81 research outputs found

    Remote Network Monitoring System (RNMS)

    Get PDF
    Nowadays, computer networks become very complex. Thousands of nodes distributed in various places. Within this complexity, it has become impossible task to monitor large networks by human effort only. Thus, there are urgent needs to find convenient solutions to help networks managers in managing and monitoring their networks. This study presents a monitoring system, named Remote Network Monitoring System (RNMS). The proposed system empowered the networks mangers to remotely monitor their network’s computers. Therefore, a web-based monitoring system has been designed using UML models, and then the system has been developed using ASP.Net with VB.Net scripts. The proposed system is based on SNMP (Simple Network Management Protocol). The SNMP provides efficacious means to access the remote agent’s MIB’s (Management Information Base) objects. Furthermore, this study has evaluated and tested the RNMS using the verification test (unit, integration, and system testing), and the validation test (user acceptance test) based on TAM (Technology Acceptance Model)

    Secured Data Masking Framework and Technique for Preserving Privacy in a Business Intelligence Analytics Platform

    Get PDF
    The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify, Map, Apply, Sign, Keep testing, Utilize) for a BI platform to protect the data at rest, preserve the data format, and maintain the data utility on-the-fly querying level. A new reversible data masking technique (COntent BAsed Data masking - COBAD) is developed as an implementation of iMaskU. The masking algorithm in COBAD is based on the statistical content of the extracted dataset, so that, the masked data cannot be linked with specific individuals or be re-identified by any means. The strength of the re-identification risk factor for the COBAD technique has been computed using a supercomputer where, three security scheme/attacking methods are considered, a) the brute force attack, needs, on average, 55 years to crack the key of each record; b) the dictionary attack, needs 231 days to crack the same key for the entire extracted dataset (containing 50,000 records), c) a data linkage attack, the re-identification risk is very low when the common linked attributes are used. The performance validation of COBAD masking technique has been conducted. A database schema of 1GB is used in TPC-H decision support benchmark. The performance evaluation for the execution time of the selected TPC-H queries presented that the COBAD speed results are much better than AES128 and 3DES encryption. Theoretical and experimental results show that the proposed solution provides a reasonable trade-off between data security and the utility of re-identified data

    Collection and Elicitation of Business Process Compliance Patterns with Focus on Data Aspects

    Get PDF
    Business process compliance is one of the prevalent challenges for companies. Despite an abundance of research proposals, companies still struggle with manual compliance checks and the understanding of compliance violations in the light of missing root-cause explanations. Moreover, approaches have merely focused on the control flow perspective in compliance checking, neglecting other aspects such as the data perspective. This paper aims at analyzing the gap between existing academic work and compliance demands from practice with a focus on the data aspects. The latter emerges from a small set of regulatory documents from different domains. Patterns are assumed as the right level of abstraction for compliance specification due to their independence of (technical) implementation in (process-aware) information systems, potential for reuse, and understandability. A systematic literature review collects and assesses existing compliance patterns. A first analysis of ten regulatory documents from different domains specifically reveals data-oriented compliance constraints that are not yet reflected by existing compliance patterns. Accordingly, data-related compliance patterns are specified

    Intelligent Mobile Learning Interaction System (IMLIS): A Personalized Learning System for People with Mental Disabilities

    Get PDF
    The domain of learning context for people with special needs is a big challenge for digi- tal media in education. This thesis describes the main ideas and the architecture of a system called Intelligent Mobile Learning Interaction System (IMLIS) that provides a mobile learning environment for people with mental disabilities. The design of IMLIS aims to enhance personalization aspects by using a decision engine, which makes deci- sions based on the user s abilities, learning history and reactions to processes. It allows for adaptation, adjustment and personalization of content, learning activities, and the user interface on different levels in a context where learners and teachers are targeting autonomous learning by personalized lessons and feedback. Due to IMLIS dynamic structure and flexible patterns, it is able to meet the specific needs of individuals and to engage them in learning activities with new learning motivations. In addition to support- ing learning material and educational aspects, mobile learning fosters learning across context and provides more social communication and collaboration for its users. The suggested methodology defines a comprehensive learning process for the mentally disabled to support them in formal and informal learning. We apply knowledge from the field of research and practice to people with mental disabilities, as well as discuss the pedagogical and didactical aspects of the design

    RFID Technology in Intelligent Tracking Systems in Construction Waste Logistics Using Optimisation Techniques

    Get PDF
    Construction waste disposal is an urgent issue for protecting our environment. This paper proposes a waste management system and illustrates the work process using plasterboard waste as an example, which creates a hazardous gas when land filled with household waste, and for which the recycling rate is less than 10% in the UK. The proposed system integrates RFID technology, Rule-Based Reasoning, Ant Colony optimization and knowledge technology for auditing and tracking plasterboard waste, guiding the operation staff, arranging vehicles, schedule planning, and also provides evidence to verify its disposal. It h relies on RFID equipment for collecting logistical data and uses digital imaging equipment to give further evidence; the reasoning core in the third layer is responsible for generating schedules and route plans and guidance, and the last layer delivers the result to inform users. The paper firstly introduces the current plasterboard disposal situation and addresses the logistical problem that is now the main barrier to a higher recycling rate, followed by discussion of the proposed system in terms of both system level structure and process structure. And finally, an example scenario will be given to illustrate the system’s utilization

    Cloud eLearning - Personalisation of learning using resources from the Cloud

    Get PDF
    With the advancement of technologies, the usage of alternative eLearning systems as complementary systems to the traditional education systems is becoming part of the everyday activities. At the same time, the creation of learning resources has increased exponentially over time. However, the usability and reusability of these learning resources in various eLearning systems is difficult when they are unstandardised and semi-standardised learning resources. Furthermore, eLearning activities’ lack of suitable personalisation of the overall learning process fails to optimize resources’ and systems’ potentialities. At the same time, the evolution of learning technologies and cloud computing creates new opportunities for traditional eLearning to evolve and place the learner in the center of educational experiences. This thesis contributes to a holistic approach to the field by using a combination of artificial intelligence techniques to automatically generate a personalized learning path for individual learners using Cloud resources. We proposed an advancement of eLearning, named the Cloud eLearning, which recognizes that resources stored in Cloud eLearning can potentially be used for learning purposes. Further, the personalised content shown to Cloud Learners will be offered through automated personalized learning paths. The main issue was to select the most appropriate learning resources from the Cloud and include them in a personalised learning path. This become even more challenging when these potential learning resources were derived from various sources that might be structured, semi- structure or even unstructured, tending to increase the complexity of overall Cloud eLearning retrieval and matching processes. Therefore, this thesis presents an original concept,the Cloud eLearning, its Cloud eLearning Learning Objects as the smallest standardized learning objects, which permits reusing them because of semantic tagging with metadata. Further, it presents the Cloud eLearning Recommender System, that uses hierarchical clustering to select the most appropriate resources and utilise a vector space model to rank these resources in order of relevance for any individual learner. And it concludes with Cloud eLearning automated planner, which generates a personalised learning path using the output of the CeL recommender system

    A Reference Model of Grouped-Metadata Object and a Change Model based on it Appling for Component-based Software Integration Testing

    No full text

    Search-based system architecture development using a holistic modeling approach

    Get PDF
    This dissertation presents an innovative approach to system architecting where search algorithms are used to explore design trade space for good architecture alternatives. Such an approach is achieved by integrating certain model construction, alternative generation, simulation, and assessment processes into a coherent and automated framework. This framework is facilitated by a holistic modeling approach that combines the capabilities of Object Process Methodology (OPM), Colored Petri Net (CPN), and feature model. The resultant holistic model can not only capture the structural, behavioral, and dynamic aspects of a system, allowing simulation and strong analysis methods to be applied, it can also specify the architectural design space. Both object-oriented analysis and design (OOA/D) and domain engineering were exploited to capture design variables and their domains and define architecture generation operations. A fully realized framework (with genetic algorithms as the search algorithm) was developed. Both the proposed framework and its suggested implementation, including the proposed holistic modeling approach and architecture alternative generation operations, are generic. They are targeted at systems that can be specified using object-oriented or process-oriented paradigm. The broad applicability of the proposed approach is demonstrated on two examples. One is the configuration of reconfigurable manufacturing systems (RMSs) under multi-objective optimization and the other is the architecture design of a manned lunar landing system for the Apollo program. The test results show that the proposed approach can cover a huge number of architecture alternatives and support the assessment of several performance measures. A set of quality results was obtained after running the optimization algorithm following the proposed framework --Abstract, page iii

    A Reference Model of Grouped-Metadata Object and a Change Model based on it Appling for Component-based Software Integration Testing

    No full text
    • …
    corecore