2,058 research outputs found

    SAMI: Service-Based Arbitrated Multi-Tier Infrastructure for Mobile Cloud Computing

    Get PDF
    Mobile Cloud Computing (MCC) is the state-ofthe- art mobile computing technology aims to alleviate resource poverty of mobile devices. Recently, several approaches and techniques have been proposed to augment mobile devices by leveraging cloud computing. However, long-WAN latency and trust are still two major issues in MCC that hinder its vision. In this paper, we analyze MCC and discuss its issues. We leverage Service Oriented Architecture (SOA) to propose an arbitrated multi-tier infrastructure model named SAMI for MCC. Our architecture consists of three major layers, namely SOA, arbitrator, and infrastructure. The main strength of this architecture is in its multi-tier infrastructure layer which leverages infrastructures from three main sources of Clouds, Mobile Network Operators (MNOs), and MNOs' authorized dealers. On top of the infrastructure layer, an arbitrator layer is designed to classify Services and allocate them the suitable resources based on several metrics such as resource requirement, latency and security. Utilizing SAMI facilitate development and deployment of service-based platform-neutral mobile applications.Comment: 6 full pages, accepted for publication in IEEE MobiCC'12 conference, MobiCC 2012:IEEE Workshop on Mobile Cloud Computing, Beijing, Chin

    Implementation of an integrated quality assurance program for CT-TPS process

    Get PDF
    Systematic constancy and accuracy of a treatment planning system (TPS) are crucial for the entire radiation treatment planning process (TPP). The Quality Assurance (QA) of individual components does not necessarily lead to satisfying performance of the whole process due to the possible errors introduced by the data transfer process between components and other fluctuations. However, most of current QA for TPS is confined to the treatment planning computers. In this study, a time efficient and integrated CT-TPS QA procedure is presented, which starts at the beginning of the TPS input --- Computer Tomograhpy (CT). The whole QA procedure is based on the concept of simulating a real patient treatment. Following the CT scan of a head phantom with geometrical objects, a set of reference treatment plans for each accelerator, with all energy beams included, were established. Whenever TPS QA is necessary, the same procedure is repeated and a QA plan is produced. Through the comparison of QA plan with the reference plan, major systematic errors can be found easily and quickly. This method was also applied to VariSeed and PLATO Brachytherapy treatment planning systems. Moreover, if any error is detected in the system, TPS is broken into several parts and individual tests are also set up

    Evaluating Institutional Repositories’ (IR) capabilities for long-term preservation with a focus on content, file format and metadata practices in selected public university libraries in Kenya

    Get PDF
    The type of content and file format influences the success of digital preservation strategies. Institutional repositories are custodians of digital resources that are to be held in perpetuity necessitating the need to consider long term preservation of these resources. The purpose of this study was to evaluate the suitability of digital content and its metadata for long term digital preservation. The study was qualitative in nature utilizing interviews as well as document analysis. websites and IR database investigations were utilized to check on content, format and metadata adequacy. The findings revealed great inadequacies in the IRs’ capabilities to support long term preservation as evidenced by haphazard content and format selection, ingest procedures that did not consider long-term preservation as well as metadata that focused on access only. Recommendations included the need to involve archivist in develop selection and appraisal policies as well as development comprehensive metadata policies that ensured that preservation metadata was also captured as required. Creation of awareness among repository administrators to expose them to the importance of adopting open file formats and standard as well as benchmarking were also proposed. The paper provides insights into universities on the relationship between selection and processing of digital resources and their long-term preservation within the IRs in Kenya

    An assessment of the role of the local structures in development in the Sekhukhune District Municipality of the Limpopo Province

    Get PDF
    Text in EnglishThe local structures are crucial component of development and they are intrinsically perceived as the epicentre of development. This is a qualitative social science study which embraces phenomenological observation to assess the role of the local structures in development in the Sekhukhune District Municipality. This study also wanted to establish the role of the local structures and their contribution to development in the Sekhukhune District Municipality. A phenomenological interviews and observations were conducted using scheduled interviews and interviews guides supported by, transcript interviews and a tape recorder. In addition, 160 participants were identified among the local structures. The Atlas TI software program was used for data analysis in order to achieve the aim and objectives of this study. The study postulated some recommendations which include inter alia: resource mobilisation, institutional capacity, and skills capacity in order to consolidate developmental local government. This study further recommended some policy options that include policy reform, policy formulation, and policy shift to better support local development and accelerate infrastructure roll-out to enhance service delivery for the benefit of development. It is in this context that the local structures are better placed to respond to the societal challenges bedridden service delivery. This study uniquely contributed to the new knowledge that stresses the correlation between the local structures and local development. It is in the light of this contribution that this study intended to further close the gap created between the local structures and local development. For further and future research, this study highlighted the land claims in the Sekhukhune District Municipality as the constraints towards development.Development StudiesD. Litt. et Phil.(Development Studies

    A Comprehensive Analysis of Blockchain Applications for Securing Computer Vision Systems

    Full text link
    Blockchain (BC) and Computer Vision (CV) are the two emerging fields with the potential to transform various sectors.The ability of BC can help in offering decentralized and secure data storage, while CV allows machines to learn and understand visual data. This integration of the two technologies holds massive promise for developing innovative applications that can provide solutions to the challenges in various sectors such as supply chain management, healthcare, smart cities, and defense. This review explores a comprehensive analysis of the integration of BC and CV by examining their combination and potential applications. It also provides a detailed analysis of the fundamental concepts of both technologies, highlighting their strengths and limitations. This paper also explores current research efforts that make use of the benefits offered by this combination. The effort includes how BC can be used as an added layer of security in CV systems and also ensure data integrity, enabling decentralized image and video analytics using BC. The challenges and open issues associated with this integration are also identified, and appropriate potential future directions are also proposed

    Access and information flow control to secure mobile web service compositions in resource constrained environments

    Get PDF
    The growing use of mobile web services such as electronic health records systems and applications like twitter, Facebook has increased interest in robust mechanisms for ensuring security for such information sharing services. Common security mechanisms such as access control and information flow control are either restrictive or weak in that they prevent applications from sharing data usefully, and/or allow private information leaks when used independently. Typically, when services are composed there is a resource that some or all of the services involved in the composition need to share. However, during service composition security problems arise because the resulting service is made up of different services from different security domains. A key issue that arises and that we address in this thesis is that of enforcing secure information flow control during service composition to prevent illegal access and propagation of information between the participating services. This thesis describes a model that combines access control and information flow control in one framework. We specifically consider a case study of an e-health service application, and consider how constraints like location and context dependencies impact on authentication and authorization. Furthermore, we consider how data sharing applications such as the e-health service application handle issues of unauthorized users and insecure propagation of information in resource constrained environments¹. Our framework addresses this issue of illegitimate information access and propagation by making use of the concept of program dependence graphs (PDGs). Program dependence graphs use path conditions as necessary conditions for secure information flow control. The advantage of this approach to securing information sharing is that, information is only propagated if the criteria for data sharing are verified. Our solution proposes or offers good performance, fast authentication taking into account bandwidth limitations. A security analysis shows the theoretical improvements our scheme offers. Results obtained confirm that the framework accommodates the CIA-triad (which is the confidentiality, integrity and availability model designed to guide policies of information security) of our work and can be used to motivate further research work in this field

    BIM and Advanced Computer-Based Tools for the Design and Construction of Underground Structures and Tunnels

    Get PDF
    Technology and digitalization are continuously producing changes in sectors and fields of human activities. Infrastructure industry needs this support in various and extensive ways, since it affects involved parties and society overall. Even though many individual branches have been transformed, design and construction show some kind of reluctance on encouraging and implementing comprehensive digitalization. A major reason is the significantly high complexity of infrastructure projects and the extended chains of work procedures and activities that are produced. All those are applying through the whole time scale of buildings’ existence. Considering that safety and durability remain always the ultimate goal, every new method and concept shall be exhaustively tested, in order to prove its value and efficiency. The current chapter aims to define and prove technology contribution all along the infrastructure sector, concentrating in tunnels and underground structures. Since evolution is proceeding in accelerated rates, future perspectives are also analyzed to provide broader visions and set indicative standpoints for potential and incentives

    Use of fibre-optic (FBG) sensors in structural health monitoring – high grade reinforced concrete beams

    Get PDF
    Natural disasters such as fires, floods and terrorist activities can cause some critical civil infrastructures to be exposed to extreme loading conditions and/or extreme temperatures. After such exposure these structures may become unsafe for general use. Currently there are limited mechanisms to evaluate the integrity of these structures after such disasters. Fibre Bragg Grating (FBG) Sensors could be used as in-situ sensing systems for reviewing the structural health of these damaged structures. The aim of this research is to design a viable method of embedding FBG Sensors within a concrete structure. This technique will be utilised to analyse the structural health of concrete when curing, under normal operating conditions, and when heated to simulate the extreme condition of a fire. The application will be used to predict damage accumulation and conditions inside the concrete structure before, during, and after such an event. The technique chosen to be tested was to encase FBG Sensors in concrete capsules before embedding them in a concrete structure. It was believed that such a technique would be superior to current and previous methods because it would be flexible and would move with the concrete. This technique thus was compared to an inflexible method of encasing that would encourage crack propagation and prove that FBG Sensors are capable of detecting internal deformities. A reinforced concrete beam was chosen as the structure to be analysed. Three dimensional static and thermal models of the beam were created in Abaqus/CAE. These models were used to determine the locations of the most critical stresses, strains and temperatures. FBG Sensors, as well as thermocouples and strain gauges for result comparison, were then placed throughout the beam structure accordingly as measuring devices. Only replicas of the sensor fibre were able to be successfully embedded in the beam with this unique concrete encasing. This is because the initial design failed. The experimental analysis suggests the modified method that was successfully embedded would be superior to alternate methods of encasing and embedding FBG Sensors, and could be a viable method for industry use. Further work would include the embedding of an actual FBG Sensor encased with the modified method of concrete encasing
    corecore