New Publications are available for Information networks
http://dl-live.theiet.org
New Publications are available now online for this publication.
Please follow the links to view the publication.An Enterprise Service Bus (ESB) and Google gadgets based micro-injection moulding process monitoring system
http://dl-live.theiet.org/content/conferences/10.1049/cp.2012.0584
Wireless Sensor Networks (WSN) have been used in various industrial monitoring applications, with the latest trend being their integration and that of other devices into the “Internet of Things (IoT)” vision in which millions of devices will be interconnected online. One industrial environment which still has not had much exposure to WSNs and the IoT is the plastics industry environment particularly Injection Moulding (IM), Micro Injection Moulding (μIM) and Extrusion. In this paper a novel approach is presented for monitoring a typical plastics industry environment based on three major technologies: WSN, Service Orientated Architecture (SOA) and Google Gadgets (GG). This is applied to a heterogeneous network of WSN nodes and National Instruments (NI) high speed data acquisition (DAQ) devices. The SOA (De-facto solution in Enterprise-IT systems) enables IT resources like specific departmental applications, business partners, business processes, systems to be accessed as a service hence allowing seamless interoperability. Here we describe; architectural design, system integration and user interfaces for a prototype system developed for the Centre for Polymer Micro and Nano Technology (MNT) at the University of Bradford which makes use of the WSO2 Carbon Platform's Enterprise Service Bus (ESB) and the GG API. (6 pages)A systematic review on the effectiveness of Web usability evaluation methods
http://dl-live.theiet.org/content/conferences/10.1049/ic.2012.0007
Usability evaluation methods have become critical in the Web domain to ensure the success of Web applications. Aim: Since a large number of proposals have been presented during the last few years, a question arises: Which usability evaluation methods have proven to be the most effective in the Web domain? Method: This paper presents a systematic review that was motivated by previous results obtained from a systematic mapping study in the Web usability evaluation field. Results: A total of 18 studies were selected from an initial set of 206 in order to extract, code, and synthesize empirical data concerning the effectiveness of usability evaluation methods for the Web. Conclusions: We detected a need of more empirical studies and more standardized effectiveness measures for comparing usability evaluation methods. Our results suggest several evaluation methods which may be useful in allowing researchers and practitioners to perform effective Web usability evaluations.Using keystroke dynamics for gender identification in social network environment
http://dl-live.theiet.org/content/conferences/10.1049/ic.2011.0124
Social networking is now a very widely adopted and highly pervasive communication medium, especially among younger people. However, while offering exceptional opportunities to share and interact these media also introduce the risk of transactions with individuals who deliberately conceal their identity or, importantly, can easily misrepresent their personal characteristics. This paper introduces an approach to addressing such risks by using a form of biometric data accessible from routine interaction mechanisms to predict important user characteristics, thereby directly increasing trust and reliability with respect to the claims made to message receivers by those who communicate with them. (6 pages)Image CAPTCHA based on distorted faces
http://dl-live.theiet.org/content/conferences/10.1049/ic.2011.0106
An image recognition-based CAPTCHA is proposed for increasing security in web applications. The proposed method uses distorted faces to create an image for a CAPTCHA test. The user has to recognise the well-known person that appears in the image choosing the name from a list. The method uses a feature-line morphing technique to distort the faces which morphs the well-known person's face into a cartoon or an animal. The performance of this approach is evaluated through different face recognition systems. The results show an improvement in human recognition in comparison with word-based CAPTCHAs and an increment in robustness against robots when trying to break through the tests. (6 pages)Implementation of Internet browsing on set top box using ARM-LINUX
http://dl-live.theiet.org/content/conferences/10.1049/ic.2011.0084
There is a need to integrate Internet browsing feature on Set Top Box (STB) as an additional feature to provide value to interactive television services. Even though there are ways to perform such a task, but providing a good design with a capable processor and operating system which are capable of handling more present and futuristic with cost effective looks to be challenging. ARM core processors and Linux operating system (OS) may be employed in implementation of interactive television. ARM is one of the most licensed and thus widespread processor cores in the world and used especially in portable devices due to low power consumption and reasonable performance (MIPS / watt) and Linux is an open source operating system with good flexibility and secured file system. Present paper presents an implementation of Internet browsing embedded in STB using ARM processors and Linux OS.Cryptographic keys generation using identity
http://dl-live.theiet.org/content/conferences/10.1049/ic.2011.0068
Public key cryptography is a fundamental and widely used technology around the world for secure information exchange over Internet. Public key cryptography uses public key of the receiver to encrypt the message and receiver uses his/her private key to decrypt the message. Public key of receiver is known publicly, prior to the communication. Hence the authentication of the public key is a big challenge and for which public key certificates, provided by Certification Authority (CA), are used. At large scale communication to set up numerous CA"s is a major overhead of public key cryptography. Hence this paper attempts to avoid the use of public key certificates and proposes an RSA based algorithm to generate the cryptographic keys using identity such as E-Mail ID of a person. The algorithm uses a hash function to generate the keys. The simulation results for key generation using various hash functions are also shown in paper.Developing a disaster surveillance system based on wireless sensor network and cloud platform
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0770
Typically, today's WSN disaster surveillance system operates poorly in its accuracy and timeliness and can only detect a single type of disasters. This owes largely to the congestion brought about by excessive communication traffic and the processing limitation of the server which dramatically restrict the development of disaster surveillance systems. In order to solve these problems, this paper proposes a new scheme in improving the traditional disaster surveillance systems. At the data collection and transmission layer, orthogonal neural network algorithm, which is based on the wavelet transform, is introduced to promote the surveillance accuracy and reduce the network congestion. At the data storage and computing layer, cloud storage and distributed parallel computing are used to overcome the limitation of the previous storage and computation. At last, the paper gives the concrete implementation plan and verifies the superiority of the system.Internet of Things technology for energy saving of telecom operators
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0741
Telecom operators are equipment-intensive enter prise with various types of huge energy consumption equipment, which occupy a large part of the operating costs of production. With the process of social modernization, the state increase emphasis on resource conservation and environment protection. As an emerging technology, Internet of Things technology using for energy conservation of telecom operators can improve the company's own service and operational efficiency. This paper analyzes the energy consumption problems telecom operators equipments faced and give the appropriate IOT solutions which achieves the purpose of equipment energy saving.Effect of mining educational data to improve adaptation of learning in e-learning system
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0499
The Apply of data mining technique in to domain specific applications is being drastically improved more and more by the researchers to improve the best decision making recommendation systems like e-learning ,e-commerce and etc.,In this research work we discuss how the datamining techniques will improve the learning style adaptation, learning content organisation and learning objects recommendations based on the instantaneous data collected through the web based learning management system like moodle. This paper focus the techniques like data classification and clustering techniques to predict the learning style of the peer learners based on the activities they have completed in the teaching learning activity of a particular course. The Experimental results shows the clear snopshot of the analysis.A comparative study of information extraction tools used for biological database
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0492
The Internet presents a huge amount of biological data. It is difficult to extract relevant data from various sources. Therefore, the availability of robust, flexible Information Extraction (IE) systems and tool that transform the Web pages into program-friendly structures such as a relational database. This paper made a study on information extraction tools. Which can be used for Biological databases. The tools have been classified based on four categories such as tools for Manually constructed Information Extraction, Supervised Wrapper Induction System, Semi supervised Information Extraction Systems, Unsupervised Information extraction Systems. Finally we made a comparative study on the Information Extraction tools used for Biological database based on the technique used such as scan Pass, Extraction Rules Type, Features used, Learning Algorithm and Tokenization Schemes.Study on food safety emergency topic detection model based on semantics
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1438
A new method of self-adaptive emergency topic detection model based on semantics is proposed in this paper. We apply the CHI_LDA method to establish the model for the news topics and reports, so as to realize the topic modeling in the semantic feature space. It can resolve the problems of high dimension and sparseness in the feature space and semantic relevance, and improve the time efficiency for LDA method to realize the semantic mapping of the feature space. We improve the traditional Single-pass incremental clustering algorithm by optimizing the updating strategy of the topic model. Meanwhile we establish the topic detector combined with the news topic timing characteristics, and realize the self-adaptive learning of the topic model so as to track the dynamic changes in topic. Experimental results indicate that this method of topic detection has a better performance; it can further improve the effect of topic detection.Design of identity verification unit and management system
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0777
With an increasing emphasis on the emerging automatic handicap personal identification applications, living fingerprint-based identification and Smart cards are receiving a lot of attention. So as to achieve secure and reliable identity verification and the tracking of documentary files and stationary, the paper presents an identity verification unit and management system based on living fingerprint identification techniques and Internet of things (IOT). Additionally, for the goal of non-paper office, the unit resolves issues, e.g., the insecurity and simplex function in traditional identification unit, by providing professional function such as electronic seal.Web 2.0, serious game: Structuring knowledge for participative and educative representations of the city
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0291
To complete the "Pandora21" project, that tackles the issue of creating awareness and action concerning sustainability by using "serious games", we propose a methodological and technical solution to make the space of the game massively "participative", at the scale of a city or of a territory. Such a space has to propose rich functions allowing not only to confront multiple players using the existing objects of this space, but also to co-design the space of the game. Co building of the scenes, discussing of the rules are possible for a wide group. Local partners of a given city will be able to add easily scenes, elements of scenes and micro-games transposing appropriate sustainability situations for their city by rapid prototyping, without having to pass by the computer specialists. Hypertopic, a multi-viewpoints model, will used to ensure a plurality of views on the city. The space of the game will be indeed "participative" at the same time for players and designers groups. (6 pages)Economic models of interaction improving a sustainable city
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0318
The paper explores three dimensions: a) The utility to develop loops based on Web 2.0 arrangements in order to collect new sets of data to improve life and governance of huge metropolis like Shanghai ; b) The new models of economic sustainability be it in market oriented transactions or in public sphere involve from now on collective intelligence, prosumers but also open source and peer to peer production, all the forms of wiki contribution and participation in a urban context ; c) Public administration and urban governance are confronted to a new crisis of scissors: huge needs in funding to face new spending and difficulty in raising taxes. Economic models of social networks may provide better governance and a crowd financing through crowd sourcing. (5 pages)The research of Chinese word segmentation strategy in educational resources search engine based on lucene
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1443
With the development of education informatization, educational resources on the network increasingly rich, for an effective retrieval of educational resources, to retrieve more targeted results, by studying the Chinese word segmentation module based on lucene and the existing Chinese word segmentation algorithm for educational resources features, proposed strategy to improve the Chinese word segmentation lay the foundation for the establishment of professional education search engine.Research of distributed file system based on massive resources and application in the network teaching system
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1447
Using traditional file system to manage the massive resources in network teaching system there is availability, scalability, reliability of data transmission and file read and write performance and other issues. According to the research of several distributed file system (MFS, GFS, etc.) which is currently used by a relatively high frequency, in combination with its own characteristics of teaching resources proposes a new storage architecture model based on distributed file system, thus enhancing the network teaching system performance and reliability.A new development model for the Internet of Things terminal
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0744
Terminal plays a key role in Internet of Things that decides the development and deployment of business. At current phase, terminal development has lagged far behind, and shows a small, few and scattered pattern, which the terminal development models have a significant impact on. In this thesis we presented an analysis of three typical models of terminal development and based on these models argued the problems in Internet of Things terminal development. We proposed a new model according to Internet of Things terminal special features and referencing to these three models of some excellent concepts. This new model is based on a concept of a scalable middleware framework and another idea of implementing the middleware framework by a public middleware development platform. The new model is aiming for reducing Internet of Things terminal development cycle and lowering terminal cost. We also described and discussed a possible ecosystem of industry based on the new model.Research and design of a vertical search engine for educational resources
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1448
With computer and network technology developing, the educational resources on the Internet are also growing exponentially. To locate useful resources from the mass and diverse information is crucial. When using general search engine to search information in a specific field, the results usually cover all fields which can't provide accurate retrieval service for users. However, powerful vertical search engine can meet users' information needs more precisely. This paper describes a vertical search engine on the resources in educational field based on Lucene. Three parts of the system are detailed in this paper, identification of search results metadata, analysis and indexing of all formats of resources and improvement of Lucene ranking algorithm.Study on hot topics identification and key issues in on-line news about emergency events
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1467
Concerning the system of hot topics detection about the emergency events, an overall technical framework is established to implement the system. Description and solution strategy about the key issues in the four components of the system are provided. In terms of the content and structure features of the news reports as well as the distribution feature of the report sources, the text clipping method and the modified model of feature weighting calculation are proposed based on the VSM text representation model and the TF-IDF formula. The news reports about the earthquake emergency event are evaluated for this model as the data sources. Experiment results indicate that the information such as the headline, the lead and relevant feature parameters by clipping the main body of the news report can be considered as the sample set of the hot topics to be identified. Furthermore, compared with the classical model, the modified feature items weighting calculation model is more efficient in execution and more adaptive in terms of the text representation capability.Study on the influence of IOT (Internet of Things) on mobile network
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0742
Mobile communication network provides the terminals of IOT (Internet of Things) with a convenient way to access the network. However a large number of connected IOT terminals will inevitably produce a significant impact on the existing mobile communication network. After summarizing the characteristics of typical applications of IOT, this review provides analysis of the specific impact of IOT on mobile network, and finally proposes the corresponding solutions.IoT business models and extended technical requirements
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0743
Internet of Things (IoT) is just in the primary stage for the concept of it is still in debate now. Authors think IoT is a cluster of infrastructure and communication infrastructure is one of most important basis. So, this paper discussed three types of IoT communication infrastructure and derived three kinds of IoT business model from them. Extended requirements of communication infrastructure for IoT are also proposed.Web questionnaire validation and vendor selection using adaptive neuro fuzzy inference system
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0476
Framing the questionnaire for supplier evaluation and selection is a serious problem in the automobile industry. Particularly, in an e-procurement scenario, the instrument has to be completely tested and verified before publishing the questionnaire for supplier evaluation. Therefore this paper presents an approach for validating the questionnaire using Factor analysis from the data set obtained from the manual records. The factors chosen for supplier evaluation are Cost, Quality, Service, Relationship, Organization and Past relationship. Initially, the 48 questions were confined to the questionnaire which was then confined into 9 components by Factor analysis. Finally the Adaptive Neuro Fuzzy Inference System was trained and tested to rate the supplier using the data collected from the e-procurement system.Bridging vehicle sensor networks with social networks: applications and challenges
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0755
More and more serious global warming boosters the research on environmental protection from both the industries and academia. The collection of environmental data is a basic block for the environmental protection. Due to the mobility and the release of stringent power constraints, vehicular sensor networks (VSN) provides an efficient way to collect environmental data. However, many existing work on the application of VSN in the environmental protection focuses on using the collected data to generate the environmental report. The increasing popularity of social networks motivates our interests in providing more innovative applications by integrating the VSN with social networks. In this paper, we introduce the structure of the integrated system, discuss the applications and the challenging issues.The research and application of business-driven internet component integration
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0867
In order to achieve rapidly developing application system, to adapt to mobile backstage development needs, this paper puts forward the method of developing application system based on business-driven internet component integration. First, we put forward the internet component business model. Then, the internet component integration development platform and the internet component integration process are described. Finally, we implement a business-driven internet component application system. Practice shows that business-driven internet component software development greatly improves the efficiency of mobile backstage development.Internet tourism scene classification with multi-feature fusion and transfer learning
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0768
This paper proposes an internet tourism scene classification algorithm, named multi-feature fusion with transfer learning, which utilizes unlabeled auxiliary data to facilitate image classification. Firstly, we do the SURF extraction and MRHM analysis for the training data separately, in which the training data set as combined with labeled images and unlabeled auxiliary images. Then we compute the target feature vector for each image by merging the extended SURF descriptor and MRHM feature. Finally, we train the SVM classifier scene classification. Due to the capability of transferring knowledge, the proposed algorithm can effectively address insufficient training data problem for image classification. Experiments are conducted on a Beijing tourism scene dataset to evaluate the performance of our proposed algorithm. The experimental results are encouraging and promising.The semantic network and social network analyses of Vancl's micro-blog
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1487
Today, lots of enterprises in China have their own micro-blogs, but most of them are obsessed in making full use of their enterprise micro-blogs. In this paper, by reviewing the general conditions of Chinese enterprises' micro-blogs and the ideas about applying the enterprise micro-blog into business, we first propose to use the semantic network and social network analysis in taking advantages of enterprise micro-blogs. Then we rank the topics' attraction of Vancl's micro-blog texts and describe the analyses on them of two periods, that is, Sep-Nov 2009 and Sep-Nov 2010, which demonstrates that such kind of analysis can definitely reveal the customers' real needs, preferences and the tacit connections buried in the enterprise micro-blog texts. At last, we put forward four application strategies in helping enterprises to employ their micro-blogs into business.Intelligent tourist attractions recommendation system based on cases
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1490
This paper describes how to meet the tourists' demands by using web crawlers, perceptual hashing, decision tree modeling and other technologies in city tourist attractions recommendation. The system makes the intelligent suggestions by using web crawlers to capture weather conditions for the next few days, and builds a decision tree according to the data base of users' feedbacks. It analyses the result of the model and updates the algorithms. To solve the tourist picture reviews issue, we design and implement a hashing algorithm base on digital image sense technology and give out the test and analysis results.The Internet of Things for resident health information service platform research
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0745
Based on Medicaland Health Information technology applications in internet of things, this paper deeply researches the electronic health records standards of residents, the model of accessing electronic health records and the mode of archiving, displaying treatment data shared by the organization. On this basis, building general framework of resident health information service platform, clearing platform functional requirements, designing the interface between medical establishments and platform, as well as solution for building network among data center medical establishments community hospital are the main purposes of the essay.Customers acceptance behavior on mobile internet services
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0774
A new model is established to analyze customers' acceptance behavior on mobile internet services. Ten different representative mobile internet services are surveyed and studied, and the key factors influencing customers' acceptance behavior on these services are analyzed. It is found that mobile internet services with different kinds of features are affected differently by the four independent factors, some of which would be the dominant factors. This provides guidelines to the mobile internet service carriers to improve the service and attract more customers.The ant colony optimization algorithm for web services composition on preference ontology
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1455
The Optimization Algorithm for Web Services Composition on Preference Ontology (OAWSCP) is put forward. OAWSCP, which makes some improvements on primary ACO (Ant Colony Optimization), builds simulation model based on services composition, and sets multiple pheromones and pheromone weights to denote the preference to different properties of a service. The algorithm can also simulate the instability of the flow of services composition, and react according to the flow change of the services composition. The algorithm can also detect if the optimizing is converging to local optimization findings, and in this case the algorithm can take measures to change its direction, and as a result reduce the probability of the algorithm to converge to local optimization findings. In order to verify the feasibility of the algorithm, the paper also builds simulation application system. The result of the performance test proves that the algorithm is more effective than primary ACO.An intrusion detection scheme based on anomaly mining in Internet of Things
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1014
Internet of things (IOT) is vulnerable to malicious attacks because of opening deployment and limited resources. It's heterogeneous and distributed characters make conventional intrusion detection methodologies hard to deploy. To overcome this problem, this paper shows an intrusion detection scheme based on the anomaly mining. The paper has two parts (i) in the first part an anomaly mining algorithm is developed to detect anomaly data of perception layer, (ii) in the second part a distributed intrusion detection scheme is designed based on the detected anomalies. Since not all anomalies are triggered by malicious intrusion, the intrusion semantic is analyzed to distinguish intrusion behaviors from anomalies. Finally our evaluation and analysis shows that our approach is accurate and extensible.A study on personalized recommender system in e-commerce based on ant colony
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.1445
This paper proposed the combination of existing Ant Colony Algorithm and the recommendation algorithm. And it introduced the concept of pheromones and volatile in Ant Colony Algorithm. Combines the browsing behavior and the preferences of similar user in recommended process, and calculate the score of each page. And proposed the solutions of specific problems when the algorithm applying in recommender system.Modelling and analysis of Herefordshire level crossing accident using management oversight and risk tree (MORT)
http://dl-live.theiet.org/content/conferences/10.1049/cp.2011.0259
This paper presents the results of analysis of the Herefordshire level crossing accident using MORT method. The aim of the study is to produce a comprehensive list of accident causal factors as per the MORT method using the RAIB Report as the input document. MORT aids learning lessons after the event is a fact established in the safety literature [6]. The MORT desk top study included collection of information and data that is publicly available to represent all relevant viewpoints to ensure completeness including authors previous work published in 2006 and 2010[2]. The MORT study revealed oversights and omissions that have occurred to cause the undesired accident. All RAIB, ORR and RSSB reports cited in the MORT study are available freely on the respective organisations' websites. Given the nature of the study, the SA2 branch of the MORT tree was excluded from the scope of the study. (10 pages)Designing human benchmark experiments for testing software agents
http://dl-live.theiet.org/content/conferences/10.1049/ic.2011.0015
Background: Software agents are becoming increasingly common in the engineering of software systems. We explore the use of humans in creating benchmarks for the evaluation of software agents. In our case studies, we address the domain of instructable software agents (e-students) as proposed by the Bootstrapped Learning project [Oblinger, 2006]. Aim: Our aim is to define and refine requirements, problem solving strategies, and evaluation methodologies for e-students, paving the way for rigorous experiments comparing e-student performance with human benchmarks. Method: Little was known about what factors would be critical, so our empirical approach is exploratory case studies. In two studies covering three distinct groups, we use human subjects to develop an evaluation curriculum for e-students, collecting quantitative data through online quizzes and tests and qualitative data through observation. Results: Though we collect quantitative data, our most important results are qualitative. We uncover and address several intrinsic challenges in comparing software agents with humans, including the greater semantic understanding of humans, the eidetic memory of e-students, and the importance of various study parameters (including timing issues and lesson complexity) to human performance. Conclusions: Important future work will be controlled experiments based on the experience of these case studies. These will provide benchmark human performance results for specific problem domains for comparison to e-student results.Smart network society applied Internet of Things (Abstract only)
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0701
Summary form only given. ICT contributes to construct to the affluent society, putting into the practice of the sophisticated transportation systems, the social safety & secure platform, the monitoring system for lessening the environmental burden such as reducing CO<sub xmlns="http://pub2web.metastore.ingenta.com/ns/">2</sub> emissions and so on. We call "Smart Network Society", it's the concept of the world view constructing by ICT near future. Then we expect ICT become the one of the resource solving the appearance social issues. Smart Network Society try to achieve the user centric environment where ICT can be utilized using an intuitive and user-friendly interface. It's like the electricity power supply, the gas service and the waterworks. Internet of things (IOT) technologies will contribute for them and build up the environment applied the computing power. IOT technologies and solutions will be able to be universally used, so that all citizens can have worry-free access to ICT and receive the benefits thereof in this society. In this session, I'll talk about the Japanese experience from points of view such as the policy, model projects, user experience and apparent subjects based the activities in Japan last decade. Beside, I'll refer to Chinese IOT strategy named "Wulianwang" and some of business opportunity in China through the collaboration between China and Japan.A SLA-based dynamically integrating services SaaS framework
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0579
SaaS cloud computing is gaining momentum in recent years with more and more successful application adoptions. Processes of these applications often comprise a series of services mapping to users' work flows and a consumer has to designate a particular provider for each service when deploying an application. As long as the provider fails to deliver the service, all application processes which include the service will discontinue their execution even though some other providers may offer the same service. In this paper, we propose a SaaS framework to support dynamic service composition based on QoS criteria of SLA. Each service is brokered and delivered to best fit the criteria specified when it is requested. Applications running on this framework will therefore obtain optimal performance.A glimpse of B&Bs promotion with Internet marketing - a case study of JC B&Bs in Taiwan
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0587
Through internet website one can operate e-commerce websites in a B&Bs business. With a flexible and scalable platform, B&Bs internet operates a rapidly growing network of websites that offer customers the ability to share information through online communities and make informed purchasing decisions-room and food reservation, travel package program etc. The purpose of this study aims to investigate the effectiveness of using Internet website to promote the marketing of JC B&Bs in central Taiwan with a useful program we had written.Preference utility mining of web navigation patterns
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0536
Through the world wide web development, web mining becomes an important research topic in database technologies. Web usage mining is to discover useful information of web pages from user navigation patterns recorded in web logs. Web utility mining is not only discovering the frequent web navigation patterns, but also identifying the profit of web pages. For enhancing the web utility mining, this study proposes a novel preference utility mining algorithm to provide web designers and decision makers more useful and meaningful web information. The proposed algorithm can also be implemented on shared memory multiprocessing (SMP) architecture of parallel computation.Constructing a multi-perspective learning environment using blog technology and topic maps
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0547
To design an effective learning environment, several perspectives should be considered. This paper proposes an implementation issue of a multiperspective model which consists of student-centered, assessment-centered, community-centered, and knowledge-centered perspectives. Blog and topic map are two technologies introduced to implement this model. We propose a hierarchical blog learning platform to implement student-centered, assessment-centered, and community-centered learning environment, which topic map standard is used to support learning environment that is knowledge-centered. To conclude, this study may be of importance in developing an effective online learning environment (OLE) using state-of-the-art technologies. Further study will discuss how to implement the proposed model in a real-world subject and evaluate the cognitive, social, and learning consequences.An e-service design on stroke-precaution for elderly
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0584
The urgent needs of medical assistant for elderly increase rapidly. This paper presents an e-service design on stroke-precaution for elderly, followed by its implementation and evaluation. The e-service design focuses on the elderly problems including the degeneracy of memory and vision as well as the recession of attention. These physiological problems become the barriers for elderly to learn knowledge effectively. In order to help elderly to obtain knowledge for stroke-precaution, this study provides a health information system and its interface design that specifically addresses the physiological issues for elderly. Owing to increase the accessibility of the stroke-precaution health e-service, we utilize multimedia streaming technology and video clips to present stroke-precaution knowledge for elderly. Unlike traditional e-learning system provide massive healthy information, this study provide a personalized health service design which only provide related healthcare information according to user's health condition. The user interface as well as the recommendation mechanism is designed for elderly. Analytical result indicates our service design could help elderly to leap over the physiological problems they encountered. With stroke-precaution healthy service for elderly, life quality could be improved for elderly and their families.Webble World - a web-based knowledge federation framework for programmable and customizable meme media objects
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0590
As the world of Internet transforms more and more to the interactive community of Web 2.0 and stretching forward towards the semantic Web 3.0, the need for tools and frameworks that can support these philosophies and technologies that come with it becomes apparent. This paper will propose a new framework that allows all Internet users to edit and participate in every single aspect of the web experience, as well as allowing web developers to embed all forms of advanced solutions like AI and content awareness. From previous research on meme media architecture and knowledge federation, known as IntelligentPad/IntelligentBox, has risen an evolved and extended web based framework that allows every user to bring their ideas and knowledge to the table in order to create a true federation of humanity's collected knowledge, that is in constant progress and evolution. We have chosen to call this framework Webble World.Monitoring procedures for tourism using RFID and Google maps technologies
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0564
Due to global e-Map on Internet, tourists can easily and precisely find the position that they are interested in. Using one kind of tag-based microchips, a RFID system is usually combined with back-end information systems to sense the tag information with internet-connected readers through wireless transmission. Recently, since the number of travel websites is under unceasing development and increasing, tourists can deeply understand scenic sites before their trips. However, the travel agents capture tourist information, only from the leading tour guides on trip, which is an ineffective monitoring procedure. This research discusses how to combine RFID technology with Google Maps in traveling applications, and provides two-way monitoring procedures with an e-map traveling system. As proposed scheme, RFID tags are attached to tourists using RFID wireless radio frequency identification technology. Four monitoring components are designed to deliver tourists' tag information so that travel agents can automatically track their tours and tourists by remote monitoring information from the mobile and spot-based RFID readers instead of tour guides. The monitoring information of tracked tours and tourists will be represented in internet-based Google Maps. By comparing with the existing traveling websites, this paper discusses advantages and disadvantages of the procedures proposed.Get the picture: how digital camera images are changing the way we travel
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0380
The Highways Agency in England has business objectives to deliver safer roads, reliable journeys and informed travellers. The Highways Agency has installed over 1,500 CCTV cameras on the strategic road network to support its operational requirements (see Figure 1). The 'Video Information Highway' is the name for the technical system by which the Agency's traffic camera images are now being distributed to a wider audience through the internet. Primary users of the images are the Agency's Regional and National Traffic Control Centres, however, other organisations and individuals are also permitted various levels of access providing their usage is aligned with Agency objectives. These customers include government bodies such as the emergency services, police and local councils, and third parties such as traffic information providers, and local/national radio stations who will refer to the "view from Highways Agency cameras" in their bulletins. Images are also available direct to members of the travelling public via the Agency's website along with other licensed internet and mobile devices. In this paper we present up-to-date usage figures for the Highways Agency's various traffic camera services, covering both operational use (Highways Agency and operational partners) and for traffic information purposes (public and business users). We also present some analysis of the benefits delivered by the wider availability of traffic camera images, both for Highways Agency staff and operational partners, and for business and domestic users. It is anticipated that this paper will help to introduce the national and international transport community to this rapidly developing application for improving traffic management and travel information on England's roads. (6 pages)Design and implementation of a context and role-based access control model for digital content
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0570
Due to the popularity of the Internet and the trend in digital information, large amounts of information can be transmitted quickly around the world. Because of this, intellectual property rights have become an issue. Some valuable or confidential information might be obtained by unauthorized users from the Internet and, consequently, providing an effective protection mechanism for digital content management has become an important issue. Therefore, the research adopted a context and role-based access control mechanism, and combined usage rules and protection mechanisms to propose a novel access control model for digital content. The proposed model not only takes into account the digital content provider's copyright but also considers users' flexibility. The proposed model was found to be effective and practical for digital content access control. In the study, a prototype was implemented to verify the effectiveness of the proposed model.Emotional classification model for tourism base on the point of view of life-record
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0577
In any activity in which people have an emotional reaction, memory and emotion in travel are often not separated. Travel will always be full of memories and emotions with the return of these memories will be the proof of the existence of life. Everyone wants to reserve forever in their minds. With the technological advancements, there are a lot of tools that could preserve the moment. Through the different platforms of the ways to connect, the moment it could be stored by digital image, video, text or others. Combination of GPS positioning system tracks out at any time while you want to remain the moment. The research brings up an effective method to store the valuable moment with emotion. The method uses expression ways, such as Blog and Google Earth to show the time, locations and event during the trip. It is a real-time recording system that you can share diary, videos, emotions and pictures with your friends. In the system, we design a path algorithm which uses the weighted of emotional classification method to calculating the travel planning. In addition to the travel path searching, we use the sentiment classification to help people find the theme-based travel with emotional judgment. It can be a reference basis for travel planning.Internet of Things - opportunities and challenges for telecom operators in China (Abstract only)
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0696
Summary form only given. Internet of things (IoT) is being developed in China as an emerging industry of strategic importance. This presentation will introduce the background and status of IoT industry in China. The development opportunities, key technologies and market challenges of IoT will be analyzed from telecom operators' perspective. Typical IoT application cases in China will be given.An effective splog detector for Chinese weblogs
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0572
The splogs are those blogs created for commercial purposes and purely copies contents from other blogs or webs. The splogs will block the contents of regular blogs and deprecate the value of the blog web server. The problems of detecting the splogs become the research topics in web engineering recently. In this paper, the methodologies and algorithms for detecting the splogs from the Chinese web logs are proposed. The goal of this study is to help blog server maintainers to detect and reduce the possible barricading splogs so that the functions of the web server can be maintained normally. In this paper, a new approach mixed with three factors of blog content similarity and a framework based on the SVM algorithm is proposed. This proposed method can correctly detect the Chinese splogs from a large set of Chinese web log and reduce the possible traffic loads of the Chinese we blog server.A heuristic bidirectional search algorithm for automatic Web service composition
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0799
With the proliferation of Web services and the evolution towards the Semantic Web comes the opportunity to automate various Web services tasks. A number of approaches have been proposed to tackle the problem of automatic web service composition. Most of them are inspired by the researches in AI planning. As heuristics plays a key role in the promotion of planning efficiency, the selection of heuristic mechanism is very important. In this paper, we propose the conception of composition distance, and propose a heuristic bidirectional search algorithm based on composition distance. The most contribution of this paper is : (1)propose the conception of composition distance; (2)a heuristic bidirectional search algorithm. The algorithm we proposed is effective and efficiency when applied in web service composition engine.Object-oriented graphical-template composition framework for information visualization
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0591
2D visualization of data is an important tool to improve human's comprehension of abstract data. However, because of the increasing amount of data, simple charts are becoming obsolete. Thus, we propose a new framework to help users easily create complex charts. In our framework, we first describe a method of combining primitive basic shape objects together to create complex templates to represent records and aggregates of records. We then describe a formal model through which users can retrieve object-oriented data. The retrieved data is then directly associated with record or aggregate templates to be visualized. Under the help of our framework, the visualization will become more flexible and easier to construct. Moreover, we have implemented our framework as a web visualization tool so that it can be shared and extended easily by any web users.Cloud networking technologies for green innovation (Abstract only)
http://dl-live.theiet.org/content/conferences/10.1049/cp.2010.0704
Summary form only given. ICT (Information and communication technology) has continued its progress to improve our lives. While environmental protection and effective use of energy has become a concern of the whole human society, ICT is now required to become not only business tool but also an essential technology for the society by means of environmental protection and energy saving. The latest ICT product "cloud computing" is an innovative combination of computing technology and network technology. It has the potential to become a primary technology to cut down a significant amount of cost, and to become a part of a mission-critical system for the human society such as the smart city, by combining the various collected information. In this presentation, I will show some of the latest activities of network technology to construct "cloud computing", which include network architecture and related technologies, such as gaining larger capacity, faster response, higher reliability, and smaller power consumption, in order to support the basis of the human society.