Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Physical Sciences and Mathematics

Implementation Guidelines For Green Data Centres, Abdallah Tubaishat, Sara Sumaidaa Nov 2017

Implementation Guidelines For Green Data Centres, Abdallah Tubaishat, Sara Sumaidaa

All Works

Increased reliance on technology and online transactions has increased the heat generated in data centres, due to greater access, storage, aggregation and analysis of such data. This paper discusses the downsides of traditional data centres and highlights the importance of applying green IT practices. It explores the benefits and proposes guidelines on shifting to green data centres. The recommendations to go green are to: a) reduce energy by applying green IT practices, b) eliminate redundancies in server systems and cooling modules, c) turn on power management tools on servers and terminals when applicable, d) utilise newer technologies of power consumption …


A Tree Based Broadcast Scheme For (M, K)-Firm Real-Time Stream In Wireless Sensor Networks, Ho Sung Park, Beom Su Kim, Kyong Hoon Kim, Babar Shah, Ki Il Kim Nov 2017

A Tree Based Broadcast Scheme For (M, K)-Firm Real-Time Stream In Wireless Sensor Networks, Ho Sung Park, Beom Su Kim, Kyong Hoon Kim, Babar Shah, Ki Il Kim

All Works

© 2017 by the authors. Recently, various unicast routing protocols have been proposed to deliver measured data from the sensor node to the sink node within the predetermined deadline in wireless sensor networks. In parallel with their approaches, some applications demand the specific service, which is based on broadcast to all nodes within the deadline, the feasible real-time traffic model and improvements in energy efficiency. However, current protocols based on either flooding or one-to-one unicast cannot meet the above requirements entirely. Moreover, as far as the authors know, there is no study for the real-time broadcast protocol to support the …


Mlcaf: Multi-Level Cross-Domain Semantic Context Fusioning For Behavior Identification, Muhammad Asif Razzaq, Claudia Villalonga, Sungyoung Lee, Usman Akhtar, Maqbool Ali, Eun Soo Kim, Asad Masood Khattak, Hyonwoo Seung, Taeho Hur, Jaehun Bang, Dohyeong Kim, Wajahat Ali Khan Oct 2017

Mlcaf: Multi-Level Cross-Domain Semantic Context Fusioning For Behavior Identification, Muhammad Asif Razzaq, Claudia Villalonga, Sungyoung Lee, Usman Akhtar, Maqbool Ali, Eun Soo Kim, Asad Masood Khattak, Hyonwoo Seung, Taeho Hur, Jaehun Bang, Dohyeong Kim, Wajahat Ali Khan

All Works

© 2017 by the authors. Licensee MDPI, Basel, Switzerland. The emerging research on automatic identification of user’s contexts from the cross-domain environment in ubiquitous and pervasive computing systems has proved to be successful. Monitoring the diversified user’s contexts and behaviors can help in controlling lifestyle associated to chronic diseases using context-aware applications. However, availability of cross-domain heterogeneous contexts provides a challenging opportunity for their fusion to obtain abstract information for further analysis. This work demonstrates extension of our previous work from a single domain (i.e., physical activity) to multiple domains (physical activity, nutrition and clinical) for context-awareness. We propose multi-level …


Mean Square Consistency On Numerical Solutions Of Stochastic Wave Equation With Cubic Nonlinearities On 2d Rectangles, Haziem M. Hazaimeh Oct 2017

Mean Square Consistency On Numerical Solutions Of Stochastic Wave Equation With Cubic Nonlinearities On 2d Rectangles, Haziem M. Hazaimeh

All Works

© The Authors, published by EDP Sciences, 2017. In this article we study the mean square consistency on numerical solutions of stochastic wave equations with cubic nonlinearities on two dimensional rectangles. In [8], we proved that the strong Fourier solution of these semi-linear wave equations exists and is unique on an appropriate Hilbert space. A linear-implicit Euler method is used to discretize the related Fourier coefficients. We prove that the linear-implicit Euler method applied to a solution of nonlinear stochastic wave equations in two dimensions is mean square consistency under the geometric condition.


A Big Data Analytics Method For Tourist Behaviour Analysis, Shah Jahan Miah, Huy Quan Vu, John Gammack, Michael Mcgrath Sep 2017

A Big Data Analytics Method For Tourist Behaviour Analysis, Shah Jahan Miah, Huy Quan Vu, John Gammack, Michael Mcgrath

All Works

© 2016 Elsevier B.V. Big data generated across social media sites have created numerous opportunities for bringing more insights to decision-makers. Few studies on big data analytics, however, have demonstrated the support for strategic decision-making. Moreover, a formal method for analysing social media-generated big data for decision support is yet to be developed, particularly in the tourism sector. Using a design science research approach, this study aims to design and evaluate a ‘big data analytics’ method to support strategic decision-making in tourism destination management. Using geotagged photos uploaded by tourists to the photo-sharing social media site, Flickr, the applicability of …


Towards A Privacy Rule Conceptual Model For Smart Toys, Laura Rafferty, Patrick C. K. Hung, Marcelo Fantinato, Sarajane Marques Peres, Farkhund Iqbal, Sy-Yen Kuo, Shih-Chia Huang Aug 2017

Towards A Privacy Rule Conceptual Model For Smart Toys, Laura Rafferty, Patrick C. K. Hung, Marcelo Fantinato, Sarajane Marques Peres, Farkhund Iqbal, Sy-Yen Kuo, Shih-Chia Huang

All Works

A smart toy is defined as a device consisting of a physical toy component that connects to one or more toy computing services to facilitate gameplay in the cloud through networking and sensory technologies to enhance the functionality of a traditional toy. A smart toy in this context can be effectively considered an Internet of Things (IoT) with Artificial Intelligence (AI) which can provide Augmented Reality (AR) experiences to users. In this paper, the first assumption is that children do not understand the concept of privacy and the children do not know how to protect themselves online, especially in a …


Secure Approximation Of Edit Distance On Genomic Data, Md Momin Al Aziz, Dima Alhadidi, Noman Mohammed Jul 2017

Secure Approximation Of Edit Distance On Genomic Data, Md Momin Al Aziz, Dima Alhadidi, Noman Mohammed

All Works

© 2017 The Author(s). Background: Edit distance is a well established metric to quantify how dissimilar two strings are by counting the minimum number of operations required to transform one string into the other. It is utilized in the domain of human genomic sequence similarity as it captures the requirements and leads to a better diagnosis of diseases. However, in addition to the computational complexity due to the large genomic sequence length, the privacy of these sequences are highly important. As these genomic sequences are unique and can identify an individual, these cannot be shared in a plaintext. Methods: In …


Os2: Oblivious Similarity Based Searching For Encrypted Data Outsourced To An Untrusted Domain, Zeeshan Pervez, Mahmood Ahmad, Asad Masood Khattak, Naeem Ramzan, Wajahat Ali Khan Jul 2017

Os2: Oblivious Similarity Based Searching For Encrypted Data Outsourced To An Untrusted Domain, Zeeshan Pervez, Mahmood Ahmad, Asad Masood Khattak, Naeem Ramzan, Wajahat Ali Khan

All Works

© 2017 Pervez et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Public cloud storage services are becoming prevalent and myriad data sharing, archiving and collaborative services have emerged which harness the pay-as-you-go business model of public cloud. To ensure privacy and confidentiality often encrypted data is outsourced to such services, which further complicates the process of accessing relevant data by using search queries. Search over encrypted data schemes solve this problem by …


Rfid Adoption In Healthcare Organizations In Uae, Ahed Abugabah Jan 2017

Rfid Adoption In Healthcare Organizations In Uae, Ahed Abugabah

Working papers

Radio frequency identification (RFID) is currently regarded as one of the most promising technologies, and considered as one of the sixteen key technologies in the coming decade, specifically in terms of its use, pervasiveness, market demand and commercial availability. RFID is perceived as critical technology for many purposes and applications, such as improving the efficiency and effectiveness in business operations and improving customer service. This research therefore has a hedonic motivation in developing an incorporated view of theoretical framework to identify factors that affect RFID adoption in healthcare and providing an empirical analysis of the effect of both organizational and …


Identifying Major Tasks From On-Line Reviews, Feras Al-Obeidat, Bruce Spencer Jan 2017

Identifying Major Tasks From On-Line Reviews, Feras Al-Obeidat, Bruce Spencer

All Works

© 2017 The Authors. Published by Elsevier B.V. Many e-commerce websites allow customers to provide reviews that reflect their experiences and opinions about the business's products or services. Such published reviews potentially benefit the business's reputation, improve both current and future customers' trust in the business, and accordingly improve the business. Negative reviews can inform the merchant of issues that, when addressed, also improve the business. However, when reviews reflect negative experiences and the merchant fails to respond, the business faces potential loss of reputation, trust, and damage. We present the Sentiminder system that identifies reviews with negative sentiment, organizes …


Enterprise Systems: The Quality Of System Outputs And Their Perceived Business Value, Ahed Abugabah Jan 2017

Enterprise Systems: The Quality Of System Outputs And Their Perceived Business Value, Ahed Abugabah

All Works

Copyright © 2017 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved. Organizations are exploring the opportunities offered by information technology to reduce cost and improve overall performance and gain more efficiency. Enterprise Resource Planning Systems are viewed as powerful solutions that help improve productivity, performance and overall quality. However, effective use and beneficial outcomes from such systems are nether guaranteed nor recognized. This study aimed at evaluating the business value of ERP systems and perceived benefits at the user level. This short paper briefly presenting some empirical results related enterprise system impacts and benefits. The reported results …


A Fuzzy Logic-Based Approach For Assessing The Quality Of Business Process Models, Fadwa Yahya, Khouloud Boukadi, Hanêne Ben Abdallah, Zakaria Maamar Jan 2017

A Fuzzy Logic-Based Approach For Assessing The Quality Of Business Process Models, Fadwa Yahya, Khouloud Boukadi, Hanêne Ben Abdallah, Zakaria Maamar

All Works

Copyright © 2017 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved. Similar to software products, the quality of a Business Process model is vital to the success of all the phases of its lifecycle. Indeed, a high quality BP model paves the way to the successful implementation, execution and performance of the business process. In the literature, the quality of a BP model has been assessed through either the application of formal verification, or most often the evaluation of quality metrics calculated in the static and/or simulated model. Each of these assessment means addresses different quality characteristics …


Pattern Matching Of Signature-Based Ids Using Myers Algorithm Under Mapreduce Framework, Monther Aldwairi, Ansam M. Abu-Dalo, Moath Jarrah Jan 2017

Pattern Matching Of Signature-Based Ids Using Myers Algorithm Under Mapreduce Framework, Monther Aldwairi, Ansam M. Abu-Dalo, Moath Jarrah

All Works

© The Author(s). 2017. The rapid increase in wired Internet speed and the constant growth in the number of attacks make network protection a challenge. Intrusion detection systems (IDSs) play a crucial role in discovering suspicious activities and also in preventing their harmful impact. Existing signature-based IDSs have significant overheads in terms of execution time and memory usage mainly due to the pattern matching operation. Therefore, there is a need to design an efficient system to reduce overhead. This research intends to accelerate the pattern matching operation through parallelizing a matching algorithm on a multi-core CPU. In this paper, we …


Three-Dimensional Wireless Ad Hoc And Sensor Networks 2016, Soo Chang Park, Babar Shah, Euisin Lee, Ki Il Kim Jan 2017

Three-Dimensional Wireless Ad Hoc And Sensor Networks 2016, Soo Chang Park, Babar Shah, Euisin Lee, Ki Il Kim

All Works

No abstract provided.


A Neural Network Approach To Visibility Range Estimation Under Foggy Weather Conditions, Hazar Chaabani, Faouzi Kamoun, Hichem Bargaoui, Fatma Outay, Ansar Ul Haque Yasar Jan 2017

A Neural Network Approach To Visibility Range Estimation Under Foggy Weather Conditions, Hazar Chaabani, Faouzi Kamoun, Hichem Bargaoui, Fatma Outay, Ansar Ul Haque Yasar

All Works

© 2017 The Authors. Published by Elsevier B.V. The degradation of visibility due to foggy weather conditions is a common trigger for road accidents and, as a result, there has been a growing interest to develop intelligent fog detection and visibility range estimation systems. In this contribution, we provide a brief overview of the state-of-the-art contributions in relation to estimating visibility distance under foggy weather conditions. We then present a neural network approach for estimating visibility distances using a camera that can be fixed to a roadside unit (RSU) or mounted onboard a moving vehicle. We evaluate the proposed solution …


Urban Road Network Crisis Response Management: Time-Sensitive Decision Optimization, Sinan Salman, Suzan Alaswad Jan 2017

Urban Road Network Crisis Response Management: Time-Sensitive Decision Optimization, Sinan Salman, Suzan Alaswad

Working papers

With the increasing global stock of vehicles, traffic congestion is becoming more severe and costly in many urban road networks. Road network modeling and optimization are essential tools in predicting traffic flow and reducing network congestion. Markov chains are remarkably capable in modeling complex, dynamic, and large-scale networks; Google’s PageRank algorithm is a living proof. In this article, we leverage Markov chains theory and its powerful statistical analysis tools to model urban road networks and infer road network performance and traffic congestion patterns, and propose an optimization approach that is based on Genetic Algorithm to model network-wide optimization decisions. Such …


The Creation Of An Arabic Emotion Ontology Based On E-Motive, Anoud Bani-Hani, Munir Majdalweieh, Feras Obeidat Jan 2017

The Creation Of An Arabic Emotion Ontology Based On E-Motive, Anoud Bani-Hani, Munir Majdalweieh, Feras Obeidat

All Works

© 2017 The Authors. Published by Elsevier B.V. There is an increased interest in social media monitoring to analyse massive, free form, short user-generated text from multiple social media sites such as Facebook, WhatsApp and Twitter. Companies are interested in sentiment analysis to understand customers' opinions about their products/services. Governments and law enforcement agencies are interested in identifying threats to safeguard their country's national security. They are actively seeking ways to monitor and analyse the public's responses to various services, activities and events, especially since social media has become a valuable real-time resource of information. This study builds on prior …


Conveh: Driving Safely Into A Connected Future, Fatma Outay, Faouzi Kamoun, Ansar Yasar, Elhadi Shakshuki, Samar El-Amine Jan 2017

Conveh: Driving Safely Into A Connected Future, Fatma Outay, Faouzi Kamoun, Ansar Yasar, Elhadi Shakshuki, Samar El-Amine

All Works

© 2017 The Authors. Published by Elsevier B.V. The loss of lives and damages to the property due to the vehicle crashes and road accidents have been an issue for long; a quarter of these accidents happen due to the adverse weather conditions. This paper presents the idea of cooperative driving technique for the drivers with the use of Connected Vehicles to minimize road accidents, traffic congestions, and to lessen, as far as possible, the effects of traffic on the environment and the loss of lives and economy. The frameworks for improving situational awareness and crash avoidance suggested hereby are …