出了一个拥塞控制调度方案,以提供有效的操作,拥塞避免或缓解。在不同拥塞场景下评估了该方案的性能,并与现有的拥塞控制调度方案进行了比较,提高了丢包率和包延迟。
{"title":"Congestion control scheduling scheme for vehicular networks","authors":"K. Qureshi, A. Abdullah, R. W. Anwar","doi":"10.1109/ICIMU.2014.7066603","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066603","url":null,"abstract":"The vehicular Ad hoc network is new emerging technology to enhance traffic safety and comfort for automotive users. Most of the safety applications in this field need real time information with high reliability and in time delivery. In dense network a large number of vehicles nodes disseminate the messages to all accessible nodes with high frequency and control channels will be easily congested and cause of broadcast storm. There is a need to prevent control channels from these types of storms and ensure the reliable and in time devilry of messages for safety applications. The congestion control mechanism is one of the most popular approach to control the load and ensure in time and efficient delivery of messages. We proposed a congestion control scheduling scheme to provide an efficient operation, congestion avoidance or mitigation. The performance of proposed scheme is evaluated in different congested scenarios and compared with existing congestion control scheduling schemes and improve packet loss rate and packet delay.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132728860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Evaluating mobile banking application: Usability dimensions and measurements 评估手机银行应用:可用性维度和测量
A. Hussain, H. Abubakar, Norlaily Binti Hashim
Usability has greatly been considered as one of the significant quality attributes to determine the success of mobile application. Mobile banking application is increasingly recognized as an emergent m-commerce application which dignified to become the giant killer mobile application arena. However, prominent usability evaluation models for mobile applications are too general and do not adequately capture the complexities of interacting with m-banking application platform. Similarly, there are no sufficient descriptions concerning the relationship between phases and appropriate usability measures for a specific application. Some banks do not offer m-banking application, while those that offer have inadequate functionalities and this shows that their interfaces are still insufficient and not user friendly. To date, usability and measurements for mbanking application in particular is very limited or even isolated and this makes usability evaluation of m-banking more of challenging. Consequently, this report proposes to address this matter by proposing a suitable and an appropriate set of usability dimensions and measurements for m-banking evaluation. The systematic literature review was employed to review relevant journals and conference proceedings. Seven hundred and eight papers were downloaded but merely forty nine papers have been selected and fully reviewed/analysed. Five usability dimensions and twelve relevant criteria (sub-dimensions) have been created that can be used to evaluate m-banking application.
可用性一直被认为是决定移动应用成功与否的重要质量属性之一。手机银行应用作为新兴的移动商务应用日益被人们所认可,并有可能成为移动应用领域的巨大杀手。然而,突出的移动应用程序可用性评估模型过于笼统,没有充分捕捉到与移动银行应用程序平台交互的复杂性。类似地,对于特定应用程序的阶段和适当的可用性度量之间的关系,也没有足够的描述。一些银行不提供手机银行应用程序,而那些提供了功能不足的银行,这表明他们的界面仍然不足,用户不友好。到目前为止,移动银行应用程序的可用性和测量非常有限,甚至是孤立的,这使得移动银行的可用性评估更具挑战性。因此,本报告建议通过为移动银行评估提出一套合适的可用性维度和测量方法来解决这个问题。采用系统文献法对相关期刊和会议论文集进行综述。下载了780篇论文,但只有49篇论文被选中并进行了全面的审查/分析。已经创建了五个可用性维度和十二个相关标准(子维度),可用于评估移动银行应用程序。
{"title":"Evaluating mobile banking application: Usability dimensions and measurements","authors":"A. Hussain, H. Abubakar, Norlaily Binti Hashim","doi":"10.1109/ICIMU.2014.7066618","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066618","url":null,"abstract":"Usability has greatly been considered as one of the significant quality attributes to determine the success of mobile application. Mobile banking application is increasingly recognized as an emergent m-commerce application which dignified to become the giant killer mobile application arena. However, prominent usability evaluation models for mobile applications are too general and do not adequately capture the complexities of interacting with m-banking application platform. Similarly, there are no sufficient descriptions concerning the relationship between phases and appropriate usability measures for a specific application. Some banks do not offer m-banking application, while those that offer have inadequate functionalities and this shows that their interfaces are still insufficient and not user friendly. To date, usability and measurements for mbanking application in particular is very limited or even isolated and this makes usability evaluation of m-banking more of challenging. Consequently, this report proposes to address this matter by proposing a suitable and an appropriate set of usability dimensions and measurements for m-banking evaluation. The systematic literature review was employed to review relevant journals and conference proceedings. Seven hundred and eight papers were downloaded but merely forty nine papers have been selected and fully reviewed/analysed. Five usability dimensions and twelve relevant criteria (sub-dimensions) have been created that can be used to evaluate m-banking application.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115641580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
A wearable device for the elderly: A case study in Malaysia 老年人可穿戴设备:马来西亚的案例研究
Aw Kien Sin, H. Zaman, Azlina Ahmad, R. Sulaiman
Malaysia is expected to reach population ageing in year 2021. There are many ways to tackle with the problems of population ageing and technology is one of them in supporting elderly in their daily life. However, elderly have problem when using technology because of their decreasing ability. In this research, we carried out 2 interviews with different groups of elderly to identify their problems of using technology, and their daily activities based on their location in a house. Based on the finding, we listed down all the important requirements in designing a wearable device. They are (a) Replacing Graphical User Interface (GUI) with Tangible User Interface (TUI) (b) Considering mental model of elderly when designing interaction and user interface, and (c) Able to provide implicit interaction to elderly.
马来西亚预计将在2021年达到人口老龄化。解决人口老龄化问题的方法有很多,技术是其中之一,支持老年人的日常生活。然而,由于老年人的能力下降,他们在使用技术时遇到了问题。在这项研究中,我们对不同的老年人群体进行了2次访谈,以确定他们在使用技术方面的问题,并根据他们在家中的位置确定他们的日常活动。基于这一发现,我们列出了设计可穿戴设备的所有重要要求。它们是(a)以有形用户界面(TUI)取代图形用户界面(GUI); (b)在设计交互和用户界面时考虑老年人的心理模型;(c)能够为老年人提供隐式交互。
{"title":"A wearable device for the elderly: A case study in Malaysia","authors":"Aw Kien Sin, H. Zaman, Azlina Ahmad, R. Sulaiman","doi":"10.1109/ICIMU.2014.7066652","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066652","url":null,"abstract":"Malaysia is expected to reach population ageing in year 2021. There are many ways to tackle with the problems of population ageing and technology is one of them in supporting elderly in their daily life. However, elderly have problem when using technology because of their decreasing ability. In this research, we carried out 2 interviews with different groups of elderly to identify their problems of using technology, and their daily activities based on their location in a house. Based on the finding, we listed down all the important requirements in designing a wearable device. They are (a) Replacing Graphical User Interface (GUI) with Tangible User Interface (TUI) (b) Considering mental model of elderly when designing interaction and user interface, and (c) Able to provide implicit interaction to elderly.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115821926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Trusting norms in normative multi-agent systems 规范性多主体系统中的信任规范
Nurzeatul Hamimah Abdul hamid, M. S. Ahmad, Azhana Ahmad, M. Mahmoud, Mohd Zaliman Mohd Yusoff, A. Mustapha
Research in normative multi-agent systems (NorMAS) have progressed from norm representation towards investigation of mechanisms in social sciences to support for agents' tasks in open multi-agent systems (open-MAS) settings. Open-MAS characteristics pose new challenges in regulating and coordinating agents' behavior. Norms are no longer assumed to be built into agents during design time, but emerged from interactions with other agents. These developments entail the needs to discover other factors that influence agents' reasoning and decision-making for norms execution in open systems. In this paper, we explore and review the general concepts of norms in normative multi-agent systems, its classifications and life cycles. We then discuss and propose norm's trust as an important factor which influences an agent's norms compliance behavior and norms stability in normative multi-agent systems.
规范性多智能体系统(NorMAS)的研究已经从规范表示发展到社会科学机制的研究,以支持开放多智能体系统(open- mas)设置中的智能体任务。开放mas的特点对智能体行为的调节和协调提出了新的挑战。规范不再被认为是在设计时内置到代理中,而是从与其他代理的交互中产生的。这些发展需要发现在开放系统中影响代理的推理和决策的其他因素。在本文中,我们探讨和回顾规范多智能体系统中规范的一般概念,它的分类和生命周期。然后,我们讨论并提出规范信任是影响规范多智能体系统中智能体遵守规范行为和规范稳定性的重要因素。
{"title":"Trusting norms in normative multi-agent systems","authors":"Nurzeatul Hamimah Abdul hamid, M. S. Ahmad, Azhana Ahmad, M. Mahmoud, Mohd Zaliman Mohd Yusoff, A. Mustapha","doi":"10.1109/ICIMU.2014.7066633","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066633","url":null,"abstract":"Research in normative multi-agent systems (NorMAS) have progressed from norm representation towards investigation of mechanisms in social sciences to support for agents' tasks in open multi-agent systems (open-MAS) settings. Open-MAS characteristics pose new challenges in regulating and coordinating agents' behavior. Norms are no longer assumed to be built into agents during design time, but emerged from interactions with other agents. These developments entail the needs to discover other factors that influence agents' reasoning and decision-making for norms execution in open systems. In this paper, we explore and review the general concepts of norms in normative multi-agent systems, its classifications and life cycles. We then discuss and propose norm's trust as an important factor which influences an agent's norms compliance behavior and norms stability in normative multi-agent systems.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114805080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Data analysis technique to extract threshold value for Fuzzy Inference System in classifying malicious agents 利用数据分析技术提取模糊推理系统的阈值,对恶意代理进行分类
N. A. Musa, M. Yusoff, Yunus Yusoff, Roslan Ismail
This paper describes a data analysis technique used to extract threshold values of a Fuzzy Inference System's (FIS) inputs. In this work, the FIS is used to classify malicious agents' behaviour in a Multi-Agent System (MAS) environment. The extraction of suitable FIS inputs threshold values in the MAS environment are based on data analysis derived from several simulation runs. Subsequently, the extracted threshold values are applied in the rules of the FIS framework for classifying malicious agents' behaviors. Results indicated that extracting the fuzzy threshold values using the data analysis technique is an acceptable alternative method when no domain expert is available.
本文描述了一种用于提取模糊推理系统(FIS)输入阈值的数据分析技术。在这项工作中,FIS用于在多代理系统(MAS)环境中对恶意代理的行为进行分类。在MAS环境中提取合适的FIS输入阈值是基于从几次模拟运行中得出的数据分析。然后,将提取的阈值应用于FIS框架的规则中,对恶意代理的行为进行分类。结果表明,在没有领域专家的情况下,利用数据分析技术提取模糊阈值是一种可接受的替代方法。
{"title":"Data analysis technique to extract threshold value for Fuzzy Inference System in classifying malicious agents","authors":"N. A. Musa, M. Yusoff, Yunus Yusoff, Roslan Ismail","doi":"10.1109/ICIMU.2014.7066601","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066601","url":null,"abstract":"This paper describes a data analysis technique used to extract threshold values of a Fuzzy Inference System's (FIS) inputs. In this work, the FIS is used to classify malicious agents' behaviour in a Multi-Agent System (MAS) environment. The extraction of suitable FIS inputs threshold values in the MAS environment are based on data analysis derived from several simulation runs. Subsequently, the extracted threshold values are applied in the rules of the FIS framework for classifying malicious agents' behaviors. Results indicated that extracting the fuzzy threshold values using the data analysis technique is an acceptable alternative method when no domain expert is available.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121950731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sonification of 3D body movement using parameter mapping technique 基于参数映射技术的三维人体运动超声
Ag. Asri Ag. Ibrahim, Alter Jimat Embug
Most of instructions by trainers or therapists in body movements, such as walking, turning, rising arms or legs are mostly done through voice instructions or touches. This does not have much problem to normal people as they can see it at the same time. To follow these instructions without seeing it can cause confusion in terms of actions and directions. Unfortunately, there is no other option for people who are blind. Thus, this research will try to replace those voice and touches form of instructions into non-speech sound instructions. The method involves transforming 3-dimensional data of body movements (kinematics) into sounds. It is hoped by only listening to the sounds, a person should be able to follow the exact movements of the body of another person or instructor without any voice commands or instructions. The novel contribution of this research is to produce an effective and efficient sonification technique (converting the data into sound) to represent the actions and directions of the body movements in 3-dimensional space. The conversion approach to be used is Parameter Mapping, where the movement properties will be mapped to sound properties. The parameter mapping will involve at least 3 transformation processes - data, acoustics parameters and sound representations. The effectiveness and efficiency of this approach is depending on all of these transformation processes. This research will use Kinect (a device used to play game with Microsoft Xbox game console) as the live 3D movements input data stream. This device is intentionally used in this research, as it is readily available and cheap. Thus, the potential applications or products from this research later on can also use this device.
教练或治疗师对身体动作的指导,比如走路、转身、抬起胳膊或腿,大多是通过声音或触摸来完成的。这对正常人来说没有太大的问题,因为他们可以同时看到它。在没有看到这些说明的情况下遵循这些说明可能会导致行动和方向上的混乱。不幸的是,盲人没有其他选择。因此,本研究将尝试将这些语音和触摸形式的指令替换为非语音语音指令。该方法包括将身体运动(运动学)的三维数据转换为声音。希望通过只听声音,一个人应该能够跟随另一个人或教练的确切动作,而不需要任何语音命令或指示。本研究的新贡献是产生一种有效和高效的超声技术(将数据转换为声音)来表示三维空间中身体运动的动作和方向。要使用的转换方法是参数映射,其中移动属性将映射到声音属性。参数映射将涉及至少3个转换过程-数据,声学参数和声音表示。这种方法的有效性和效率取决于所有这些转换过程。本研究将使用Kinect(一种用于与微软Xbox游戏机一起玩游戏的设备)作为实时3D动作输入数据流。本研究有意使用该装置,因为它容易获得且便宜。因此,本研究以后的潜在应用或产品也可以使用该设备。
{"title":"Sonification of 3D body movement using parameter mapping technique","authors":"Ag. Asri Ag. Ibrahim, Alter Jimat Embug","doi":"10.1109/ICIMU.2014.7066664","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066664","url":null,"abstract":"Most of instructions by trainers or therapists in body movements, such as walking, turning, rising arms or legs are mostly done through voice instructions or touches. This does not have much problem to normal people as they can see it at the same time. To follow these instructions without seeing it can cause confusion in terms of actions and directions. Unfortunately, there is no other option for people who are blind. Thus, this research will try to replace those voice and touches form of instructions into non-speech sound instructions. The method involves transforming 3-dimensional data of body movements (kinematics) into sounds. It is hoped by only listening to the sounds, a person should be able to follow the exact movements of the body of another person or instructor without any voice commands or instructions. The novel contribution of this research is to produce an effective and efficient sonification technique (converting the data into sound) to represent the actions and directions of the body movements in 3-dimensional space. The conversion approach to be used is Parameter Mapping, where the movement properties will be mapped to sound properties. The parameter mapping will involve at least 3 transformation processes - data, acoustics parameters and sound representations. The effectiveness and efficiency of this approach is depending on all of these transformation processes. This research will use Kinect (a device used to play game with Microsoft Xbox game console) as the live 3D movements input data stream. This device is intentionally used in this research, as it is readily available and cheap. Thus, the potential applications or products from this research later on can also use this device.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129491292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Factors affecting the adoption of integrated cloudbased e- health record in healthcare organizations: a case study of Jordan 影响医疗保健组织采用综合云电子健康记录的因素:约旦案例研究
H. Sulaiman, Asma I. Magaireah
Cloud computing is one of the most prominent technological trends as it allows modernization of healthcare organization. The purpose of this study is to explore the factors that affect adoption of integrated cloud-based e-health record EHR system in healthcare organizations in Jordan based on TOE framework. The study is done by conducting interviews with IT experts in healthcare organization in Jordan. The three contexts of TOE that affect adoption of cloud-based EHR are: Technological context “privacy, security, and reliability”, Organizational context “top management support, and technology readiness”, and Environmental context “government policy, legal environment, and competition”.
云计算是最突出的技术趋势之一,因为它可以实现医疗保健组织的现代化。本研究旨在探讨基于TOE框架的约旦医疗机构采用集成云电子健康档案EHR系统的影响因素。该研究是通过对约旦医疗保健组织的IT专家进行访谈来完成的。影响采用基于云的电子病历的三个TOE背景是:技术背景“隐私、安全和可靠性”,组织背景“高层管理支持和技术准备”,环境背景“政府政策、法律环境和竞争”。
{"title":"Factors affecting the adoption of integrated cloudbased e- health record in healthcare organizations: a case study of Jordan","authors":"H. Sulaiman, Asma I. Magaireah","doi":"10.1109/ICIMU.2014.7066612","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066612","url":null,"abstract":"Cloud computing is one of the most prominent technological trends as it allows modernization of healthcare organization. The purpose of this study is to explore the factors that affect adoption of integrated cloud-based e-health record EHR system in healthcare organizations in Jordan based on TOE framework. The study is done by conducting interviews with IT experts in healthcare organization in Jordan. The three contexts of TOE that affect adoption of cloud-based EHR are: Technological context “privacy, security, and reliability”, Organizational context “top management support, and technology readiness”, and Environmental context “government policy, legal environment, and competition”.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127059124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A fuzzy framework for modelling confidence in multi-agent system 多智能体系统置信度建模的模糊框架
G. S. Basheer, M. S. Ahmad, Alicia Y. C. Tang
In open multi-agent systems, agents may hide or lie about information regarding some events. In order to avoid such deception, a multi-agent system must be designed to test the confidence of agents. In this paper, we present a new approach to agent-based confidence modeling. This approach integrates two confidence requirements, namely, trust and certainty. We use fuzzy logic in representing the importance of trust and certainty to model an agent's confidence reasoning. The modeling mechanism eliminates the influence of untrusted agents' opinions because certainty level and importance of trust may not be valuable in all circumstances.
在开放的多智能体系统中,智能体可能会隐藏或隐瞒有关某些事件的信息。为了避免这种欺骗,必须设计一个多智能体系统来测试智能体的置信度。本文提出了一种新的基于智能体的置信度建模方法。这种方法整合了两个信心要求,即信任和确定性。我们使用模糊逻辑来表示信任和确定性的重要性,对智能体的信心推理进行建模。由于信任的确定性水平和重要性可能在所有情况下都是有价值的,因此建模机制消除了不可信代理意见的影响。
{"title":"A fuzzy framework for modelling confidence in multi-agent system","authors":"G. S. Basheer, M. S. Ahmad, Alicia Y. C. Tang","doi":"10.1109/ICIMU.2014.7066635","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066635","url":null,"abstract":"In open multi-agent systems, agents may hide or lie about information regarding some events. In order to avoid such deception, a multi-agent system must be designed to test the confidence of agents. In this paper, we present a new approach to agent-based confidence modeling. This approach integrates two confidence requirements, namely, trust and certainty. We use fuzzy logic in representing the importance of trust and certainty to model an agent's confidence reasoning. The modeling mechanism eliminates the influence of untrusted agents' opinions because certainty level and importance of trust may not be valuable in all circumstances.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129264116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of immersion effectiveness in VR-based stress therapy 沉浸式压力治疗在vr中的有效性研究
Imran Mahalil, M. Rusli, Azmi Bin Mohd Yusof, Mohd Zaliman Mohd Yusoff, Ahmad Redza Razieff Zainudin
Stress problems often causes negative emotional response which tends to lead to a negative work performance. There are many treatments for stress such as going to gymnasium, undergoing hypnosis and taking medicine. Lately, virtual reality therapy (VRT) has been proposed as an alternative technique for stress treatment. In this VR-based treatment, one of the important elements to ensure its effectiveness is the level of immersion. In order to prove that the level of immersion does contribute to the effectiveness of the VR-based stress treatment, comparative studies with imaginary technique was conducted and analysed. In this paper, we present a comprehensive study on the effect of immersion level to participants when using our VR-based stress therapy [1] that includes typical Malaysian environment in 3D, zikr, and soothing audio.
压力问题往往会导致消极的情绪反应,从而导致消极的工作表现。有很多治疗压力的方法,如去健身房,接受催眠和吃药。最近,虚拟现实疗法(VRT)被提出作为一种替代技术的压力治疗。在这种基于vr的治疗中,确保其有效性的重要因素之一是沉浸程度。为了证明沉浸水平确实有助于基于vr的应力处理的有效性,与虚拟技术进行了比较研究并进行了分析。在本文中,我们对使用基于vr的压力疗法[1]时沉浸水平对参与者的影响进行了全面研究,其中包括3D、zikr和舒缓音频中的典型马来西亚环境。
{"title":"Study of immersion effectiveness in VR-based stress therapy","authors":"Imran Mahalil, M. Rusli, Azmi Bin Mohd Yusof, Mohd Zaliman Mohd Yusoff, Ahmad Redza Razieff Zainudin","doi":"10.1109/ICIMU.2014.7066663","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066663","url":null,"abstract":"Stress problems often causes negative emotional response which tends to lead to a negative work performance. There are many treatments for stress such as going to gymnasium, undergoing hypnosis and taking medicine. Lately, virtual reality therapy (VRT) has been proposed as an alternative technique for stress treatment. In this VR-based treatment, one of the important elements to ensure its effectiveness is the level of immersion. In order to prove that the level of immersion does contribute to the effectiveness of the VR-based stress treatment, comparative studies with imaginary technique was conducted and analysed. In this paper, we present a comprehensive study on the effect of immersion level to participants when using our VR-based stress therapy [1] that includes typical Malaysian environment in 3D, zikr, and soothing audio.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114607863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Proceedings of the 6th International Conference on Information Technology and Multimedia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1