Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746704
A. Lipitakis
In this paper we show that e-business and strategic management problems in digital information management (DIM) methodologies and smart environments (SE) can be efficiently solved by using corresponding adaptive algorithmic procedures. Case studies representing characteristic e-business problems and strategic management methodologies in DIM & SE are presented by considering the proposed algorithmic approach. The adaptability and compactness of the proposed algorithmic schemes combined by the proper choice of singular perturbation parameters allow the (near) optimum solution of a wide class e-business and strategic management problems in digital information management and smart environments.
{"title":"E-business and strategy management in Digital Information Management methodologies: An adaptive algorithmic approach","authors":"A. Lipitakis","doi":"10.1109/ICDIM.2008.4746704","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746704","url":null,"abstract":"In this paper we show that e-business and strategic management problems in digital information management (DIM) methodologies and smart environments (SE) can be efficiently solved by using corresponding adaptive algorithmic procedures. Case studies representing characteristic e-business problems and strategic management methodologies in DIM & SE are presented by considering the proposed algorithmic approach. The adaptability and compactness of the proposed algorithmic schemes combined by the proper choice of singular perturbation parameters allow the (near) optimum solution of a wide class e-business and strategic management problems in digital information management and smart environments.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116453198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
One important field where mobile technology can make significant contributions is education. However one criticism in mobile education is that students receive impersonal teaching. Affective computing may give a solution to this problem. In this paper we describe an affective bi-modal educational system for mobile devices. In our research we describe a novel approach of combining information from two modalities namely the keyboard and the microphone through a multi-criteria decision making theory.
{"title":"Mobile education: Towards affective bi-modal interaction for adaptivity","authors":"Efthymios Alepis, M. Virvou, K. Kabassi","doi":"10.3991/ijim.v3i2.774","DOIUrl":"https://doi.org/10.3991/ijim.v3i2.774","url":null,"abstract":"One important field where mobile technology can make significant contributions is education. However one criticism in mobile education is that students receive impersonal teaching. Affective computing may give a solution to this problem. In this paper we describe an affective bi-modal educational system for mobile devices. In our research we describe a novel approach of combining information from two modalities namely the keyboard and the microphone through a multi-criteria decision making theory.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121284997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746759
J. Bahi, M. Eskandar, A. Mostefaoui
In wireless ad hoc networks, nodes are energy constrained. As they communicate far off destinations using intermediate relays, it may not be in interest of a node to expend its energy in relaying and consequently reducing its own lifetime. On the other hand, if all nodes decide not to always accept relay requests, the network throughput will drop dramatically i.e., the lifetime of the whole network is reduced. Obviously, from a single node point of view, these two extreme attitudes are opposite to its interest. We addressed this issue by proposing a novel distributed approach that guarantees tasks affectation to nodes with regard to their energy constraints. The key idea behind is to guarantee to all nodes that they share tasks in function of their energy provisions. In this paper, we tackle the problem of nodes mobility and its impact on the behaviour of our proposed approach. We evaluated the performance of our approach under several scenarios and showed that it still improves the network lifetime.
{"title":"A robust cooperation approach for mobile multimedia adhoc networks","authors":"J. Bahi, M. Eskandar, A. Mostefaoui","doi":"10.1109/ICDIM.2008.4746759","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746759","url":null,"abstract":"In wireless ad hoc networks, nodes are energy constrained. As they communicate far off destinations using intermediate relays, it may not be in interest of a node to expend its energy in relaying and consequently reducing its own lifetime. On the other hand, if all nodes decide not to always accept relay requests, the network throughput will drop dramatically i.e., the lifetime of the whole network is reduced. Obviously, from a single node point of view, these two extreme attitudes are opposite to its interest. We addressed this issue by proposing a novel distributed approach that guarantees tasks affectation to nodes with regard to their energy constraints. The key idea behind is to guarantee to all nodes that they share tasks in function of their energy provisions. In this paper, we tackle the problem of nodes mobility and its impact on the behaviour of our proposed approach. We evaluated the performance of our approach under several scenarios and showed that it still improves the network lifetime.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121925093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746776
A. Melouah, H. Merouani
A new hybrid approach for mammography segmentation is suggested in this work. The segmentations proceed by refining successively, in a way that macro regions at each step are recovered. Two segmentation techniques, thresholding and Markov field, enter in competition to segment theses regions. The technique which gives the best results according to a given criterion will take on the process. However, using the same segmentation for all macro regions is not necessary. Thus, the new obtained regions will become candidates for a novel segmentation. The process continues till verification of a stop criterion.
{"title":"Hierarchical segmentation of digital mammography by agents competition","authors":"A. Melouah, H. Merouani","doi":"10.1109/ICDIM.2008.4746776","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746776","url":null,"abstract":"A new hybrid approach for mammography segmentation is suggested in this work. The segmentations proceed by refining successively, in a way that macro regions at each step are recovered. Two segmentation techniques, thresholding and Markov field, enter in competition to segment theses regions. The technique which gives the best results according to a given criterion will take on the process. However, using the same segmentation for all macro regions is not necessary. Thus, the new obtained regions will become candidates for a novel segmentation. The process continues till verification of a stop criterion.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131154814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746782
M. Sharif, Tariq Faiz, M. Raza
The analysis of keystroke dynamics (KD) is a developing biometric technique for user authentication. In computer security, its use is limited to some constraints such as longer typing and practice sessions. In this paper, a practical user authentication system is proposed that combines a conventional login/password method and a said biometric technique. The conventional password authentication method is enhanced through analysis of keystroke dynamics (KD) and click patterns (CP). In this way increased security level is achieved without using long and complicated passwords. For this, an application is developed to demonstrate the technique and the results are analyzed. user time signatures (TS) are identified after analyzing user KD and CP. Based on ability to follow their specific TS, users are categorized into beginner, standard and expert. At the time of login, the user inputs are matched with respective database records for authentication.
{"title":"Time signatures - an implementation of Keystroke and click patterns for practical and secure authentication","authors":"M. Sharif, Tariq Faiz, M. Raza","doi":"10.1109/ICDIM.2008.4746782","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746782","url":null,"abstract":"The analysis of keystroke dynamics (KD) is a developing biometric technique for user authentication. In computer security, its use is limited to some constraints such as longer typing and practice sessions. In this paper, a practical user authentication system is proposed that combines a conventional login/password method and a said biometric technique. The conventional password authentication method is enhanced through analysis of keystroke dynamics (KD) and click patterns (CP). In this way increased security level is achieved without using long and complicated passwords. For this, an application is developed to demonstrate the technique and the results are analyzed. user time signatures (TS) are identified after analyzing user KD and CP. Based on ability to follow their specific TS, users are categorized into beginner, standard and expert. At the time of login, the user inputs are matched with respective database records for authentication.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129651061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746775
Hasina Attaullah, F. Iqbal, M. Javed
In order to sustain connection and service in heterogeneous wireless environment, vertical handover is necessary. Now-a-days research focus is to optimize vertical handover so that optimized and application specific (QoS based) handover can be made possible. In this paper, an intelligent approach to vertical handover is proposed. The fuzzy logic based decision making is used to select among the available networks. Triggers and events are used to generate the input which is sent to fuzzy expert system. In this way, the intelligent selection of networks can optimize vertical handover and improve QoS of real-time application running on mobile device which is roaming around heterogeneous wireless networks.
{"title":"Intelligent vertical handover decision model to improve QoS","authors":"Hasina Attaullah, F. Iqbal, M. Javed","doi":"10.1109/ICDIM.2008.4746775","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746775","url":null,"abstract":"In order to sustain connection and service in heterogeneous wireless environment, vertical handover is necessary. Now-a-days research focus is to optimize vertical handover so that optimized and application specific (QoS based) handover can be made possible. In this paper, an intelligent approach to vertical handover is proposed. The fuzzy logic based decision making is used to select among the available networks. Triggers and events are used to generate the input which is sent to fuzzy expert system. In this way, the intelligent selection of networks can optimize vertical handover and improve QoS of real-time application running on mobile device which is roaming around heterogeneous wireless networks.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130338268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746778
F. Corradini, F. D. Angelis, A. Polini, A. Polzonetti
Service oriented computing is an emerging discipline that promotes and make easier inter-organization integration of software systems. In such a context interoperability issues are considered a primary threat for a correct integration. Testing can be a fruitful approach helping to reduce interoperability mismatches. In this paper, considering the case of services to be integrated within an orchestration, we propose a testing derivation strategy based on a counter-example based technique. The state explosion phenomenon, caused by the presence of complex data sets, is handled by applying genetic algorithm strategies.
{"title":"A participant testing strategy for service orchestrations","authors":"F. Corradini, F. D. Angelis, A. Polini, A. Polzonetti","doi":"10.1109/ICDIM.2008.4746778","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746778","url":null,"abstract":"Service oriented computing is an emerging discipline that promotes and make easier inter-organization integration of software systems. In such a context interoperability issues are considered a primary threat for a correct integration. Testing can be a fruitful approach helping to reduce interoperability mismatches. In this paper, considering the case of services to be integrated within an orchestration, we propose a testing derivation strategy based on a counter-example based technique. The state explosion phenomenon, caused by the presence of complex data sets, is handled by applying genetic algorithm strategies.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123015666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746820
E. Ahmed, N. Bessis, Yong Yue, M. Sarfraz
Accessing integrated databases leads to the performance of searching and matching of data. Data can be redundant and found with different business contexts in different integrated databases. Usually, accessing data from integrated databases is accomplished by using each databasepsilas own catalogue or metadata schema. A generic strategy is adopted to consolidate distinct catalogue schemas of federated databases to access information seamlessly. This strategy involves matching of structure objects and data values across federated databases in a grid environment. In this paper, the concept of grid services is introduced to manage the importance of data search and matching within an OGSA-DAI (open grid services architecture - data access integration) environment.
{"title":"Matching multiple elements in grid databases: A practical approach","authors":"E. Ahmed, N. Bessis, Yong Yue, M. Sarfraz","doi":"10.1109/ICDIM.2008.4746820","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746820","url":null,"abstract":"Accessing integrated databases leads to the performance of searching and matching of data. Data can be redundant and found with different business contexts in different integrated databases. Usually, accessing data from integrated databases is accomplished by using each databasepsilas own catalogue or metadata schema. A generic strategy is adopted to consolidate distinct catalogue schemas of federated databases to access information seamlessly. This strategy involves matching of structure objects and data values across federated databases in a grid environment. In this paper, the concept of grid services is introduced to manage the importance of data search and matching within an OGSA-DAI (open grid services architecture - data access integration) environment.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123079454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746705
R. Souza, F. Cysneiros, D. C. F. Queiroz, Roberta Fagundes
This paper introduces two classifiers for interval symbolic data based on logit and probit regression models, respectively. Each example of the learning set is described by a feature vector, for which each feature value is an interval and a binary response that defines the class of this example. For each classifier two versions are considered. First fits a classic binary regression model conjointly on the lower and upper bounds of the interval values assumed by the variables in the learning set. Second fits a classic binary regression model separately on the lower and upper bounds of the intervals. The prediction of the class for new examples is accomplished from the computation of the posterior probabilities of the classes. To show the usefulness of this method, examples with synthetic symbolic data sets with overlapping classes are considered.
{"title":"Two pattern classifiers for interval data based on binary regression models","authors":"R. Souza, F. Cysneiros, D. C. F. Queiroz, Roberta Fagundes","doi":"10.1109/ICDIM.2008.4746705","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746705","url":null,"abstract":"This paper introduces two classifiers for interval symbolic data based on logit and probit regression models, respectively. Each example of the learning set is described by a feature vector, for which each feature value is an interval and a binary response that defines the class of this example. For each classifier two versions are considered. First fits a classic binary regression model conjointly on the lower and upper bounds of the interval values assumed by the variables in the learning set. Second fits a classic binary regression model separately on the lower and upper bounds of the intervals. The prediction of the class for new examples is accomplished from the computation of the posterior probabilities of the classes. To show the usefulness of this method, examples with synthetic symbolic data sets with overlapping classes are considered.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132976975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746758
S. Caballé, F. Xhafa, A. Abraham
The discussion process plays an important social task in Computer-Supported Collaborative Learning (CSCL) where participants can discuss about the activity being performed, collaborate with each other through the exchange of ideas that may arise, propose new resolution mechanisms, and justify and refine their own contributions, and as a result acquire new knowledge. Indeed, learning by discussion when applied to collaborative learning scenarios can provide significant benefits for students in collaborative learning, and in education in general. As a result, current educational organizations incorporate in-class online discussions into web-based courses as part of the very rationale of their pedagogical models. However, online discussions as collaborative learning activities are usually greatly participated and contributed, which makes the monitoring and assessment tasks time-consuming, tedious and error-prone. Specially hard if not impossible by humans is to manually deal with the sequences of hundreds of contributions making up the discussion threads and the relations between these contributions. As a result, current assessment in online discussions restricts to offer evaluation results of the content quality of contributions after the completion of the collaborative learning task and neglects the essential issue of constantly assessing the knowledge building as a whole while it is still being generated. In this paper, we propose a multidimensional model based on data analysis from online collaborative discussion interaction that provides a first step towards an automatic assessment in (almost) real time. The context of this study is a real on-line discussion experience that took place at the Open University of Catalonia.
{"title":"Towards an automatic real-time assessment of online discussions in Computer-Supported Collaborative Learning practices","authors":"S. Caballé, F. Xhafa, A. Abraham","doi":"10.1109/ICDIM.2008.4746758","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746758","url":null,"abstract":"The discussion process plays an important social task in Computer-Supported Collaborative Learning (CSCL) where participants can discuss about the activity being performed, collaborate with each other through the exchange of ideas that may arise, propose new resolution mechanisms, and justify and refine their own contributions, and as a result acquire new knowledge. Indeed, learning by discussion when applied to collaborative learning scenarios can provide significant benefits for students in collaborative learning, and in education in general. As a result, current educational organizations incorporate in-class online discussions into web-based courses as part of the very rationale of their pedagogical models. However, online discussions as collaborative learning activities are usually greatly participated and contributed, which makes the monitoring and assessment tasks time-consuming, tedious and error-prone. Specially hard if not impossible by humans is to manually deal with the sequences of hundreds of contributions making up the discussion threads and the relations between these contributions. As a result, current assessment in online discussions restricts to offer evaluation results of the content quality of contributions after the completion of the collaborative learning task and neglects the essential issue of constantly assessing the knowledge building as a whole while it is still being generated. In this paper, we propose a multidimensional model based on data analysis from online collaborative discussion interaction that provides a first step towards an automatic assessment in (almost) real time. The context of this study is a real on-line discussion experience that took place at the Open University of Catalonia.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134017031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}