25,884 research outputs found

    On sharing and synchronizing groupware calendars under android platform

    Get PDF
    (c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.Sharing a calendar of tasks and events is a cornerstone in collaborative group work. Indeed, the individual work of the members of the group as well as the group work as a whole need the calendar to guide their activity and to meet the deadlines, milestones, deliverables of a project, etc. Additionally the members of the group should be able to work both offline and online, which arises when members of the group use smartphones and can eventually run out of Internet connection from time to time, or simply want to develop some activities locally. In the former case, they should have access to the calendar locally, while in the later case they should access the calendar online, shared by all members of the group. In both cases they should be able to see eventually the same information, namely the local calendars of the members should be synchronized with the group calendar. For the case of smartphones under Android system, one solution could be using the Google calendar, however, that is not easily tailorable to collaborative group work. In this paper we present an analysis, design and implementation of group work calendar that meets several requirements such as 1) sharing among all of members of the group, 2) synchronization among local calendars of members and global group calendar, 3) conflict resolution through a voting system, 4) awareness of changes in the entries (tasks, members, events, etc.) of the calendar and 5) all these requirements under proper privacy, confidentiality and security mechanisms. Moreover, we extend the sharing of calendars among different groups, a situation which often arises in enterprises when different groups need to be aware of other projects' development, or, when some members participate in more than one project at the same time.Peer ReviewedPostprint (author's final draft

    Network layer access control for context-aware IPv6 applications

    Get PDF
    As part of the Lancaster GUIDE II project, we have developed a novel wireless access point protocol designed to support the development of next generation mobile context-aware applications in our local environs. Once deployed, this architecture will allow ordinary citizens secure, accountable and convenient access to a set of tailored applications including location, multimedia and context based services, and the public Internet. Our architecture utilises packet marking and network level packet filtering techniques within a modified Mobile IPv6 protocol stack to perform access control over a range of wireless network technologies. In this paper, we describe the rationale for, and components of, our architecture and contrast our approach with other state-of-the- art systems. The paper also contains details of our current implementation work, including preliminary performance measurements

    SCUdent Books: A University-Focused Bookselling Platform

    Get PDF
    As the beginning of each university semester or quarter commences, so does the rush to acquire books for classes. The search for school books is a busy and important task for many students. However, an entire slew of problems and frustrations emerge with this academic race to gather books. To begin, students have to deal with the traditional frustrations of expensive textbooks sold at the university bookstore which is especially troublesome for those on a tight budget. Additionally, required textbooks for classes may not be available at the bookstore or require restocking which can take an unknown amount of time. Because of this, students turn to cheaper, faster, and more efficient alternatives for acquiring school books including online retailers such as Amazon or Barnes and Noble. While the Internet makes book shopping appear easier, there exist issues that come with it. Students have to put in more effort ordering online, pay for extra shipping, and wait for their books to arrive. Also, online shopping for books is incredibly decentralized with no convenient platform to cater to students\u27 needs. Students must first spend time finding out which books are required for each class and then spend even more time comparing prices from multiple online retailers. In addition, once a student completes a class he or she may no longer need the book. As a result, the student has no convenient method of disposing the book and must now sell it, throw it away, or keep it. Overall, the process of acquiring books in university is disorganized, stressful, and inconvenient for students

    Forecasting electricity consumption using SARIMA method in IBM SPSS software

    Get PDF
    Forecasting is a prediction of future values based on historical data. It can be conducted using various methods such as statistical methods or machine learning techniques. Electricity is a necessity of modern life. Hence, accurate forecasting of electricity demand is important. Overestimation will cause a waste of energy but underestimation leads to higher operation costs. Univesity Tun Hussein Onn Malaysia (UTHM) is a developing Malaysian technical university, therefore there is a need to forecast UTHM electricity consumption for future decisions on generating electric power, load switching, and infrastructure development. The monthly UTHM electricity consumption data exhibits seasonality-periodic fluctuations. Thus, the seasonal Autoregressive Integrated Moving Average (SARIMA) method was applied in IBM SPSS software to predict UTHM electricity consumption for 2019 via Box-Jenkins method and Expert Modeler. There were a total of 120 observations taken from January year 2009 to December year 2018 to build the models. The best model from both methods is SARIMA(0, 1, 1)(0, 1, 1)12. It was found that the result through the Box-Jenkins method is approximately the same with the result generated through Expert Modeler in SPSS with MAPE of 8.4%

    Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints

    Get PDF
    Developments of seamless mobile services are faced with two broad challenges, systems security and user privacy - access to wireless systems is highly insecure due to the lack of physical boundaries and, secondly, location based services (LBS) could be used to extract highly sensitive user information. In this paper, we describe our work on developing systems which exploit location information to enhance security and services under privacy constraints. We describe two complimentary methods which we have developed to track node location information within production University Campus Networks comprising of large numbers of users. The location data is used to enhance security and services. Specifically, we describe a method for creating geographic firewalls which allows us to restrict and enhance services to individual users within a specific containment area regardless of physical association. We also report our work on LBS development to provide visualization of spatio-temporal node distribution under privacy considerations
    • …
    corecore