首页 > 最新文献

2008 Third International Conference on Digital Information Management最新文献

英文 中文
Grid-based Semantic Integration and dissemination of medical information 基于网格的医学信息语义集成与传播
Pub Date : 2008-12-01 DOI: 10.1109/ICDIM.2008.4746756
A. Naseer, L. Stergioulas, Suhel Hammoud, Maozhen Li
Healthcare data and medical information need to be seamlessly accessible and available at all times to the various healthcare stakeholders. Inability to share, integrate and access critical healthcare information is a challenge for the healthcare IT. Moreover, semantic interoperability of health-related heterogeneous data sources is a challenging issue and healthGrids are expected to address this challenge in a systematic manner. This paper proposes a new architecture: ASIDS (architecture for semantic integration of data sources), that could be a potential candidate for solving the challenge of semantic interoperability of geographically distributed heterogeneous data sources. ASIDS has three main components that are loosely coupled (through interfaces) in a distributed manner. This architecture sets the basis for future research in terms of implementing a healthGrid application in real environments.
医疗保健数据和医疗信息需要在任何时候都可以被各种医疗保健利益相关者无缝访问和使用。无法共享、集成和访问关键医疗保健信息是医疗保健IT面临的一大挑战。此外,与健康相关的异构数据源的语义互操作性是一个具有挑战性的问题,健康网格有望以系统的方式解决这一挑战。本文提出了一种新的体系结构:ASIDS(数据源语义集成体系结构),它可能是解决地理分布异构数据源语义互操作性挑战的潜在候选。ASIDS有三个主要组件,它们以分布式方式松散耦合(通过接口)。该体系结构为在真实环境中实现健康网格应用程序的未来研究奠定了基础。
{"title":"Grid-based Semantic Integration and dissemination of medical information","authors":"A. Naseer, L. Stergioulas, Suhel Hammoud, Maozhen Li","doi":"10.1109/ICDIM.2008.4746756","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746756","url":null,"abstract":"Healthcare data and medical information need to be seamlessly accessible and available at all times to the various healthcare stakeholders. Inability to share, integrate and access critical healthcare information is a challenge for the healthcare IT. Moreover, semantic interoperability of health-related heterogeneous data sources is a challenging issue and healthGrids are expected to address this challenge in a systematic manner. This paper proposes a new architecture: ASIDS (architecture for semantic integration of data sources), that could be a potential candidate for solving the challenge of semantic interoperability of geographically distributed heterogeneous data sources. ASIDS has three main components that are loosely coupled (through interfaces) in a distributed manner. This architecture sets the basis for future research in terms of implementing a healthGrid application in real environments.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132182416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A hierarchical model-based system for discovering atypical behavior 用于发现非典型行为的分层模型系统
Pub Date : 2008-11-13 DOI: 10.1109/ICDIM.2008.4746832
D. Monekosso
In this paper, we describe a model-based system for context discovery and behavior modeling for the purpose of monitoring well-being. In modeling behavior in a smart home, the system must detect atypical (anomalous) patterns of behavior resulting from failure of equipment as well as those deviations resulting from significant variations atypical of the human inhabitant. In the context of a smart home, both situations require human intervention although the response will differ. The home is embedded with sensors that unobtrusively record various environmental parameters. Models of behavior are generated from the sensor data. These models are employed to infer atypical behavior.
在本文中,我们描述了一个基于模型的系统,用于监测幸福感的上下文发现和行为建模。在智能家居的行为建模中,系统必须检测由设备故障引起的非典型(异常)行为模式,以及由人类居民的非典型显著变化引起的偏差。在智能家居的背景下,这两种情况都需要人工干预,尽管反应会有所不同。该住宅嵌入了传感器,可以不显眼地记录各种环境参数。行为模型由传感器数据生成。这些模型被用来推断非典型行为。
{"title":"A hierarchical model-based system for discovering atypical behavior","authors":"D. Monekosso","doi":"10.1109/ICDIM.2008.4746832","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746832","url":null,"abstract":"In this paper, we describe a model-based system for context discovery and behavior modeling for the purpose of monitoring well-being. In modeling behavior in a smart home, the system must detect atypical (anomalous) patterns of behavior resulting from failure of equipment as well as those deviations resulting from significant variations atypical of the human inhabitant. In the context of a smart home, both situations require human intervention although the response will differ. The home is embedded with sensors that unobtrusively record various environmental parameters. Models of behavior are generated from the sensor data. These models are employed to infer atypical behavior.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116974963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Management of context-aware preferences in multidimensional databases 多维数据库中上下文感知首选项的管理
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746714
H. Jerbi, F. Ravat, O. Teste, G. Zurfluh
Personalization of information systems brings new challenges to OLAP technology. A key characteristic of emerging OLAP database systems will be customizability of their behaviour taking into account users preferences as well as their context of analysis. In this paper we define a personalization framework for OLAP database systems based on user context-aware preferences. We consider a qualitative preference model which handles user preferences on the multidimensional schema. Context is modelled as a tree of multidimensional components of an OLAP analysis (fact, measures, dimensions, parameters). We define some OLAP operations that support personalization. User queries are dynamically enhanced with his preferences and are aware of the analysis context.
信息系统的个性化给OLAP技术带来了新的挑战。新兴OLAP数据库系统的一个关键特征将是考虑到用户偏好及其分析上下文的行为可定制性。在本文中,我们定义了一个基于用户上下文感知偏好的OLAP数据库系统个性化框架。我们考虑了一个定性偏好模型,该模型在多维模式上处理用户偏好。上下文被建模为OLAP分析的多维组件树(事实、度量、维度、参数)。我们定义了一些支持个性化的OLAP操作。根据用户的首选项动态增强用户查询,并了解分析上下文。
{"title":"Management of context-aware preferences in multidimensional databases","authors":"H. Jerbi, F. Ravat, O. Teste, G. Zurfluh","doi":"10.1109/ICDIM.2008.4746714","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746714","url":null,"abstract":"Personalization of information systems brings new challenges to OLAP technology. A key characteristic of emerging OLAP database systems will be customizability of their behaviour taking into account users preferences as well as their context of analysis. In this paper we define a personalization framework for OLAP database systems based on user context-aware preferences. We consider a qualitative preference model which handles user preferences on the multidimensional schema. Context is modelled as a tree of multidimensional components of an OLAP analysis (fact, measures, dimensions, parameters). We define some OLAP operations that support personalization. User queries are dynamically enhanced with his preferences and are aware of the analysis context.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121794027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Fine-grained access control in hybrid relational-XML database 混合关系- xml数据库中的细粒度访问控制
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746739
Taketo Sasaki, T. Fukushima, Daeil Park, Motomichi Toyama
In this paper, we propose a fine-grained access control based on logic programming in hybrid relational-XML database. Hybrid relational-XML database such as IBM DB2 can manage and query both XML and relational data. Our access control model provides a way to restrict data access at the cell-level for relational data and also at the node-level for XML data in a cell. Since our access control model dynamically produce authorization-views using logic programming when each user queries to the system, it enables us to manage views easily, unity management of databasepsilas contents and access policy. Finally we show the implementation our model and evaluate its performance.
本文提出了一种基于逻辑编程的关系- xml混合数据库的细粒度访问控制方法。混合关系-XML数据库(如IBM DB2)可以管理和查询XML和关系数据。我们的访问控制模型提供了一种方法,可以在单元格级别限制关系数据的数据访问,也可以在节点级别限制单元格中的XML数据的数据访问。由于我们的访问控制模型在每个用户查询系统时使用逻辑编程动态地生成授权视图,因此它使我们能够轻松地管理视图,统一管理数据库内容和访问策略。最后给出了模型的实现,并对其性能进行了评价。
{"title":"Fine-grained access control in hybrid relational-XML database","authors":"Taketo Sasaki, T. Fukushima, Daeil Park, Motomichi Toyama","doi":"10.1109/ICDIM.2008.4746739","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746739","url":null,"abstract":"In this paper, we propose a fine-grained access control based on logic programming in hybrid relational-XML database. Hybrid relational-XML database such as IBM DB2 can manage and query both XML and relational data. Our access control model provides a way to restrict data access at the cell-level for relational data and also at the node-level for XML data in a cell. Since our access control model dynamically produce authorization-views using logic programming when each user queries to the system, it enables us to manage views easily, unity management of databasepsilas contents and access policy. Finally we show the implementation our model and evaluate its performance.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"334 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116907285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A generic context model with autonomic features 具有自主特征的通用上下文模型
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746830
T. Cioara, I. Anghel, I. Salomie, M. Dînsoreanu
This paper addresses two fundamental research problems in the domain of pervasive autonomic systems: the development of a generic context model that can be used to represent general purpose contexts in a system interpretable way and the autonomic context model management. The context model is generically represented using a triple set consisting of context resources, actors and policies. The model is mapped onto real contexts by populating the sets with context specific elements. A context situation to which a pervasive system must adapt is represented by a specific context model instance. To ease the context reasoning and adaptation processes, the context model concepts and relationships are represented using a core ontology. The increasing complexity of the pervasive systems, and the difficulties of their management, administration and adaptation have headed us towards the necessity of integrating autonomic computing paradigms in the context model management process.
本文讨论了普适自主系统领域的两个基本研究问题:可用于以系统可解释的方式表示通用上下文的通用上下文模型的开发和自主上下文模型的管理。上下文模型通常使用由上下文资源、参与者和策略组成的三重集来表示。通过使用特定于上下文的元素填充集合,将模型映射到真实的上下文。普适系统必须适应的上下文情况由特定的上下文模型实例表示。为了简化上下文推理和适应过程,使用核心本体表示上下文模型概念和关系。普适系统日益增加的复杂性,以及它们的管理、管理和适应的困难,使我们有必要在上下文模型管理过程中集成自主计算范式。
{"title":"A generic context model with autonomic features","authors":"T. Cioara, I. Anghel, I. Salomie, M. Dînsoreanu","doi":"10.1109/ICDIM.2008.4746830","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746830","url":null,"abstract":"This paper addresses two fundamental research problems in the domain of pervasive autonomic systems: the development of a generic context model that can be used to represent general purpose contexts in a system interpretable way and the autonomic context model management. The context model is generically represented using a triple set consisting of context resources, actors and policies. The model is mapped onto real contexts by populating the sets with context specific elements. A context situation to which a pervasive system must adapt is represented by a specific context model instance. To ease the context reasoning and adaptation processes, the context model concepts and relationships are represented using a core ontology. The increasing complexity of the pervasive systems, and the difficulties of their management, administration and adaptation have headed us towards the necessity of integrating autonomic computing paradigms in the context model management process.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"2 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120898539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Securing information content using new encryption method and Steganography 使用新的加密方法和隐写术保护信息内容
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746742
A. Cheddad, J. Condell, K. Curran, P. Kevitt
This paper proposes a novel encryption method with password protection based on an extended version of SHA-1 (secure hash algorithm) that is able to encrypt 2D bulk data such as images. There has been a modest research in the literature on encryption of digital images though. The algorithm benefits also from the conjugate symmetry exhibited in what is termed, herein, an irreversible fast Fourier transform (IrFFT). The proposed encryption method is a preprocessing phase which aims at increasing the robustness of image steganography against hackers. This scenario lays down a multi layer of security which forms a strong shield, against eavesdroppers, that is impossible to break. Both Shannon law requirements are met and results show promising results.
本文提出了一种基于SHA-1(安全散列算法)扩展版本的具有密码保护的新型加密方法,该方法能够对图像等二维批量数据进行加密。然而,在数字图像加密的文献中有一个适度的研究。该算法还受益于共轭对称性,在这里被称为不可逆快速傅立叶变换(IrFFT)。提出的加密方法是一个预处理阶段,旨在提高图像隐写对黑客的鲁棒性。这种方案奠定了多层安全,形成了一个强大的屏障,防止窃听,这是不可能打破的。满足香农法的两个要求,结果显示出令人满意的结果。
{"title":"Securing information content using new encryption method and Steganography","authors":"A. Cheddad, J. Condell, K. Curran, P. Kevitt","doi":"10.1109/ICDIM.2008.4746742","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746742","url":null,"abstract":"This paper proposes a novel encryption method with password protection based on an extended version of SHA-1 (secure hash algorithm) that is able to encrypt 2D bulk data such as images. There has been a modest research in the literature on encryption of digital images though. The algorithm benefits also from the conjugate symmetry exhibited in what is termed, herein, an irreversible fast Fourier transform (IrFFT). The proposed encryption method is a preprocessing phase which aims at increasing the robustness of image steganography against hackers. This scenario lays down a multi layer of security which forms a strong shield, against eavesdroppers, that is impossible to break. Both Shannon law requirements are met and results show promising results.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124906046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Integrity assurance of mobile agents through public-key encryption and watermarking 基于公钥加密和水印的移动代理完整性保证
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746769
Noor-ul-Qayyum, Farooq Ahmad
Mobile agents are autonomous complex software entities with the ability to travel across different nodes in the network to carry out computations on behalf of the user. Although mobile agents have proven to be very useful approach for distributed computation, yet in practice there are several technical challenges involved to implement them on a large scale. Most of these challenges involve security aspect in one way or the other. Protecting mobile agents against the eavesdropping attacks by malicious hosts is considered the most difficult security problem to solve. The approach that is presented here secures the agentpsilas data against eavesdropping attacks and detects the malicious hosts. Our approach is based on public-key encryption to convert the executing host results into cipher text. The ciphered results are then represented by a dynamic watermark graph structure that aids to detect the manipulation attacks performed on the agentpsilas data by the malicious hosts. Our proposed twofold technique ensures the integrity of the agentpsilas data.
移动代理是自主的复杂软件实体,具有跨越网络中不同节点的能力,以代表用户执行计算。尽管移动代理已被证明是一种非常有用的分布式计算方法,但在实践中,要大规模地实现它们存在一些技术挑战。这些挑战大多以这样或那样的方式涉及安全方面。保护移动代理不受恶意主机的窃听攻击被认为是最难解决的安全问题。这里介绍的方法可以保护代理程序数据免受窃听攻击,并检测恶意主机。我们的方法基于公钥加密,将执行的主机结果转换为密文。然后,加密的结果由一个动态水印图结构表示,该结构有助于检测恶意主机对agentpsilas数据执行的操纵攻击。我们提出的双重技术确保了agent - psilas数据的完整性。
{"title":"Integrity assurance of mobile agents through public-key encryption and watermarking","authors":"Noor-ul-Qayyum, Farooq Ahmad","doi":"10.1109/ICDIM.2008.4746769","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746769","url":null,"abstract":"Mobile agents are autonomous complex software entities with the ability to travel across different nodes in the network to carry out computations on behalf of the user. Although mobile agents have proven to be very useful approach for distributed computation, yet in practice there are several technical challenges involved to implement them on a large scale. Most of these challenges involve security aspect in one way or the other. Protecting mobile agents against the eavesdropping attacks by malicious hosts is considered the most difficult security problem to solve. The approach that is presented here secures the agentpsilas data against eavesdropping attacks and detects the malicious hosts. Our approach is based on public-key encryption to convert the executing host results into cipher text. The ciphered results are then represented by a dynamic watermark graph structure that aids to detect the manipulation attacks performed on the agentpsilas data by the malicious hosts. Our proposed twofold technique ensures the integrity of the agentpsilas data.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124947981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Preservation metadata - a framework for 3D data based on the Semantic Web 保存元数据——基于语义网的3D数据框架
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746811
Julie Doyle, H. Viktor, E. Paquet
Preservation metadata, information that supports and documents the long term preservation of a digital object, is an essential component of any preservation environment that must manage knowledge over time. It describes the digital objectpsilas associated semantic information. Furthermore, in the case of preserving 3D data, it can also support future post-processing of the preserved 3D object. However, a preservation metadata framework to support semantic data associated with a 3D object is currently lacking. Developing such a framework, and anticipating what semantic information should be included within this framework, is the focus of this paper.
保存元数据是支持和记录数字对象长期保存的信息,是任何必须随时间管理知识的保存环境的重要组成部分。它描述了数字对象及其相关的语义信息。此外,在保留3D数据的情况下,它还可以支持保存的3D对象的未来后处理。然而,目前还缺乏一个保存元数据框架来支持与3D对象相关的语义数据。开发这样一个框架,并预测哪些语义信息应该包含在这个框架中,是本文的重点。
{"title":"Preservation metadata - a framework for 3D data based on the Semantic Web","authors":"Julie Doyle, H. Viktor, E. Paquet","doi":"10.1109/ICDIM.2008.4746811","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746811","url":null,"abstract":"Preservation metadata, information that supports and documents the long term preservation of a digital object, is an essential component of any preservation environment that must manage knowledge over time. It describes the digital objectpsilas associated semantic information. Furthermore, in the case of preserving 3D data, it can also support future post-processing of the preserved 3D object. However, a preservation metadata framework to support semantic data associated with a 3D object is currently lacking. Developing such a framework, and anticipating what semantic information should be included within this framework, is the focus of this paper.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126648686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Mobile Ontology-based Reasoning and Feedback (MORF) Health Monitoring System 基于移动本体的推理与反馈(MORF)健康监测系统
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746831
Luke Docksteader, R. Benlamri
Over the past few years many medical professionals have shifted their focus to ubiquitous health monitoring systems. With continuous advancements in both bio-medical and information technologies, such futuristic monitoring systems have become a present reality. When intermixed with ubiquitous computing, a mobile health monitoring system provides unrestrained potential and innumerable applications. This research aims to improve upon and advance beyond modern medical monitoring systems by incorporating ontology-based reasoning to make the system independent and automated. In this paper, we present the main features of our ubiquitous mobile health monitoring system, its hardware and software design, and potential applications.
在过去的几年里,许多医疗专业人员已经将他们的注意力转移到无处不在的健康监测系统上。随着生物医学和信息技术的不断进步,这种未来的监测系统已经成为现实。当与普适计算相结合时,移动健康监测系统提供了无限的潜力和无数的应用。本研究旨在通过结合基于本体的推理,使系统独立和自动化,从而改进和超越现代医疗监测系统。本文介绍了无处不在的移动健康监测系统的主要特点、硬件和软件设计以及潜在的应用前景。
{"title":"Mobile Ontology-based Reasoning and Feedback (MORF) Health Monitoring System","authors":"Luke Docksteader, R. Benlamri","doi":"10.1109/ICDIM.2008.4746831","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746831","url":null,"abstract":"Over the past few years many medical professionals have shifted their focus to ubiquitous health monitoring systems. With continuous advancements in both bio-medical and information technologies, such futuristic monitoring systems have become a present reality. When intermixed with ubiquitous computing, a mobile health monitoring system provides unrestrained potential and innumerable applications. This research aims to improve upon and advance beyond modern medical monitoring systems by incorporating ontology-based reasoning to make the system independent and automated. In this paper, we present the main features of our ubiquitous mobile health monitoring system, its hardware and software design, and potential applications.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114899235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Identification of influence factors in the information technology formation in United Arab Emirates 确定阿拉伯联合酋长国信息技术形成的影响因素
Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746799
A. Al-Tameem
This paper explores and predicts the link between the motives and the nature of the governance structure in the strategic alliances between the UAE (United Arab Emirates) organizations and the foreign companies in the field of information technology (IT). The hypotheses were tested to predict whether functions and sectors influence the formal of governance between relational versus classical. The findings suggest that development purpose and high sectors predict relational governance, while marketing/sales functions and low technology sector predict classical (arms-length) alliances. However, contrary to the expectation, real estate as a low technology sector predicts relational rather than classical alliances.
本文探讨并预测了阿联酋(United Arab Emirates)组织与信息技术(IT)领域的外国公司之间战略联盟的动机和治理结构性质之间的联系。我们对假设进行了检验,以预测职能和部门是否会影响关系型与经典型之间的治理形式。研究结果表明,发展目的和高部门预测关系治理,而营销/销售职能和低技术部门预测经典(适度)联盟。然而,与预期相反,房地产作为一个低技术行业预测关系而不是经典联盟。
{"title":"Identification of influence factors in the information technology formation in United Arab Emirates","authors":"A. Al-Tameem","doi":"10.1109/ICDIM.2008.4746799","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746799","url":null,"abstract":"This paper explores and predicts the link between the motives and the nature of the governance structure in the strategic alliances between the UAE (United Arab Emirates) organizations and the foreign companies in the field of information technology (IT). The hypotheses were tested to predict whether functions and sectors influence the formal of governance between relational versus classical. The findings suggest that development purpose and high sectors predict relational governance, while marketing/sales functions and low technology sector predict classical (arms-length) alliances. However, contrary to the expectation, real estate as a low technology sector predicts relational rather than classical alliances.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"57 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116431542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2008 Third International Conference on Digital Information Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1