Editorial Board

Prof. P.Ekel (Brazil),

Prof. Y.Li (Taiwan),

Prof. V.Mladenov (Bulgaria),

Prof. G.Bognar (Hyngary),

Prof. A.Zemliak (Mexico),

Prof. Lotfi A. Zadeh (USA),

Prof. Leonid Kazovsky (USA),

Prof. Nikos Mastorakis (GR),

Prof. S. Kartalopoulos (USA),

Prof. Z.Bojkovic (Serbia),

Prof. Ana Madureira (Portugal),

Prof. M.Sugeno (Japan),

Prof. J.C.Quadrado (Portugal),

Prof. A.Caballero (USA),

Prof. Lin Feng (Singapore),  

Prof. M.Garcia-Planas (Spain)



Topics

All aspects of contemporary computers and communications and their applications are covered including technology, multimedia systems, hardware and software systems, networking, wireless communications, microwaves, antennas, radar, propagation, scaterring, in general applied electromagnetics, signal processing, microcomputer applications such as engineering, science, business, management, robotics, manufacturing, medicine, bioinformatics, systems biology and personal computers. It appears quarterly.

Special Issues are specially encouraged.

Format

Download Format... 

 

Contact us

Issue 1, Volume 5, 2011

Relationship between Security and Usability – Authentication Case Study
by Miloslav Hub, Jan Capek, Renata Myskova

Abstract: In this paper there is discussed relation between seemingly independent aspects of software quality – security and usability. This relation is demonstrated in case study of password authentication. For this purposes a method of password security is suggested and described in this paper. This method consists in mathematical model of dictionary attack and brute force attack. This model is used to break passwords gained from two studies. In these two studies different groups of end users were instructed to select a password by a different way. Afterwards, in security of selected passwords was examined and compared with their usability and this relationship were examined.

Keywords:

Authentication, brute force attack, data security, dictionary attack, passwords, usability
Full Paper, pp. 1-8

 

Adaptive Wireless Multipath Access Solution for Transport Telematics
by Tomas Zelinka, Miroslav Svitek, Tomas Starek, Zdenek Lokaj

Abstract: Intelligent Transportation Systems solutions require availability of the selectable range of wireless telecommunications services with guaranteed coverage and service quality. Even though publically available mobile wireless data services can usually offer acceptable service coverage and reasonable pricing, providers’ portfolios mostly do not include guarantee of any data services quality. Private solutions can frequently guarantee relevant quality of provided service, however, such solutions are not typically ready for the wide area mobile coverage. Authors of this paper propose mobile solution alternative with more efficient quality as well as wide area coverage management based on the dynamical seamless handover of the best possible service from the set of just accessible different wireless alternatives. In contrary to the proposed standards ISO TC204, WG16.1 (CALM) or IEEE 802.21 based on the L2 switching and Policy-based Management (PBM) authors introduce alternative in category of the “intelligent” routing, i.e. solution based and implemented exclusively on the routing L3. Success of proposed solution is strongly dependent on efficient adaptive decisions processes which are managing selection of the best possible alternative between the available ones. Such approach has got remarkable advantage in relatively simple system integration based dominantly on the SW implementation with no or very limited additional requirements on mostly off shelf available hardware.

Keywords:

Intelligent Transport System, Transport telematics, Multipath seamless communications access service, Bayes statistics, Laplace density function, adaptive approach
Full Paper, pp. 9-17

 

Path Loss Aspects of a Wireless Communication System for Sensors
by T. Lkhagvatseren, F. Hruska

Abstract: Over the past 10 years there have been rapid advances in wireless technologies and an importance of a radio frequency (RF) communication system is expanding day by day due to its advantages. In the meantime, a huge number of researchers are investigating from the various aspects of such field. Electromagnetic wave propagation in an indoor environment and, penetration trough environment medium is still under consideration. In this paper, we reveal a measured result from the different indoor environments for a various transmitted power levels and frequencies. The experience can be used to application of a wireless communication system between sensors and embedded system.

Keywords:

Communication, penetration, propagation, sensor, and wireless
Full Paper, pp. 18-26

 

Internal Versus External Cluster Validation Indexes
by Erendira Rendon, Itzel Abundez, Alejandra Arizmendi, Elvia M. Quiroz

Abstract: One of fundamental challenges of clustering is how to evaluate results, without auxiliary information. A common approach for evaluation of clustering results is to use validity indexes. Clustering validity approaches can use three criteria: External criteria (evaluate the result with respect to a pre-specified structure), internal criteria (evaluate the result with respect a information intrinsic to the data alone). Consequently, different types of indexes are used to solve different types of problems and indexes selection depends on the kind of available information. That is why in this paper we show a comparison between external and internal indexes. Results obtained in this study indicate that internal indexes are more accurate in group determining in a given clustering structure. Six internal indexes were used in this study: BIC, CH, DB, SIL, NIVA and DUNN and four external indexes (F-measure, NMIMeasure, Entropy, Purity). The clusters that were used were obtained through clustering algorithms K-means and Bissecting-K-means.

Keywords:

Cluster validity, clustering algorithm, external indexes, internal indexes
Full Paper, pp. 27-34

 

Issue 3, Volume 5, 2011

ICT Integration of Public Protection and Disaster Relief: Services for Fire and Rescue Personnel
by Jyri Rajamaki, Taina Hult, Paulinus Ofem

Abstract: In field operations of Public Protection and Disaster Relief (PPDR) services, vehicles are the most important tools. Today, the vehicles are increasingly dependent on ICT systems. PPDR responder’s need is to enhance mission critical voice with broadband data. Command and control applications aboard a vehicle are commonplace. There is a need to ease situational awareness and decision making by utilizing sensor information, such as satellite or network based position information, living video images. However, each country and even every single user organization is developing their own solutions according to their legislation and requirements, because uniform standards are missing. The Mobile Object Bus Interaction (MOBI) research project is a kick off for creating a common international ICT infrastructure for all PPDR vehicles. MOBI researches possibilities to further develop and integrate ICT systems, applications and services of PPDR vehicles. MOBI aims at starting the development of standards used by like-minded countries and possibly with the European Commission, the European Law Enforcement Agency EUROPOL and the European Agency for the Management of Operational Cooperation at the External Borders FRONTEX. This paper concentrates on services for fire and rescue personnel and researches the Finnish fire and rescue environment and the ICT systems used in action. PPDR services constitute a distributed system. Software development paradigms which have been used in the past for distributed systems have inherent limitations that do not support integration, interoperability and reusability. To contribute towards resolving the well known issues of integration and interoperability between ICT systems in emergency vehicles which often work in a collaborative fashion, a preliminary investigation of the applicability of SOA and Web Services Standards towards the optimization of ICT systems and services provided by emergency vehicles is presented.

Keywords:

Data communications, Fire and rescue services, ICT, Professional mobile radio, Public safety, Search and rescue, Serviceoriented architecture, Systems integration, Web services
Full Paper, pp. 119-132

 

Business’ New Requirement: Information Systems Integration – Methods and Technologies
by D. Litan, M. Velicanu, L. Copcea Teohari, M. Teohari, A. M. Mocanu Virgolici, I. Surugiu, O. Raduta

Abstract: Today, the integration of information systems has become a necessity due to the fact that the big companies have developed over time, mostly, separate information systems (which do not communicate between them) for the automation of different activities. If in the beginning the “situation” seemed to be under control, the boost in the number of customers, products, suppliers, etc. brought about an acutely increasing need for the companies’ information systems to communicate with each other. Also, in its turn, the current economic crisis has increased the necessity to integrate the information systems within a company, thus simplifying any means of controlling the business. That is why in this paper we submit to your attention some types of information systems used by companies (Enterprise Resource Planning - ERP, Customer Relationship Management - CRM, Supply Chain Management - SCM) as well as possible ways of integrating these systems (integration through business processes and services). On the other hand, systems integration also implies integration of the data handled by these systems, so we will consider also some ways of data integration (databases, data warehouses) by means of technologies such as Oracle GoldenGate. Finally, we will describe a technique for testing, the integrated operation of a software product, more precisely, an integrated type of testing: Pairwise, a powerful testing technique.

Keywords:

Customer Relationship Management, data integration, Enterprise Application Integration, Enterprise Resource Planning, Geographical Information Systems, Information Systems Integration, Supply Chain Management, Pairwise
Full Paper, pp. 133-145

 

Approached Evaluation of Rectangular Spiral Antenna Parameters for UHF RFID Tag
by Makroum El Mostafa, Rifi Mounir, Latrach Mohamed, Benbassou Ali

Abstract: Radiofrequency identification is an emerging and promising technology for the identification of individuals and goods: the automation of manual operation, rapidity, precise information... the are many RFID technologies. In this article, we are interested in the passive UHF RFID technology and especially to the calculation of parameters of spirals rectangular antennas for RFID. First we present a model based on the theory of diffraction by fine wires, we arrive at an integro-differential equation, this equation can be solved by using the method of moments. Although this method gives us a very good agreement with the measure, it remains gourmand in calculation time. We then develop a method to simplify the calculation of the parameters of spiral antenna for RFID tag without resorting to numerical analysis methods. In high frequency, when resonances appear, we introduce the propagation using the Transmission Line Theory. Knowing that this theory doesn’t take into account neither common mode currents nor lateral tracks of the loops. Then we introduce some improvements on it. These improvements consist on the one hand to integrate common mode in this theory decomposing excitations and on the other hand to correct the positions and magnitudes of resonances by introducing lateral tracks of these loops. The results obtained in this study highlight interesting prospects for future studies.

Keywords:

Antennas, Spiral antennas, RFID tags, UHF RFID, Method of moments, S11 parameter, Transmission Lines Theory
Full Paper, pp. 146-153

 

Information Technology Standards - a Way to Bring Quality and Performance in the Software Products Field
by D. Litan, M. Velicanu, A. M. Mocanu Virgolici, I. Surugiu, O. Raduta

Abstract: Project scope, budget and schedule are easily to maintain when working organized and based on standards, keeping at least the same quality target as the initial purpose. Standards create concepts and use them to simplify, organize, manage and make the delivery process more efficient by reducing costs and increasing scope and quality. In two words, the standards mean quality and efficiency; they create more performant and predictable software products, offering at the same time a tool for consistency, coherency, integrity, confidence and faster communication. Therefore, in this paper, we will proceed to the analysis, presentation and comparison of the current most important Information Technology standards, in the fields of Information Technology Governance, Enterprise Application Integration, Geographic Information Systems, egovernment, information systems testing and information security.

Keywords:

E-government, Enterprise Application Integration, Geographical Information Systems, information security, information systems performance, Information Technology Governance, Information Technology standards, testing standards
Full Paper, pp. 154-168

 

Exploiting Local IPv4-only Access Networks to Deliver IPv6 Service to End-users
by Ala Hamarsheh, Marnix Goossens

Abstract: This paper introduces a new IPv6 deployment protocol called E4Deliver6, which stands for Exploiting Local IPv4-only Access Networks to Deliver IPv6 Service to End-users. The protocol intends to help the Internet Service Providers (ISPs) to rapidly start providing IPv6 service to the end-users. E4Deliver6 tunnels the IPv6 traffic into IPv4 traffic to transit the IPv4-only access network infrastructure. The new protocol offers IPv6 service alongside IPv4 service to the end-users, economical solution, and requires simple and automatic configurations at both end-users’ hosts and ISP sides at the time of setup. E4Deliver6 connected hosts will be able to communicate with other IPv6-only servers outside their local IPv4-only access network. The performance analysis of E4Deliver6 showed that the performance parameters (e.g. Latency and Throughput) are acceptable in comparison to other stateless protocols (e.g. 6rd) and it is much better than other stateful protocols (e.g. BDMS) performance parameters.

Keywords:

Local IPv4-only access networks, IPv6 deployment, IPv6 host, IPv6-in-IPv4 tunnels, IPv4 host, ISP, Latency, Throughput
Full Paper, pp. 169-177

 

Assessing Effectiveness in Mobile Learning by Devising MLUAT (Mobile Learning Usability Attribute Testing) Methodology
by Bekim Fetaji, Mirlinda Ebibi, Majlinda Fetaji

Abstract: Mobile learning has been investigated from a range of perspectives, but there is little published research studies on usability of m-learning and its efficiency. Therefore investigated and analyzed the feasibility of m-learning by doing a review of published research in the past decade (2000 - 2010) analyzing successful m-learning projects and m-learning in general as well as realized analyses of advantages and the pitfalls and issues found. Based on this analyses provided are recommendations for improving m-learning in general. To have successful and efficient m-learning it is essential to devise and implement appropriate usability testing methodologies to evaluate the usability of mobile applications. The primary goal of this research study was to develop more efficient usability testing methodology that the authors called MLUAT (Mobile Learning Usability Attribute Testing) for m-learning and comparing its results with two other usability testing methods aimed for e-learning and applied in m-learning. Findings showed that the developed MLUAT methodology is more efficient and recommendations for approaching and improving m-learning are discussed.

Keywords:

M-learning, e-learning, mobile devices, usability testing, HCI for mobile devices
Full Paper, pp. 178-187

 

Development of Handheld Directory System built on WiFi-based Positioning Techniques
by Lee Pieh Wen, Chan Wee Nee, Khor Meng Chun, Tan Shiang-Yen, Rosnah Idrus

Abstract: As outdoor positioning systems have relatively well established and matured, indoor positioning and navigation systems still have great potential to grow. The researches on indoor positioning system have gained the ever increasing momentum and importance, as the needs toward indoor positioning and navigation are flourishing. With the prominence of smartphone, this paper introduces a portable indoor directory system that can be easily installed and operated on the typical smartphone; hence the system could benefit greater number of users. The proposed system is aimed to provide a new ways of providing indoor floor directory, which offers capabilities to retrieve customizable and real time information, to navigate interactively, and to enable location-awareness computing. Additionally, the proposed system is designated to cater for the needs of visually challenged persons by incorporating screen reader and improved accessibility. The whole system consists of three modules, namely mobile phone module, Kiosks module, and Website and Database module. The mobile phone module is the main frontend module which installed on users’ mobile devices, whereas the Kiosks and website are to provide supports and maintenances to the main module. Users can download maps and application from the Kiosks or website. On the other hand, administrator uses the website to manage the database.

Keywords:

WiFi Positioning, WLAN positioning, Navigation system, Mobile Application, Visually impaired
Full Paper, pp. 188-197

 

Data Security in M-Learning Messaging Services
by Catalin Boja, Paul Pocatilu, Alin Zamfiroiu

Abstract: The m-learning field has been defined new educational services that deliver knowledge and content on mobile devices, highlighting a dreamed educational concept, anywhere, anytime. Education processes have evolved in the last decades by integrating new technology. Many m-learning services use SMS to deliver simple text content because it has a low cost, it is available on all mobile devices and has wide coverage and availability. As more and more sensitive data is processed by m-learning services, we propose a solution that will secure the SMS content and that will have minimal impact on the device performance. The solution implements a symmetric encryption scheme based on AES and is used by a distributed m-learning architecture. The paper presents two examples developed for Java ME and .NET CF platforms.

Keywords:

Cryptography, Mobile Applications, Security, SMS
Full Paper, pp. 198-205

 

 

 

 

 

 

Issue 2, Volume 5, 2011

Integrating New Calls and Performance Improvement in OVSF based CDMA Networks
by Vipin Balyan, Davinder S. Saini

Abstract: In code division multiple access (CDMA), orthogonal variable spreading factor (OVSF) codes are used to allocate vacant codes when new calls arrive. In this paper, integration is done for allocation of OVSF codes when a quantized or non-quantized call arrives, and further, the voice calls and data calls are treated differently as former are delay sensitive and later can be stored in buffer. Voice calls are assigned a busy or vacant code when a call arrives. The rate of data calls can increase or decrease according to the availability of free capacity in code tree or according to type of traffic load. Single code and multi code schemes are proposed which minimize the internal fragmentation of busy codes by utilizing their wastage capacity. In addition, the external fragmentation is also reduced. The vacant code is assigned when busy code wastage capacity is insufficient to handle a call. Simulation results prove dominance of our scheme over other novel schemes.

Keywords:

OVSF codes, code blocking, code searches, single code assignment, single code assignment, wastage capacity
Full Paper, pp. 35-42

 

A Decision and Reconstruction Support Framework: Elaborating on Web Technology
by Francisco Antunes, Joao Paulo Costa

Abstract: In earlier research, we focused on the development of information models for distributed GDSS (Group Decision Support Systems), closing the gap between the study of concurrency control mechanisms, document structuring and decision tracking. The properties of the developed information model (implemented into a GDSS software tool) not only achieved the proposed goals, but allowed to support the reconstruction of past decision-making processes. Decision reconstruction is the process that allows an individual or group of individuals to understand how a GDSS supported group has reached a previous decision in the context of an organization. We believe that by fostering the decision reconstruction ability, we promote their capability for information retrieval, while fostering knowledge acquisition. In this paper we present a framework for developing decision and reconstruction support systems. With this framework a GDSS encompass not only quantitative analysis and deliberative support, but also decision reconstruction or traceability support. The building blocks of the framework are: Contribution support; Preservation of the information; Structure building support; Decision making and reporting; and Visual representation. Instead of advocate the development of systems from scratch, we posit their development by using the common functionalities of Web 2.0/3.0 tools.

Keywords:

Decision, Framework, Group, Reconstruction, Support, System
Full Paper, pp. 43-50

 

Web Services-based Charging Control in Multimedia Networks
by Ivaylo I. Atanasov, Evelina N. Pencheva, Dora A. Marinska

Abstract: Parlay X is a set of Web Services interfaces for open access to network function. One of the alternatives for deployment of Parlay X functionality is an add-on to the Open Service Access (OSA) functionality. The OSA gateway is a special type of application server that translates the OSA interfaces in the network control protocols. The paper suggests a mapping of OSA Charging interfaces onto Diameter protocol messages. A formal approach to specification of OSA gateway behavior is suggested. The approach is based on the theory of Labeled Transition Systems and the concept of bisimilarity. Using the available mapping of Parlay X interfaces onto OSA interfaces, the possibilities of Parlay X charging control on sessions in all IP-based multimedia networks are investigated.

Keywords:

Service Oriented Architecture, Application Programming Interfaces, Charging, Interface to protocol mapping, Labelled Transition Systems, Behavioural equivalence
Full Paper, pp. 51-58

 

Reasoning on Service Interaction in Mobile Networks
by Ivaylo I. Atanasov, Evelina N. Pencheva

Abstract: The paper presents a formal approach to detection of interaction between CAMEL-based services. CAMEL stands for Customized Application for Mobile network Enhanced Logic and it is a way for mobile operators to offer customized services that may be unique or differentiated from similar services offered by competitors. The more services operate in the network, the greater chance that they will interfere with each other. CAMEL basic call control models and mobility management models are described by means of the formalism of description logic. Services are modeled by refinement which transforms the knowledge base. A standard inference mechanism is used to reason about service interaction.

Keywords:

Call control, CAMEL, Description logic, Inference algorithm, Mobility management control, Satisfiability
Full Paper, pp. 59-66

 

A Cluster Based Energy Efficient Location Routing Protocol in Wireless Sensor Networks
by Nurhayati, Sung Hee Choi, Kyung Oh Lee

Abstract: One of the key issue that needs to be addressed in the wireless sensor network field is how to create a most efficient energy system. This is a crucial element because the wireless sensor network is a network made up of small batteries powered devices with a limited amount of energy resources within it. The purpose of the routing protocol is how to utilize energy efficiently and to prolong network lifetime. The conventional clustering method has a unique potential to be an important element for energy conserving sensor network. To address this problem in this paper, we present A Cluster Based Energy Efficient Location Routing Protocol (CELRP) in Wireless Sensor Networks. This routing adopted hierarchical structure method, multi hop and location-based node in the field area of the sensor node. The processes of the routing involves the clustering of nodes and the selection of a Cluster Head (CH) node in each cluster which will be the messenger that sends all the information to the Cluster Head Leader. This Cluster Head Leader will then finally send the aggregated data to the Base Station (BS). To prove the efficiency of energy in CELRP network, we have compared it to the BCDCP and GPRS in the simulation conducted. BCDCP and GPRS are both routing protocols that work well in a small-scale network however not so much in a larger scale network since it uses a lot of energy for long distance wireless communication. The Simulation results have proved energy efficiency in CELRP, its’ ability to reduce energy dissipation and prolong network lifetime that is superior compared to the BCDCP and GPRS.

Keywords:

Wireless Sensor Networks, Clustering, Routing Protocol, BCDCP, GPRS, CELRP
Full Paper, pp. 67-74

 

The Technology Evolution in Web Design, Development and Deployment Supporting Web Scientific Applications
by S. Pastore

Abstract: In recent years Internet and it famous application - the web - have seen a wide diffusion and have been subjected to technological changes. The underlying platforms supporting web applications are now based on layered software and complex hardware solutions in order to support a growing load request. Sciences in general and Astrophysics in specific take advantage of Internet and the web since most of its applications are executed on the Internet and manifest a web user interface. For modern applications is important both the architectural framework where to execute them and the languages used in the design and development of web applications that could be scientific applications or web tools used to communicate this science. Among the different solution available in these two topics, this paper proposes a framework in an open environment as a combination of several software. The aim is to adhere to standards in every stage of the application lifecycle to guarantee main features as openness, accessibility, interoperability and internationalization. The solution implements the cloud paradigm through an open platform like the Eucalyptus software for the deployment environment and web specifications (i.e., HTML 5, CC3 and ECMAScript) together with different standards proposed by international bodies as languages to design and develop user interface accessing applications.

Keywords:

Cloud computing; grid computing; web applications; web standards technologies; markup languages
Full Paper, pp. 75-83

 

A Tree-Based Power Saving Routing Protocol for Wireless Sensor Networks
by Iman ALMomani, Maha Saadeh, Mousa AL-Akhras, Hamzeh AL Jawawdeh

Abstract: Wireless Sensor Networks (WSNs) are a recent promising technology used to facilitate the provision of many civilian, military, and industrial services. Many challenges hinder the effective use of WSNs to support different applications, such as the resource limitations of sensor devices and the finite battery power. This paper proposes a new routing protocol that considers sensors power limitation and prolongs the network’s lifetime by avoiding excessive messages between nodes. This protocol is based on Tree Routing (TR). It routes the data over the shortest path using parent-child links in accompany with neighbors' links. Also, it solves the problem of node’s failure. The proposed protocol is analyzed and compared with other tree-based routing protocols.

Keywords:

Power Consumption, Shortest Path, Tree-Based Routing, Wireless Sensor Network, WSN
Full Paper, pp. 84-92

 

AmIHomCare: AAL System for Elderly and Disabled People Indoor Assistance
by Stefan Mocanu, Irina Mocanu, Silvia Anton, Calin Munteanu

Abstract: This paper presents a complex ambient intelligent system designed to monitor and assist human subjects at their residence. Unlike other proposed systems, AmIHomCare will monitor the vital signs of the patient or elderly people in attempt to identify a potential dangerous situation and it is also capable to control environmental parameters in order to ensure a personalized environment for the user. The system offers several other functions: access control to some restricted areas based on biometric recognition, gesture and object identification based on image retrieval and processing, mobile robot assistance, real time processing of data gathered from sensors, data logging and archiving, communication with a remote call center, automatic alerts sending capabilities. The system is based on 4 independent modules, each one with it’s own specific task. The modules communicate and may cooperate if required by a specific situation. The core of the system is represented by the environment monitoring module where all the data from other modules is gathered and kept in a data base. The core also acts as a relay for alert messages that are being sent by the other modules (when detecting an emergency situation) to a call center. Certain communication redundancy will be implemented in order to make sure that alerts reach the destination and fast reaction is guaranteed. The emergency medical unit that arrives at patient’s home can consult his/her medical history by accessing the local database. Some individual components and functionality have already been tested and other just simulated.

Keywords:

Ambient monitoring, content based retrieval, elderly and disabled assistance, image annotation and retrieval, iris and fingerprint recognition, multi-agent system, wireless body sensors, wearable sensors
Full Paper, pp. 93-100

 

Assessing the Prevailing Implementation Issues of RFID in Healthcare: A Five-Phase Implementation Model
by E. Lefebvre, L. Castro, L. A. Lefebvre

Abstract: In healthcare, supply and demand of medical devices and equipment pose enormous challenges for material managers who have to ensure that “the right equipment” is at “the right moment” at the “point-of-need”. Every year hospitals lose millions of dollar due to hoarded, lost, stolen, and misplaced medical equipment. This lack of visibility on critical medical assets has led to increase of operations inefficiencies, increase in needed resources and budgets, loss of staff valuable time, as well as delays in patient care delivery, generating patients and staff dissatisfaction and potentially affecting patient flow and safety. Radio frequency identification (RFID) is rising as an enabling technology to facilitate asset management in healthcare, where caregivers continually use thousands of medical devices across multiple clinical departments. RFID proven capabilities to automatically and capture, share and synchronize product’s information, as precise as at the item-level, is giving rise to new paradigms for the management of critical and life-saving medical equipment in hospitals. Even tough RFID seems to be a very promising technology; its adoption and implementation in this sector have been hindered by the haziness of RFID projects’ ROI. Through a case study at a European hospital, we intend to assess the suitability of a proposed RFID implementation model to evaluate the various implications of RFID projects, the prevailing implementation issues, as well as to investigate the anticipated benefits of such implementation.

Keywords:

Healthcare, mobile asset management, key performance indicators, RFID implementation
Full Paper, pp. 101-117

 

Issue 4, Volume 5, 2011

The Design of a Steganographic System Based on the Internal MP4 File Structures
by M. Jokay

Abstract: We propose a new technique for inserting the information into the mp4 video files. This technique is based on a modification of the GOP (Group of Pictures) structure and alternation of the streams in the video file. The proposed steganographic system is implemented on the MP4 format. Although our method does not assume decoding of the video stream included in the MP4 file, its suitability depends on the used video encoder and more specially on the type of video scenes. A variable number of adjacent P and B frames in the individual GOPs (variable number of video frames in the MP4 chunk structures) is used to decode the inserted (hidden) information.

Keywords:

GOP, I-frame, MP4 file, P-frame, steganography, video stream
Full Paper, pp. 207-214

 

Classification in the Speech Recognition
by D. Donko, I. Traljic

Abstract: This paper presents specific approach of the classification of the incorrect speech sounds. Sampled data are vowels gathered during the speech therapy with children that have difficulties to pronounce them correctly. Continuous wavelet transformation has been applied on these incorrectly pronounce vowels using Morlet wavelet. Coefficients have been analyzed in the context of three main formants that characterized each of the vowels. The selected coefficients have been classified into main clusters, and have been compared with the one obtained for correct signals. At the end some improvements have been proposed in order to use results in the daily speech therapy and to automate process.

Keywords:

Classification, Morlet wavelet, Speech Therapy, Wavelet analysis
Full Paper, pp. 215-222

 

Breaking the Barcode and RFID Myth: Adoption Paths for Improving the Medication Process
by Alejandro Romero, Elisabeth Lefebvre, Louis-A. Lefebvre

Abstract: The use of barcode has become a key primary technological strategy for improving healthcare service quality in general and point-of-care patient safety in particular. But will RFID eventually replace the widely adopted barcode technology for decreasing adverse medication events? This paper explores four different adoption paths for improving the medication process of an emergency department, namely full barcode implementation, full RFID implementation, migration and hybridization. Since medication errors are considered the most frequent type of adverse events occurring in hospitals, it appears rather crucial to gain a better understanding of the relative advantages and drawbacks related to each of these four adoption paths.

Keywords:

Adverse medication events, RFID, barcode, technology adoption and medication process
Full Paper, pp. 223-235

 

Parallel Approach of Sobel Edge Detector on Multicore Platform
by N. E. A. Khalid, S. A. Ahmad, N. M. Noor, A. F. A. Fadzil, M. N. Taib

Abstract: This paper presents the parallel multicore Sobel edge algorithm which parallelizes the traditional sequential Sobel edge detection algorithm on a parallel multicore platform. Dealing with images, the algorithm inherits repetitive instructions that depend on the image size, thus may slow down the processing speed. The multicore architecture is a ready available resource on ordinary personal computer but often not fully utilized to its utmost potential. Align with this hidden opportunity, Sobel edge algorithm can be implemented on parallel programming paradigm by focusing on the thread operations. This work presents the parallel multicore Sobel edge algorithm which parallelizes the traditional sequential Sobel edge detection algorithm on a parallel multicore platform via Parallel communication software named Message Passing Interface (MPI). The test is being done on ten different images with each image tested in the varying size of 1KxK, 2KxK and 3KxK pixels. Various threads, ranging from two to ten had been performed on Duo and Quad cores. An interesting result shows that in sequential processing Duo core overcome Quad core speed. As for parallel processing, two thread is the best used for Duo core and eight threads is finest for Quad core.

Keywords:

Parallel programming, Sobel edge algorithm, Message Passing Interface (MPI), Multicore
Full Paper, pp. 236-244

 

The Impact of Young Adults’ Lifestyles in Preference and Belief towards Communication Media
by Siti Z.Z. Abidin, Nasiroh Omar, Zamalia Mahmud, Marshima M. Rosli, Hani F.A. Rahman

Abstract: Nowadays, there are a lot of communication media available for sharing information. The use of online media is among the common activities within the society of digital era especially for young adults. The Internet allows information to be shared freely, easily and fast through social media. Several studies show that information can be a weapon to influence people. The misuse of communication media may lead to threat. It is therefore important to understand the factors that affect people in selecting media and trusting their sources. In this paper, we present an exploratory study to investigate the patterns of media preferences and beliefs based on the young adults’ lifestyles focusing on parents’ education level, standard of living and their access to the internet. Participants comprise of ninety eight local young adults who use communication media regularly. Data were analyzed using multidimensional proximity scaling and multiple response techniques. The results show that media preferences are affected by their lifestyles while belief towards the communication media are not related to their lifestyles.

Keywords:

Belief, Communication media, Multi-dimensional proximity scaling, Pattern, Preference, Social media, Visualization, Young adults
Full Paper, pp. 245-253

 

Users Management in Interactive Networked Collaborative Environment
by Zainura Idrus, Siti Z. Z. Abidin, N. Omar, R. Hashim

Abstract: In interactive networked collaborative virtual environment (NCVE), users work in a group to involve in activities such as game, discussion and learning. However, their existence is not visibly presence. Therefore, there is a crucial need to represent the invisible users so that users know with whom they are interacting with, when to communicate and what to do during the collaboration. Most NCVE systems support non-verbal communication cue only to a limited degree causing unnatural communication and degrading communication quality. This leads to miss communication and miss interpretation of information during the collaboration. Research works on identifying this situation have been performed by many researchers that lead to the issues of awareness. There is a lack of research that focusing on the use of effective digital elements in networked collaborative virtual environment. In this research, we investigate what are the digital elements used and how they present invisible users. In this way, the appropriate digital elements can be used to model the invisible users in terms of their presence, states and roles. Thus, conflicts in communication between users can be avoided and the digital elements can provide the mean of knowing the participants in the virtual space.Then, our research further explore various roles played by users and access right granted to each role, specifically in e-learning, project management and game. A clear role and well defined job function can strictly outline users’ access right for ensuring smooth communication and secure protection as well as privacy of users.

Keywords:

Communication, Collaborative Applications, Digital elements, Networked Collaborative Virtual Environment (NCVE), Role, Social Awareness, User Management
Full Paper, pp. 254-262

 

Utility Enhancement by Power Control in WSN with Hexagonal Deployment Scheme Using Game Theoretic Approach with Pricing
by R. Valli, P. Dananjayan

Abstract: The fundamental component of resource management in Wireless Sensor Network (WSN) is transmitter power control since they are miniature battery powered devices. An efficient power control technique is essential to maintain reliable communication links in wireless sensor network (WSN) and to maintain the battery life of the sensor node and in turn the sensor network. This paper analyses a game theoretic model with pricing for power control taking into account the residual energy of the nodes in a homogeneous sensor network considering square grid, triangular and hexagonal deployment schemes. The utility with pricing that minimizes the power consumption of the nodes is analysed. Simulation results show that, for hexagonal deployment scheme, with the inclusion of residual energy check in the game, the transmitting power of the nodes is reduced thereby saving energy and increasing the network lifetime.

Keywords:

Game theory, Pricing, Power control, Wireless sensor network
Full Paper, pp. 263-270

 

An Adaptive Call Admission Control Scheme with Load Balancing for QoS Enhancement in RoF Based Converged UMTS/WLAN
by R. Shankar, P. Dananjayan

Abstract: As universal mobile telecommunications system (UMTS) and wireless local area network (WLAN) have complementary characteristics, convergence of UMTS and WLAN offer seamless wireless access service to users. In a converged UMTS/WLAN enhancing quality of service (QoS) for different services require call admission control and load balancing. This paper analyses the performance of wideband power based (WPB) and throughput based (TB) call admission control schemes in UMTS/WLAN. Further an adaptive call admission control scheme with load balancing for enhancing QoS in hybrid coupled and radio over fiber (RoF) based UMTS/WLAN convergence network is analysed. Simulation results show that adaptive call admission control with load balancing improves QoS in RoF based UMTS/WLAN compared to hybrid coupled UMTS/WLAN convergence network.

Keywords:

Admission control, hybrid coupled, RoF, Converged UMTS WLAN, load balancing, QoS
Full Paper, pp. 271-278