The document describes a Wireless Stream Management System (WSMS) that allows a moderator (teacher) to remotely manage and control wireless screen mirroring from student devices to support collaborative learning. Key features of WSMS include allowing the teacher to select any student's laptop screen to project, enabling the teacher to remotely control the student's laptop, and distributing presentation content as images to student devices. The system architecture uses various components like a Wireless Screen Sender, Receiver, Administrator and Controller. Performance tests showed the system using under 2 Mbps of bandwidth and latency under 173ms with no major CPU utilization issues.
A unified dashboard for collaborative robot management systemConference Papers
This document proposes a unified dashboard for managing collaborative robot (COBOT) systems across multiple factories. The dashboard would provide centralized monitoring and control of COBOT assets and production data. It incorporates interactive 3D visualization of COBOT movement for troubleshooting. The dashboard has role-based access, with views tailored for super administrators, administrators and regular users. It utilizes a hierarchical interface and "batch actions" to efficiently manage large numbers of COBOTs.
Improvement from proof of concept into the production environment cater for...Conference Papers
This document discusses improvements made to the Trust Engine component of an authentication platform to improve performance and scalability. The Proof of Concept system was found to not meet scalability requirements due to the database architecture requiring multiple connections to retrieve and update user data. The improvements included consolidating configuration data, combining user tables, updating the process to perform analysis in memory without database connections, limiting stored login records, and changing to a JSON data format. Performance testing showed the new system completed processes on average 99% faster.
Software testing automation a comparative study on productivity rate of ope...Conference Papers
This document compares the productivity of two open source automated software testing tools, Robot Framework 3.0 and Katalon Studio 7.0, for testing smart manufacturing applications. Ten subject matter experts tested their productivity using each tool across various stages of the software development lifecycle. Katalon Studio 7.0 was found to be significantly more productive than Robot Framework 3.0 based on statistical analysis of the time taken using each tool. The study provides guidance for selecting automated testing tools to improve productivity for software test engineers working in smart manufacturing.
Cobot fleet management system using cloud and edge computing bukharyConference Papers
This document proposes a Cobot Fleet Management System (CFMS) that uses cloud and edge computing to manage multiple collaborative robots (cobots) in factories. The CFMS has a dual-sided architecture with cloud-based centralized control and management, and edge computing nodes that bridge communication between the manufacturing floor and cloud applications. The CFMS is intended to automate and simplify cobot development, deployment, operation, and maintenance. It would collect health and production data from cobots, enable simulation and design tools in the cloud, and provide predictive maintenance and error notifications to support zero downtime.
A deployment scenario a taxonomy mapping and keyword searching for the appl...Conference Papers
This document discusses developing a taxonomy to map relationships between applications, virtual machines, hosts, and clients when performing upgrades and patches. It proposes creating a taxonomy based on analyzing errors that occur during application execution to understand dependencies. The taxonomy would classify applications based on their libraries, operating systems, and browsers to provide a troubleshooting guideline for upgrades. An experiment upgrading an application called Crawling encountered errors due to dependencies on older software versions. Mapping the application criteria and relationships in a taxonomy could help identify the root cause of issues and the steps to resolve them.
This document summarizes a proposed multi-tenant healthcare system called Mi-HealthCare that uses a containerized microservices architecture. Key points include:
- Mi-HealthCare uses a multi-tenant architecture to allow multiple healthcare providers (tenants) to access the system using a single codebase and shared infrastructure.
- Containers are used instead of virtual machines for their higher performance and scalability. Docker Swarm is used for container orchestration.
- The system provides features like patient management, clinical documentation, and prescription management. It is designed to meet regulations like HIPAA and GDPR.
This document discusses the implementation challenges of autonomous things and proposes a high-level architecture for a cloud robotics infrastructure to address these challenges. It explores existing platforms for autonomous things and identifies three main areas of complexity: development, execution, and operation. A proposed architecture is presented using the TOGAF framework, with core services for integrated development/testing/simulation and operation/monitoring/maintenance, and application services and technologies to realize these, including cloud, edge and robotics computing with virtualization and ROS. The architecture aims to ease autonomous things implementation through a super-converged system.
Advanced resource allocation and service level monitoring for container orche...Conference Papers
This document proposes an architecture for advanced resource allocation and service level monitoring for container orchestration platforms. It begins with background on containerization and popular orchestration platforms like Docker Swarm and Kubernetes. It then highlights issues with default scheduling approaches and proposes a resource-aware placement algorithm and SLA-based monitoring to minimize container migration and ensure performance. The key components of the proposed architecture are described and its advantages over default scheduling are discussed. In conclusion, the solution is meant to benefit container orchestrators by improving application performance through more effective scheduling and issues prevention.
A unified dashboard for collaborative robot management systemConference Papers
This document proposes a unified dashboard for managing collaborative robot (COBOT) systems across multiple factories. The dashboard would provide centralized monitoring and control of COBOT assets and production data. It incorporates interactive 3D visualization of COBOT movement for troubleshooting. The dashboard has role-based access, with views tailored for super administrators, administrators and regular users. It utilizes a hierarchical interface and "batch actions" to efficiently manage large numbers of COBOTs.
Improvement from proof of concept into the production environment cater for...Conference Papers
This document discusses improvements made to the Trust Engine component of an authentication platform to improve performance and scalability. The Proof of Concept system was found to not meet scalability requirements due to the database architecture requiring multiple connections to retrieve and update user data. The improvements included consolidating configuration data, combining user tables, updating the process to perform analysis in memory without database connections, limiting stored login records, and changing to a JSON data format. Performance testing showed the new system completed processes on average 99% faster.
Software testing automation a comparative study on productivity rate of ope...Conference Papers
This document compares the productivity of two open source automated software testing tools, Robot Framework 3.0 and Katalon Studio 7.0, for testing smart manufacturing applications. Ten subject matter experts tested their productivity using each tool across various stages of the software development lifecycle. Katalon Studio 7.0 was found to be significantly more productive than Robot Framework 3.0 based on statistical analysis of the time taken using each tool. The study provides guidance for selecting automated testing tools to improve productivity for software test engineers working in smart manufacturing.
Cobot fleet management system using cloud and edge computing bukharyConference Papers
This document proposes a Cobot Fleet Management System (CFMS) that uses cloud and edge computing to manage multiple collaborative robots (cobots) in factories. The CFMS has a dual-sided architecture with cloud-based centralized control and management, and edge computing nodes that bridge communication between the manufacturing floor and cloud applications. The CFMS is intended to automate and simplify cobot development, deployment, operation, and maintenance. It would collect health and production data from cobots, enable simulation and design tools in the cloud, and provide predictive maintenance and error notifications to support zero downtime.
A deployment scenario a taxonomy mapping and keyword searching for the appl...Conference Papers
This document discusses developing a taxonomy to map relationships between applications, virtual machines, hosts, and clients when performing upgrades and patches. It proposes creating a taxonomy based on analyzing errors that occur during application execution to understand dependencies. The taxonomy would classify applications based on their libraries, operating systems, and browsers to provide a troubleshooting guideline for upgrades. An experiment upgrading an application called Crawling encountered errors due to dependencies on older software versions. Mapping the application criteria and relationships in a taxonomy could help identify the root cause of issues and the steps to resolve them.
This document summarizes a proposed multi-tenant healthcare system called Mi-HealthCare that uses a containerized microservices architecture. Key points include:
- Mi-HealthCare uses a multi-tenant architecture to allow multiple healthcare providers (tenants) to access the system using a single codebase and shared infrastructure.
- Containers are used instead of virtual machines for their higher performance and scalability. Docker Swarm is used for container orchestration.
- The system provides features like patient management, clinical documentation, and prescription management. It is designed to meet regulations like HIPAA and GDPR.
This document discusses the implementation challenges of autonomous things and proposes a high-level architecture for a cloud robotics infrastructure to address these challenges. It explores existing platforms for autonomous things and identifies three main areas of complexity: development, execution, and operation. A proposed architecture is presented using the TOGAF framework, with core services for integrated development/testing/simulation and operation/monitoring/maintenance, and application services and technologies to realize these, including cloud, edge and robotics computing with virtualization and ROS. The architecture aims to ease autonomous things implementation through a super-converged system.
Advanced resource allocation and service level monitoring for container orche...Conference Papers
This document proposes an architecture for advanced resource allocation and service level monitoring for container orchestration platforms. It begins with background on containerization and popular orchestration platforms like Docker Swarm and Kubernetes. It then highlights issues with default scheduling approaches and proposes a resource-aware placement algorithm and SLA-based monitoring to minimize container migration and ensure performance. The key components of the proposed architecture are described and its advantages over default scheduling are discussed. In conclusion, the solution is meant to benefit container orchestrators by improving application performance through more effective scheduling and issues prevention.
Towards predictive maintenance for marine sector in malaysiaConference Papers
This research uses machine learning on sensor data from ships to predict failures of components and their remaining useful life. Interviews with marine experts identified significant maintenance items to prioritize for ship supply chains. The results were analyzed to provide recommendations to a government company on implementing predictive analytics and supply chain strategies for ship maintenance in Malaysia.
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
An analysis of a large scale wireless image distribution system deploymentConference Papers
This document describes two setups of a wireless image distribution system:
1. A setup using commercial network equipment like access points and an access controller, which supported over 125 connected devices and provided sufficient bandwidth for the system load during a conference.
2. A setup using a wireless mesh network of NICT NerveNet nodes, which provided a quick and easy setup but had room for improved performance based on analysis of the wireless backhaul links and connected devices. Both setups were tested and analyzed to evaluate network technologies for smart community applications.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Designing the Process of Stores Management for Implementing ERP in Manufactur...sushil Choudhary
This paper describes the importance of ERP in manufacturing industries and examines the various articles
published by eminent Researchers in the field of ERP. Enterprise Resource Planning (ERP) software presents a
frame work for organizations to better utilize their processes. The report is about windows based application.
The main idea of this paper is to handle the all details of stores management system. In this project software
package has been developed to smoothen the processing of item transaction in stores such as item receive, item
issue & report generation such as stock statement, issue register & receive register etc. This Software will help in
automating all the process like receiving and issuing application in stores.
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...ijngnjournal
IP Multimedia Subsystem (IMS) is considered to be one of the important features in Mobile Next Generation Networks (MNGN). It adds value to the mobile services and applications by integrating mobile network resources, such as location, billing and authentication. This is achieved by enabling a third party access to network resources. In previous work [1] we have presented a testbed to be used as platform for testing mobile application prior to actual deployment. We have chosen a novel IMS based MObile Mass EXamination (MOMEX) system to showcase the benefit of designing an IMS based mobile application. We identify two aspects essential to of the application namely security threats and delay analysis. In this paper we identify MOMEX security threats and suggest strategies to mitigate system vulnerabilities. We then
evaluate the performance of MOMEX system in terms of delay and security threats and vulnerabilities. The results presented show system performance limitation and tradeoffs.
Adaptive authentication to determine login attempt penalty from multiple inpu...Conference Papers
This document proposes an adaptive authentication method that determines login penalties based on multiple input sources. It describes adding an IP address checker module to the existing Trust Engine component of the Mi-UAP authentication platform. The IP address checker would identify the source type of the user's IP address and apply the appropriate penalty, such as requiring additional authentication methods or blocking the user, depending on factors like whether the IP is on a blacklist database. The document outlines the process and provides examples of how penalties would be applied based on the identified source type.
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...AM Publications
This paper proposes the use of design patterns in a marine research general information platform. The development of the platform refers to a design of complicated system architecture. Creation and execution of the research workflow nodes and designing of visualization library suited for marine users play an important role in the whole software architecture. This paper studies the requirements characteristic in marine research fields and has implemented a series of framework to solve these problems based on object-oriented and design patterns techniques. These frameworks make clear the relationship in all directions between modules and layers of software, which communicate through unified abstract interface and reduce the coupling between modules and layers. The building of these frameworks is importantly significant in advancing the reusability of software and strengthening extensibility and maintainability of the system.
System analysis and design for multimedia retrieval systemsijma
Due to the extensive use of information technology and the recent developments in multimedia systems, the
amount of multimedia data available to users has increased exponentially. Video is an example of
multimedia data as it contains several kinds of data such as text, image, meta-data, visual and audio.
Content based video retrieval is an approach for facilitating the searching and browsing of large
multimedia collections over WWW. In order to create an effective video retrieval system, visual perception
must be taken into account. We conjectured that a technique which employs multiple features for indexing
and retrieval would be more effective in the discrimination and search tasks of videos. In order to validate
this, content based indexing and retrieval systems were implemented using color histogram, Texture feature
(GLCM), edge density and motion..
This document discusses conceptual literature related to network monitoring and diagnosis systems. It provides definitions and descriptions of key concepts from various sources, including network monitoring, bandwidth, uptime, downtime, uploading/downloading, user sessions, CPU utilization, fault detection, peer-to-peer networking, network interface cards, routers, network flows, and the strategic importance of network monitoring. Diagrams and tables are included to illustrate several of these concepts.
This document presents a reference framework for classifying software quality models. It proposes analyzing software quality using four "worlds": 1) Subject World, which defines what software quality is, 2) Usage World, which identifies user intentions and goals for quality, 3) System World, which specifies how quality will be represented and measured, and 4) Development World, which contains processes and tools to achieve quality objectives. Each world addresses a fundamental question about quality. The framework characterizes each model based on attributes within these worlds. It aims to provide a comprehensive way to analyze, compare, and develop software quality models.
This document discusses the development of a Virtual Computing Lab (VCL) using a private cloud at Terna Engineering College in India. It begins with an abstract that outlines how a VCL and private cloud can help meet increasing demands on limited resources. It then reviews related work on VCL implementations at other universities. The proposed system would use the open-source Eucalyptus framework to create the private cloud infrastructure and provide on-demand access to virtual machines and applications through a web portal. Setting up the private cloud involves configuring controller and node machines running Eucalyptus services. Once complete, students and faculty could remotely launch and manage virtual environments. The conclusion discusses potential future work like expanding capabilities and mobile access.
This document describes modeling and verifying a telecommunication application called Depannage using Live Sequence Charts (LSCs) and the Play-Engine tool. Depannage allows users to call for help from emergency services. The application is complex due to its distributed architecture, time constraints, and evolving components.
The authors specify Depannage using LSCs to describe component behaviors and interactions. Key components include Search, which locates emergency providers, and Users, which models user states. Universal LSCs define mandatory component behaviors, while existential LSCs define possible behaviors. The Play-Engine tool is used to simulate, animate, and formally verify the LSC specification.
The methodology captures requirements at a high level using
Validation of early testing method for e government projects by requirement ...Conference Papers
The document describes a validation study of an Early Requirement Testing Method (ERTM) for e-government projects. Test engineers used the ERTM, which involves reviewing requirements documents and providing feedback, on six e-government projects. The number of defects found before and after applying the ERTM and providing interventions was compared using a statistical test. The results showed that overall, there was a statistically significant reduction in the number of defects found after applying the ERTM, suggesting it is useful for improving requirements documentation. However, one project saw an increase in defects due to additional requirements added later in the project.
This document describes a Relaxed Context-Aware Machine Learning Middleware (RCAMM) for Android that was developed by students and a professor at V.E.S. Institute of Technology in Mumbai, India. RCAMM collects and stores context information from mobile devices and uses machine learning to provide personalized suggestions to users. It aims to reduce redundancy for developers by handling context collection and storage in a middleware, allowing apps to simply consume context data. The middleware uses a hybrid context model with JSON encoding and a relational database to store historical context values from devices.
GROUP MEMBER :
MOHD.AIRIL SOLEHAN BIN JOHARI 043911
MUHAMMAD AIMAN BIN ABD GHANI 043959
MUHAMMAD NAUFAL BIN FARID 043953
MUHAMMAD NURAZRUL AMRI BIN NOOR AZLAN 044416
MUHAMMAD NUR ATHARI BI SHAFIEE 044439
Real time text stream processing - a dynamic and distributed nlp pipelineConference Papers
The document proposes a real-time architecture using Apache Storm and Apache Kafka to apply natural language processing (NLP) tasks to streams of text data. It allows developers to inject NLP modules from different programming languages in a distributed, scalable, and low-latency manner. An experiment was conducted using OpenNLP, Fasttext and SpaCy modules on Bahasa Malaysia and English text, and Apache Storm achieved the lowest latency compared to other frameworks.
This document describes the development of a web-based job fair information system using the waterfall model of software development. The system allows users to access information on job vacancies, registration for vacancies, and test schedules. It was developed using requirements collection, specification and design, implementation, and testing phases of the waterfall model. The system provides information to both job seekers and administrators. For job seekers, it allows viewing of information and online registration for vacancies. Administrators can manage all data and information on the system. The system was tested on different browsers and needs further improvement for use on mobile devices.
Distant learning is developing and attracting more users due to the availability and popularity of computers and mobile devices among young and old learners alike. A lot of learning platforms provide courses and training in different fields, but lack accessibility for the visually disabled students, and cannot be optimally accessed from a handheld device, whereas mobile devices are very popular.
The document describes a lecture presentation system called Classroom Presenter that uses a Tablet PC as the presentation device. Key features of the system include the ability for instructors to write directly on slides, have multiple views including a separate view for notes, and support for navigation between slides and a digital whiteboard. An evaluation found that instructors made extensive use of inking on slides and found the system improved interactivity over traditional computer-based presentations. The system has been deployed across multiple universities.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
This document describes potential thesis topics in networking that a professor at UNSW is willing to supervise. It provides details on several proposed undergraduate thesis projects related to the supervisor's research interests in areas like video communication, network dependability, and wireless networking. Students are instructed to email their resume and academic record to the professor if interested in any of the topics.
Towards predictive maintenance for marine sector in malaysiaConference Papers
This research uses machine learning on sensor data from ships to predict failures of components and their remaining useful life. Interviews with marine experts identified significant maintenance items to prioritize for ship supply chains. The results were analyzed to provide recommendations to a government company on implementing predictive analytics and supply chain strategies for ship maintenance in Malaysia.
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
An analysis of a large scale wireless image distribution system deploymentConference Papers
This document describes two setups of a wireless image distribution system:
1. A setup using commercial network equipment like access points and an access controller, which supported over 125 connected devices and provided sufficient bandwidth for the system load during a conference.
2. A setup using a wireless mesh network of NICT NerveNet nodes, which provided a quick and easy setup but had room for improved performance based on analysis of the wireless backhaul links and connected devices. Both setups were tested and analyzed to evaluate network technologies for smart community applications.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Designing the Process of Stores Management for Implementing ERP in Manufactur...sushil Choudhary
This paper describes the importance of ERP in manufacturing industries and examines the various articles
published by eminent Researchers in the field of ERP. Enterprise Resource Planning (ERP) software presents a
frame work for organizations to better utilize their processes. The report is about windows based application.
The main idea of this paper is to handle the all details of stores management system. In this project software
package has been developed to smoothen the processing of item transaction in stores such as item receive, item
issue & report generation such as stock statement, issue register & receive register etc. This Software will help in
automating all the process like receiving and issuing application in stores.
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...ijngnjournal
IP Multimedia Subsystem (IMS) is considered to be one of the important features in Mobile Next Generation Networks (MNGN). It adds value to the mobile services and applications by integrating mobile network resources, such as location, billing and authentication. This is achieved by enabling a third party access to network resources. In previous work [1] we have presented a testbed to be used as platform for testing mobile application prior to actual deployment. We have chosen a novel IMS based MObile Mass EXamination (MOMEX) system to showcase the benefit of designing an IMS based mobile application. We identify two aspects essential to of the application namely security threats and delay analysis. In this paper we identify MOMEX security threats and suggest strategies to mitigate system vulnerabilities. We then
evaluate the performance of MOMEX system in terms of delay and security threats and vulnerabilities. The results presented show system performance limitation and tradeoffs.
Adaptive authentication to determine login attempt penalty from multiple inpu...Conference Papers
This document proposes an adaptive authentication method that determines login penalties based on multiple input sources. It describes adding an IP address checker module to the existing Trust Engine component of the Mi-UAP authentication platform. The IP address checker would identify the source type of the user's IP address and apply the appropriate penalty, such as requiring additional authentication methods or blocking the user, depending on factors like whether the IP is on a blacklist database. The document outlines the process and provides examples of how penalties would be applied based on the identified source type.
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...AM Publications
This paper proposes the use of design patterns in a marine research general information platform. The development of the platform refers to a design of complicated system architecture. Creation and execution of the research workflow nodes and designing of visualization library suited for marine users play an important role in the whole software architecture. This paper studies the requirements characteristic in marine research fields and has implemented a series of framework to solve these problems based on object-oriented and design patterns techniques. These frameworks make clear the relationship in all directions between modules and layers of software, which communicate through unified abstract interface and reduce the coupling between modules and layers. The building of these frameworks is importantly significant in advancing the reusability of software and strengthening extensibility and maintainability of the system.
System analysis and design for multimedia retrieval systemsijma
Due to the extensive use of information technology and the recent developments in multimedia systems, the
amount of multimedia data available to users has increased exponentially. Video is an example of
multimedia data as it contains several kinds of data such as text, image, meta-data, visual and audio.
Content based video retrieval is an approach for facilitating the searching and browsing of large
multimedia collections over WWW. In order to create an effective video retrieval system, visual perception
must be taken into account. We conjectured that a technique which employs multiple features for indexing
and retrieval would be more effective in the discrimination and search tasks of videos. In order to validate
this, content based indexing and retrieval systems were implemented using color histogram, Texture feature
(GLCM), edge density and motion..
This document discusses conceptual literature related to network monitoring and diagnosis systems. It provides definitions and descriptions of key concepts from various sources, including network monitoring, bandwidth, uptime, downtime, uploading/downloading, user sessions, CPU utilization, fault detection, peer-to-peer networking, network interface cards, routers, network flows, and the strategic importance of network monitoring. Diagrams and tables are included to illustrate several of these concepts.
This document presents a reference framework for classifying software quality models. It proposes analyzing software quality using four "worlds": 1) Subject World, which defines what software quality is, 2) Usage World, which identifies user intentions and goals for quality, 3) System World, which specifies how quality will be represented and measured, and 4) Development World, which contains processes and tools to achieve quality objectives. Each world addresses a fundamental question about quality. The framework characterizes each model based on attributes within these worlds. It aims to provide a comprehensive way to analyze, compare, and develop software quality models.
This document discusses the development of a Virtual Computing Lab (VCL) using a private cloud at Terna Engineering College in India. It begins with an abstract that outlines how a VCL and private cloud can help meet increasing demands on limited resources. It then reviews related work on VCL implementations at other universities. The proposed system would use the open-source Eucalyptus framework to create the private cloud infrastructure and provide on-demand access to virtual machines and applications through a web portal. Setting up the private cloud involves configuring controller and node machines running Eucalyptus services. Once complete, students and faculty could remotely launch and manage virtual environments. The conclusion discusses potential future work like expanding capabilities and mobile access.
This document describes modeling and verifying a telecommunication application called Depannage using Live Sequence Charts (LSCs) and the Play-Engine tool. Depannage allows users to call for help from emergency services. The application is complex due to its distributed architecture, time constraints, and evolving components.
The authors specify Depannage using LSCs to describe component behaviors and interactions. Key components include Search, which locates emergency providers, and Users, which models user states. Universal LSCs define mandatory component behaviors, while existential LSCs define possible behaviors. The Play-Engine tool is used to simulate, animate, and formally verify the LSC specification.
The methodology captures requirements at a high level using
Validation of early testing method for e government projects by requirement ...Conference Papers
The document describes a validation study of an Early Requirement Testing Method (ERTM) for e-government projects. Test engineers used the ERTM, which involves reviewing requirements documents and providing feedback, on six e-government projects. The number of defects found before and after applying the ERTM and providing interventions was compared using a statistical test. The results showed that overall, there was a statistically significant reduction in the number of defects found after applying the ERTM, suggesting it is useful for improving requirements documentation. However, one project saw an increase in defects due to additional requirements added later in the project.
This document describes a Relaxed Context-Aware Machine Learning Middleware (RCAMM) for Android that was developed by students and a professor at V.E.S. Institute of Technology in Mumbai, India. RCAMM collects and stores context information from mobile devices and uses machine learning to provide personalized suggestions to users. It aims to reduce redundancy for developers by handling context collection and storage in a middleware, allowing apps to simply consume context data. The middleware uses a hybrid context model with JSON encoding and a relational database to store historical context values from devices.
GROUP MEMBER :
MOHD.AIRIL SOLEHAN BIN JOHARI 043911
MUHAMMAD AIMAN BIN ABD GHANI 043959
MUHAMMAD NAUFAL BIN FARID 043953
MUHAMMAD NURAZRUL AMRI BIN NOOR AZLAN 044416
MUHAMMAD NUR ATHARI BI SHAFIEE 044439
Real time text stream processing - a dynamic and distributed nlp pipelineConference Papers
The document proposes a real-time architecture using Apache Storm and Apache Kafka to apply natural language processing (NLP) tasks to streams of text data. It allows developers to inject NLP modules from different programming languages in a distributed, scalable, and low-latency manner. An experiment was conducted using OpenNLP, Fasttext and SpaCy modules on Bahasa Malaysia and English text, and Apache Storm achieved the lowest latency compared to other frameworks.
This document describes the development of a web-based job fair information system using the waterfall model of software development. The system allows users to access information on job vacancies, registration for vacancies, and test schedules. It was developed using requirements collection, specification and design, implementation, and testing phases of the waterfall model. The system provides information to both job seekers and administrators. For job seekers, it allows viewing of information and online registration for vacancies. Administrators can manage all data and information on the system. The system was tested on different browsers and needs further improvement for use on mobile devices.
Distant learning is developing and attracting more users due to the availability and popularity of computers and mobile devices among young and old learners alike. A lot of learning platforms provide courses and training in different fields, but lack accessibility for the visually disabled students, and cannot be optimally accessed from a handheld device, whereas mobile devices are very popular.
The document describes a lecture presentation system called Classroom Presenter that uses a Tablet PC as the presentation device. Key features of the system include the ability for instructors to write directly on slides, have multiple views including a separate view for notes, and support for navigation between slides and a digital whiteboard. An evaluation found that instructors made extensive use of inking on slides and found the system improved interactivity over traditional computer-based presentations. The system has been deployed across multiple universities.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
This document describes potential thesis topics in networking that a professor at UNSW is willing to supervise. It provides details on several proposed undergraduate thesis projects related to the supervisor's research interests in areas like video communication, network dependability, and wireless networking. Students are instructed to email their resume and academic record to the professor if interested in any of the topics.
This document describes Synchron-ITS, an interactive tutoring system designed to teach operating systems concepts related to process synchronization and shared memory. It aims to bridge the gap between the high-level theory taught in OS courses and the low-level implementation details.
The system provides three modes of operation - autonomous mode which runs simulations without interruption, self-check mode which allows users to validate their understanding by testing guesses, and real-time mode which will integrate data from a running Linux system. It uses visual representations and source code examples to help students connect concepts to implementations. The goal is to make typically complex OS concepts more accessible through an interactive learning experience.
The document discusses architectural issues for pervasive computing applications. It proposes an application model where applications are composed of modular components that can interact through a middleware infrastructure. The key aspects of the model are:
1) Applications are distributed across devices, device proxies, user proxies, and network services. This allows applications to span multiple devices and users.
2) Components communicate by exchanging messages through capabilities-based security that limits what components can access. This protects applications and the system from misbehaving components.
3) The model is flexible enough to allow customizing applications through adding, removing, or modifying components after deployment.
Video conferencing systems allow for real-time audio and video communication between multiple locations. They have several components including cameras, displays, microphones, and speakers. They can be used in distance education to provide high quality teaching, enable collaboration, and give students access to expertise not available locally. Benefits include resembling traditional classes and cost effectiveness. Limitations include high initial costs and equipment requirements, potential student disengagement, and dependence on network infrastructure. Types of systems include desktop conferencing over the internet, ISDN conferencing using digital phone lines, and ATM conferencing over dedicated networks. Research shows people may rely more on superficial cues like likability when communicating via videoconference compared to in-person due to increased cognitive demands
This document discusses using virtual laboratories for security education. It begins with an introduction on using virtual environments for practical coursework. It then discusses the strengths, weaknesses, opportunities and threats (SWOT analysis) of using virtual security laboratories. The key strengths are that virtual environments allow students administrator privileges safely, have simple saving and roll-back of states, and are scalable and versatile for security networking scenarios. Weaknesses include potential loss of computing power compared to physical machines. Opportunities include more efficient use of hardware and potential cost savings. Threats include software licensing issues and ensuring virtual machines are securely contained.
FYP PROJECT : TRANSPORTATION BOOKING SYSTEM VIA MOBILE COMPUTINGNurul Khairunisa Isa
This presentation outlines a proposed transportation booking system via mobile application for students at UniSZA. It discusses the current issues with manual booking that causes miscommunication and redundancies. The project aims to design and develop a mobile app to allow students to easily book and manage transportation with drivers. Key aspects of the system design are presented, including context and data flow diagrams to model the user roles and processes, as well as an entity relationship diagram to show the database structure. A proof of concept was also developed following an SDLC methodology to analyze requirements and design the technical architecture.
This document outlines requirements for an e-education software system. It will allow users to generate multimedia presentations combining video, images, and slides and publish them online. Key requirements include allowing teachers to upload course materials, students to view and download resources, and students to communicate with teachers. The software will import, organize, and synchronize various media files to generate previewable and publishable online courses.
The Grade Companion system is a web-based grade sheet creator for teachers at the National Institute of Technology Silchar. It allows faculty to upload exam marks and automatically generate grade sheets for all students, saving significant time over manual methods. Students can also view current and past grades online. The system aims to reduce workload for over 100 faculty members and provide grades to around 2500 students in a secured, scalable and easy-to-use manner.
This document discusses the concept and features of a virtual classroom called Virtual Class Room (VCR). VCR allows teachers to present remotely and conduct live online sessions for students. Key features include audio/video conferencing, screen sharing, file sharing, online quizzes, and remote desktop access. The goal of VCR is to simulate a traditional classroom experience over a computer network and provide interactive learning opportunities for students and teachers separated by location.
VIDEOCONFERENCING WEB APPLICATION FOR CARDIOLOGY DOMAIN USING FLEX/J2EE TECHN...cscpconf
This document describes a videoconferencing system designed for cardiologists using open source technologies. The system was developed using Flex and J2EE frameworks and the Red5 media server. It allows cardiologists at different remote hospitals to hold video conferences to consult experts on patient treatments. Key features included live audio/video streaming, text chat, video recording, and user/room management. The system architecture integrates Flex for the user interface with J2EE for the business logic via AMF remoting. This provides a rich internet application that can support real-time videoconferencing through a web browser.
This document describes a videoconferencing system designed for cardiologists using open source technologies. The system was developed using Flex and J2EE frameworks and the Red5 media server. It allows cardiologists at different remote hospitals to hold video conferences to consult experts on patient treatments. Key features include live audio/video streaming, text chat, video recording, and user/room management. The system architecture integrates Flex for the user interface with J2EE for the business logic via AMF remoting. This provides a rich internet application that can support real-time multimedia communication between multiple users through a standard web browser.
An enhanced wireless presentation system for large scale content distribution Conference Papers
An enhanced wireless presentation system (eWPS) was developed to distribute presentation content to larger audiences over WiFi networks. The eWPS uses multiple access points connected via a high-speed Ethernet switch to provide WiFi coverage to audiences. It captures screenshots of presentations and stores them on an external web server for access by audience devices through a web browser. Testing showed the eWPS could serve over 125 audience devices with an average delay of 1.74ms per page load. System resources on the web server remained mostly idle, indicating it could potentially serve a much larger audience size.
An enhanced wireless presentation system for large scale content distribution Conference Papers
An enhanced wireless presentation system (eWPS) was developed to distribute presentation content to larger audiences over WiFi networks. The eWPS uses multiple access points connected via a high-speed Ethernet switch to provide WiFi coverage to audiences. It captures screenshots of presentations and stores them on an external web server for access by audience devices through a web browser. Testing showed the eWPS could serve up to 125 audience devices with an average delay of 1.74ms per page load. The system utilized CPU and memory resources efficiently, indicating it could potentially serve a much larger audience size.
The document discusses major design issues in cloud computing operating systems and techniques to mitigate them. It outlines issues like providing sufficient APIs, security, trust, confidentiality and privacy. To address these, a cloud OS needs to design abstract interfaces following open standards for interoperability. It also needs mechanisms like trusted third parties to establish trust dynamically between systems. The OS must allow for multitenancy while preventing confidentiality breaches through techniques like limiting residual data.
This document outlines a presentation on web conferencing. It defines web conferencing as live meetings over the internet that allow sharing of text, audio, video, and screens. It discusses objectives of using web conferencing in distance education like enabling real-time communication and collaboration. Features, limitations, uses, and examples of web conferencing tools are also summarized, as well as concerns about its use and a case study on its impact on distance learning.
Similar to Improved learning through remote desktop mirroring control (20)
The document describes an AI-driven Occupational Skills Generator (AIOSG) that aims to automate the process of creating occupational skills reference documents. The AIOSG utilizes an intelligent web crawler, natural language processing, neural networks, and a blockchain to gather data on occupational skills from various sources, analyze the data, and generate standardized skills reference documents. It is meant to make the document creation process more efficient, data-driven, and able to incorporate rapidly changing skills demands compared to the traditional manual process. The system architecture and key components of data collection, analysis, skills ontology construction, and reference document generation are outlined.
Advanced resource allocation and service level monitoring for container orche...Conference Papers
This document proposes an architecture for advanced resource allocation and service level monitoring for container orchestration platforms. It begins with background on containerization and different container orchestration platforms like Docker Swarm, Kubernetes, and Mesos. It then discusses the need for resource-aware container placement and SLA-based monitoring to minimize container migration and ensure performance. The proposed architecture consists of different components like a request manager, information collector, policy manager, and resource manager to enable advanced scheduling and monitoring of containers on Kubernetes. The proposed solution aims to analyze future resource utilization to improve placement decisions and reduce issues after deployment.
Adaptive authentication to determine login attempt penalty from multiple inpu...Conference Papers
This document proposes an adaptive authentication solution that determines login penalties based on multiple input sources. It describes adding an IP address checker module to the existing Trust Engine component of the Mi-UAP authentication platform. The IP address checker would identify the source type of a user's IP address and apply the appropriate penalty, such as requiring additional authentication methods or blocking the user, depending on factors like whether the IP is on a blacklist database. The document outlines the process flow and provides examples of how penalties would be applied based on the identified source type.
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...Conference Papers
- The document analyzes the absorption spectrum of dentine sialophosphoprotein (DSPP) in gingival crevicular fluid (GCF) samples from orthodontic patients to develop a model for detecting orthodontic-induced inflammatory root resorption (OIIRR).
- GCF samples were collected from orthodontic patients at different treatment periods (3, 6, 12 months) and from non-orthodontic patients. Absorption spectroscopy found DSPP absorbance spectra increased with longer treatment duration, indicating more DSPP released due to more OIIRR.
- A qualitative model using SIMCA analysis accurately classified GCF samples into orthodontic and non-orthodont
A deployment scenario a taxonomy mapping and keyword searching for the appl...Conference Papers
This document discusses developing a taxonomy to map relationships between applications, virtual machines, hosts, and clients when performing upgrades and patches. It proposes creating a taxonomy based on analyzing errors that occur during application execution to understand dependencies. The methodology involves backing up configurations, testing connectivity between virtual networks and clusters before and after upgrades, and analyzing issues that arise. The goal is to establish structures for troubleshooting by classifying relationships between applications, libraries, operating systems, and browsers involved. This may improve determining the root cause of errors during upgrades involving virtualization.
Automated snomed ct mapping of clinical discharge summary data for cardiology...Conference Papers
The document discusses an approach to automatically map clinical terms in clinical discharge summary data from Malaysian hospitals to SNOMED CT terminology in order to improve the accuracy of queries for cardiology-related cases. Natural language processing techniques are used to preprocess the free-text discharge notes by removing formatting tags and identifying clinical terms, which are then mapped to SNOMED CT concepts using techniques like synonym matching, subsumption relationships, and identifying and excluding negative statements. The goal is to enrich the query results by standardizing the clinical terms to SNOMED CT and taking relationships like synonyms, subsumption, and negation into account to provide more accurate analytic results for monitoring and planning related to heart disease in Malaysia.
Automated login method selection in a multi modal authentication - login meth...Conference Papers
The document proposes an intelligent model to automatically select the login authentication method in a multi-modal authentication system based on user behavior profiling. It analyzes user behavior data from login sessions to minimize real-time processing and prevent untrusted attempts, while facilitating a frictionless user experience. The system determines the user, retrieves their behavioral historical data, matches the user profile based on data retrieval, and selects the authentication method based on evaluating the user profile and environmental parameters. It then updates the user profile with new successful login session data for future evaluations.
Atomization of reduced graphene oxide ultra thin film for transparent electro...Conference Papers
This document summarizes research on using an atomization process to deposit reduced graphene oxide (rGO) thin films for use as transparent conductive electrodes. Key points:
- Graphene oxide was spray coated onto silicon wafers and glass slides using an ultrasonic atomizer. Thermal reduction processes were then used to make the films electrically conductive while maintaining optical transparency.
- Thinner films with 1-2 spray coats had higher transparency (>90%) but higher resistivity, while thicker 3-4 coat films had lower transparency (77.1%) but lower resistivity (5.3 kΩ/sq).
- Rapid thermal processing was more effective than plasma processing at reducing resistivity. Sheet resistance decreased
An analysis of a large scale wireless image distribution system deploymentConference Papers
This document describes two setups of a wireless image distribution system:
1. A setup using commercial network equipment like access points and an access controller, which supported over 125 connected devices and provided sufficient bandwidth for the system load in an auditorium with 159 seats.
2. A setup using a wireless mesh network of three NerveNet nodes, which provided a quick and easy setup without wired connections but needs further performance improvements. Results from tests of both setups were analyzed to evaluate the network technologies for smart community applications.
The design and implementation of trade finance application based on hyperledg...Conference Papers
This document describes the design and implementation of a trade finance application built on the Hyperledger Fabric permissioned blockchain platform. It discusses the architecture of blockchain-based applications in general and this trade finance application specifically. Key aspects covered include identifying different types of software connectors (linkage, arbitrator, event, adaptor) that are important building blocks in the architecture. The trade finance application uses connectors like the blockchain facade connector and block/transaction event connector to interface between layers and handle asynchronous event propagation. Overall the document aims to provide insights into architectural considerations and best practices for developing blockchain-based applications.
Unified theory of acceptance and use of technology of e government services i...Conference Papers
This document describes a study that developed and validated a survey instrument to understand technology acceptance of an e-Government system called MYGOVSVC among Malaysian government employees. A literature review was conducted on previous studies applying the Unified Theory of Acceptance and Use of Technology (UTAUT) model to e-Government systems. A 21-item survey was developed containing questions on performance expectancy, effort expectancy, hedonic motivation, and facilitating conditions. The survey was translated to Malay and validated with stakeholders. It was administered to 419 government employees and results found the survey to be reliable in measuring acceptance of the MYGOVSVC system. The validated survey can be used to help improve e-Government services for Malaysian citizens.
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...Conference Papers
This document describes the development of a lead ion-selective electrode (Pb2+-ISE) sensor based on a poly-tetrahydrofurfuryl acrylate (pTHFA) membrane without plasticizers using photo-polymerization. The sensor demonstrated a linear range of 0.1-10-5 M, Nernstian slope of 26.5-29.8 mV/decade, limit of detection of 3.24-3.98 x 10-6 M, and good selectivity against interfering ions. Sensor characterization showed comparable results to measurements using atomic absorption spectroscopy on artificial and real samples. Optimization of the lipophilic salt potassium tetrakis(4-chlorophenyl)borate and lead ionophore
This document summarizes security definitions for searchable symmetric encryption (SSE) schemes. It reviews the indistinguishability and semantic security game definitions, noting that attacks have succeeded against published schemes. It then proposes a new security game definition against distribution-based query recovery attacks, to better capture practical adversary capabilities. The goal is to define security in a way that implies the current indistinguishability and semantic security definitions.
Study on performance of capacitor less ldo with different types of resistorConference Papers
The document summarizes a study on the performance of a capacitor-less low dropout (LDO) voltage regulator using different types of resistors. A 1.8V LDO voltage regulator was designed and simulated using five different resistor types in Cadence. The performance metrics compared included output voltage accuracy, phase margin, unity gain bandwidth, and power supply rejection ratio. Simulation results showed differences in LDO performance depending on the resistor type. The LDO with hpoly resistor had the best stability performance, while the LDO with pdiffb resistor produced the highest power supply rejection ratio. In conclusion, the type of resistor used can significantly impact key performance characteristics of a capacitor-less LDO regulator.
Stil test pattern generation enhancement in mixed signal designConference Papers
This document describes a process for generating STIL test patterns from mixed signal design simulations in order to test digital blocks on an SoC. It involves simulating the mixed signal design, sampling the waveforms to generate test vectors, and converting those vectors into an ATPG-compliant STIL format using an automation program. This was implemented successfully at MIMOS Berhad, generating STIL test patterns that passed 100% of stuck-at tests.
The document discusses the implementation of an on-premise AI platform at MIMOS Berhad, a Malaysian research institute. The platform makes use of existing on-premise services such as a private cloud, distributed storage, and authentication platform. It provides an AI training facility using containers on VMs, with distributed training and GPU/CPU support. A version management system stores AI models and applications in Docker images. Deployment is supported on the private cloud and edge devices using containers. The goal is to enable internal development and hosting of AI projects in a secure, customizable manner.
Review of big data analytics (bda) architecture trends and analysis Conference Papers
This document reviews big data analytics (BDA) architecture trends and analysis. It discusses the evolution of data analytics from ancient times to modern technologies like Hadoop and Spark. It describes key features of BDA like flexibility, scalability, and fault tolerance. Common BDA architectures like lambda and kappa architectures are summarized. The lambda architecture uses batch, speed, and serving layers to handle both real-time and batch processing. The kappa architecture simplifies this by removing the batch layer and handling all processing through streaming. Overall, the document provides a high-level overview of BDA architectures and technologies.
Rapid reduction of ultrathin films of graphene oxide on large area silicon su...Conference Papers
This document summarizes research on producing graphene oxide thin films on large silicon substrates using ultrasonic spray coating and rapid thermal reduction. GO droplets were spray coated in ethanol and overlapped to form uniform thin films. Films were reduced at 1100°C by rapid thermal processing (RTP), achieving sheet resistances of 1-4 kOhms/sq. Characterization with SEM, AFM, XPS and four-point probe showed the spray coating produced uniform, continuous thin films with increasing thickness for more spray passes. RTP effectively removed oxygen and produced conductive rGO with mostly sp2 bonding, while lower temperature reduction was less effective. Sheet resistance generally decreased with more spray passes due to increased thickness.
Performance evaluation of route selection schemes over a clustered cognitive ...Conference Papers
This document evaluates the performance of different route selection schemes over a clustered cognitive radio network (CRN) using a testbed with Universal Software Radio Peripheral (USRP) and GNU Radio platforms. The experimental results show that an enhanced reinforcement learning (RL)-based route selection scheme (C-ERL) selects stable routes in a clustered CRN while improving cluster stability and network scalability without significantly impacting quality of service metrics like throughput, packet delivery rate, and end-to-end delay. C-ERL adjusts its learning rate based on route capacity to reduce the number of route breakages and number of clusters compared to other non-clustered and clustered non-RL and RL-based route selection schemes.
Performance analysis of enhanced delta sampling algorithm for ble indoor loca...Conference Papers
1) The document presents research on enhancing the Delta Sampling algorithm to improve Bluetooth Low Energy (BLE) indoor localization accuracy.
2) The original Delta Sampling algorithm aims to stabilize unstable RSSI readings but has drawbacks related to threshold and range parameters.
3) The study collects RSSI data from a BLE beacon and transmitter at different distances and analyzes the original and enhanced Delta Sampling algorithms.
4) Results show the enhanced algorithm with adaptive threshold and range parameters better stabilizes RSSI readings compared to the original.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Improved learning through remote desktop mirroring control
1. Improved Learning through Remote Desktop
Mirroring Control
Khong-Neng Choong, Chrishanton Venthanayagam and Putri Shahnim Khalid
MIMOS, Kuala Lumpur, Malaysia
Email: {kn.choong, chrishanton.v, shahnim.khalid}@mimos.my
Abstract—The potential of wireless technology to improve
teaching and learning is so effective that it is currently at the
forefront of technological advancements in education.
Besides utilizing laptops and mobile devices, content
mirroring (e.g. Apple Airplay and Miracast) has also been
an important application technology in supporting better
learning. This paper describes a wireless presentation
system which directs and controls wireless presentation
stream called the Wireless Stream Management System
(WSMS). Unlike Airplay and Miracast, WSMS is designed
to allow the moderator (teacher) to remotely manage and
control selected real-time screen mirroring source for
instant content amendment/correction in the effort of
supporting collaborative learning.
Index Terms—wireless presentation, seamless presentation,
presentation management, collaborative learning, screen
capturing, display sharing.
I. INTRODUCTION
The potential of wireless technology to improve
teaching and learning is so effective that it is currently at
the forefront of technological advancements in education.
These technologies include the continuous enhancement
of mobile device capabilities, omnipresence of wireless
connectivity, use of multimedia content and collaborative
application tools to improve teaching/learning interaction.
The key objective here is to utilize these technologies to
aid and enhance the delivery of course content for better
understanding and experience of the students.
Presentation is a common routine being in classroom,
seminars, conference sessions, meetings or other
interactive forums using shared displays and mobile
devices for collaboration purposes [1, 2]. Presentation
generally involves presenters connecting their laptops to
projectors, which could be done wirelessly using wireless
projector, or with wire in the traditional manner.
Connecting individual laptop one at a time to the
projector is manageable if the presentation session
involves single laptop and single screen output per
presentation, such as in typical meeting and lectures. But
it would be a challenge in a smart classroom environment
given both the teacher (moderator) and students have to
constantly interact by switching their laptop content onto
the common projector screen for presentation and
discussion.
As of today, there are many electronic communication
tools that help users to conduct meeting and presentation.
This includes online chat, video conferencing, remote
desktop sharing, application sharing etc. Despite these
long list of tools, the fundamental problems in handling
meetings and presentations have not been addressed. In
general, these problems can be categorized as follows:
A. Limitation of physical connection
The need to plug and unplug VGA cable across
different laptops for various individual presentations. The
length of VGA cable further determines the location and
hence limit the mobility of the presenter. The unhealthy
practice of attaching and detaching USB drives
(potentially from various unsecure sources) to/from the
PC connected to the LCD/projector, causing unnecessary
virus infections to the PC, and also causing delay to the
presentation.
B. Inflexible meeting control
Presenters must listen to the session chair (teacher) on
when to start connecting to the projector in order to show
their laptop content. Absence of easy-to-use meeting flow
control capability for session chair to start/stop, direct and
queue-up presentation from one central location.
C. Limited interaction with participants
Some meeting participants are not able to see the
projected contents on the screen due to their seating
location, viewing distance and blocking by front
participants. Participants who are late are not able to
access the materials they want (e.g. the first few slides
that has been presented). Less vocal participants are
unable to interact with the presenter or session moderator
throughout the presentation session.
The above top 2 issues can cause problems and often
delay the setting up of presentation. Worst, it could even
introduce technical issues where no output is shown on
the LCD/projector due to hardware incompatibility or
different screen resolutions. In this paper, we introduce a
wireless mirroring system which tackles the above issues.
This paper focuses on enabling a remote management
feature on top of the wireless mirroring system, which
allows the moderator (teacher) to remotely manage and
take over selected real-time screen mirroring source for
on-the-spot guidance as an effort to support collaborative
learning.
This paper is organized as follows. Section 2 provides
a detailed description of the proposed system. Section 3
describes the system architecture and components.
Section 4 describes the testbed setup and performance
results, while Section 5 highlighted some related works.
Section 6 concludes the paper.
2. II. WIRELESS STREAM MANAGEMENT SYSTEM
Figure 1 shows the high-level functional overview of
our proposed system named the Wireless Stream
Management System (WSMS). WSMS uses wireless
connectivity (Wi-Fi) to address the physical limitation of
conventional presentation setup. It supports two modes of
presentation, namely (1) the democratic mode where any
presenter can take over the central screen whenever they
want, and (2) the moderated mode where a moderator is
allowed to manage and select which presenter can stream
his/her device screen to the central screen. WSMS is also
designed to distribute the current presentation content as
lightweight images (less than 1 MB in size) to
participants. This allows participants to zoom-in on the
image for clearer visual clarification, and save to their
local device storage for offline reading.
Figure 1. Wireless Streaming Management System
Besides the above features, WSMS is also supporting
remote device control over the network. This capability is
especially useful for teaching session which involves
practical hands-on such as lab assignment or exercise
where students are expected to repeat or utilize what was
taught to complete an assignment in the class using their
individual PC/laptops. Very often, students will
encounter problems, and lab assistants are usually the
helpers to the teacher/lecture who move around the class
to resolve issues for the students. This process takes time
and effort if there are lots of students. Students may be
experiencing the same or similar issues, but unfortunately
due to lack of technology, lab assistants are required to
repeatedly resolve these similar issues for multiple
students.
A proper technological approach would be to get all
students’ laptops connected to the WSMS so that the
teacher could log-in as the moderator to select any
student’s laptop to be projected on the main
screen/projector as shown in Step 1 at Figure 2. The
tablet at the lower left of Figure 2 shows a list of 3
student laptop icons where the first laptop is currently
mirroring/projecting its laptop’s content.
The teacher could then remotely control and manage
the student’s laptop to demonstrate how to resolve their
problems for the benefits of the entire class as shown in
Step 2 at Figure 2. With this approach, the teacher alone
could manage the entire practical session without the
need of any lab assistant. Moreover, the demonstration
showed on the projector would be seen by other students
who were experiencing the same or similar problems.
With WSMS, any student could have their laptop’s screen
projected easily onto the main screen/projector for the
teacher to comment or for other students to ask questions.
Hence, it would lead to an effective collaborative learning
experience.
Figure 2. Sequence of Moderator Flow Control
III. SYSTEM DESCRIPTION
WSMS is an application that was developed based on
the Seamless Presentation (SP) core modules as reported
in [3], which supports various screen mirroring delivery
models such as 1-to-1, 1-to-Many and 1-to-1-to-Many.
The latest version has incorporated the capability of
distributing presented content as screenshot images to
multiple receiving devices which run web browsers.
These combinations of content mirroring, delivery and
distribution are capable of supporting multiple usage
scenarios.
A. System Architecture
Figure 3 shows the system architecture of the entire
system. The system comprises of four key components
namely: Wireless Screen Sender (WSS) which is the
content origin, the Wireless Screen Receiver (WSR)
which is the corresponding receiver of content delivered
by WSS, the Wireless Screen Administrator (WSA) that
is responsible for assigning and managing the
presentation session and the Wireless Screen Controller
(WSC) as the central point of connection for WSS, WSR
and WSA besides coordinating the presentation session.
WSMS is built on top of the existing system as described
in [3] with additional VNC-based components, as
denoted by the shaded boxes.
B. System Components
There are several modules within each component. This
section discusses these components together with their
respective modules in detail:
WSS is consists of:
a) Application GUI as the interface for the initial
configuration input such as the presentation
content type and the group name
3. b) Core, which provides the main functionalities
such as performing screen capturing, encoding
and transmission to the WSC and also for
providing connection security. Detailed
description of the Core can be found in [3]
c) Screen Manager that comprises of the Session
Manager for coordinating the screen capturing,
encoding and transmission process, and the
Registry Client as the initial registration to the
WSC
d) VNC Server is a 3rd
party component which
shares screen and control of its local device, to
the VNC client over the network
WSR has a set of corresponding modules to the WSS:
a) Application GUI as the interface for setting up
the configuration such as the custom name.
b) Core, which provides the main functionalities
such as receiving, decoding and display contents
received from WSS via WSC
c) Screen Player, which consists of the Session
Manager for coordinating the receiving,
decoding and displaying of screen content from
the Screen Manager of the WSS, and the
Registry Client for registration to the WSC
WSA which works within the web browser context runs
the Session Management Module which consists of three
sub-modules:
a) Web UI as the user interface for the WSA to set
up, assign and manage the presentation sessions
b) UI Controller as the UI event handling. It runs
scripts to support VNC viewer web application
c) Session Agent which is used by the UI
Controller to forward WSA’s command to the
WSC as well as receiving status information and
updates from WSC
d) VNC Viewer Web App is a 3rd
party component
which is loaded from the VNC Proxy Server to
interact with the VNC Server
WSC as the session coordinator requires a Web Server to
deliver the Session Management Module to the WSA.
Besides that, it requires the Registry Module to enable the
coordination of the presentation session. In details, the
Registry Module comprises of:
a) Session Proxy as the gateway of communication
between the Session Agent and the Registry
Manager. The commands received from the
WSA is parsed and translated into a form of
message that is recognized by the Registry
Manager and vice versa.
b) Registry Storage for storing the information of
the WSS and the WSR.
c) Registry Manager for handling WSA’s
command as well as the registration process for
the WSS and the WSR
VNC Proxy Server, which interfaces websocket
communication from the VNC viewer web application in
WSA, to the RFB (Remote Frame Buffer) protocol with
the VNC server residing in the WSS.
Figure 3. System Architecture
4. IV. TESTBED SETUP
A. Network Architechture
A testbed as shown in Figure 4 has been set up to verify
the functionality and performance of WSMS. This testbed
is made up of one WSR and three WSSs, connected
wirelessly to one WSC which serves Wi-Fi hotspot. WSC
also serves the administrative webpage WSA to run on
browser device. A network monitoring tool named PRTG
[4] is used to collect statistics from devices running in the
network.
In this experiment a 3D3 Alix board [5] is used to host
the WSC component. This system board is equipped with
Ubuntu 12.04 OS and running in AP mode. All nodes
should connect to this board and ultimately get registered
with the Registry Module.
Figure 4. Testbed Setup
WSA on the other hand, is a web-based component
which retrieves the Session Management Module from
WSC. Therefore, it can be running on any machine or
device equipped with a web Brower. In our experiment a
Windows-based laptop runs as the WSA. Once any of
WSS node connects to WSC, WSA will be notified and
the web UI will be updated with the newly joined node
icon and information.
Figure 5 shows the user interface of the WSA. The
interface is very simple and direct. All connected and
registered WSS shall be represented with individual
square boxes with their names within. Whenever the
moderator selects a WSS box, an animation is played
within the box indicating an active session. Selecting the
active WSS will terminate the ongoing session. This is a
typical control for moderator to start and stop any WSS
via the moderator UI. Above each square box, there is an
extra button named “control”. Pressing this button allows
the moderator to remotely control the respective WSS.
Figure 5. User Interface of WSA
B. System Performance
Performance measurement for such a wireless-based
system is generally broken into 3 parts as follows:
• Network bandwidth utilization,
• Network latency and
• CPU utilization
This combination of tests should serve as a good
performance indicator on the overall user experience for
conducting remote desktop control.
To conduct the network bandwidth utilization, we first
determine the bandwidth available in the WiFi network
using iPerf [6]. This is followed by running PRTG on the
moderator laptop to measure the bandwidth used on
establishing the remote control VNC session for 3
different scenarios for a fixed period of 15 min as in
Table 1.
Table 1. Test Scenarios
Scenario Description
A Presenter streams PowerPoint slides
B Presenter streams low motion video
C Presenter streams high motion video
The total bandwidth available and WiFi link speed
measured during the experiment are as shown in Table 2.
Table 2. Network Measurement
Bandwidth
Available
(Mbps)
WiFi Link
Speed
(Mbps)
19.5 54
Figure 6 shows the maximum bandwidth utilization for
all 3 scenarios, from 0.47, 1.082 to 1.835 mbps
respectively. This matches logically to the nature of the
content from minimum screen changes in presentation
slides to drastic screen change as in videos.
5. Figure 6. Bandwidth Utilization
Measuring packet round trip time is essential to
understand the latency in the network. In general, ping
result of less than 50 ms means the network is really
good, less than 100 ms indicates good to average
performance, 150 ms means it is starting to have
problems with interactive online games, and above 150
ms means users may experience lagging.
Figure 7 shows the network latency collected for all 3
scenarios. Scenario C showed the highest latency at a
maximum of 173 ms which may due to certain high
movement scenes therefore utilizing higher bandwidth.
This has caused some performance degradation to
scenario C.
Figure 7. Network Latency
Table 3 tabulates the actual recorded values of network
latency for all 3 scenarios. There were however no issues
with CPU having enormous workload for all 3 scenarios.
Table 3. Network Latency and CPU workload
Scenario Network Latency (ms) CPU workload
Maximum Average Maximum
A 4.6 3 18%
B 16.1 6 19%
C 173 23 23%
V. RELATED WORKS
Various works and products can be found offering
similar basic features as our WSMS. However, each of
these works is limited to basic screen mirroring, there is
still an absence of session management and remote
control capability.
Wireless projector [7, 8] is the most common and
widely used product in the market. Even though it is a
self-contained device, it has many shortcomings. It is not
a straight-forward process for connecting laptops to the
wireless projectors as each brand comes with its own
configuration and execution steps. As mentioned, there is
no session management as described in WSMS.
A closer product in terms of basic functionality is
Google Chromecast [9] which supports browser-content
mirroring. It provides direct 1-to-1 streaming model and
is capable of running across any OS platforms. The main
limitation is that only contents within the browser could
be mirrored across. Again, it has no session management
as proposed in WSMS.
A screen sharing system in [10] has studied screen
contents for variety of usage scenarios and developed a
practical transformation that improved compression rates
which adapts to different screen content. This system runs
natively on Mac OS X, iOS and Windows platforms.
Unfortunately, it stops as a research project without
further development into product or service that is made
available in the market. Nevertheless, it is still lacking
session management as discussed in this paper.
VI. SUMMARY AND FUTURE WORKS
This paper proposes and describes a wireless
collaborative system for interactive learning called
WSMS, which allows the moderator (teacher) to remotely
manage and take over selected real-time screen mirroring
source (student’s laptop/device) for instant content
amendment/correction in the effort of supporting
collaborative learning. WSMS is developed on top of a
streaming platform called Seamless Presentation (SP) as
reported in [3]. Through SP platform, various mirroring
delivery models could be supported. Explained in this
paper is one of the recent models.
Future works include enabling more functionality. First
is to show desktop activities of all participants’
laptops/devices presented as image thumbnails which are
updated at fixed intervals. This allows moderator to easily
monitor each and every participant from a central point of
control. Second is to develop some image processing
algorithm to determine whether there are any
participants’ laptops/devices screens which are different
than the majority participants’ screens. This is to help the
moderator to ensure all participants are performing the
same tasks or focusing on the same piece of content as
instructed by the moderator.
REFERENCES
[1] Christian Berkhoff, Sergio F. Ochoa, José A. Pino, Jesus Favela,
Jonice Oliveira, Luis A. Guerrero, Clairvoyance: “A framework to
integrate shared displays and mobile computing devices”, Future
Generation Computer Systems, Volume 34, May 2014, Pages 190-
200, ISSN 0167-739X.
[2] Sungwon Nam, Khairi Reda, Luc Renambot, Andrew Johnson,
Jason Leigh: “Multiuser-centered resource scheduling for
collaborative display wall environments”, Future Generation
Computer Systems, 30 August 2014, ISSN 0167-739X.
[3] K.N. Choong, D. Naghshbandi and M.S Hisham, ‘Seamless
Presentation: A screen sharing system for WiFi network,” in Proc.
Int’l Conference on Communication, Networks and Satellite,
Jakarta, Indonesia, 2014.
[4] PRTG. [Online]. Available: https://www.paessler.com/prtg
6. [5] PC Engines. [Online]. Available: http://www.pcengines.ch/
alix3d3.htm.
[6] iPerf. [Online]. Available: https://iperf.fr/
[7] X. Li, S. Wang, J. Tan, J. Ye, X. Si and M. Li, “Automatic
wireless embedded projector player system,” in Proc. Int’l
Conference on Multimedia Technology, Ningbo, China, 2010.
[8] I. Dvir and Y. Medan, “Method and system for remote video
display through a wireless projector,” WO 2002033687 A2, April
25, 2002.
[9] Google Chromecast. [Online]. Available: http://www.google.com/
intl/en/chrome/devices/chromecast/
[10] S. Chandra, J. Boreczky and L.A. Rowe, “High performance
many-to-many intranet screen sharing with DisplayCast”, ACM
Transactions on Multimedia Computing, Communications, and
Applications, Volume 10, Issue 2, 2014.