81 research outputs found
Remote Network Monitoring System (RNMS)
Nowadays, computer networks become very complex. Thousands of nodes distributed in various places. Within this complexity, it has become impossible task to monitor large networks by human effort only. Thus, there are urgent
needs to find convenient solutions to help networks managers in managing and monitoring their networks.
This study presents a monitoring system, named Remote Network Monitoring System (RNMS). The proposed system empowered the networks mangers to remotely monitor their network’s computers. Therefore, a web-based monitoring
system has been designed using UML models, and then the system has been developed using ASP.Net with VB.Net scripts. The proposed system is based on SNMP (Simple Network Management Protocol). The SNMP provides efficacious
means to access the remote agent’s MIB’s (Management Information Base) objects. Furthermore, this study has evaluated and tested the RNMS using the verification test (unit, integration, and system testing), and the validation test (user acceptance test) based on TAM (Technology Acceptance Model)
Secured Data Masking Framework and Technique for Preserving Privacy in a Business Intelligence Analytics Platform
The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify, Map, Apply, Sign, Keep testing, Utilize) for a BI platform to protect the data at rest, preserve the data format, and maintain the data utility on-the-fly querying level. A new reversible data masking technique (COntent BAsed Data masking - COBAD) is developed as an implementation of iMaskU. The masking algorithm in COBAD is based on the statistical content of the extracted dataset, so that, the masked data cannot be linked with specific individuals or be re-identified by any means.
The strength of the re-identification risk factor for the COBAD technique has been computed using a supercomputer where, three security scheme/attacking methods are considered, a) the brute force attack, needs, on average, 55 years to crack the key of each record; b) the dictionary attack, needs 231 days to crack the same key for the entire extracted dataset (containing 50,000 records), c) a data linkage attack, the re-identification risk is very low when the common linked attributes are used. The performance validation of COBAD masking technique has been conducted. A database schema of 1GB is used in TPC-H decision support benchmark. The performance evaluation for the execution time of the selected TPC-H queries presented that the COBAD speed results are much better than AES128 and 3DES encryption. Theoretical and experimental results show that the proposed solution provides a reasonable trade-off between data security and the utility of re-identified data
Collection and Elicitation of Business Process Compliance Patterns with Focus on Data Aspects
Business process compliance is one of the prevalent challenges for companies. Despite an abundance of research proposals, companies still struggle with manual compliance checks and the understanding of compliance violations in the light of missing root-cause explanations. Moreover, approaches have merely focused on the control flow perspective in compliance checking, neglecting other aspects such as the data perspective. This paper aims at analyzing the gap between existing academic work and compliance demands from practice with a focus on the data aspects. The latter emerges from a small set of regulatory documents from different domains. Patterns are assumed as the right level of abstraction for compliance specification due to their independence of (technical) implementation in (process-aware) information systems, potential for reuse, and understandability. A systematic literature review collects and assesses existing compliance patterns. A first analysis of ten regulatory documents from different domains specifically reveals data-oriented compliance constraints that are not yet reflected by existing compliance patterns. Accordingly, data-related compliance patterns are specified
Intelligent Mobile Learning Interaction System (IMLIS): A Personalized Learning System for People with Mental Disabilities
The domain of learning context for people with special needs is a big challenge for digi- tal media in education. This thesis describes the main ideas and the architecture of a system called Intelligent Mobile Learning Interaction System (IMLIS) that provides a mobile learning environment for people with mental disabilities. The design of IMLIS aims to enhance personalization aspects by using a decision engine, which makes deci- sions based on the user s abilities, learning history and reactions to processes. It allows for adaptation, adjustment and personalization of content, learning activities, and the user interface on different levels in a context where learners and teachers are targeting autonomous learning by personalized lessons and feedback. Due to IMLIS dynamic structure and flexible patterns, it is able to meet the specific needs of individuals and to engage them in learning activities with new learning motivations. In addition to support- ing learning material and educational aspects, mobile learning fosters learning across context and provides more social communication and collaboration for its users. The suggested methodology defines a comprehensive learning process for the mentally disabled to support them in formal and informal learning. We apply knowledge from the field of research and practice to people with mental disabilities, as well as discuss the pedagogical and didactical aspects of the design
RFID Technology in Intelligent Tracking Systems in Construction Waste Logistics Using Optimisation Techniques
Construction waste disposal is an urgent issue
for protecting our environment. This paper proposes a
waste management system and illustrates the work
process using plasterboard waste as an example, which
creates a hazardous gas when land filled with household
waste, and for which the recycling rate is less than 10%
in the UK. The proposed system integrates RFID
technology, Rule-Based Reasoning, Ant Colony
optimization and knowledge technology for auditing
and tracking plasterboard waste, guiding the operation
staff, arranging vehicles, schedule planning, and also
provides evidence to verify its disposal. It h relies on
RFID equipment for collecting logistical data and uses
digital imaging equipment to give further evidence; the
reasoning core in the third layer is responsible for
generating schedules and route plans and guidance, and
the last layer delivers the result to inform users. The
paper firstly introduces the current plasterboard
disposal situation and addresses the logistical problem
that is now the main barrier to a higher recycling rate,
followed by discussion of the proposed system in terms
of both system level structure and process structure.
And finally, an example scenario will be given to
illustrate the system’s utilization
Cloud eLearning - Personalisation of learning using resources from the Cloud
With the advancement of technologies, the usage of alternative eLearning systems as complementary
systems to the traditional education systems is becoming part of the everyday activities. At the same time, the creation of learning resources has increased exponentially
over time. However, the usability and reusability of these learning resources in various eLearning systems is difficult when they are unstandardised and semi-standardised learning
resources. Furthermore, eLearning activities’ lack of suitable personalisation of the overall learning process fails to optimize resources’ and systems’ potentialities. At the same time, the evolution of learning technologies and cloud computing creates new opportunities for
traditional eLearning to evolve and place the learner in the center of educational experiences.
This thesis contributes to a holistic approach to the field by using a combination of artificial intelligence techniques to automatically generate a personalized learning path for
individual learners using Cloud resources. We proposed an advancement of eLearning, named the Cloud eLearning, which recognizes that resources stored in Cloud eLearning can
potentially be used for learning purposes. Further, the personalised content shown to Cloud Learners will be offered through automated personalized learning paths. The main issue was to select the most appropriate learning resources from the Cloud and include them in a personalised learning path. This become even more challenging when these potential learning resources were derived from various sources that might be structured, semi- structure or even unstructured, tending to increase the complexity of overall Cloud eLearning retrieval and matching processes.
Therefore, this thesis presents an original concept,the Cloud eLearning, its Cloud eLearning Learning Objects as the smallest standardized learning objects, which permits reusing them because of semantic tagging with metadata. Further, it presents the Cloud eLearning Recommender System, that uses hierarchical clustering to select the most appropriate resources and utilise a vector space model to rank these resources in order of relevance for any individual learner. And it concludes with Cloud eLearning automated planner, which generates a personalised learning path using the output of the CeL recommender system
Search-based system architecture development using a holistic modeling approach
This dissertation presents an innovative approach to system architecting where search algorithms are used to explore design trade space for good architecture alternatives. Such an approach is achieved by integrating certain model construction, alternative generation, simulation, and assessment processes into a coherent and automated framework. This framework is facilitated by a holistic modeling approach that combines the capabilities of Object Process Methodology (OPM), Colored Petri Net (CPN), and feature model. The resultant holistic model can not only capture the structural, behavioral, and dynamic aspects of a system, allowing simulation and strong analysis methods to be applied, it can also specify the architectural design space. Both object-oriented analysis and design (OOA/D) and domain engineering were exploited to capture design variables and their domains and define architecture generation operations. A fully realized framework (with genetic algorithms as the search algorithm) was developed. Both the proposed framework and its suggested implementation, including the proposed holistic modeling approach and architecture alternative generation operations, are generic. They are targeted at systems that can be specified using object-oriented or process-oriented paradigm. The broad applicability of the proposed approach is demonstrated on two examples. One is the configuration of reconfigurable manufacturing systems (RMSs) under multi-objective optimization and the other is the architecture design of a manned lunar landing system for the Apollo program. The test results show that the proposed approach can cover a huge number of architecture alternatives and support the assessment of several performance measures. A set of quality results was obtained after running the optimization algorithm following the proposed framework --Abstract, page iii
- …