首页 > 最新文献

2008 New Technologies, Mobility and Security最新文献

英文 中文
Computation of SAR for Two Antennas Used in Mobile Communication Systems: Monopole and Patch 移动通信系统中单极和贴片两种天线的SAR计算
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.31
M. Bouhorma, F. Elouaai, A. Mamouni
This paper is a comparative study of several antennas commonly used in cellular telephones. These include a monopole and a patch antenna. Each one of these structures is modeled and numerically tested using HFSS code. The testing procedure involves antenna simulation in the proximity of the human head. The behaviour of each antenna is evaluated for variable distances from the head geometry. Continuous waveform, representative of the sources used in mobile telephones, (250 mW) is used as the form of the antenna excitation. The SAR levels for the head tissues are calculated for and with accordance to the two currently accepted standards: Federal Communications Commission (FCC) and International Commission on Non-Ionizing Radiation Protection (ICNIRP). The computed SAR levels within each of the considered tissues vary for the two antennas under investigation.
本文对移动电话中常用的几种天线进行了比较研究。这些包括单极子和贴片天线。采用HFSS代码对每一种结构进行了建模和数值测试。测试过程包括在人类头部附近进行天线模拟。每个天线的行为被评估为从头部几何形状的可变距离。采用连续波形(250 mW)作为天线激励形式,代表了移动电话中使用的信号源。头部组织的SAR水平是根据两个目前公认的标准计算的:联邦通信委员会(FCC)和国际非电离辐射防护委员会(ICNIRP)。在研究的两个天线中,计算出的每个考虑组织内的SAR水平是不同的。
{"title":"Computation of SAR for Two Antennas Used in Mobile Communication Systems: Monopole and Patch","authors":"M. Bouhorma, F. Elouaai, A. Mamouni","doi":"10.1109/NTMS.2008.ECP.31","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.31","url":null,"abstract":"This paper is a comparative study of several antennas commonly used in cellular telephones. These include a monopole and a patch antenna. Each one of these structures is modeled and numerically tested using HFSS code. The testing procedure involves antenna simulation in the proximity of the human head. The behaviour of each antenna is evaluated for variable distances from the head geometry. Continuous waveform, representative of the sources used in mobile telephones, (250 mW) is used as the form of the antenna excitation. The SAR levels for the head tissues are calculated for and with accordance to the two currently accepted standards: Federal Communications Commission (FCC) and International Commission on Non-Ionizing Radiation Protection (ICNIRP). The computed SAR levels within each of the considered tissues vary for the two antennas under investigation.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124761788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fault Analysis Attack on an FPGA AES Implementation 针对FPGA AES实现的故障分析攻击
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.45
F. Khelil, Mohamed Hamdi, S. Guilley, J. Danger, Nidhal Selmane
Hardware implementation of cryptographic algorithms are widely used to secure wireless networks. They guarantee good security performance at low processing and energy costs. However, unlike traditional implementations, they are vulnerable to side channel attacks. Particularly, fault attacks have proved their efficiency in cracking hardware implementation of some robust symmetric and asymmetric encryption algorithms. In this paper, we develop an FPGA version of the attack proposed by Piret and Quisquater against the AES (Advanced Encryption Standard) algorithm. Through temporal and spatial analyses of the rounds that have been affected by the fault injection process, we adapt the aforementioned attack to our context. The results obtained in this paper can serve to design a more secure FPGA implementation of AES.
加密算法的硬件实现被广泛应用于无线网络安全。它们以较低的处理和能源成本保证良好的安全性能。然而,与传统实现不同,它们容易受到侧信道攻击。特别是,故障攻击已经证明了它们在破解一些健壮的对称和非对称加密算法的硬件实现方面的效率。在本文中,我们开发了由Piret和Quisquater提出的针对AES(高级加密标准)算法的攻击的FPGA版本。通过对受故障注入过程影响的攻击轮进行时间和空间分析,我们使上述攻击适应我们的环境。本文的研究结果可以为设计更安全的AES FPGA实现提供参考。
{"title":"Fault Analysis Attack on an FPGA AES Implementation","authors":"F. Khelil, Mohamed Hamdi, S. Guilley, J. Danger, Nidhal Selmane","doi":"10.1109/NTMS.2008.ECP.45","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.45","url":null,"abstract":"Hardware implementation of cryptographic algorithms are widely used to secure wireless networks. They guarantee good security performance at low processing and energy costs. However, unlike traditional implementations, they are vulnerable to side channel attacks. Particularly, fault attacks have proved their efficiency in cracking hardware implementation of some robust symmetric and asymmetric encryption algorithms. In this paper, we develop an FPGA version of the attack proposed by Piret and Quisquater against the AES (Advanced Encryption Standard) algorithm. Through temporal and spatial analyses of the rounds that have been affected by the fault injection process, we adapt the aforementioned attack to our context. The results obtained in this paper can serve to design a more secure FPGA implementation of AES.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129124081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Querying and Semantic Mapping Approaches for Semantic Resolution in E-Learning System 电子学习系统中语义解析的查询和语义映射方法
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.83
Rashid Jayousi, Yasmin Bali
Selecting appropriate learning services for a learner from a large number of heterogeneous knowledge sources is a complex and challenging task. This research will illustrate and discuss how semantic Web technologies and ontology can be applied to e-learning systems to help the learner in selecting an appropriate learning course or retrieving relevant information. It will present the main features of an e-learning scenario and the ontology on which it is based, and then illustrates the scenario ontology with the training domain and the application domain. Finally, it will present semantic querying and semantic mapping approaches as one process to solve the problem of the semantic resolution in an e-learning system.
从大量的异构知识来源中为学习者选择合适的学习服务是一项复杂而具有挑战性的任务。本研究将说明和讨论如何将语义Web技术和本体应用于电子学习系统,以帮助学习者选择合适的学习课程或检索相关信息。本文将介绍电子学习场景及其所基于的本体的主要特征,然后用训练域和应用域对场景本体进行说明。最后,将语义查询和语义映射作为一个过程来解决电子学习系统中的语义解析问题。
{"title":"Querying and Semantic Mapping Approaches for Semantic Resolution in E-Learning System","authors":"Rashid Jayousi, Yasmin Bali","doi":"10.1109/NTMS.2008.ECP.83","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.83","url":null,"abstract":"Selecting appropriate learning services for a learner from a large number of heterogeneous knowledge sources is a complex and challenging task. This research will illustrate and discuss how semantic Web technologies and ontology can be applied to e-learning systems to help the learner in selecting an appropriate learning course or retrieving relevant information. It will present the main features of an e-learning scenario and the ontology on which it is based, and then illustrates the scenario ontology with the training domain and the application domain. Finally, it will present semantic querying and semantic mapping approaches as one process to solve the problem of the semantic resolution in an e-learning system.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128735745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Integration Approach for Heteregenous Information Sources: Applied to Medical Resources and Patients Medical Documents 异构信息源的混合集成方法:应用于医疗资源和患者医疗文献
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.50
L. Cherrat, M. Ezziyyani, M. Essaaidi, M. Bennouna, M. Ezziyyani
The goal of this research is to promote the establishment of an information system to provide to the Internet users the quality information on health and medicine related to the Patient Medial Documents (PMD). This information are extracted from several certified heterogeneous sources of the health localized dynamically. In addition, all the data of the patients and the information relating to any medical activity (operation, consultation, analysis, radiology, etc..) are stored in Data warehouse. These Data warehouse are distributed over several regions according to the geographical distribution location of the patients. Such a functional architecture will take us to deal with two integration methodologies of the heterogeneous information systems most recommended. The Data warehouse method used to store the information related to the PDM and the virtual integration method used to retrieve the health and medicine scientific information. In this article, we propose a new hybrid approach of integrating the heterogeneous information systems between Data warehouse and the virtual mediation. We develop a mechanism rewriting request and an algorithm adapted for updates of Data warehouse based on the mobile agents.
本研究旨在促进资讯系统的建立,为网际网路使用者提供与病患医疗档案(Patient medical Documents, PMD)相关的高品质健康与医药资讯。此信息是从动态本地化的几个经过认证的异构健康源中提取的。此外,患者的所有数据以及与任何医疗活动(手术、会诊、分析、放射等)有关的信息都存储在数据仓库中。这些数据仓库根据患者的地理分布位置分布在多个区域。这样的功能体系结构将带我们处理最推荐的异构信息系统的两种集成方法。数据仓库方法用于存储与PDM相关的信息,虚拟集成方法用于检索卫生和医学科学信息。在本文中,我们提出了一种在数据仓库和虚拟中介之间集成异构信息系统的新混合方法。我们开发了一种基于移动代理的请求重写机制和一种适用于数据仓库更新的算法。
{"title":"Hybrid Integration Approach for Heteregenous Information Sources: Applied to Medical Resources and Patients Medical Documents","authors":"L. Cherrat, M. Ezziyyani, M. Essaaidi, M. Bennouna, M. Ezziyyani","doi":"10.1109/NTMS.2008.ECP.50","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.50","url":null,"abstract":"The goal of this research is to promote the establishment of an information system to provide to the Internet users the quality information on health and medicine related to the Patient Medial Documents (PMD). This information are extracted from several certified heterogeneous sources of the health localized dynamically. In addition, all the data of the patients and the information relating to any medical activity (operation, consultation, analysis, radiology, etc..) are stored in Data warehouse. These Data warehouse are distributed over several regions according to the geographical distribution location of the patients. Such a functional architecture will take us to deal with two integration methodologies of the heterogeneous information systems most recommended. The Data warehouse method used to store the information related to the PDM and the virtual integration method used to retrieve the health and medicine scientific information. In this article, we propose a new hybrid approach of integrating the heterogeneous information systems between Data warehouse and the virtual mediation. We develop a mechanism rewriting request and an algorithm adapted for updates of Data warehouse based on the mobile agents.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121062129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Analysis of Tu and Piramuthu's Protocol 图和皮拉穆图协议的安全性分析
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.88
J. Munilla, A. Peinado
RFID (radio frequency identification) devices are usually vulnerable to attacks related to proximity verification: distance fraud attacks, relay attacks and terrorist attacks. These attacks require simpler technical resources than tampering or cryptanalysis and, they cannot be prevented by ordinary security protocols that operate in the high layers of the protocol stack. Distance bounding protocols, which are tightly integrated into the physical layer, are the main countermeasure against them. Hancke and Kuhn's protocol was the first distance bounding protocol for RFID. Tu and Piramuthu have recently proposed another protocol which outperform it. More precisely, the authors claim that their protocol reduces the false acceptance ratio and is resistant to terrorist attack. In this paper, however, we analyse this protocol and, discuss some aspects that could question its effectiveness.
RFID(无线射频识别)设备通常容易受到与接近验证相关的攻击:距离欺诈攻击,中继攻击和恐怖袭击。这些攻击需要比篡改或密码分析更简单的技术资源,并且无法通过在协议栈的高层中操作的普通安全协议来阻止。与物理层紧密结合的距离边界协议是解决这些问题的主要手段。汉克和库恩的协议是RFID的第一个距离边界协议。Tu和Piramuthu最近提出了另一种优于它的协议。更准确地说,作者声称他们的协议降低了错误接受率,并抵抗恐怖袭击。然而,在本文中,我们分析了该协议,并讨论了可能质疑其有效性的一些方面。
{"title":"Security Analysis of Tu and Piramuthu's Protocol","authors":"J. Munilla, A. Peinado","doi":"10.1109/NTMS.2008.ECP.88","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.88","url":null,"abstract":"RFID (radio frequency identification) devices are usually vulnerable to attacks related to proximity verification: distance fraud attacks, relay attacks and terrorist attacks. These attacks require simpler technical resources than tampering or cryptanalysis and, they cannot be prevented by ordinary security protocols that operate in the high layers of the protocol stack. Distance bounding protocols, which are tightly integrated into the physical layer, are the main countermeasure against them. Hancke and Kuhn's protocol was the first distance bounding protocol for RFID. Tu and Piramuthu have recently proposed another protocol which outperform it. More precisely, the authors claim that their protocol reduces the false acceptance ratio and is resistant to terrorist attack. In this paper, however, we analyse this protocol and, discuss some aspects that could question its effectiveness.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126859366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
ScatterFactory2: An Architecture Centric Framework for New Generation ScatterWeb ScatterFactory2:新一代ScatterWeb的以架构为中心的框架
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.85
M. Saad, Elfriede Fehr, Nicolai Kamenzky, J. Schiller
ScatterFactory2 is a model-driven eclipse-based framework for the new generation of our WSN platform ScatterWeb The already deployed Modular Sensor Boards (MSBs) can be configured, programmed and tested at the same time. This is made possible by the combination of plug-ins for ScatterFactory2. Apart from the high grade of automation, the focus of ScatterFactory2 lies with the aspect of human-computer interfaces for WSN. ScatterFactory2 provides the opportunity to examine different characteristics and properties of WSN-applications illustratively and interactively. The plug-in oriented architecture encourages the enhancement of the tool, when new questions concerning WSN arise. ScatterFactory2 is based wholly on open source components, which are available at no extra cost.
ScatterFactory2是一个模型驱动的基于eclipse的框架,用于新一代WSN平台ScatterWeb。已经部署的模块化传感器板(msb)可以同时配置,编程和测试。这可以通过ScatterFactory2的插件组合来实现。除了自动化程度高之外,ScatterFactory2的重点在于WSN的人机界面方面。ScatterFactory2提供了以说明和交互方式检查wsn应用程序的不同特征和属性的机会。当出现有关WSN的新问题时,面向插件的体系结构鼓励对工具进行增强。ScatterFactory2完全基于开源组件,这些组件不需要额外费用。
{"title":"ScatterFactory2: An Architecture Centric Framework for New Generation ScatterWeb","authors":"M. Saad, Elfriede Fehr, Nicolai Kamenzky, J. Schiller","doi":"10.1109/NTMS.2008.ECP.85","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.85","url":null,"abstract":"ScatterFactory2 is a model-driven eclipse-based framework for the new generation of our WSN platform ScatterWeb The already deployed Modular Sensor Boards (MSBs) can be configured, programmed and tested at the same time. This is made possible by the combination of plug-ins for ScatterFactory2. Apart from the high grade of automation, the focus of ScatterFactory2 lies with the aspect of human-computer interfaces for WSN. ScatterFactory2 provides the opportunity to examine different characteristics and properties of WSN-applications illustratively and interactively. The plug-in oriented architecture encourages the enhancement of the tool, when new questions concerning WSN arise. ScatterFactory2 is based wholly on open source components, which are available at no extra cost.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125713858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multihop Data Message Transmission with Inter-Vehicle Communication and Store-Carry-Forward in Sparse Vehicle Ad-Hoc Networks (VANET) 稀疏车辆自组织网络(VANET)中具有车间通信和存储-前向的多跳数据报文传输
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.66
H. Oka, H. Higaki
In wireless multihop data message transmission by multiple mobile computers in ITS systems, even though in an area with sparsely distributed mobile computers, mobility of a computer with transmitting data messages helps to achieve high data message transmission ratio. This paper proposes data message transmission along a sequence of roads detected by a GPS satellite navigation system. Due to combination of dynamic determination of intermediate mobile computers and a store-carry-forward approach, higher transmission ratio and shorter end-to-end delay are achieved even with high mobility and sparse distribution.
在ITS系统中多台移动计算机的无线多跳数据报文传输中,即使在移动计算机分布稀疏的区域,传输数据报文的计算机的移动性也有助于实现较高的数据报文传输率。本文提出了一种由GPS卫星导航系统探测到的沿道路序列传输数据报文的方法。由于中间移动计算机的动态确定与存储-结转方法相结合,即使在高移动性和稀疏分布的情况下,也可以实现更高的传输率和更短的端到端延迟。
{"title":"Multihop Data Message Transmission with Inter-Vehicle Communication and Store-Carry-Forward in Sparse Vehicle Ad-Hoc Networks (VANET)","authors":"H. Oka, H. Higaki","doi":"10.1109/NTMS.2008.ECP.66","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.66","url":null,"abstract":"In wireless multihop data message transmission by multiple mobile computers in ITS systems, even though in an area with sparsely distributed mobile computers, mobility of a computer with transmitting data messages helps to achieve high data message transmission ratio. This paper proposes data message transmission along a sequence of roads detected by a GPS satellite navigation system. Due to combination of dynamic determination of intermediate mobile computers and a store-carry-forward approach, higher transmission ratio and shorter end-to-end delay are achieved even with high mobility and sparse distribution.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125799205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
On Efficient Security Modelling of Complex Interconnected Communication Systems based on Markov Processes 基于马尔可夫过程的复杂互联通信系统安全高效建模研究
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.72
Dimitrios Alexios Karras, V. Zorkadis
While interconnected systems proliferate in nowadays computing and communications technology there are few reports investigating their security. In this paper, new efficient models are developed and evaluated for analyzing the security-related behavior of computing architectures and networks comprising complex interconnected communication systems adapted towards a generalized analysis. These models, based on Markov processes, allow calculation of critical security factors, related to intrusion detection, of such interconnected systems components and the evaluation of the associated security mechanisms. Although, at this step two interconnected systems are analyzed, the systematic model introduced allows for a generalized model of N interconnected systems. We herein show the principles of such an analysis. Security parameters calculation and Security mechanisms evaluation may support the risk analysis and the decision making process in resolving the trade-offs between security and quality of service characteristics corresponding to the complex interconnected computing and communication systems.
虽然互连系统在当今的计算和通信技术中激增,但很少有报告调查其安全性。在本文中,开发和评估了新的有效模型,用于分析计算体系结构和网络的安全相关行为,包括适应广义分析的复杂互连通信系统。这些基于马尔可夫过程的模型允许计算与入侵检测相关的关键安全因素,以及这些互连系统组件和相关安全机制的评估。虽然在这一步分析了两个相互连接的系统,但引入的系统模型允许N个相互连接系统的广义模型。我们在此说明这种分析的原理。安全参数计算和安全机制评估可以支持风险分析和决策过程,以解决复杂互连计算和通信系统对应的安全与服务质量特征之间的权衡。
{"title":"On Efficient Security Modelling of Complex Interconnected Communication Systems based on Markov Processes","authors":"Dimitrios Alexios Karras, V. Zorkadis","doi":"10.1109/NTMS.2008.ECP.72","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.72","url":null,"abstract":"While interconnected systems proliferate in nowadays computing and communications technology there are few reports investigating their security. In this paper, new efficient models are developed and evaluated for analyzing the security-related behavior of computing architectures and networks comprising complex interconnected communication systems adapted towards a generalized analysis. These models, based on Markov processes, allow calculation of critical security factors, related to intrusion detection, of such interconnected systems components and the evaluation of the associated security mechanisms. Although, at this step two interconnected systems are analyzed, the systematic model introduced allows for a generalized model of N interconnected systems. We herein show the principles of such an analysis. Security parameters calculation and Security mechanisms evaluation may support the risk analysis and the decision making process in resolving the trade-offs between security and quality of service characteristics corresponding to the complex interconnected computing and communication systems.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132115639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Framework for Embedding Tacit Knowledge in Pedagogical Model to Enhance E-Learning 在教学模式中嵌入隐性知识以促进电子学习的框架
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.48
Rizwana Irfan, M. U. Shaikh
Globalization has brought with it acute need of knowledge availability, due to which e-learning has been expressing dramatic growth day by day. Using this technology one can create opportunities for the learner to get knowledge whenever and wherever it is required. For better and accurate delivery of knowledge, it is very important to enhance quality, availability and processing of current training systems. E-learning should be adaptive and in accord with the requirement of the learner. A course should be designed on the basis of student's background, interests and aptitude. Much has been written on the contents' management of e-learning based on theoretical knowledge. Likewise, much has been written on the contents' delivery issues in e-learning but less effort has been made regarding e-learning, based on experimental knowledge. In this paper the authors have tried to emphasize the need of tacit learning and have designed a framework which helps to incorporate the tacit knowledge, hence trying to attain true essence of knowledge.
全球化带来了对知识可用性的迫切需求,因此电子学习日益增长。使用这种技术可以为学习者创造机会,随时随地获得知识。为了更好和准确地传递知识,提高现有培训系统的质量、可用性和处理是非常重要的。网络学习应具有适应性,符合学习者的要求。一门课程应该根据学生的背景、兴趣和天赋来设计。在理论知识的基础上,对网络学习的内容管理已有大量的研究。同样,关于电子学习中的内容交付问题已经写了很多,但关于基于实验知识的电子学习的努力却很少。本文试图强调隐性学习的必要性,并设计了一个有助于融入隐性知识的框架,从而试图获得知识的真正本质。
{"title":"Framework for Embedding Tacit Knowledge in Pedagogical Model to Enhance E-Learning","authors":"Rizwana Irfan, M. U. Shaikh","doi":"10.1109/NTMS.2008.ECP.48","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.48","url":null,"abstract":"Globalization has brought with it acute need of knowledge availability, due to which e-learning has been expressing dramatic growth day by day. Using this technology one can create opportunities for the learner to get knowledge whenever and wherever it is required. For better and accurate delivery of knowledge, it is very important to enhance quality, availability and processing of current training systems. E-learning should be adaptive and in accord with the requirement of the learner. A course should be designed on the basis of student's background, interests and aptitude. Much has been written on the contents' management of e-learning based on theoretical knowledge. Likewise, much has been written on the contents' delivery issues in e-learning but less effort has been made regarding e-learning, based on experimental knowledge. In this paper the authors have tried to emphasize the need of tacit learning and have designed a framework which helps to incorporate the tacit knowledge, hence trying to attain true essence of knowledge.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132406901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
AdaMS: An Adaptation Multimedia System for Heterogeneous Environments 异构环境下的自适应多媒体系统
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.15
F. M. Bouyakoub, Abdelkader Belkhir
This paper presents a new adaptation platform for composite multimedia documents in SMIL (synchronized multimedia integration language) format. Our adaptation system, named AdaMS, allows users of heterogeneous terminals to reach the same multimedia content. The platform assumes the management of user's profiles (user preferences, device characteristics...) for the adaptation process, as well as the management of the new presentations versions, created according to the user profile. The adaptation process is a combination of on stock and on demand adaptation. The aim is to have a balance between the two methods to optimize the adaptation process. Unlike other existing platforms, our system gives the possibility to the user to begin the visualisation of the multimedia presentation before the end of the adaptation process, thus reducing user waiting time.
提出了一种新的SMIL(同步多媒体集成语言)格式复合多媒体文档适配平台。我们的适配系统,命名为AdaMS,允许不同终端的用户访问相同的多媒体内容。该平台为适应过程管理用户配置文件(用户首选项、设备特征……),以及管理根据用户配置文件创建的新演示文稿版本。适应过程是按需适应和按需适应的结合。目的是在两种方法之间取得平衡,以优化适应过程。与其他现有平台不同,我们的系统使用户可以在适应过程结束之前开始多媒体演示的可视化,从而减少了用户的等待时间。
{"title":"AdaMS: An Adaptation Multimedia System for Heterogeneous Environments","authors":"F. M. Bouyakoub, Abdelkader Belkhir","doi":"10.1109/NTMS.2008.ECP.15","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.15","url":null,"abstract":"This paper presents a new adaptation platform for composite multimedia documents in SMIL (synchronized multimedia integration language) format. Our adaptation system, named AdaMS, allows users of heterogeneous terminals to reach the same multimedia content. The platform assumes the management of user's profiles (user preferences, device characteristics...) for the adaptation process, as well as the management of the new presentations versions, created according to the user profile. The adaptation process is a combination of on stock and on demand adaptation. The aim is to have a balance between the two methods to optimize the adaptation process. Unlike other existing platforms, our system gives the possibility to the user to begin the visualisation of the multimedia presentation before the end of the adaptation process, thus reducing user waiting time.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115635158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2008 New Technologies, Mobility and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1