Professional Documents
Culture Documents
International Journal of
ISSN 2225-658X (Online)
DIGITAL INFORMATION AND WIRELESS COMMUNICATIONS
Volume 4 Issue 3
2014
TABLE OF CONTENTS
Original Articles
PAPER TITLE
AUTHORS
PAGES
267
276
284
Makki,
Karim
292
FRAMEWORK-BASED
MANAGEMENT
299
DATA
REQUIREMENTS
FOR
IT
TOP
Virpi Hotti
Virpi
Hotti,
Saarelainen
Miia-Maarit
305
A MEDIUM ACCESS PROTOCOL FOR COGNITIVE RADIO NETWORKS Dina Tarek Mohamed, Amira M.
BASED ON PACKET'S COLLISION AND CHANNELS' USAGE
Kotb, S.H.Ahmed
314
ICT GOVERNANCE: LITERATURE REVIEW AND SURVEY IN Virpi Hotti, Heikki Merilainen,
NORTHERN SAVONIA
Harri Salomaa, Antti Lahtela
333
341
355
Ahmed,
372
387
MINIATURIZED
BANDSTOP
FILTERS
COMPLEMENTARY RESONATORS
401
USING
SLOTTED-
Mohammed Bait-Suwailam
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 267-275
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
ABSTRACT
The aim of this paper is to analyse and present cloudlink as well as campus-linked students perceptions of
collaborative learning and design based learning in
engineering. Project oriented design based learning
(PODBL) is a learning and teaching approach, where
students learn through design activities while being
driven by project(s). PODBL enhances cloud-linked
and campus-linked students ability to acquire career
essential skills that fulfill future industry needs. A
paper-based survey is used to recognise a cohort of
students' experience of collaborative learning and
design based learning in engineering. The paper-based
survey was given to 30 students from an engineering
discipline.
The quantitative analysis of the survey results shows
that more than 50% of the students view collaborative
learning to have a large benefit in design-based
learning.
KEYWORDS
Design based learning, project oriented design based
learning, collaborative learning, cloud-linked and
campus-linked.
1 INTRODUCTION
Collaborative learning is learning and teaching
approach that encourages students to work
together, share ideas, experiences and evaluate
each others results [1, 2]. In collaborative
learning, each member of the team needs to
understand what other team members have agreed
to research and what them as individuals must
contribute to the team. The students locate
resources that are directly relevant to the learning
267
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 267-275
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
combination of problem and project based
learning. Design projects have been used to
motivate and teach science in elementary, middle,
and high school classrooms and can help to open
doors to possible engineering careers. Design
based learning was implemented more than ten
years ago, however it is a concept that still needs
further development. With this in mind, it is very
important to characterise DBL as an educational
concept in higher engineering education [4] [5, 6].
A design based learning environment assists
curriculum to move into the twenty first century
with students being hands-on in their work, in
addition to using problem solving skills, engaging
in collaborative teamwork, creating innovative
designs, learning actively, and engaging with realworld assignments. Figure 1 illustrates the design
based learning process.
268
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 267-275
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
to demonstrate that their graduates are capable of
acquiring and achieving career focused learning
outcomes. It creates a boundary for a student
learning capability, when programs are content
driven that is focused on engineering science and
technology courses. PODBL is a structured
framework, which will overcome insufficiency of
design practice related to industry requirement.
3.1 Cloud-Linked and Campus-Linked
The cloud-linked (online education) has played an
important role in the provision of educational
equity for learners who live in remote Australian
communities [14]. Engaging students and lectures
will always ensure a positive experience in offcampus education (cloud-linked) [15]. The
teaching staff team must be committed, equipped
and
adequately
resourced
to
support
implementation of the cloud-linked (distance
based learning) mode.
Cloud-linked must enhance learner-staff and
learner-learner interactions as well as enriching
the learning experiences of both learners and staff
[16]. The technology will never replace the
teacher in any classroom, but with careful
planning and judicious use. It can provide ways of
enhancing rural education. The Problems exists in
distance education are quality of instruction,
misuse of technology, attitudes of instructors,
students and administrators. To fulfill cloud-linked
(distance learning) students expectations, the
Internet and compressed video have taken distance
learning in new directions, allowing distance
learning to occur in real time [17].
Engineers Australia, Accreditation of engineering
programs in Australia recognizes that educational
and learning techniques are continually changing
and advancing [18]. Engineers Australia policy on
Accreditation of programs offered in distance
mode guidelines states, Electronic and face-toface opportunities must be provided for distance
mode learners to interact, particularly to ensure
that group and team based learning experiences
are equitable for both campus-linked (on-campus)
and cloud-linked (online mode) cohorts and
269
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 267-275
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
The PODBL cycle (figure 2) involves nine main
steps. The steps are illustrated in figure 2 above.
Steps 1-6 & step 9 are a combination of both cloud
and located learning (campus-linked), and steps 78 are performed through located learning. Steps 1
to 3 of the PODBL cycle the project is presented
to the students by the academic or industry based
facilitator and the students are given the
opportunity to brainstorm on the project to
identify the problems and engage in concept
research to understand the essential learning issues
and the overlapping issues. These activities are
conducted in the seamless digital environment for
cloud-linked learning. The students are provided
with integrated short, accessible, highly visual,
media-rich, interactive learning experiences
rebuilt for the mobile screen, and integrating
learning resources created by Deakin and other
worldly universities and premium providers.
The school of engineering has already started in
this direction with the use of technology to enable
learning practice and under this initiative
encouraged staff to record the lectures and
tutorials. The staff could record their lecture on
video or use screen capture software to record the
lecture slides along with audio and the recording
are provided to the students via the cloud. These
lecture resources provide the students with an
opportunity to revisit lectures and go through the
concepts discussed during the session. The lecture
videos allow the students to catch up on missed
lectures with an experience similar to attending a
lecture. Students have indicated in a survey they
use the lecture as a catch up exercise and it allows
them greater interaction [20]. The school is
moving towards the recording of short topic based
clips no longer than ten minutes which will allow
the students to access material which are media
rich and visually engaging.
Steps 4 to 6 in the PODBL cycle the teams are
involved in developing the design brief to produce
the key planning document with the specifications
for the project and project plan, select the concept
for the solution based on the ideas generated
during the concept research step and move on to
the design and development step to develop the
final design. These activities are a combination of
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 267-275
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
in solving real world problems, and evidence their
achievements in professional and personal digital
portfolios. With premium cloud learning
experiences in place, students who come to
campus will have the opportunity to engage with
teaching staff and peers in opportunities for rich
interpersonal interaction through large and small
team activities and also provided through the use
of lecture videos, online tutorial for students who
are able to make it campus-linked.
4 COLLABORATIVE LEARNING
When students work in groups of two or more
where the centre of attention is project report or a
design is known as collaborative learning.
Participants have their individual accountability
along with several conditions. Collaborative
learning requires working together towards a
common goal where students are responsible for
one anothers learning [21]. It is an educational
approach to learning and teaching that involves a
group of learners working together to solve a
problem, complete a task or create a product [22].
With different learning styles students are able to
express their skills and talents through working on
projects or by simply designing experiments in
authentic learning environments [4, 23].
Integrating design and technology tools into
science education provides students with dynamic
learning opportunities to actively investigate and
construct innovative design solutions. By
engaging students in collaborative learning,
PODBL provides an opportunity to experience
individual, inventive and creative projects that
initiate the learning process in relation to their
preferences, learning styles and various skills.
4 METHODOLOGY
Engineering at Deakin has used design-based
learning (DBL) as one of its engineering learning
principles for further development in teaching and
learning. It is required to improve the learning and
teaching process as a holistic approach from the
perspective of students and staff over the entire
degree program. The qualitative and quantitative
paper based survey method is used to obtain
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 267-275
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
projects through real world problems with
industrial experiences.
Table 1: Advantages of collaborative learning
Cloud
linked
(%)
4
Campus
linked
(%)
11
30
15
No answer
Students perceptions
More discussion Opportunities,
distribution of knowledge
Campus
linked
(%)
27
10
12
15
16
10
Students perceptions
Team members are not
contributing
Independent learning not
applicable, Relaying on other
tasks
272
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 267-275
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Table 3: Design based learning means
Students perceptions
Campus
linked
(%)
22
19
31
10
Cloud
linked
(%)
No answer
Learning in a particular way,
Learning by doing, hands on
projects
Learning through Practical
application of engineering (design
problem)
Project based learning (real world
projects), learning through
projects (design projects)
Figure 4: DBL final year project
Cloud
linked
(%)
0
Campus
linked
(%)
37
19
10
11
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 267-275
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
About 7% of all students in both study mode
believed DBL through industry related projects;
learning through projects, design techniques.
Through a design based learning approach, design
is driven by qualitative thinking, speculation,
ideation, prototyping and specification [25, 26].
To achieve the goal of developing education,
design educators provide practical strategies that
exhibit the pedagogy of design education and
problem solving processes. The goal of the design
approach was not to change the whole curriculum
of art education but for students to develop the
ability to enhance and transform ideas through
visualization, manipulation and the application of
data to problem solving through design activities
[27, 28].
The purpose of design education is to enhance
learning in order to teach students to become
active participants to solve the design problems
around them [29, 30]. The aim of all educational
institutions is to educate students as graduate
engineers, and equip them with the ability to work
in industry with graduate ready skills such as
creativity, innovation, teamwork, problem solving,
observation, analytical thinking, communication,
and prototyping etc. Every learning and teaching
approach has its own special way of confronting
engineering problems. In design based learning,
students solve engineering problems by using
design as a vehicle.
6 CONCLUSION
This research paper focused on identifying cloudlinked and campus-linked students perceptions on
collaborative learning and design-based learning
in engineering. The quantitative analysis of the
survey results shows that more than 50% of the
students view collaborative learning to have a
large benefit in design-based learning. Project
oriented design based learning approach created
an enhancing environment for students and staff
members through collaborative learning in cloudlinked and campus-linked study mode. The
students' perceptions always have an important
value in an engineering curriculum to foster their
learning outcomes.
7 REFERENCES
1.
274
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 267-275
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
13. Chandrasekaran, S., Stojcevski, A., Littlefair, G.,
Joordens, M.: Accreditation Inspired Project Oriented
Design Based Learning curriculum for Engineering
Education, in 2nd International Engineering and
Technology Education Conference (IETEC), Ho Chi
Minh City, Vietnam (2013).
14. Stevens, K., Australian Developments in Distance
Education and Their Implications for Rural Schools.
Journal of Research in Rural Educaion, vol.10, pp. 7883 (1994).
15. Rachel Crease, B.P.a.L.H. Bridging the gap - engaging
distance education students in a virtual world, in
Proceedings ascilite 2011 Changing Demands,
Changing directions, Hobart (2011).
16. Bradley, P.A., Engineers Australia Policy on
Accreditation of Programs Offered in Distance Mode,
Engineers Australia, Melbourne (2011).
17. Valentine, D., Distance Learning: Promises, Problems,
and Possibilities. Online Journal of Distance learning
Administration, vol.5, (2002).
18. EA, Stage1 competency standard for professional
engineer, Engineers Australia: Australia (2012).
19. Stuart Palmer, W.T., The evolution of online teaching
and learning in engineering at Deakin University,
Journal of Computing in Higher Education, vol.3, pp.
91-109 (2001).
20. Joordens, M., Chandran, J., Stojcevski, A.: Comparison
of Technology Enabled Learning Practices (TELP) in
Engineering: a student's perspective, in 23rd Annual
Conference of the Australasian Association for
Engineering Education. Melbourne (2012).
21. Dooly, M.: Telecollaborative Language Learning. A
guidebook to moderating intercultural collaboration
online, in Constructive Knowledge Together, Bern,
Editor. Peter Lang (2008).
22. Laal, M., Ghodsi, S.M.: Benefits of collaborative
learning. Procedia - Social and Behavioral Sciences,
vol.31, pp. 486-490. Elservier (2012).
275
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 276-283
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
ABSTRACT
This paper explains how to develop an integrated
framework for English language education based on
the four phases of design-based research (DBR). In the
first phase of the DBR we conducted a qualitative
investigation to identify relevant problems at the
Japanese university where this research was
undertaken. To ameliorate these problems in the
second phase, we (a) developed an original placement
test, (b) created a classification technique by
employing a Bayesian algorithm, and (c) established an
e-learning system and comprehensive educational
policy. In the third phase the developed placement test
was tested, and all the test items were analyzed using a
Rash model. In the last phase our framework for
English language education was put into practice. Our
findings confirmed that the new framework not only
resulted in a substantial reduction in budgetary and
manpower costs, but also successfully contributed to
the improvement of the students learning outcomes
and integration of the entire process of English
language education.
KEYWORDS
English language education, design-based research, test
development, e-learning, education in Japanese
1 INTRODUCTION
English language education in Japanese
universities has been changing rapidly in recent
years as a result of a number of government
initiatives and directives. The Ministry of
Education, Culture, Sports, Science and
Technology recently released a report on the
globalization of Japanese universities.[1] In the
report reforms in English language education were
particularly emphasized. These reforms were in
276
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 276-283
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
2 DESIGN-BASED RESEARCH
The framework for our English language program
was developed using design-based research (DBR).
The origin of DBR is most closely associated with
Brown (1992) and Collins (1992).[4] [5] In the early
stages of development DBR was labeled a design
experiment (DE) in consideration of the research
focus, practice, and underlying epistemology.[6]
DE focuses on the understanding of a learning
ecology, which consists of complex elements of
an interactive system in teaching and learning,
with different types and levels.[7] In contrast to
other research methodologies that reduce complex
teaching and learning practices to a simple causeand-effect models with a list of separating factors,
DE aims to offer a holistic explanation for designbased practice, and has greatly influenced
educational studies.
DE has grown in diversity since it first appeared in
the field of educational studies. Consequently, it
has become difficult to find theoretical or
methodological
coherence
among
efforts
purporting to use DE. In recognition of this
diverse nature of DE, the Design-Based Research
Collective (2003) was created to provide new
theoretical and methodological advances.[8] Their
work clearly defined the character of DBR, and
showed the direction for ensuing studies based on
DBR.
Figure 1. The four phases of DBR (adopted from Amiel & Reeves, 2008, p. 34)
277
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 276-283
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 276-283
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
(1)
(2)
(3)
(4)
e-learning
system
and
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 276-283
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
280
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 276-283
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
3 PRACTICE
281
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 276-283
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
M = 22.41
SD = 5.86
4 SUMMARY
As a result of our efforts, we were able to achieve
three project outcomes:
1. Development of an original placement
examination (ver. 1.0)
2. Development of a probability model based on a
naive Bayes classifier
3. Development of an integrated framework for
two-year compulsory English lessons, with
applications to actual lessons
In regard to the first point, it is worth noting we
managed to drastically reduce budgetary and
manpower costs. Beginning in the 2014 academic
year we will conduct a computer-based placement
test using Moodle software, in place of the
previous private, standardized test. Since we have
developed a new Moodle module for a naive
Bayes classifier, scores of any test conducted on
Moodle can be classified automatically. Further
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 276-283
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
14.
15.
5 REFERENCES
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
16.
17.
18.
ACKNOWLEDGMENT
This work was supported by JSPS KAKENHI
Grant Number 25870967.
283
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 284-291
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
I. INTRODUCTION
A smartphone is a mobile device, which offers PClike functionality. A variety of operating systems
exist for smartphones today; examples of this include
Apples iOS, Android, Symbian, and Windows
This material is based upon the work supported by the National Science
Foundation under Grant No. 0851912.
Any opinions, findings, and conclusions or recommendations expressed in this
material are those of the author(s) and do not necessarily reflect the views of the
National Science Foundation.
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 284-291
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
costs while limiting the product in other ways, such
as memory size and weight. While this approach
makes some improvements on mobile device
resources, it still leaves the devices with significant
limitations.
Another
approach
involves
offloading
computational tasks to remote servers in order to
conserve mobile resources. This approach is
generally described as Cyber Foraging, or
application offloading. This approach is a key step
in realizing the pervasive computing vision [21].
Solving the problem of resource constraints on
mobile devices is an important achievement for the
user and for mobile computing. In order to achieve
this, an intelligent and active mobile middleware is
necessary.
The outline of this paper is as follows: In the next
section, we discuss relevant background information
pertaining to surrogate computing, automatic
reconfiguration, remote servers, and mobile
middleware. Section III summarizes and highlights
the key features of our proposed middleware. Section
IV presents the conclusion and future work.
II. RELATED WORK
A. Mobile Applications
A mobile application is a program designed for
mobile devices. There are a plethora of mobile
applications (apps) available today; for instance, the
iPhones App Store is home to over 500,000 mobile
applications [2]. Similarly, Androids Google Play
contains approximately the same amount of mobile
applications [3]. Mobile applications range from
games to navigation apps; each application put
different strains on the resources of a mobile device.
For example, a movie streaming application heavily
consumes networking resources, while a game with
detailed 3D graphics consumes processor resources.
B. Offloading
For many years, researchers have investigated the
issues of conserving mobile resources through the
offloading of computationally intensive tasks.
Rudenko et. al. [4] was among the first to introduce
the idea of remote execution to conserve energy of
mobile devices. The authors in [5, 18, 20, 22]
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 284-291
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
search results. The server calculates a score for each
result based on the user preferences. Then, it
organizes the results so only the apps relevant to the
users interests appear, and finally the server sends
the results to the user. Without using a surrogate,
this process is unacceptably slow, as memory and
processing resources of a mobile device are limited.
Our experiment demonstrates the benefits of
offloading to minimize mobile device resource usage,
highlighting the importance of having automatic
reconfiguration in middleware.
C. Remote Server
In order for tasks or applications to be offloaded to
servers remotely, servers must have the following
features to run effectively:
Communication Manager - A communication
manager is needed to operate data to and
from mobile devices.
Virtual Machine Manager- This section of a
remote server manages the creation,
execution, and storage of the virtual machine
within the server.
Decryption Service A decryption service is
required to decrypt data exchanged between
severs and mobile device.
Individual Server Provides service to Mobile Devices
Communication
Manager
Decryption
Service
Phone OS
Storage
Virtual Machine
Manager
Virtual Machine
iOS
Device
Android
Device
Web OS
Device
Android
Device
With
static
reconfiguration, applications are always offloaded
whenever they are executed on the mobile device.
This process occurs at the time of installation, and
before execution of the application, allowing the user
to change preferences for static reconfiguration of a
specified application.
Dynamic Reconfiguration Unlike static
reconfiguration, dynamic reconfiguration is a process
of offloading based on the state of the device. This
occurs when there is a noticeable change in
performance. In order to determine when a dynamic
reconfiguration should take place, cost benefit
formulas are used. These formulas take into account
several factors, such as battery level, user
preferences, bandwidth description, and network
strength. The formulas are calculated individually and
compared. If the benefit of offloading is higher than
the cost, the middleware will offload the application
to a remote server.
Contextual Reconfiguration Contextual
reconfiguration shares similarities with Dynamic
configuration, with the exception of where
applications are offloaded. With contextual
reconfiguration, only nearby servers are used to host
applications. The term originates from the use of the
devices context, specifically its location. Utilizing
contextual reconfiguration may reduce the latency of
offloading from the mobile device to the remote
server.
Criteria for Good Middleware
In the context of being able to perform efficient
286
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 284-291
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
automatic reconfiguration of applications, a good
mobile middleware solution must generally meet one
or more of these five criteria:
i. Complete Service Along with reconfiguration,
middleware must offer other features, such as
fault solution systems and intelligent knowledgebase.
ii. Application
Portability
Middleware
compatibility with applications is essential for
providing efficient automatic reconfiguration.
iii. Offloading Pieces of Application Small
portions of an application or the application itself
may need to be offloaded if they are
computationally intense.
iv. Triggering of Reconfiguration.
v. Contextual Reconfiguration Contextual
reconfiguration allows for data to be sent across
shorter distances, allowing for more efficient
offloading.
E. Offloading
Related work in this area has touched upon
different aspects of mobile middleware development
and mechanisms for offloading.
Xiaohu Gu et. at.s work describes an adaptive
offloading mechanism which relies on a distributed
offloading platform and an offloading inference
engine to compute small portions of an application
remotely [13].
Similarly, Gonzalo Huerta-Canepa et. al., worked
on a version of this offloading technique that
revolved around monitoring application behavior and
offloading based on a mathematical model [15].
Mararasu et al.s work describes a service which
must be created and configured by developers [12].
Byung-Gon Chun et. al., discussed the design and
implementation of the CloneCloud system [7, 8],
which enables mobile applications to seamlessly offload threads from mobile devices onto device clones
operating in a computational cloud. This is done
through the utilization of static analysis and dynamic
profiling to partition applications in a manner which
optimizes application execution. Implementation of
this system was shown to lead to a 20 times
execution speedup for certain applications [8].
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 284-291
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
B. Reconfiguration
The proposed middleware supports dynamic,
static, and contextual reconfiguration:
Dynamic Reconfiguration - Our system utilizes
the cost benefit using the formulas shown below:
Cost of offloading = Network Type + Battery Level +
Bandwidth Restrictions + User Preferences+ Current
Network Strength + Application Currently
Reconfigured
(1)
Benefit of offloading = Processor Utilization +
Memory Utilization
(2)
Fault, n
Solution, 1
Solution, n
Attempts, 1, K
Attempts, n, K
Apply
Solution
Solution
found and
applied.
Fault fixed.
D.
Feature Model
The feature model as shown in Figure 4 provides
design information about our proposed system,
which allows us to identify all of the commonalities
that would exist between different versions of the
middleware on different devices [11]. The feature
288
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 284-291
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
model also allows the middleware to be easily
visualized, as shown in Figures [5-8].
Middleware
Higher
Processing Power
Intelligence
Knowledgebase
Sensor
User
Preferences
Automatic
Reconfiguration
Context
Database
Application
Setup
Intelligence
Knowledgebase
Error
Knowledgebase
Problems &
Solutions
Reasoning
Problems
Attempted Fixes &
Solutions
Sensors
Policies
User
Preferences
Reasoning
Storage
User
Preferences
Structure
Application
Access
Contextual
Reconfiguration
Robust
API
F. Fidelity Adaptation
Fidelity Adaption is another approach to
conserving a mobile devices resources. Fidelity
refers to an applications metric of quality [17] that
can be modified to conserve energy resources. For
example, if a user runs a visually intensive application
on his/her mobile device and observes a low frame
rate (because the device cannot handle the intense
computations), then the user can lower the visual
quality of the application so it can run smoothly.
Therefore, the fidelity adaptation approach is ideal
289
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 284-291
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
as it provides a method of minimizing resource usage
in the absence of surrogate computers. Furthermore,
it can be combined with Cyber Foraging techniques
to optimize mobile device efficiency [18, 19]. For
example, this combination would allow a lower
quality visual application to be offloaded to a
surrogate which leads to a smaller amount of data
being communicated to a remote server. This results
in a lower latency between the server and the mobile
device because smaller data can be parsed quickly.
Middleware
Application
Setup
User
Preferences
Preferences
Storage
User
Interface
Automatic
Reconfiguration
Service
Engine
Static
Reconfiguration
Data
Transfer
Engine
Application
States
State
Collection
Monitoring
Service
Remote Server
Lookup
State
Storage
Policies
If/Else
Engine
XML
No
Structure
XML
Encryption
State
Security
Other Data
Encryption
290
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 284-291
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Energy. In Proceedings of Computer, Vol.43, No.4,
pp.51-56, April 2010.
[7] C. Byung-Gon and M. Petros. Augmented
Smartphone Applications Through Clone Cloud
Execution. In Proceedings of 12th workshop on Hot
Topics in Operating Systems (HotOS XII), May
2009, Monte Verita, Switzerland.
[8] Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis,
Mayur Naik, and Ashwin Patti. CloneCloud: Elastic
Execution between Mobile Device and Cloud. In
Proceedings of the 6th international conference on
Computer systems (EuroSys '11), pp. 301-314, 2011,
New York, USA, DOI=10.1145/1966445.1966473,
http://doi.acm.org/10.1145/1966445.1966473.
[9] Roelof Kemp, Nicholas Palmer, Thilo Kielmann, and
Henri Bal. The Smartphone and the Cloud: Power to
the User. In Proceedings of the MobiCloud 2010.
[10] Xinwen Zhang, Anugeetha Kunjithapatham, Sangoh
Jeong, and Simon Gibbs. Towards an Elastic
Application Model for Augmenting the Computing
Capabilities of Mobile Devices with Cloud
Computing. In MONET 16(3): pp. 270-284, 2011.
[11] Setfan Ashmore and S. Kami Makki. IMISSAR: An
Intelligent, Mobile Middleware Solution for Secure
Automatic Reconfiguration of Applications, Utilizing
a Feature Model Approach. In Proceedings of the 5th
International Conference on Ubiquitous Information
Management and Communication (ACM SIGKDDSIGAPP ICUIMC 2011), pp. 21-23 February, 2011,
Seoul Korea.
[12] Alin F. Murarasu and Thomas Magendanz. Mobile
Middleware Solution for Automatic Reconfiguration
of Applications. In Proceedings of the 6th International
Conference of Information Technology: New
Generations (ITNG 09), pp.1049-1055, 2009, Las
Vegas USA.
[13] Xiaohui Gu, Alan Messer, Ira Greenberg, Dejan
Milojinic, and Klara Nahrstedt. Adaptive Offloading
for Pervasive Computing. In IEEE Pervasive
Computing Magazine, Vol.3, No.3, pp. 66-73, 2004.
[14] S. Kami Makki, Narasimha B. Srirangam, Venkata
S. Aiswarya, and Shui Yu. Utilizing Intelligent
Middleware for Reconfiguration of Applications on
Android. In Proceedings of International Conference
on Convergence and Hybrid Information Technology
291
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 292-298
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Minimization of Mutual Coupling Using Neutralization Line Technique for 2.4 GHz
Wireless Applications
W.N.N.W. Marzudi1, Z.Z. Abidin1, S.Z. Muji1, Ma Yue2 and Raed A. Abd-Alhameed3
1
Research Center of Applied Electromagnetic, Universiti Tun Hussein Onn Malaysia, Johor, Malaysia.
2
National Astronomical Observatories (NAOC), Chinese Academy of Sciences.
3
Mobile and Satellite Communications Research Centre, University of Bradford, United Kingdom
wannoornajwa@gmail.com, zuhairia@uthm.edu.my
ABSTRACT
This paper presented a planar printed multiple-inputmultiple-output (MIMO) antenna with a dimension of
100 x 45 mm2. It composed of two crescent shaped
radiators placed symmetrically with respect to the
ground plane. Neutralization line applied to suppress
mutual coupling. The proposed antenna examined both
theoretically and experimentally, which achieves an
impedance bandwidth of 18.67% (over 2.04-2.46 GHz)
with a reflection coefficient < -10 dB and mutual
coupling minimization of < -20 dB. An evaluation of
MIMO antennas is presented, with analysis of
correlation coefficient, total active reflection
coefficient (TARC), capacity loss and channel
capacity.
These characteristics indicate that the
proposed antenna suitable for some wireless
applications.
KEYWORDS
Multiple-Input-Multiple-Output (MIMO), impedance
bandwidth, mutual coupling, neutralization line
wireless applications.
1 INTRODUCTION
Nowadays and future wireless applications, there
is an insatiability demand for having high data
rate, high link quality, large bandwidth antenna at
both transmitter and receiver. MIMO technologies
have gain much attention recently. The potential
for MIMO antenna systems to improve reliability
and enhance channel capacity in wireless mobile
communications has generated great interest[1]. A
major consideration in MIMO antenna design is to
reduce correlation between the multiple elements,
and
in
particular
the
mutual-coupling
292
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 292-298
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
293
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 292-298
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
3 SIMULATED AND MEASURED
PERFORMANCE
(a)
(b)
294
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 292-298
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
(a)
(b)
Figure 7.Simulated radiation patterns for the proposed
antenna for two planes at 2.4 GHz; (a) X-Z plane.
xxxx (blue) simulated cross-polarization, oooo (red)
simulated co -polarization. (b) Y-Z plane. xxxx (blue)
simulated co-polarization, oooo (red) simulated crosspolarization Port 1(left) excited and port 2(right)
terminated in 50.
|
e=
11 12
21 22
( 1-| 11 |2 -| 21 |2 )( 1-| 22 |2 -| 12 |2 )
(1)
(a)
295
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 292-298
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
[
with
(|
]
|
(3)
| )) and
for i , j = 1 or 2.
The simulated capacity losses of the proposed
antenna with and without neutralization line show
in Figure 11. It can be seen that the capacity loss
after inserting neutralization line neither exceeds
0.6 bps / Hz at 2.4 GHz. The comparison between
simulated and measured capacity loss shows in
Figure 12.
(a)
(b)
Figure 10Measured correlation coefficient of the
proposed antenna. (a)without Neutralization line,(b) with
neutralization line.
(2)
296
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 292-298
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Proposed Antenna
without
Neutralization
Line
Proposed Antenna
with
Neutralization
Line
Correlation
Coefficient (dB)
0.091
0.0017
Capacity Loss
(bits/s/Hz)
0.9089
0.6854
TARC (dB)
-12.29
-17.02
bits/s/Hz
(4)
Where ;
= ignal to Noise ratio ( NR)
In = Identity matrix of order n
HT = Hermitian transpose of the H matrix
n = no. of antennas
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 292-298
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
[3]
[4]
[5]
5 CONCLUSION
A two-element crescent shaped printed MIMO
antenna for covering 2.4 GHz wireless
applications presented. Neutralization line applied
to meet the requirement of MIMO in term of low
mutual coupling parameter. Simulated and
measured results show that the antenna achieves
an impedance bandwidth of 18.67% (over 2.04 2.46 GHz) with a reflection coefficient < -10 dB
and mutual coupling minimization of < -20 dB.
Further, the correlation coefficient, TARC,
capacity and capacity loss have been analyzed for
antenna with and without neutralization line. It has
been shown that the proposed antenna has met the
requirements of MIMO practical antenna.
[6]
[7]
[8]
[9]
[10]
6 ACKNOWLEDGEMENT
The authors of this paper wish to acknowledge the
funding of this project by Universiti Tun Hussein
Onn Malaysia under short term grant Vot 0992.
[11]
[12]
7 REFERENCES
[1]
[2]
[13]
298
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 299-304
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Virpi Hotti
School of Computing
University of Eastern Finland
Finland
virpi.hotti@uef.fi
ABSTRACT
There are several challenges on the adoptions of the
frameworks (e.g., standards). If the main target is semantic interoperability, then data should be taken into
consideration. The main aim of this paper is to identify
some mechanisms that take closer to the semantic interoperability. Therefore, the framework-based lessons
for top management are based on the asset management standard (ISO 55001:2014 where data are one
type of assets) and enterprise architecture metamodel
(TOGAF content metamodel). The results establish
that none of the asset management requirements for top
management mentions data and the attributes of the
data entity do not support the semantics interoperability.
KEYWORDS
data, asset, enterprise architecture, top management
1 INTRODUCTION
Nowadays, there are international standards that
specify requirements for management systems
within the context of the organization. For example, the management standards are implemented to
improve the effectiveness of organizational operations. The management standards provide requirements or guidelines for organizations to develop and systematically manage their policies,
processes and procedures in order to achieve specific objectives [1]. Furthermore, organizations
are adopting Enterprise Architecture (EA) frameworks for improving the interoperability of the
information systems that are used in the production of services. Interoperability is defined to be
ability of the service to interoperate with differ-
299
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 299-304
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
2 ANALYZABLE DATA
Architecture development methods, for example
the TOGAF Architecture Development Method
(ADM), provide tasks and work products (e.g.,
artifacts and deliverables [9]) for creating and
managing architectures within an enterprise or
organization. A content metamodel defines a formal structure in terms to ensure consistency within
the architecture development method (e.g., ADM).
The main terms of the content metamodel are entities and their attributes.
The data entity supports the creation of data
models, which is then extended by the data extension to include the concept of a data component
[2]. Data components are logical and physical
ones that can be governed and deployed into applications and they have own attributes [2].
There are relationships in where the data entity is
a source entity as follows [2]:
Data Entity is processed by Logical
Application Component.
Data Entity is accessed and updated through
Service.
Data Entity decomposes/relates Data Entity.
Data Entity resides within Logical Data
Component.
There are relationships in where the data entity is
a target entity as follows [2]:
Actor supplies/consumes Data Entity.
Logical Application Component operates on
Data Entity.
Service provides/consumes Data Entity.
Logical Data Component encapsulates Data
Entity.
and
ele-
Element1
Elementn
...
Datan
300
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 299-304
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
and
ele-
Element1
and
ele-
Element1
Data1
Elementn
[]
...
Datan
()
()
([])
Description
Category
Source
Owner
Element1
...
Elementn
Instead of the spreadsheets, we can use data management tools. However, first we have to understand what we are doing and why? When we explicitly specify our data elements, then we can
specify, for example, the data sources of our performance indicators, as well as, we can make different kind of data analyzes to develop the organizations. For example, the category can be nominal,
ordinal or continuous, if we want to support data
analyzes (Table 4). The categories, nominal (N),
ordinal (O) or continuous (C) can be used with or
instead of mandatory (x), mandatory and the value
is one of several alternative choices ([]) and optional (()). Nominal data (e.g., names) can be
counted, ordinal data (e.g., ratings) can be counted
and ordered, and continuous data (e.g., amounts)
can be counted, ordered and measured.
Datan
Elementn
...
Data
data
ments
(C)
(N)
(O)
Nominal, ordinal and continuous data have different kinds of algorithms [11] or surrogate models
[12] for example to produce summaries or make
predictions.
301
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 299-304
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
ISO 9001:2008
ISO 9001:2008
4.1 General requirements
5.1 Management commitment
5.4 Planning
5.3 Quality policy
5.2 Customer focus
5.5 Responsibility, authority and communication
7.2 Customer-related processes
5.6 Management review
5.4 Planning
5.5 Responsibility, authority and
communication
5.6 Management
review
7.2
Customerrelated processes
ISO/IEC 200001:2011
4.1.1 Management
commitment
4.1.1 Management
commitment
4.1.4 Management
representatives
4.1.2
Service
management policy
4.1.1 Management
commitment
4.1.1 Management
commitment
4.1.2
Service
management policy
4.1.4 Management
representatives
4.5.4.3 Management review
4.1.3 Authority,
responsibility and
communication
4.1.4 Management
representatives
Annex SL
5.1
Leadership
and commitment
5.1
Leadership
and commitment
5.3 Organization
roles, responsibilities and authorities
5.2 Policy
5.1
Leadership
and commitment
5.1
Leadership
and commitment
5.2 Policy
5.3 Organization
roles, responsibilities and authorities
9.3. Management
review
5.3 Organization
roles, responsibilities and authorities
Annex SL
5.1 Leadership and commitment
5.2 Policy
5.3 Organization roles, responsibilities and authorities
302
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 299-304
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
ISO 55001:2014
SDL by ensuring that the
XM policy, the SAMP and
XM
objectives
are
established
and
are
compatible
with
the
organizational
objectives
(5.1)
SDL by ensuring the
integration of the XMS
requirements
into
the
organizations
business
processes (5.1)
SDL by ensuring that the
resources needed for the
XMS are available (5.1)
SDL by communicating the
importance of effective
XMS and of conforming the
XMS requirements (5.1)
SDL by ensuring that the
XMS achieves its intended
outcome(s) (5.1)
SDL by directing and
supporting
persons
to
contribute
to
the
effectiveness of XMS
SDL by promoting crossfunctional
collaboration
within the organization (5.1)
SDL
by
promoting
continual improvement (5.1)
SDL by supporting other
relevant management roles
to
demonstrate
their
leadership as it applies to
their areas of responsibility
(5.1)
SDL by ensuring that the
approach used for managing
risk in asset management is
aligned
with
the
organizations approach for
managing risk (5.1)
shall establish a XM policy
that a) is appropriate to the
purpose
of
the
organization . . . d) includes
a commitment to continual
improvement of the XMS
(5.2)
303
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 299-304
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
eration. The results are alarming - none of the asset management requirements for top management
mentions data and the attributes of the data entity
do not support the semantics interoperability.
There is a need for a data-based framework supporting the IT governance, IT management and
enterprise architecture work. The data-based
framework enables dialogue between various
stakeholders. Furthermore, it is needed to ensure
consistency in information architecture supporting
decision-making.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
Structured
analysis
wiki,
Data
Dictionaries,
http://yourdon.com/strucanalysis/wiki/index.php?title=C
hapter_10
[11]
[12]
[13]
[14]
[15]
304
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 305-313
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
ABSTRACT
1 INTRODUCTION
KEYWORDS
software modernization, system modernization,
architecture-driven modernization, literature review,
enterprise architecture, semantic asset
305
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 305-313
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
2 LITERATURE-BASED
MODERNIZATIONS
We are interested in the statements of
information system modernization. Therefore,
we need to find out how the concept of
modernization is defined in scientific papers.
The data collection method in this study is
literature review. Qualitative methods (content
306
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 305-313
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Number
of hits
108
296
228
220
122
18
64
1056
Selected
articles
23
9
2
2
36
http://dl.acm.org/
http://ieeexplore.ieee.org/Xplore/home.jsp
3
http://link.springer.com/
4
http://www.sciencedirect.com/
5
http://www.ebscohost.com/academic/academic-search-elite
6
http://onlinelibrary.wiley.com/
7
http://www.emeraldinsight.com/
2
307
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 305-313
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
existing software
existing software
artifacts
existing software
assets
existing system
legacy
information
system
legacy software
system modernization
1
1
1
1
2
1
1
4
1
1
legacy system
LIS
software system
system
4
total
software modernization
modernization of enterprise
systems
modernizing a legacy system
modernization
model-driven modernization
LIS modernization
Domain
aged legacy
system
aging software
system
enterprise system
existing
applications
existing IT assets
ADM
Defined modernization
1
2
2
4
13
3 ARCHITECTURE-BASED
MODERNIZATION
Governments
are
adopting
Enterprise
Architecture (EA) frameworks for improving
the interoperability of the information systems
that are used in the production of services. In
Finland, the EA development framework is
called JHS 1798 the entities of which are
implicitly mapped the entities of the TOGAF
content metamodel [52].
Semantic
assets
Number
Client records
217
Core
components
Core
components in
CIS
148
148
Known
Unsure
Unknown
120-195
(69-93 %)
112-148
(76-100 %)
2-11
(1-5 %)
0-7
(0-5 %)
2-63
(2-29 %)
35-86
(24-58 %)
60-103
(41-70 %)
1-13
(1-9 %)
35-85
(24-58 %)
http://www.cgi.fi/
http://www.tieto.fi/
11
http://www.abilita.fi/index.html
10
http://www.jhs-suositukset.fi/web/guest/jhs/recommendations/179
308
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 305-313
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
4 DISCUSSIONS
We noticed that the defined modernization
(system, software, architecture-driven) does not
reveal what the domain of modernization is.
System and software modernization can be
defined similarly as well as software and
architecture-driven modernization. Our findings
reveal the vagueness of the term modernization
[60].
If we want to have similar notions about
information system modernizations, then the
changes have to be transparent. Enterprise
architecture frameworks make the entities and
relationships of the enterprise transparent, and
the information system modernization decisions
can be based on the analysis of relationships
between the entities. We have identified that at
least four entities (i.e., services, data entities,
logical application components, logical
13
12
http://prosessipankki.qpr.com/QPR20122/Portal/QPR.Isapi.dll?QPRPORTAL&*prmav&SES=77T1cGdLYHE
XtUm9u9CqXQ&FMT=p&LAN=fi%u002c1&DTM=&RID=1168941
54286571286
http://www.thl.fi/thl-client/pdfs/a270d99b-58c5-44b0-a3bfcffb01002092
14
http://www.sosiaaliportti.fi/File/3eeffcca-8c86-4a01-a7103963f52eb41d/Tietokomponenttisanasto.pdf
15
http://www.thl.fi/thl-client/pdfs/a270d99b-58c5-44b0-a3bfcffb01002092
309
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 305-313
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
5 REFERENCES
[1]
Merriam-Webster.com.
,
"modernize",2014,
http://www.merriam-webster.com/dictionary/modernize.
[2] R. Hirschheim, H.K. Klein and K. Lyytinen,
Information systems development and data modeling :
conceptual and philosophical foundations, Cambridge:
Cambridge University Press, 1995, pp. 289.
[3] J. Bisbal, D. Lawless, Bing Wu and J. Grimson,
"Legacy
information
systems:
issues
and
directions," Software, IEEE, vol. 16, pp. 103-111, 1999.
[4] K. Bennett, "Legacy systems: coping
stress," Software, IEEE, vol. 12, pp. 19-23, 1995.
with
310
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 305-313
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
311
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 305-313
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
component
reuse
in
modernizing
enterprise
systems," Inf.Syst.Front., vol. 13, pp. 359-370, jul. 2011.
[45] R. Prez-Castillo, I.G. de Guzmn, M. Piattini, B.
Weber and S. Places, "An empirical comparison of
static and dynamic business process mining," in
Proceedings of the 2011 ACM Symposium on Applied
Computing, pp. 272-279, 2011.
[46] N. Ilk, J.L. Zhao and P. Hofmann, "On Reuse of
Source Code Components in Modernizing Enterprise
Systems," in IEEE Symposium on Advanced
Management of Information for Globalized Enterprises,
2008. AMIGE 2008. pp. 1-5, 2008.
[47] G. Canfora, A.R. Fasolino, G. Frattolillo and P.
Tramontana, "A wrapping approach for migrating legacy
system interactive functionalities to Service Oriented
Architectures," J.Syst.Software, vol. 81, pp. 463-480, 4.
2008.
[48] G.E. Boussaidi, A.B. Belle, S. Vaucher and H. Mili,
"Reconstructing Architectural Views from Legacy
Systems," in 19th Working Conference on Reverse
Engineering (WCRE), 2012, pp. 345-354, 2012.
[49] A. Bergmayr, H. Bruneliere, J.L. Canovas Izquierdo,
J. Gorronogoitia, G. Kousiouris, D. Kyriazis, P. Langer,
A. Menychtas, L. Orue-Echevarria, C. Pezuela and M.
Wimmer, "Migrating Legacy Software to the Cloud with
ARTIST," in 17th European Conference on Software
Maintenance and Reengineering (CSMR), 2013, pp. 465468, 2013.
[50] H. Bagheri and K. Sullivan, "Bottom-up modeldriven development," in 35th International Conference
on Software Engineering (ICSE), 2013, pp. 1221-1224,
2013.
[51] G. Menkhaus and U. Frei, "Legacy system
integration using a grammar-based transformation
system," in 26th International Conference on Information
Technology Interfaces, 2004. pp. 119-124, 2004.
[52] The Open Group. , "TOGAF Version 9.1, an Open
Group Standard".
[53] M. Saarelainen and V. Hotti, Does Enterprise
Architecture Form the Ground for Group Decisions in
eGovernment Programme? Qualitative Study of the
Finnish National Project for IT in Social Services, 15th
IEEE International Enterprise Distributed Object
Computing Conference Workshops (EDOCW), 2011, 1117.
312
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 305-313
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
kolmen
tietojrjestelmtoimittajan
nkemyksi
Tikesostavoitetilan
edellyttmist
asiakastietojrjestelmmuutoksista, Sosiaalialan tietoteknilogiahanke, 2011.
[58] K. Hyppnen, M. Alonen, S. Korhonen, and V.
Hotti, XHTML with RDFa as a semantic document
format for CCTS modelled documents and its application
for social services, The Semantic Web: ESWC 2011
Workshops, Lecture Notes in Computer Science, Volume
7117 2012, 229-240, Springer Berlin Heidelberg.
[59] H. Lintula, P. Leinonen, and V. Hotti, Semantic
Documents - Example for CCTS-based and RDFaannotated XHTML documents, The International
Conference on E-Technologies and Business on the Web
(EBW2013), SDIWC 2013, 120-125.
[60] M. Saarelainen and V. Hotti, Different Notions
Lead Difficulties of Making Information System
Modernization Decisions, The Fourth International
Conference on Digital Information Processing and
Communications (ICDIPC2014), SDIWC 2014, 43-52.
313
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 314-332
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Amira M. Kotb
a.kotb@fci-cu.edu.eg
S.H.Ahmed
sana.ola@fci-cu.edu.eg
KEYWORDS
Cognitive Radio Networks - Medium Access Control Spectrum Sharing Time Slotted - Collision - Renewal
Theory
1 INTRODUCTION
In recent years there has been a huge increase
in the access of the limited spectrum for mobile
services, so the fixed spectrum assignment policy
314
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 314-332
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Even when using the most perfect spectrum
sharing techniques, avoiding collision between
PUs and SUs would be impossible. So; in the
scheduling technique; due to the repeated collision
occurrence, collision statistics (average number of
collisions) must be taken into consideration. Using
this concept a fair scheduling schema was
developed in [11].
A time slotted spectrum sharing protocol is
proposed in this paper, it depends on counting the
number of collisions for each SU, predicting the
ideality of the entire available channels and then
based on the channel usage probability by each
SUs nearby PUs at each time slot; channel
exclusion process is done, before SUs' channel
allocation process is performed. By the exclusion
process; it can be anticipated that collision
occurrence will be decreased when taking into
consideration that any of the available channels
has a high probability to be used by any PU
allocated near by the SU requesting the channel,
this SU won't be given this channel.
The rest of this paper is organized as follows;
various MAC protocols classifications are
explained in section 2. Related work is explained
in section 3. In section 4, the proposed MAC
protocol (CUCB- MAC) will be explained in
details. Evaluation of the proposed protocol will
be given in section 5. Finally summarized
conclusion and future works will be illustrated in
section 6.
2 MEDIUM ACCESS CONTROL
PROTOCOLS CLASSFICATIONS
From various readings it has been found that
there is no single classification for spectrum
sharing techniques in cognitive radio networks. In
fact many classifications exist; some of these
classifications are based on the spectrum access
technique, others are based on architecture, on
spectrum allocation behavior, on scope and on
spectrum access time. These classifications will be
explained in the rest of this section.
MAC protocols in CRNs can be categorized
into three main categories according to the access
method; random access MAC protocols, time
315
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 314-332
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Cooperative MAC Protocols;
in
these
protocols each nodes interference information is
shared among various nodes. This is usually
done by constructing clusters to locally share the
interference measurements.
Non-Cooperative MAC Protocols; these
protocols are selfish as they don't consider
interference at other nodes; they only consider
the node at hand.
MAC protocols in CRNs can be categorized
into two main categories according to scope as
intranetwork MAC protocols and internetwork
MAC protocols [7].
Underlay
RELATED WORKS
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 314-332
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
general scheduling framework to solve the MTCS
problem. Maximizing the throughput is expected
to maximize the total Available Transmission
Time (ATT).
All Channels
SU2
SUn
SU3
Central Spectrum
Manager
Channel Status and
PU uses it (if busy)
Ch2
Number of
Collision for each
SU
Buffer
Ch1
Ch3
Calculate Prob. of
ch. usage for each
PU
Scheduler
Calculate Estimated
Prob. of ch.
availability
Chm
At each Slot
317
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 314-332
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
information in its buffer to allocate the
appropriate channel for the SUs packets.
4 CHANNEL USAGE AND COLLISION
BASED MAC (CUCB-MAC) PROTOCOL
The proposed CUCB-MAC protocol is a
centralized time-slotted spectrum sharing protocol
based on counting the number of collisions for
each SU, predicting the ideality of the entire
available channel then excluding some of the
available channels at each time slot.
The process of channel exclusion is performed at
the central spectrum manger. It is done by
performing these steps; first at each sample time
the scheduler has to record status of all the
available channels that are used by any PU, then
the scheduler calculates the channel usage
probability for each channel by each PU. The SU
that is requesting a channel to send a packet must
senses the surrounding area for any existing PUs
and then sends to the scheduler a list contains all
the PUs existing in the surrounding area. So the
SUs -that have a nearby PU with high channel
usage probability for any of the available channels
the scheduler- are prohibited them from using
these channels. Hence the protocol is named;
Channel Usage and Collision Based Medium
Access Control (CUCB-MAC).
Figure 1 shows the architecture of the proposed
CUCB-MAC protocol.
It is obvious from this figure that the proposed
protocol consists of three main parties; SUs,
channels and central spectrum manger.
SUs: represent any of the unlicensed user that
need to send a packet.
318
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 314-332
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Start
no
New Packet
no
Waiting
Time >
Threshold
yes
Number of Collisions
for this packet =0
yes
no
Drop the
packet
Sot time
arrives
yes
Central Manager
allocates the SU a
channel
no
yes
The SU uses the allocated channel to
send the waiting packet (after removing it
from the buffer)
Increase no
of Collisions
for this
packet by 1
yes
A PU aims to
use this channel
)
no
The SU finishes
sending this packet
no
)
yes
Stop
(1)
The central spectrum manger performs the most
dominant tasks that is considered the substantial
tasks in the proposed CUCB-MAC protocol. Some
of these tasks are performed at the beginning of
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 314-332
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
(2)
where E[TON] and E[TOFF] are the mean of
the distribution.
E[TON] = 1/Yi and E[TOFF] = 1/Xi
The renewal process is used to calculate i and Xi
as follows:
Assume a vector of ri samples results from the
sensing process of channel i for Tpi duration:
Zi = {Zit1 , Zit2 , Zit2 , ........ Ziti}
(3)
i
where Z tj is the status of the link at time tj
(j = 1, 2, 3, ........ ri), note that status
of a link is either ON (1) or OFF (0)
Four types of transition probability based on ON
(1) or OFF (0); 0 0, 0 1, 1 0, 1 1. With
the usage of the joint probability mass function,
the probability of the four transitions can be
calculated as follows:
(4)
and
The Maximum Likelihood (ML) estimator
can be calculated as follows:
(5)
4.2.2
(7)
(6)
where A = ( i - ( i)2) (ri - 1)
B = - 2A + (ri - 1) - (1 - i) n0 - i n3
C = A - i n0 - (1 - i) n3
n0, n3 denotes the numbers of
occurrences of the 0 0, 1 1
transition respectively
(8)
4.2.3 Allocation of Channels for Secondary
Users
The central spectrum manger uses the collected
number of collisions encountered from each SU
packet, nearby PU list of each SU, the estimated
320
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 314-332
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Start
no
Is there any
waiting requests
yes
no
A new slot
arrives
yes
Drop the packets' request exceeding the
waiting time from the packets' waiting list
Using the number of collisions for each packet:
order the waiting packets requests descendingly.
yes
Channel list is
empty
no
Pick the packet at the top of the packets' waiting list
Find the SU for this packet then check its nearby PU
Pick the next
channel in the
channel list
yes
yes
Any available
channel
no
no
Assign this channel to this packet.
Send the SU a message of that meaning
* Remove the packet from the waiting packets' list
* Remove the channel from the available channel list
Waiting Packets
list is empty
yes
Stop
no
Parameter
Value
PU Data Rate
Number of PUs
SU Data Rate
Number of SU
Packet Length
Number of Channels
Sample Time
Slot Time
Dropping Time
Channel Usage
Threshold for each PU
Simulation Time
20 packets/sec
20
30 packets/sec
20
4500 bytes
4
5 msec
0.6 * Packet Transmission Time
3 * Packet Transmission Time
0.3
10 sec
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 314-332
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
average number of PUs packets collided,
percentage of channel utilization and finally
percentage of dropped packets.
5.1.1 Average Throughput
Average throughput is defined as the average rate
of packets delivered successfully per one second.
Its preferable to retain it as extreme as possible.
(9)
5.1.2 Average Delay
Average Delay is defined as the average time
taken for a packet to be transferred from the
source to the destination. Its preferable to retain it
as minimum as possible.
(10)
5.1.3 Average Number of Primary Users
Packets Collided
Collision occurs when a PU and a SU aim to use
the same channel. Its preferable to retain it as
minimum as possible.
(11)
5.1.4 Percentage of Channel Utilization
Percentage Channel Utilization is defined as the
percentage of how efficient the channels are being
used. Or it can be defined as how much time the
channel is being used from the beginning of the
simulation till its end.
(12)
In reality the aim is to retain the percentage of
channel utilization as extreme as possible, as long
as the packets are transferred safely from the first
attempt. But when using a simulation program;
where the same random packets arrival act as an
input for both the original and the proposed
protocols, the protocol having less percentage of
channel utilization is more efficient. As the
(13)
5.2 Simulation Results
Four scenarios are used to prove the efficiency
of the proposed CUCB-MAC protocol compared
to the original CB-MAC protocol. In each scenario
one simulation parameter takes different values to
be able to see the effect of this change on both
MAC protocols. The first three parameters used in
the first, second and third scenarios are; data rate,
time used to drop a packet and packet length
respectively. The fourth scenario depends on
changing the values of channel usage threshold to
examine its impact on the proposed CUCB-MAC
protocol; of course this parameter wont have any
effect on the original CB-MAC protocol.
5.2.1 First Scenario: Changing Data Rate
In this scenario the effect of changing the SUs
data rate is shown in Figures 4 to 8. The SUs data
rate values vary from 10 packets to 50 packets per
second.
Figure 4 shows that the average throughput of
the proposed CUCB-MAC protocol is higher than
that of the old CB-MAC protocol using various
data rates, the throughput improvement increases
with the increase of the data rate. As increasing
the data rate means increasing number of packets
per second, this will lead to increasing in the
collision probability; so as the need to retransmit
the collided packets, i.e. the time each packet will
take from the source to the destination will
322
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 314-332
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
increase by the retransmission overhead, so the
number of packets arriving per second
(throughput) will decrease. This cannot be avoided
using CB-MAC protocol, while the proposed
CUCB-MAC protocol prevents some packets with
high collision probability from being transmitted,
so decreases the number of collision and some
packets wont waste time in the retransmission
process; thus retransmission overhead will be
avoided; i.e. the time each packet will take from
the source to the destination will not increase,
leading to an increase in the number of packets
arriving per second (throughput).
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 314-332
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
with the increase of data rate. Increasing the data
rate means (increasing number of packets per
second), i.e. increasing in the collision probability;
so the packets' retransmission process will be
performed more frequently. In case of applying
the old CB-MAC protocol the time that each
packet will take from the source to the destination
will increase, so the channels will be used more
often. While using the proposed CUCB-MAC
protocol; the packets with high collision
probability will be prevented from being
transmitted, so it wont use the channels, and they
will remain idle for sometimes.
5.2.2
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 314-332
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
smaller; so the number of packets delivered per
second (throughput) is higher.
325
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 314-332
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
5.2.3
326
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 314-332
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Figure 15 shows that the average delay of
the proposed CUCB-MAC protocol is a bit lower
than that of the original CB-MAC protocol for all
used packet lengths. Also; it is clear that
increasing the packet length will not increase the
difference between the two averages delay got
from applying both protocols. As increasing the
packet length; will increase the collision
probability, so increase the packets retransmission
process which leads to a retransmission overhead,
so increase in the time taken by a packet to reach
its destination. Using CUCB-MAC, some of the
retransmission process obtained using CB-MAC
will be avoided, so this is will lead to lower delay.
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 314-332
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
these packets will increase. But as using CUCBMAC protocol prevents highly probable packets'
collision from happening, this will decrease its
number of packets' retransmission, and the
retransmission process overhead, which will
eventually decrease their probability of being
dropped.
per
second
5.2.4
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 314-332
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
probability threshold. Increasing the channel
usage probability threshold used in CUCB-MAC,
will allow packets with high probable collision to
be sent; so collision occurs, i.e. more packets to be
resent. The leads to the existence of larger number
of packets in the network, and all of them need to
use the spectrum, i.e. crowded network, so more
and more collision.
Changed Parameter
Performance Metric
Average
Average
Average
Percentage
value
value
of
Obtained
Obtained
improveme
using
using CBnt Using
CUCBMAC
CUCBMAC
MAC
329
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 314-332
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Data Rate
17.31
19.32
11.6%
124.45
117.14
5.9%
0.52
0.16
69.2%
79.19
75.94
4.1%
21.21
17.64
16.8%
18.11
20.88
15.3%
140.76
132.50
5.9%
0.61
0.19
68.7%
85.34
81.85
4.1%
22.53
17.13
24.0%
18.57
19.98
7.6%
151.51
147.87
2.4%
0.38
0.13
66.8%
72.77
70.45
3.2%
21.61
18.87
12.7%
20.33
21.62
6.3%
125.34
119.91
4.3%
0.63
0.36
42.4%
86.03
83.88
2.5%
17.22
14.58
15.3%
Dropping Time
Packet Length
330
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 314-332
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
From the results, it is concluded that the
proposed CUCB-MAC protocol overcome the
original CB-MAC protocol on all the measured
performance metrics; average throughput, average
delay, average number of PUs packets collided,
percentage of channel utilization and finally
percentage of dropped packets.
As future work, 1) Formulate a mathematical
model to prove the values used as slot period,
channel usage threshold and packet dropping time.
2)
Propose a decentralized MAC protocol that uses
collision statistics. 3)Use another collision statistics
measure. 4) Use a soft computing paradigm based
on fitness optimization function to reach optimal
best channel allocation process.
7 REFERENCES
331
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 314-332
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
[19] Michael Todinov, "Reliability and Risk Models", John
Wiley & Sons, 2005
[20] Xiaoke Jiang & Jun Bi, "What Would Be the Optimal
Chunk Size for Information", Technical Report,
Institute for Network Sciences and Cyberspace,
Tsinghua University. October 2013. http://netarchlab.
tsinghua.edu.cn/~shock/THU-NetArchLab-ICN-TRCHUNK-SIZE-20131101.pdf. Last Accessed February
2014
332
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 333-340
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
ABSTRACT
1 INTRODUCTION
KEYWORDS
ICT governance, enterprise architecture, IT management, IT service management
333
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 333-340
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
2 LITERATURE REVIEW
The data collection method in this study is
litera-ture review. Instead of ICT we used IT
because there are more hits using IT. We reviewed IT governance together with IT management, service management and enterprise
architecture. We tried to find frame-works for
clarifying what the service support should be
considered and why. Furthermore, we collected statements for IT governance if it was defined in the selected papers - definitions are
statements describing a concept [8].
Research literature can be reviewed for different purposes: to provide a theoretical background for research, to learn the breadth of
the research field or to answer practical ques-
http://dl.acm.org/
http://ieeexplore.ieee.org/Xplore/home.jsp
5
http://www.sciencedirect.com/
6
http://onlinelibrary.wiley.com/
7
http://www.ebscohost.com/academic/academic-search-elite
4
http://www.vm.fi/vm/en/04_publications_and_documents/03_docu
ments/20110902ActonI/Tietohallintolaki_englanniksi.pdf
2
https://www.ictstandard.org/
334
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 333-340
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Table 1. Hits
Database
ACM
IEEE
Elsevier
Wiley
EBSCOhost
Total
Title:
ITG
9
103
28
49
23
212
AND
Abstract:
ITM
2
4
2
15
1
24
AND
Abstract:
SM
3
4
7
AND
Abstract:
EA
2
1
3
ACM
IEEE
Elsevier
Wiley
EBSCOhost
Total
Selected
papers
1
7
1
2
11
335
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 333-340
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
3 SURVEY
The online survey was attended by five municipalities in the Northern Savonia, the two
federations of municipalities and one ICT
service provider. There were 331 potential
respondents and we got 136 answers. The
response rate was 41,1 % and it is excellent
because we did not have earlier connection to
the respondents (a response rate 30 % is acceptable in online surveys8). Our survey has
25 questions based mainly on the ICT Standard for Management [6]. However, in this
paper we report the answers of five questions
(Table 3) that position the ICT governance in
the Northern Savonia.
ICT governance has to work closely with organizations
business,
making
those
work products, it has agreed upon with business [6]. ICT can be good way to increase the
cost-effectiveness of business and in the best
ICT scenario can even offer totally new business possibilities. Therefore, we were interested how well this development collaboration works in responding organizations (the
question Collaboration works with business
and ICT?).
ICT strategy is an important tool for defining
the right direction for ICT governance - making sure that ICT governance follows the
overall strategy of the organization [6]. Models of ICT governance define responsibilities,
duties, objectives and how things of the different kind should be measured [6]. We were
interested in how respondents view the importance of the strategy (the question Need
for ICT strategy?) and the ICT governance
model (the question Need for ICT governance model?) within their organization.
In development projects it is normally the
duty of business to define need for development, but ICT governance usually documents
these need. ICT governance should also help
in evaluation between different development
SUM of NO
answers
Collaboration
works
with business and ICT?
ICT is consulted before
development projects?
Need for ICT strategy?
Need for ICT governance model?
Familiar with enterprise architecture?
SUM
YES
swers
80
56
48
88
48
88
20
116
87
49
of
an-
https://www.utexas.edu/academic/ctl/assessment/iar/teaching/gather/
method/survey-Response.php
9
http://www.jmp.com/software/jmp/
336
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 333-340
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Mean Mean
of NO answers
Mean
Mean
YES
swers
64
72
64
72
50
86
83,5
52,5
of
an-
Mean Mean
of NO answers
48
Mean
Mean
of
YES
answers
88
34
102
67,5
68,5
337
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 333-340
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Mean Mean
of NO answers
Mean
Mean
YES
swers
34
102
67,5
68,5
of
an-
Mean Mean
of NO answers
53,5
Mean
Mean
YES
swers
of
an-
82,5
338
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 333-340
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
4 DISCUSSIONS
There is a need for a simple framework supporting enterprise architecture and ICT governance. The framework should enable dialogue between various stakeholders. Furthermore, it is needed to ensure consistency in
decision-making. In the conceptual context
(Figure 5), we will combine key stakeholders
(users, customers, and providers of the different kind) and two main principles of governance frameworks (conformance and performance) with the entities around the service,
we will see that conformance will be established when the service meets the requirements which are specified in the contracts.
Furthermore, performance is deemed to be the
fulfillment of the obligations, which are based
on contracts or objectives.
The services are realized through logical application components and implemented on
logical technology components in TOGAF
Content Metamodel. When we talk about entities, which are related to service, we have
identified at least four entities (contract, objective, measure, and service quality), which
should be taken into account when the responsibility for information management is
shared. The objective, as well as, the service,
is tracked against the measure. The service is
governed and measured by contract. Furthermore, the service should meet the service
quality.
339
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 333-340
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
REFERENCES
[13]
[1]
[14]
[15]
[2]
[3]
[16]
[4]
[17]
[18]
[5]
[6]
[19]
[7]
ICT
Standard
Forum,
Tietohallintomallin
soveltamisohje julkiselle hallinnolle, Laine Direct
Oy, 2013.
[20]
[8]
[9]
[21]
[10]
[22]
[11]
[12]
340
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 341-354
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Abstract:
Keywords:
INTRODUCTION
At the 12th ASEAN Summit in Cebu,
Philippines, ASEAN leaders agreed to
shorten the time to establish and integration of
the ASEAN Community by five years, to
2015; the community has been divided into 3
different communities such that each
congregation has the following goals (Tanesh
Kongprasert, 2012).
1. ASEAN Political-Security CommunityAPSC aims to promote cooperation in
political and security affairs; to strengthen and
maintain the peace and stability of the region;
to make each country live together in
peace; and to resolve problems and conflicts
when possible by peaceful means.
2 ASEAN Economic Community-AEC also
aims to create ASEAN as a single market and
production base and to make the movement of
goods, services, investment, and skilled
labor free.
341
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 341-354
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
342
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 341-354
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
343
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 341-354
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
344
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 341-354
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
345
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 341-354
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Figure 10.
Thai youths find educational
videos from YouTube most often.
Resource:
http://storify.com/imsakulsri/digitalmedia-trend-in-thailand
346
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 341-354
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Strategy 1: Create
a
competitive
advantage over other countries.
Strategy 2: Decrease the differences and
create equal opportunities in society.
Strategy 3: Build an environmentally
friendly infrastructure.
Strategy 4: Modify the administrati on
with good governance for a balanced
system administration. Use the strategic
national approach to deal with issues
related to the preparation to join the
ASEAN community.
The mission of the Ministry of ICT relates
to the three pillars of the ASEAN community:
1) services that move freely, such as computer
services and telecommunications services; 2)
the development of an information technology
infrastructure and e-commerce; and 3)
promote the use of ICT among disadvantaged
children and women, including the
management of disasters and the security of
information (cyber-security).
Strategy for Thailand in the ASEAN One
Community
Education for ASEAN One Community
In education, there will be an operating
mechanism that includes sectorial meetings
among senior officials and the Council of
Ministers and the ASEAN Socio-Cultural
Community to achieve ASEANs caring and
sharing goals. The Declaration Cha Am-Hua
Hin on strengthening cooperation in education
will be reviewed. The role of education in
347
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 341-354
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
A
meeting
of
ASEAN
to
promote research, education, research and
development, cooperation, and to provide a
forum for researchers from member countries
to exchange views on issues and matters
related regional support, understanding and
awareness of awareness of the issues and the
environment by integrating the curriculums in
schools.
348
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 341-354
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
universities employees, both academic and
support call status, face insecurity, and since
they lack a contract, ties to the systems
stability are insecure. They depend on the
evaluation system to gain a contract,
indicating instability in the profession. Also,
the management or governance of the
Executive Committee of the University,
which affects the status of teachers, has
changed. The potential and efficiency of
teaching and learning in Thailand and
increasing the quality of education have been
compromised to the extreme, and no system
to strengthen and encourage employees has
developed potential in both languages. And
further education to higher levels adequate to
support the ASEAN community by entering
related and affiliated university itself is
considered an important factor affecting
Thailands tertiary education and preparation
to step into the ASEAN community.
Governments and related agencies must take
measures to resolve the issue ASAP and
must have a clear policy on human resources,
as the need for this in such studies is
substantial.
3. Adaptation to prepare the student. It is
inevitable that students will have to learn to
adapt and prepare for the future, as students
must be interested in and aware of the
consequences stemming from the integration
of various countries. ASEAN, in terms of
advantages and disadvantages, is complex to
fully grasp. The emergence of the ASEAN
community, which is reflective of modern
society, is increasingly a multicultural society.
A new generation of students is so necessary
to adjust the learning process, as an attitude
adjustment that remains aware of nationhood
is vital. The modern paradigm of learning
should be a goal, including such aspects as
knowing the situation, creating the ability
to work with others of different cultures, and
learning about the history and culture of
349
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 341-354
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
350
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 341-354
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
351
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 341-354
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
352
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 341-354
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
3.1
Public and private support for
scholarships for masters degrees and the PhD
in Management Education about digital
medias influence over ICT and with respect
to the cooperation of ASEAN in particular,
for example, ASEAN foundations with
Microsoft Youthspark help arrange website
creation for starting business training for
youth
inside
and
outside
the
school/university.
3.2 Promoting distance learning courses
between ASEAN countries to save time and
cost
while
preserving
knowledge,
understanding and beneficial cooperation
between ASEAN countries.
Sukhothai
Thammathirat Open University, STOU,
offers distance learning (e-learning) in
Undergraduate, Masters, and PhD levels
with their D4L software embedded in the
STOU website in order to assist students
and teachers in collaboration while traveling.
3.3
Promoting the use of English as the
second and third language in their own
countries to help the workers communicate
with each other and foreigners who come to
work in outsourcing companies in order to
support businesses communication.
[2] Areewan Howerangsi ( 2013) The action
continues their ICT knowledge. Preparing ASEAN.
Retrieved from http://www.mict.go.th/view/
[3] Chaiyaphruek Serirak (2013) Thailand to
boost
vocational Bachelor's Degree Career practical and
AEC.
Retrieved
from
http://www.dlfeschool.in.th/TETA/20130303 t.html
[4] ChaiYun Peangkeiatpairog (2014) Ministry of ICT
Action plan aimed to prepare Thailand for the Asean
Community.
Retrieved
from
http://www.thaigov.go.th/th/news-ministry
[5] Conole, G., de Laat, M., Dillon, T. & Darby, J.
(2006) JISC LXP: Student experiences of technologies
(Final Draft Report). Joint Information Systems
Committee
(JISC),
UK.
Retrieved
from:
http://labspace.open.ac.uk/file.php/1/kmap/1
176712833/references/LXP%20project%20fi
nal%20report%20dec%2006.pdf
353
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 341-354
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
[6] David M. Kennedy, Bob Fox (2013) Digital
natives: An Asian perspective for using learning
technologies. International Journal of Education and
Development using Information and Communication
Technology (IJEDICT), 2013, Vol. 9, Issue 1, pp. 6479.
[7] IMC Institute (2013) Information on Thailand ICT
Q2
2013.
Retrieved
from:
http://www.slideshare.net/imcinstitute/thailan
d-ictoverview-q2-2013.
[8] Marketingupdate.co.za (2013) Connecting the
lecturer to students 24/7 via route social media.
Retrieved
from
http://www.marketingupdate.co.za/?IDStory
=58318
[9] Tanesh Kongprasert (2012) Entering the
ASEAN
Economic Community (AEC) and its impact on
Thailand's
economy.
Retrieved
from
http://www.thaiworld.org/th/include/answer_
search.php?question_id=1174
[10] Thai Post Newspaper (2012) Education of
Thailand in the ASEAN context. Retrieved From
http://www.interscholarship.com/4545/9319
[11] Viriya Ruchaipanit (2012) Four key skills survival
to
ASEAN.
Retrieved
from
https://www.youtube.com/watch?v=o6k5LTy IqDM
[12] ZenithOptimedia and Performics (2012) Trend
Digital Media
in
Thailand.
Retrieved
from
http://storify.com/imsakulsri/digital-media- trend-inthailand
354
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 355-371
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
An Instructional Design Model and Criteria for Designing and Developing Online
Virtual Labs
Mohamed Elsayed Ahmed 1, 3 and Shinobu Hasegawa 2
1
School of Information Science, Japan Advanced Institute of Science and Technology
2
Center for Graduate Education Initiative, Japan Advanced Institute of Science and Technology
3
Department of Educational technology, Faculty of Specific Education, South Valley University
1, 2
1-1, Asahidai, Nomi, Ishikawa, Japan, 3 83523 Qena, Egypt
1, 3
mohamedelsayed@jaist.ac.jp, 2 hasegawa@jaist.ac.jp
ABSTRACT
The purpose of this work is to propose a general
instructional design model to teach students in faculty
of education, especially in department of educational
technology how to design and develop online virtual
labs in a common way. We have made analyses of
previous instructional design models and related
studies in regard to the virtual labs to specify diverse
features of the proposed model. It was found that the
online virtual labs have no conventional instructional
design model, especially for designing and developing
stages and also no common shape and components.
Based on these results, we have reached to a new
suggestion model which guides the students in
refinement of the future learning environment using
recent technology. In this paper, we also present a list
of criteria for designing and developing the online
virtual labs.as a modern principles for directing
designing process of online virtual labs environments
to become instructional products. We have made a
derivation of these criteria from previous studies
related to the virtual labs, e-Learning technologies and
some miscellaneous technological resources in
educational technology. These criteria would provide
the students with educational and technological
guidelines to produce the online virtual labs with high
quality and efficiency.
KEYWORDS
Online Virtual Labs, Instructional Design Model,
Educational Technology Students, Designing and
Developing Criteria.
1. INTRODUCTION
In the 21st century, technological revolution had
made a great positive impact on diverse fields
including education. Therefore, ICT became one
of the main elements of any educational
systems/curriculums nowadays. This impact led
to the emergence of the many applications of
technology in education, such as e-learning,
distance learning, virtual learning, and virtual
campus/classroom. Some educational systems
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 355-371
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 355-371
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
2.
3.
4.
5.
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 355-371
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Segment
Segment
Segment
Segment
OVL Content
OVL Platform
358
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 355-371
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
5. ADVANTAGES OF OVLs
The OVLs are characterized by many advantages
as modern methods in developing educational
process. Some previous studies presented diverse
advantages of the VLs such as [3], [30], and [31].
Now we have organized and added these
advantages from improvement of learning point
of view as follows:
1. Economic: The OVLs are low in costs of
equipment and tools because of the virtual
form as well as of maintenance compared with
the real labs.
2. Richness: The OVLs enable to have rich
environments with the kits and tools,
furthermore with information through linking
to especial websites.
3. Safety: The OVLs provide safe experimental
environments, especially with regard to the
danger and harmful experiments.
4. Sufficiency: The OVLs supply sufficient and
repeatable
training
environments
for
359
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 355-371
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
360
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 355-371
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
361
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 355-371
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
362
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 355-371
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
363
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 355-371
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
364
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 355-371
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
365
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 355-371
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Technological Criteria
a)
b)
c)
d)
e)
a)
b)
c)
d)
e)
f)
g)
h)
i)
j)
Objectives
Contents
activities
Evaluation
Feedback
366
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 355-371
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
d) Evaluation
It should be related to the educational objectives
in the OVL contents.
Its styles should be appropriate to the OVL
objectives.
It should be covered all the OVL contents.
It should be clearly stated and understandable.
It should have a variety in question types.
Its questions should be ordered by difficulty
level.
Its questions should contain texts, image,
graphics, sound, videos or animations related to
the simulation.
It should provide continuous formative
evaluation during learning.
It should provide summative evaluation after
learning.
e) Feedback
d) Sound
a) OVL Platform
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 355-371
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
It should be creative.
It should provide interactive environment.
It should harmonize with computer software
used in the producing.
h) Interactivity
Its multiple forms should be provided such as the
teacher to the learners, the learner to the learners,
and the learner to the contents.
It should be provided in synchronous and
asynchronous ways.
It should provide the learners with full control.
i) Learning Administration
It should provide a direct login to the OVLs.
It should provide information about the OVLs
subject and courses.
It should provide announcements such as next
skills, encouragement for participation, time of
contact, guides, results, and award, etc.
It should provide information about new and
emerging technologies such as Wikis, blogs,
collaborative content development software, and
video conferencing software, etc.
It should offer functions to upload and download
files.
It should be balanced between cost and learning
outcomes.
It should provide tools for assessing performance
in the OVLs.
It should provide tracking function for learning.
j) Publishing and Technical Support
The OVLs requirements about software and
hardware should be specified.
The server of the OVLs should have enough
space in consideration of future expansion.
The OVLs domain via the internet should be
simple and suitable content types.
The OVLs pages should be downloaded quickly.
The OVLs should be controlled remotely from
the host institution.
The testing of the OVLs should be validated.
The OVLs should be robust and sustainable to
handle inadvertent damage by the students or
malicious programs.
The OVLs should be easy to maintain in terms of
routine tasks like back-up.
The OVLs should provide accessibility in
anytime and anywhere.
368
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 355-371
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
369
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 355-371
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
[6]. Abu Jalal, R. A.: The effect of using the virtual
laboratory on the teaching of mathematics at the basic
education stage, Unpublished Master Thesis, Faculty of
Specific Education, Mansoura University (2009).
[7]. Babateen, H. M.: The role of Virtual Laboratories in
Science Education. In: International Conference on
Distance Learning and Education IPCSIT, vol. 12, pp.
100--104, IACSIT Press, Singapore (2011).
[8]. Harms, U.: Virtual and remote labs in Physics education.
Second European Conference on Physics Teaching in
Engineering Education, Budapest (2000).
[9]. Carnevali, G., Buttazzo, G.: A virtual laboratory
Environment for real-time Experiments. In :The IFAC
Symposium on Intelligent Components and Instruments
for Control Applications, SICICA , pp. 39--44 ,a vireo,
Portugal (2003).
[10]. Prieto-Blzquez, J., Garcia-Tora, I.,
HerreraJoancomart, J., Guerrero-Roldn, A.-E.: Virtual
Laboratory Ontology for Engineering Education. In:
Proc. 2008 of the 38th Annual Frontiers in Education
(FIE).pp. S2F-1--S2F-6, Saratoga Springs New York
(2008).
[11]. Sun, O., Lin, Y., Yu, C.: A study on learning effect
among different learning styles in a Web-based lab of
science for elementary school students. Computers &
Education, vol.50 (4), pp. 1411--1422 (2008).
[12]. Tatli, Z., Ayasb, A.: Virtual laboratory applications in
chemistry education. Social and Behavioral Sciences,
vol. 9, pp. 938--942(2010).
[13]. Muhamada, M., Zamanb, H. B., Ahmad, A.: Virtual
Biology Laboratory (VLab-Bio): Scenario-Based
Learning Approach, Social and Behavioral Sciences. vol.
69, pp. 162--168 (2012).
[14]. Bajpai, M.: Developing Concepts in Physics through
Virtual Lab Experiment: An Effectiveness Study, An
International Journal of Educational Technology,
Techno LEARN, vol.3 (1), pp. 43--50(2013).
[15]. Metrailler, Y. A., Reijnen, E., Kneser, C., Opwis, K.:
Scientific problem solving in a virtual laboratory:
comparison between individuals and pairs. Swiss
journal of psychology, vol. 67, pp. 71--83(2008).
[16]. Tarouco, L., Gorziza, B., Correa, Y., Amaral, E.M.H.,
Muller, T.: Virtual Laboratory for Teaching Calculus:
an Immersive Experience. In: Proc. IEEE Global
Engineering Education Conference (EDUCON), vol. 1,
pp. 774 -- 781. Berlin, jarmany (2013).
[17]. Kantzavelou, I.: a Virtual Lab Model for an Introductory
Computer Science Course. FACTA UNIVERSITATIS
(NIS) SER. ELEC.ENERG. vol. 18(2), pp.263-274(2005).
[18]. Jara, C. A., Candelas, F. A., Puente, S. T., Torres, F.:
Hands-on experiences of undergraduate students in
Automatics and Robotics using a virtual and remote
laboratory. Computers & Education, Vol. 57(4), pp.
2451--2461(2011).
[19]. Tran, N. H., Tran, H. D., Chiem, P. T., Luu, D. T., Cao,
T. D., Kaskenpalo, P.: CenLavi: Virtual Computer
Network Laboratory. In: Fifth International Conference
Ubiquitous and Future Networks (ICUFN), DA NANG,
pp. 523 -- 528 , da nang (2013).
[20]. Pati, B., Misra, S., Mohanty, A.: A Model for Evaluating
the Effectiveness of Software Engineering Virtual Labs.
370
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 355-371
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Content Design for a Remote Laboratory: A Case Study
on ERRL. IEEE Transactions on Education, vol. 54(2),
pp. 320-327 (2011).
[39]. Padman, V., Memon, N.: Design of a Virtual Laboratory
for Information Assurance Education and Research. In:
Proc. 2002 IEEE Workshop on Information Assurance
and Security, pp.1--7 United States (2002).
[40]. Achuthan, K. , Sreelatha, K.S. , Surendran, S. ,
Diwakar, S. ,
Nedungadi, P. ,
Humphreys, S. ,
Sreekala, S.C.O. , Pillai, Z. , Raman, R. , Deepthi,
A. , Gangadharan, R. , Appukuttan, S. , Ranganatha,
J. , Sambhudevan, S. , Mahesh, S.: The VALUE @
Amrita Virtual Labs Project Using Web Technology to
Provide Virtual Laboratory Access to Students . In:
2011 IEEE Global Humanitarian Technology
Conference, pp. 117--121 Seattle, WA (2011).
[41]. Hristov, G., Zahariev, P., Bencheva, N., Ivanov, I.:
Designing the Next Generation of Virtual Learning
Environments Virtual Laboratory with Remote Access
to Real Telecommunication Devices. In: Proc. EAEEIE
Annual Conference, pp.139--144 Chania (2013).
[42]. Li, L., Zheng, Y., Zhong, S.: Research on Web-based
Virtual Laboratories. In: 2010 International Conference
on Computer, Mechatronics, Control and Electronic
Engineering (CMCE), Vol.1, pp. 478--481 Changchun
(2010).
[43]. Melkonyan, A., Gampe, A., Pontual, M., Huang, G.,
Akopian, D.: Facilitating Remote Laboratory
Deployments Using a Relay Gateway Server
Architecture. IEEE Transactions on Industrial
Electronics, vol. 61(1), pp. 477--485 (2014).
[44]. Besada-Portas, E., Lopez-Orozco, J.A. , de la Torre, L. ,
de la Cruz, J.M.: Remote Control Laboratory Using EJS
Applets and Twin CAT Programmable Logic
Controllers . IEEE Transactions on Education, vol.
56(2), pp. 156 - 164 (2013).
[45]. Shee, D. Y., Wang, Y.: Multi-criteria evaluation of the
web-based e-learning system: A methodology based on
learner satisfaction and its applications. Computers &
Education, vol .50(3), pp. 894--905(2008).
[46]. Mchichi, T., Afdel, K.: Exploiting Web 2.0 technologies
in promoting learning activities: e-learning Web 2
platform .In: International Conference on Education and
e-Learning Innovations, pp. 1--5 Sousse (2012).
[47]. Hus, C., yeh, y., yen, j.: Development of design criteria
and evaluation scale for web-based learning platforms.
International Journal of Industrial Ergonomics, vol.39
(1), pp. 90--95 (2009).
[48]. Ardito, C., De Marsico, M., Lanzilotti. R., Levialdi, S.,
Roselli, T., Rossano, V., Tersigni, M.: Usability of ELearning Tools. In: Proc. working conference on
advanced visual interfaces, pp. 80--84 (2004).
[49]. Holt, D., Segrave, S.: A creating and Sustaining Quality
E-learning Environments of Enduring Value of
Teachers and learners. In G.Crisp, D.Thiele, I.Scholten,
S.Barker and J.Baron (Eds), Interact, Integrate, Impact.
In: Proc. 20th Annual Conference of the Australasian
Society for Computers in Learning in Tertiary
Education. ASCILITE, pp. 226--235, Adelaide,
Australia (2003).
[50]. Jung, I.: The dimensions of e-learning quality: from the
learners perspective. Educational Technology Research
and Development, vol.59 (4), pp.445--464 Association
371
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 372-386
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
ABSTRACT
2 THE ROTATING CALIPERS IN 2-D
A paper published in 1983 established that the rotating
calipers paradigm provides an elegant, simple, and yet
powerful computational tool for solving several twodimensional geometric problems. Since then the
rotating calipers have been extended to three
dimensions, and have been applied to many new
problems. In the present paper the history of this tool is
reviewed, and stock is taken of the rich variety of
computational problems and applications that have
been tackled with it during the past thirty years.
KEYWORDS
Rotating calipers, algorithms, computational geometry,
geometric complexity, computer graphics, computer
vision, robotics, combinatorial optimization, line
fitting, statistics, graphs, thrackles, rotating planes
1 INTRODUCTION
The rotating calipers paradigm constitutes a
powerful, simple, elegant, and computationally
efficient tool that can solve a wide variety of
geometric problems in practice. The basic idea
first appeared in the 1978 Ph.D. thesis of Michael
Shamos, where it was applied to the computation
of the maximum distance between the elements of
a convex set: the diameter of a convex polygon in
the plane [1]. Later I coined the name Rotating
Calipers for this procedure, and generalized it in
a number of ways to solve several other twodimensional geometric problems. In 1983 I
presented some of these results at an IEEE
conference in Athens, Greece [2]. Since then the
rotating calipers paradigm has been generalized
further to solve other problems in two as well as
three dimensions. In the present paper the thirtyyear history of this tool is reviewed.
pj-1
pj+1
pi+1
i
pi
pi-1
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 372-386
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
the diameter in terms of a finite subset of the
points in P. A simple contradiction argument
shows that the diameter of P is determined by a
pair of vertices of P. If two points of P determine
the diameter and are not vertices of P then the line
segment joining these two points may be increased
in length by moving either point so that it
coincides with a vertex of P. Therefore the
diameter may be calculated by examining only the
distances between all the pairs of vertices of P,
and selecting the maximum distance encountered.
However, this nave (brute force) search algorithm
requires a number of operations that grows as the
square of the number of vertices in the polygon. A
more fruitful characterization narrows the set of
candidates to be searched down to linear size.
Several approaches have been tried in the past in
order to speed up diameter-finding algorithms [3],
and some characterizations have proved to be
incorrect [4]. Several hill-climbing algorithms
published are not guaranteed to yield the diameter
because they assume that the distance between a
vertex of a convex polygon and the remaining
vertices scanned in order, is a unimodal function,
when in fact such a distance function may have
(n) local maxima [4]. Indeed, a convex polygon
may have (n2) pairs of vertices that are local
maxima of their distance functions. However, a
valid characterization of the diameter was
obtained by Shamos [1] via the pairs of vertices,
such as pi and pj in Fig. 1. These vertices are
antipodal, meaning that they admit parallel lines
of support. Shamos showed that the diameter of a
polygon is determined by two of its antipodal
vertices. Furthermore, a polygon with n vertices
has O(n) antipodal pairs, assuming that all the
vertices of P that have an angle of 180 have been
removed, which is a straightforward matter. The
rotating calipers provide a simple O(n) time
procedure for searching all the antipodal pairs to
find the maximum. The idea is to first place a pair
of parallel lines of support in any orientation, say
horizontal, as in Fig. 1, and then rotate the lines,
while keeping them as support lines of the
polygon, until they are horizontal again. Such a
procedure will visit all pairs of antipodal vertices.
The crucial observation that makes this seeming
infinite continuous process discrete and finite is
that the rotation process can hop from vertex to
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 372-386
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
pj
pj-1
j
pj+1
pi+1
i
pi
pi-1
pt
ps
s
i
pi
pi-1
374
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 372-386
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
In closing this sub-section it is worth noting that
the rotating calipers have also be used to find
minimum-area enclosing triangles [20], [21],
squares [22], minimum-perimeter enclosures [23],
and the densest double-lattice packing of a convex
polygon [24]. The case of the minimum-area
triangles enclosing a convex polygon is most
similar to the rectangle problem considered in this
subsection. Klee and Laskowski [20] provided the
key characterization of the optimal solution. They
proved that if T is a local minimum among the
triangles that contain the polygon, then at least one
side of T must lie flush with an edge of the
polygon. This property led the authors to propose
an O(n log2 n) time algorithm for finding the
optimal solution. ORourke et al., used the
rotating calipers to solve this problem in linear
time [21]. The rotating calipers used with four
rotating lines can also be used to find the
maximum-area quadrilateral enclosing a convex
polygon. Hosono, Meijer, and Rappaport [25] use
it to compute the visibility graph of a set of nonintersecting translates of the same compact convex
object in the plane.
2.4 The Maximum Distance Between Two
Convex Polygons
The maximum distance between two convex
polygons, P and Q, arises in several applications
including pattern recognition, cluster analysis, and
unsupervised learning [26]. It is defined as the
largest distance determined by one point in P and
another point in Q. As with the diameter problem,
the search for the maximum distance may be
restricted to the vertices of P and Q, denoted by
p1, p2, , pn and q1, q2, , qn, respectively. This
maximum distance between P and Q is given by:
dmax(P,Q) = max{d(pi, qj)}, i, j=1, 2, , n,
(1)
pi-1
pi+1
qj+1
qj-1
j
qj
375
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 372-386
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
2.5 Minkowski Sum of Two Convex Polygons
Consider two points r and s in the plane, denoted
by r(xr,yr) and s(xs,ys), specified by their x and y
coordinates. The Minkowski sum (also called the
vector sum) of r and s is the new point t(xt,yt),
where xt = xr+xs and yt = yr+ys. The Minkowski
sum of two convex polygons P and Q, denoted by
P Q, is the set of points obtained by the
Minkowski addition of each and every point in P
with each and every point in Q. The Minkowski
sums of polygons in the plane, and polyhedra in
space, find application in spatial planning
problems in the field of robotics [29], [30]. The
Minkowski sum of two convex polygons, P and Q
may be characterized in terms of their vertices,
thus making it computable. In particular, P Q is
a convex polygon, and has at most 2n vertices,
which are Minkowski sums of the vertices of P
with those of Q. This characterization implies the
following algorithm: first compute all (n2)
pairwise Minkowski additions of the vertices of P
and Q, and then compute the convex hull of the
resulting set. Using an efficient O(n log n) time
convex hull algorithm, such as Grahams
algorithm [31], yields an O(n2 log n) time
algorithm for computing the Minkowski sum.
However, a much faster O(n) time algorithm may
be obtained by exploiting a characterization of the
Minkowski sum in terms of a modification of the
notion of an antipodal pair of vertices. Two
vertices pi P and qj Q are defined as being copodal if, and only if, they admit parallel directed
lines of support of P and Q, at pi P and qj Q,
respectively, such that the support lines are
oriented in the same direction, and each polygon
lies to the right of its support line, as illustrated in
Fig. 5. The following characterization of the
Minkowski sum of P and Q may now be obtained:
the vertices of P Q are the Minkowski sums of
co-podal pairs of vertices of P and Q. This
characterization permits the computation of P
Q by rotating the calipers in the manner as shown
in Fig. 5, where the pair pi and qj is a candidate
pair of vertices to be summed. The subsequent
candidate pair is obtained in O(1) time by rotating
the calipers in a clockwise manner by the smaller
of the angles i and j. Let zk = pi qj denote a
P
pi+1
pi
qj+1
pi-1
Q
qj-1
j
qj
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 372-386
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
must, at some time during the rotation, completely
overlap, and whenever they do so they identify a
bridge. Thus, the convex hull of the two polygons
may be obtained by rotating the calipers a full
revolution, and at each step outputting the vertex
of either P or Q, that lies on the leftmost
supporting line. Since each vertex of P and Q is
visited only once, and there are O(n) bridges, O(n)
time suffices for the entire computation.
pr+1
qj
LQ LP
LB
qs-1 qs
pi+1
pi+1
pi
qs+1
qj-1
pi
j
pi-1
qj+1
qj
LB
qj-1
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 372-386
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
and x denotes the intersection point corresponding
to this bridge. The algorithm in [37] first
determines if the two polygons intersect. If they
do then the rotating calipers are used to find the
convex hull as described in Sub-section 2.6, after
which for each bridge the corresponding
intersection point is found by a simple step-down
procedure along the convex chains searching for
the two intersecting edges.
LB
LP
pi
LB
qj
qj+1
qj-1
pi-1
pi+1
pi-1
pi
qj-1
pi+1
qj
Q
qj+1
LQ
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 372-386
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
between the directions of the two critical support
lines, and may be found in O(n) time with the
rotating calipers.
The widest empty strip problem is closely related
to the problems of fitting lines to data [41], finding
transversals of sets [42], and linear approximation
of objects [43], [44], all of which have been
solved efficiently using the rotating calipers.
Similar problems occur when data is not linearly
separable. In this setting Aronov et al., [45] use
the rotating calipers to find linear separators that
minimize a variety of different measures of error
for the points misclassified by the separator.
2.10 The Grenander Distance Between Two
Convex Polygons
Ulf Grenander [46] proposed that the distance
between two disjoint convex polygons be
measured by comparing the lengths of the
connecting segments of their critical support lines,
to the lengths of the polygonal chains spanned by
these segments. To be more precise let the critical
support lines be supported at pi and pr in P, and qj
and qs in Q, and refer to Fig. 9.
qj
qj+1
pr
Q
qs
pi+1
pi
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 372-386
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
to Q is defined as the angle of the cone with apex
at x, that contains Q, and has its two rays that
emanate from x tangent to Q. The critical lines of
support play singular roles in computing the
extreme aperture angles, and may be efficiently
computed with the rotating calipers [48].
2.13 Wedge Placement Optimization Problems
Wedge placement optimization problems arise in
several contexts such as visibility with bounded
aperture angles, and layout design of parts in stock
cutting for manufacturing. A wedge W may be
thought of simply as an unbounded cone with a
fixed angle at its apex. Given an n-vertex
polygonal region, such as R in Fig. 10, we are
interested in computing the entire region where a
camera (the apex of the cone) with aperture angle
, may be positioned so that it is as close as
possible to R. Such a region is bounded by a
concatenation of arcs (called the wedge cloud)
determined by the apex of the cone as it travels
around R maintaining contact with R. Fig. 10
shows three points on the cloud, xi, xj and xk which
are camera locations with a fixed aperture angle .
The original rotating calipers can be generalized
so that the lines of support form any fixed angle to
each other.
xi
xj
xk
qj+1
pi+1
pi
qs
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 372-386
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
2.15 Nice Triangulations and Quadrangulations
of Planar Sets of Points
A convex polygonal annulus is the region in
between two properly nested convex polygons,
such as the blue shaded region consisting of the
polygon Q less the interior of the green shaded
polygon P (Fig. 12). This region admits a very
simple triangulation by means of the rotating
calipers [51]. A triangulation of a polygonal
region is a partition of the regions interior into as
many triangles as possible, obtained by inserting
diagonals between pairs of vertices, without
allowing any edges to properly cross each other.
Initially two parallel lines of support, oriented in
the same direction, are constructed through a pair
of extreme vertices such as the vertices of P and Q
with lowest y-coordinates, such that the polygons
lie to the right of the lines (Fig. 12). As the
calipers are rotated clockwise, the pairs of vertices
that come into simultaneous contact with the lines
of support are connected with an edge. The first
few edges connected by this algorithm are shown
in red in Fig. 12. In general a region admits many
triangulations, some of which may have long
edges, acute triangles, or other properties deemed
undesirable for some applications such as mesh
generation. One attractive property of the
triangulation of the annulus obtained with the
rotating calipers algorithm is that the triangulation
tends to be nice, in the sense that the resulting
triangles tend to be nearly regular. Furthermore,
the method can be applied to more general
problems such as obtaining nice triangulations of
sets of points. One way of doing this is to first
compute all the convex layers of the set [52],
which yields a nested collection of annuli, each of
which can be triangulated with the rotating
calipers [53]. Another method involves first
computing a spiral polygonal chain spanning the
points [54], and then triangulating this spiral with
the rotating calipers [53]. This latter triangulation
also has the added nice property that it is
serpentine, i.e., its dual graph is a chain. In a
similar approach the rotating calipers have been
used to count and enumerate pointed pseudotriangulations using the greedy diagonal flipping
algorithm, by rotating the calipers along the
interiors of two pseudo-triangles [55].
qj+3
Q
pi-2
qj+2
pi+1
i
qj+1
pi
j
qj
381
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 372-386
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
pi
a
b
a'
x-axis
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 372-386
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
3.2 Finding Minimal Enclosing Boxes
A natural generalization of the problem of finding
the minimum-area rectangle that encloses a given
convex polygon, is finding the minimum-volume
box that contains a given convex polyhedron.
However, unlike its two-dimensional rectangular
counterpart, the minimum-volume box bounding a
convex polyhedron need not have one of its faces
flush with a face of the polyhedron. Fig. 15
illustrates the minimum-volume box enclosing a
regular tetrahedron (shaded in blue) in which no
faces of the box are flush with faces of the
tetrahedron. Note however, that in this example
every face of the box is flush with an edge of the
tetrahedron. In fact, ORourke [61] showed that a
box of minimum volume enclosing any convex
polyhedron must have at least two adjacent faces
flush with edges of the polyhedron. This
characterization allows ORourke to design an
algorithm that performs a type of threedimensional caliper rotation starting with every
pair of edges of the polyhedron, that runs on O(n3)
time. The caliper in effect consists of two planes
orthogonal to each other that rotate in unison,
reminiscent of the wedge-placement optimization
problems in two dimensions.
383
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 372-386
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
4 ACKNOWLEDGEMENTS
This research was supported by a grant from the
Provost's Office of New York University Abu
Dhabi, through the Faculty of Science, in Abu
Dhabi, The United Arab Emirates.
5 REFERENCES
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
384
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 372-386
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
30. T. Lozano-Perez, Spatial planning: A conguration
space approach, IEEE Transactions on Computers, vol.
32, no. 2, pp. 108120, 1983.
31. R. L. Graham, An efficient algorithm for determining
the convex hull of a finite planar set, Information
Processing Letters, vol. 1, pp. 132-133, 1972.
32. F. P. Preparata, and S. Hong, Convex hulls of finite
sets of points in two and three dimensions,
Communications of the ACM, vol. 20, pp. 87-93, 1977.
33. B. Chazelle, Approximation and decomposition of
shapes, in Advances in Robotics 1: Algorithmic and
Geometric Aspects of Robotics, (J.T. Schwartz, C.K.
Yap, eds), Lawrence Erlbaum Associates (1987), pp.
145-185.
34. J. Abrahamson, A. Shokoufandeh, and P. Winter,
Euclidean TSP between two nested convex obstacles,
Information Processing Letters, vol. 95, pp. 370-375,
2005.
35. F. P. Preparata, and D. E. Muller, Finding the
intersection of n half-spaces in time O(n log n),
Theoretical Computer Science, vol. 8, no. 1, pp. 45-55,
1979.
36. J. ORourke, A new linear algorithm for intersecting
convex polygons, Computer Graphics and Image
Proccessing, vol. 19, pp. 384-391, 1982.
37. G. T. Toussaint, A simple linear algorithm for
intersecting convex polygons, The Visual Computer,
vol. 1, pp. 118-123, 1985.
38. Y. Freund, and R. E. Schapire, Large margin
classification using the perceptron algorithm, Machine
Learning, vol. 37, no. 3, pp. 277-296, 1999.
39. M. E. Houle, Algorithms for weak and wide separation
of sets, Discrete Applied Mathematics, vol. 45, pp.
139-159, 1993.
40. M. E. Mavroforakis, and S. Theodoridis, A geometric
approach to support vector machine (SVM)
classification, IEEE Transactions on Neural Networks,
vol. 17, no. 3, pp. 671-682, 2006.
41. C. Rey, and R. Ward, On determining the on-line
minimax linear fit to a discrete point set in the plane,
Information Processing Letters, vol. 24, pp. 97-101,
1987.
42. B. K. Bhattacharya, J. Czyzowicz, P. Egyed, I.
Stojmenovic, G. T. Toussaint, and J. Urrutia,
Computing shortest transversals of sets, International
Journal of Computational Geometry and Applications,
vol. 2, no. 4, pp. 417-436, 1992.
43. J.-M. Robert, and G. T. Toussaint, Linear
approximation of simple objects, Proceedings 9th
Annual Symposium on Theoretical Aspects of
Computer Science (STACS'92), Cachann France,
February 1992, A. Finkel and M. Jantzen (eds.), Lecture
Notes in Computer Science #577, pp. 233-244.
44. J.-M. Robert, and G. T. Toussaint, Computational
geometry and facility location, Proceedings of the
International Conference on Operations Research and
Management Science, Manila, The Philippines,
December 11-15, 1990, pp. B-1 to B-19.
385
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 372-386
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
61. J. O'Rourke, Finding minimal enclosing boxes,
International Journal of Computer and Information
Science, vol. 14, pp. 183-199, 1985.
62. C.-T. Chang, B. Gorissen, and S. Melchior, Fast
oriented bounding box optimization on the rotation
group SO(3;R), ACM Transactions on Graphics, vol.
30, no. 5, October 2011, Article 122.
63. G. Barequet, and S. Har-Peled, Efficiently
approximating the minimum volume bounding box of a
point set in three dimensions, Journal of Algorithms,
vol. 38, pp. 91-109, 2012.
64. I. T. Jolliffe, Principal Component Analysis. Springer,
New York, NY, USA, 2002.
65. M. Lahanas, T. Kemmerer, N. Milickovic, K.
Karouzakis, D. Baltas, and N. Zamboglou, Optimized
bounding boxes for three-dimensional treatment
planning in brachytherapy, Medical Physics, vol. 27,
no. 10, pp. 2333-2342, October 2000.
66. G. T. Toussaint, and B. K. Bhattacharya, Optimal
algorithms for computing the minimum distance
between two finite planar sets, Pattern Recognition
Letters, vol. 2, pp. 79-82, 1983.
67. C. Grima, and A. Mrquez, Computational Geometry on
Surfaces, Kluwer Academic Publishers, Dordrecht, The
Netherlands, 2001.
68. H. Pirzadeh, Computational Geometry with the Rotating
Calipers, M.Sc. Thesis, School of Computer Science,
McGill University, Montreal, Canada, November 1999.
386
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 387-400
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
ABSTRACT
Heated debates involving reforms in the
educational system are becoming more and more
frequent in recent years. This is due to the
increasingly evident shortcomings in the
educational system and its difficulties to evolve at
the same pace as technological development. The
aim of this work is to present an analysis of the
current engineering educational context and
propose an interactive content authoring system as
well as a virtual professor in an attempt to make
learning experience richer and more motivating to
students.
KEYWORDS
Flipped Classroom; Virtual Learning Environment;
Avatar; E-Learning; Content Authoring.
1 INTRODUCTION
The advent of new technologies in recent years
has been transforming human lifestyle at a
breathtaking speed. Education, as an exception, is
one of the social structures most resistant to
adopting the technological tools available today.
Educators, in general, do not truly believe that the
lack of interest and low student performance can
be directly associated with the traditional and
restricted way of learning. This has motivated the
interest of researchers in the search for
methodologies and processes in an attempt to
make an educational reform based on Digital
Information and Communication Technologies
[1].
In applied sciences, for instance, there is a
growing disaffection of high school students for
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 387-400
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
PBL (Problem-Based Learning). Other proposals
refer to the intensive use of WebLabs, Virtual
Labs and Simulation Tools, either at home or in
the classroom [5, 6, 7, 8, 9]. However, these new
methods of education will require: (1) improved
classroom acoustic and environments; (2) highquality audio and video; (3) use of smart
computers; (4) use of Flipped Classroom
methodology and (5) proposition of real-life
challenges.
Currently, with the help of Internet, millions of
students can be simultaneously attended in online
courses offered in different areas of knowledge.
Universities like Harvard, MIT and Stanford have
already adopted distance learning and achieved
good results with their MOOCs (Massive Online
Open Courses) offered through Coursera and edX
platforms.
In addition to distance learning, the concept of
Flipped Classroom [10] seems to be an efficient
solution to make classes more dynamic and
attractive. Reversing a classroom means to change
the pedagogical model of teaching concerning the
traditional oral exposition of concepts and
homework assignment. In this new model,
students are encouraged to study and learn by
themselves, reading books and articles, watching
videos and solving especial homeworks. The
classroom environment is then redirected to focus
on projects, activities and discussions. Technology
and new media are invaluable tools for the success
of this concept. Briefly, the value of this inversion
is the transformation of disciplines into
workshops, where students can test their
knowledge in the application of concepts and
interact with each other in practical activities [10].
In other words, learn at home and practice in the
classroom.
According to [10], in traditional classes
students try to understand what is being said,
which often makes them lose important points of
the speech. They also cannot think about the
speech often because they are trying to transcribe
the words of their instructors. The use of movie
and other technological resources places them
under control of the content presentation execution
flow. It is worth mentioning that there is also the
possibility to include people with special needs
through the use of subtitles and other interesting
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 387-400
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Flipped Classrooms;
Online video broadcasting (YouTube);
Learning Management Systems (LMS);
Real-time communication;
Increased use of technological devices
(smartphones, mobile phones, tablets, etc.);
Broadband Internet.
According to Economides [16], the term
Collaborative Education should be used instead
of Distance Education, considered by him
surpassed.
Although simple and promising, the reverse
classroom paradigm can be easily misunderstood.
This occurs mainly because of the careful
preparation of contents that are needed. Moreover,
lesson recording requires great dedication and
effort, and activities need to be carefully
integrated with content taught. In addition,
instructors may need to learn new skills to put into
practice lessons recording, which introduces a
learning curve for the model. Well-structured and
well-prepared lessons contribute to students'
motivation [10]. Not to mention the cost of
recording equipment and the difficulties of
updating or editing recorded content. Our proposal
tries to deal with these trade-offs and will be
further discussed soon.
Peer Instruction [17] has also been used in a
similar way. Proposed by Eric Mazur, it involves
students completing simple and direct learning
tasks at home and discussing content in classes
assisted by their instructors. This technique was
first used in introductory physics courses at
Harvard University and quickly spread to other
disciplines and institutions due to its efficiency
and flexibility compared to traditional teaching
methods based on oral presentation [18, 19, 20].
Watkins and Mazur [21] have found a significant
increase of retention among STEM students that
used this technique in an introductory physics
course. Giving students the chance to think,
respond and actively interact in the classroom can
significantly contribute to retention in courses in
these areas [21].
The Peer Instruction technique consists of:
1. Professor proposes a pre-class activity that
might be a reading, movie, etc., as
homework;
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 387-400
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
integrated into an e-learning system and is able to
interact with users sympathetically. Its goal is not
actually to teach students, but demonstrate
emotional reactions according to actions taken by
them, with the use of gestures and facial
expressions.
According to Wang et al. [23], it is important
to make students to feel good during the learning
process. In this context, in their work is proposed
an approach to build an environment for empathic
learning. Users can express their emotions while
they learn. A virtual human was also created for
proactively reacting to users' actions.
Other proposals of virtual professors were
made by Hu and Zao [24] and Sharma et al. [25].
In their work is proposed a 3D virtual teaching
environment where students can connect and
interact remotely with each other and with their
professors, and attend classes, all of them
represented by avatars. The virtual professor is
suggested to be affective and intelligent when
interacting with students according to them.
1.2 Challenges for Contemporary Educators
Currently, we spend much of the day interacting
directly or indirectly with technological devices.
All this involvement can be used for educational
purposes. Through this interaction, we have easy
access to a large number of information, what was
difficult to access in the past.
With all this advancement, and considering
that most students have access to technological
devices, we can think about a methodology that
enhances teaching based on the conceptualization
of knowledge rather than just memorization.
However, in order to take advantage of the
benefits provided by technology, we must have a
teaching environment that makes it possible to
apply new methodologies. Hence, this involves
creating computational tools to improve education
and motivating student's interaction with
professors, monitors, and classmates.
To accommodate all technological capability it
is necessary to adapt classrooms, so that all
available resources can be better used. This means
providing classrooms with high definition
projectors, high quality sound systems, digital
whiteboards, tablets, notebooks, access to
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 387-400
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
languages rather than just in their mother tongue.
In addition, students learn valuable techniques for
writing and reading academic papers.
2 PROPOSAL OF AVATAR-BASED
TEACHING
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 387-400
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
students seem more motivated to study at
home.
392
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 387-400
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
in particular. Therefore, we can say that some of
the non-functional requirements that guided the
development of this environment were:
Usability: to create friendly user interfaces
to assist professors and students;
Performance: to avoid excessive waiting in
multimedia processing;
Security: to prevent unauthorized access to
content of VClass Projects;
Integration: to allow Virtual Class Editor
to be integrated to any TTS (Text-toSpeech) system built using SAPI 5
framework from Microsoft;
Internationalization: to allow the editor to
be easily translated to any language
throughout the use of XML.
Figure 4. VClass Projects.
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 387-400
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Therefore, a HUD was modeled for the Virtual
Classroom in order to allow students to have
access to all the tools offered by virtual classes, as
shown in Figure 5. Regarding this picture, we can
also see several numbers indicating some specific
regions of this component:
1. Button that give us access to the playlist of
scenes;
2. Scenes control area. When any option of
this area is accessed, scenes can be
forwarded, rewound, paused, etc.;
3. Button that give us the ability to move to a
specific scene in the playlist;
4. When the student wants to access the
interactive quiz, this button can be used.
Quizzes may or may not be present, since
it depends on the professor to model them;
5. Button to access the class questionnaire;
6. Button that give us access to extra-class
resource materials. A wide range of items
can be added to classes as resource
materials to support students that want to
have further information about the topics
covered;
7. Button that provides access to the got
question interface. When the student clicks
on it, the class execution flow is
interrupted so he or she can write its doubt.
After this doubt is transmitted, the flow is
resumed;
8. Option that allows returning to the Virtual
Classroom main menu, composed mainly
of classes contained in the Workspace
directory;
9. The ability to show subtitles was coded in
the tool in order to support students when
hearing synthetic voices or even for
internationalization purposes. Subtitles can
be activated by this button;
10. The immediate interruption of any song
played by the tool can be made through
this option at any time;
11. And finally, the click on button 11 turns
off the execution of classes, as well as the
tool closed.
394
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 387-400
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
do not constitute an access control system. Also
according to this picture, you may also notice an
option to display or omit scenes containing
content considered advanced. Marking content as
complex depends on the professors when they are
modeling scenes. This functionality was
implemented to meet a requirement generated
during evaluations, when students reported that
they were not willing to see content that did not
match their cognitive load. Therefore, now it is
possible to accommodate a wide diversity of
students' profiles.
When the Virtual Classroom is started, some
checkup operations are executed in order to
validate the consistency of the tool and projects
contained in the Workspace directory. If there are
any unwanted issues, the environment interrupts
its execution and notifies the user the problem
occurred.
3 EVALUATION METHODOLOGY
In order to evaluate the attributes of the Virtual 3D
Learning Environment, we have selected especial
classes of graduate students in the School of
Electrical and Computer Engineering, University
of Campinas - UNICAMP, and in the Salesian
University of So Paulo UNISAL, both in the
city of Campinas, SP, Brazil.
A survey was carried out during the month of
November of 2013, where 73 individuals had the
opportunity to interact with classes presented by
avatars in our Learning Environment. At the end
of each presentation the students were asked to
answer an especial questionnaire.
The nature of the survey was based on mixedmethods. Data were collected in questionnaires
containing 12 Likert items [28], which are based
on a scale of levels of agreement or disagreement
to specific questions: (1) Completely Disagree, (2)
Disagree, (3) Indifferent, (4) Agree, (5) Strongly
Agree; and three open items.
The questionnaires were based on a proposal
by Knay and Knaack [29], which was developed
mainly to measure user satisfaction of students
when interacting with learning objects. We have
adapted their proposal for our study by adding
three open items. The original proposal divides the
instrument into 3 dimensions to group and collect
data:
Learning
1. The platform helped me learn.
2. Feedback resources (i.e., email) can be
useful in learning.
3. Graphical resources and animations helped
me learn.
4. The platform helped me learn a new
concept.
5. Overall, the learning platform helped me
learn.
Quality
6. Help features can be useful in learning.
7. Instructions appear to be easy to follow.
8. The platform appears to be easy to be used.
9. The platform appears to be organized.
Motivation
10. I liked the theme presented.
11. I consider the learning environment
motivating.
395
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 387-400
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
12. I would like to use the platform again.
Open Items
1. What did you like most in the platform?
2. What did you most dislike in the platform?
3. What would you change in the platform?
The questionnaire reliability analysis was
performed in accordance with the principles of
Cronbach's alpha coefficient [29], which ended up
showing that the questionnaire was reliable to be
applied in the study. Part of the instrument was
already validated in previous studies and presented
good results [30].
Cronbachs alpha coefficient can be estimated
according to
(1
(1)
= (
( )
where,
= the number of individuals;
= the confidence interval (CI) [31];
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 387-400
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
3.2 Sample Characteristics
A high percentage of individuals were enrolled in
an undergraduate course (89.04%, N = 66) while
others were involved with a graduate course
(9.59%, N = 7)
Except for one course, the others had
somewhat similar numbers of participants in this
study: 35.62% students were enrolled in Bachelors
in Mechanic Engineering (N = 26), 27.4% were
attending Industrial Automation (N = 20), 26.03%
were in Bachelors in Computer Engineering (N =
19) and, finally, 9.59% were enrolled in an
Electrical Engineering graduate course (N = 7).
Sample was mainly composed of young
people: 32.84% of respondents reported to be
between 21 and 25 years old (N = 22), 26.87% of
them said they were between 15 and 20 years old
(N = 18), 13.43% were between 26 and 30 (N =
9), and, finally, the rest of them declared to be in
age groups with smaller percentages.
The vast majority of respondents declared to
be males (91.67%, N = 66) while there were only
8.33% females for this study (N = 6).
4 RESULTS
As a case study, we have modeled some virtual
classes to be presented to students. Due to our
sample characteristics (most of them were enrolled
in an engineering course), we decided to create
some introductory classes concerning the use of
Matlab applied to Calculus. We tried to enrich the
platform as much as possible, using almost all
features and characteristics developed. Students
had the opportunity to watch content, ask
questions to our avatars, solve interactive quizzes,
access complimentary resources such as
documents and websites, etc. Special attention was
given to the TTS (Text-To-Speech) system in
order to produce voices for avatars as close as
possible to human voices, reducing pronunciation
errors or misspellings.
According to the statistical parameters of our
results, presented in Table 1, the mean was similar
for all items, as well as the standard deviations.
Mode and median parameters were also identical.
Me
Mo
Item
4
4
3.7
0.4
0.6
7
4
4
4.0
0.2
0.5
8
4
4
3.8
0.4
0.6
9
4
4
3.7
0.4
0.6
10
4
4
3.8
0.3
0.5
11
4
4
4.1
0.3
0.5
12
Me
Mo
4
4
4.0
0.5
0.7
4
4
4.1
0.5
0.7
4
4
4.1
0.4
0.6
4
4
4.0
0.4
0.6
4
4
3.8
0.4
0.7
4
4
3.8
0.3
0.5
Items
12
5
4
3
Possible Range
12-60
5-25
4-20
3-15
Internal Reliability
0.82
0.78
0.73
0.77
397
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 387-400
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Quality items of our questionnaire were those
that achieved the highest scores, as shown in
Figure 8. All items scored higher than 80%.
Learning
100%
Indifferent
80%
Agree;
Strongly
Agree
60%
40%
Disagree;
Completely
Disagree
20%
0%
i1
i2
i3
i4
i5
Motivation
100%
80%
60%
40%
Quality
100%
Indifferent
80%
60%
Agree;
Strongly
Agree
40%
20%
Disagree;
Completely
Disagree
0%
i6
i7
i8
Indifferent
i9
Agree;
Strongly
Agree
20%
Disagree;
Completely
Disagree
0%
i10
i11
i12
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 387-400
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
image resolution and fonts, and reducing speech
speed in order to improve understanding of what
was being spoken by the virtual tutors.
6.
5 CONCLUSIONS
Throughout this work we presented in-progress
studies of an attempt to create an environment to
help professors designing content-rich interactive
virtual classes, as well as virtual instructors.
Efforts have been made in the design of robust and
easy-to-use platforms for use in educational
contexts in order to enable the creation of
motivating and friendly classes. Our platform has
already achieved the first results. Summative
evaluations were carried out with success,
resulting in good feedback from users
satisfaction. On the other hand, we intend to carry
out formative evaluations to measure the extent to
which students have really learned from content
presentation. Moreover, there are several recent
developments with great potential for important
contributions to education. Big Data algorithms
and Artificial Intelligence, for instance, are among
the applications that are likely to foster the
advancement of these educational tools, especially
for Massive Online Open Courses.
7.
8.
9.
10.
11.
12.
13.
6 ACKNOWLEDGEMENTS
14.
2.
3.
4.
5.
15.
16.
17.
18.
19.
20.
399
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 387-400
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
21. Watkins, J., Mazur, E.: Retaining Students in Science,
Technology, Engineering, and Mathematics (STEM)
Majors. Journal of College Science Teaching 42(5), 36
(2013)
22. Grujic, Z., Kovacic, B., Pandzic, I. S.: Building Victor - A
Virtual Affective Tutor. In: Proceedings of 10th
International
Conference
on
Telecommunications
(ConTEL), pp. 185--189, Zagreb, Croatia (2009)
23. Wang, C., Chen, G., Liu, C., Liu, B.: Design an Empathic
Virtual Human to Encourage and Persuade Learners in eLearning Systems. In: Proceedings of the First ACM
International Workshop on Multimedia Technologies for
Distance Learning, pp. 27--32, New York, USA (2009)
24. Hu, Y., Zhao, G.: Virtual Classroom with Intelligent
Virtual Tutor. In: Proceedings of International Conference
on e-Education, e-Business, e-Management and eLearning, pp. 34--38, Washington, USA (2010)
25. Sharma, S., Agada, R., Ruffin, J.: Virtual Reality
Classroom as an Constructivist Approach. In: Proceedings
of the IEEE Southeastcon, pp. 1--5, Jacksonville, USA
(2013)
26. Amaral, W. M., Martino, J. M., Angare, L. M. G. Sign
Language 3D Virtual Agent. In: Proceedings of the 5th
International Multi-Conference on Society, Cybernetics
and Informatics (IMSCI), pp. 93--97 (2011)
27. Amaral, W. M., Martino, J. M.: Formalismo,
Implementao e Avaliao de um Sistema de Transcrio
para Gerar Contedo em Lngua de Sinais em Ambiente
Virtual. In: Proceedings of the V Encontro dos Alunos e
Docentes do Departamento de Engenharia de Computao
e Automao Industrial (EADCA) (2012)
28. Creswell, J. Research Methodology: Qualitative,
Quantitative, and Mixed Methods Approaches, 2nd ed.
SAGE Publications, Inc., Los Angeles, USA (2002)
29. Cronbach, L. J.: Coefficient Alpha and the Internal
Structure of Tests. Psychometrika 16(3), 297--334 (1951)
30. Kay, R., Knaack, L.: Assessing Learning, Quality, and
Engagement in Learning Objects: The Learning Object
Evaluation Scale for Students (LOES-S). Educational
Technology Research and Development 57(2), 147--168
(2008)
31. Triola, M.: Elementary Statistics. Pearson Education Inc.,
Boston (2006)
400
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 401-407
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
ABSTRACT
This paper presents a technique to miniaturize
bandstop
filters
applicable
for
radiofrequency/microwave applications. The technique
comprises the use of small resonant inclusions bridged
with a slot, etched from the metallic ground plane
underneath the filters microstrip line segment. Unlike
artificial magnetic materials, for instance split-ring
resonators (SRRs) that respond to vertical magnetic
field, complementary SRRs (CSRRs) resonate upon an
excitation of an axial time-varying electric field.
Numerical full-wave studies are presented here to
validate and proof the proposed concepts. It is found
that high miniaturization factors can be achieved for
the filters loaded with the proposed slotted
complementary resonators in comparison to nonslotted resonators. Furthermore, sensitivity analysis is
conducted to study the effect of geometrical parameters
of the proposed slotted resonators as well as the effect
of the choice of host media on the suppression
bandwidth and rejection level of such filters.
Miniaturized bandstop filters based on developed
slotted-complementary spiral resonators are also
proposed and numerically evaluated.
KEYWORDS
Bandstop filters, complementary-split ring resonators
(CSRRs), slotted-CSRRs, miniaturized filters.
1 Introduction
Microwave filters are vital building blocks in
modern wireless communication systems. Such
filters are widely used to either pass particular
frequency components or reject spurious modes or
harmonics. In particular, microwave bandstop
filters are used quite often in cellular base stations,
navigation systems and alike. Amongst the
available
bandstop
filters
manufacturing
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 401-407
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
enough periods of aforementioned concentric
rings and formed in either periodic or aperiodic
fashion, artificial materials can be realized with
unique effective magnetic permeability response.
When excited with an axial time-varying magnetic
field H (see Fig. 1), SRRs resonate and hence give
rise to an effective magnetic response, eff. It was
until that Smith and his ground [10] made the first
artificial magnetic material following the
hypothetical analysis of Veselago [11] and Pendry
to realize materials with unique effective electric
and magnetic properties.
It is important to highlight here that at frequencies
below the resonance frequency of the SRR
inclusion, the effective magnetic permeability
becomes positive, while at frequencies above the
SRRs resonance, eff becomes negative. On the
other hand, complementary split-ring resonator
(CSRR) is the dual-counter part of SRR [12]. In
other words, CSRR starts to resonate once excited
with an axial time-varying electric field E. Based
on Babenits principle [13], this means that
CSRRs give rise to an effective electric response,
eff. CSRRs are in fact achieved by replacing the
metallic rings of SRRs with apertures (i.e., slotted
rings) and surrounding free-space region nearby
SRR inclusion is replaced with metallic plate.
Fig. 2 (a) depicts a unit cell of CSRR inclusion.
For simplicity, a square shaped resonator is
shown. At resonance, the inductance from the
inclusions metals balances the capacitance
between the etched rings of the resonator.
Recently, slotted-CSRR inclusions were proposed
to mitigate space wave coupling effect between
microstrip patch antennas [14]. In Fig. 2 (b), a
modified resonator is proposed through the use of
two collinear CSRRs connected through a
compact slit. The slit (or bridging slot) provides
significant advantage in enhancing the bandwidth
of the proposed stopband filter.
This paper aims to explore the application of such
slotted resonators as particles to enhance
performance of bandstop filters. While in [15] the
aforementioned
application
was
briefly
highlighted, herein, more analyses are devoted to
thoroughly investigate the effect of geometrical
parameters as well as the applied host medium of
the proposed slotted complementary resonators on
Fig. 2 (a) CSRR unit cell, and (b) the proposed slottedCSRR inclusion. Note that gray area represents
metallization.
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 401-407
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
linearly cascading the suppression band of both
CSRRs and the slot. By cascading several varied
in size S-CSRRs, a wide stopband behavior is
attainable. Fig. 3 shows the bandstop filter
comprises a transmission line segment of width
2.88 mm for an impedance of 50 . The proposed
resonator (slotted-CSRR) has the following
geometrical parameters (see Fig. 1): L = 4 mm, a =
b = g = 0.2 mm, Ls = 2 mm, and Ws = 0.35 mm,
where a dielectric substrate (r = 3.48, tan =
0.004) with a thickness of 1.27 mm is used. In this
study, more than one S-CSRR unit cell is used.
This helps to provide strong suppression (zero
transmission) when capturing the transmission
coefficient, S21, between two ports of a
transmission line segment as indicated in Fig. 3.
The periodicity (separation distance between each
successive S-CSRR inclusion) is maintained
constant at 1 mm for ease of manufacturing.
403
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 401-407
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
rejection band of the filter to shift to lower
frequencies.
Fig. 5 A parametric study illustrates the effect of the SCSRR slot width, Ws, on the rejection band of the filter.
Fig. 6 Attenuation coefficient for the proposed filter with SCSRRs and compared with CSRRs filter (without the slot).
404
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 401-407
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
405
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 401-407
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
The effect of the bridged slot between resonant
CSRs is investigated next on the suppression band
of bandstop filters. Similar model (see Fig. 11) to
that presented in Fig. 8 is numerically studied and
simulated to extract the suppression band of the
filer. The transmission coefficient, S21, is
computed by considering two ports at the edges of
a TL segment of width 3.5 mm for proper match to
a 50- impedance. The width and length of the
slot, that is used to bridge two CSRs, is chosen as
Ws = 0.15 mm and Ls = 2 mm, while the length of
the two identical CSRs is taken as before. The
results are presented as shown in Fig. 12. As can
be seen, the effect of the slotted bridge has
resulted in a dramatic increase in the suppression
band of the filter, with almost 2 GHz band of
signal rejection when compared with the filter
without the slotted line (see Fig. 9). Furthermore,
the effect of the host dielectric material is noted to
further miniaturize the bandstop filter as can be
seen from Fig. 12.
Fig. 11 3D view of the bandstop filter with slottedcomplementary spiral resonators etched out from metallic
ground plane. Note that TL segment is matched to 50.
3 CONCLUSIONS
In this paper, bandstop filters based on developed
slotted complementary split ring resonators and
slotted complementary spiral resonators were
proposed and investigated. The filters were
numerically studied using full-wave time-domain
simulator of CST Microwave Studio. Parametric
studies based on varying the filters geometrical
parameters as well as the host dielectric medium
were thoroughly conducted and several remarks
based on the suppression band of the proposed
filter were highlighted in the context of the
discussed results.
4 ACKNOWLEDGMENT
The author would like to thank Sultan Qaboos
University for providing the resources to
accomplish this research work. The author also
acknowledges the support from CST Microwave
Studio for providing trials to do the full-wave
modeling of the filters.
406
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(3): 401-407
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
5 REFERENCES
[1] M. Mandal and P. Mondal, Design of sharp-rejection,
compact, wideband bandstop filters, IET Microw.
Antennas Propag., Vol. 2, No. 4, pp. 389-393, 2008.
[2] F. Yang, K. Ma, Y. Qian, and T. Itoh, A uniplanar
compact photonic-bandgap (UC-PBG) structure and its
applications for microwave circuit, IEEE Trans. Micro.
Theory Tech., Vol. 47, No. 8, pp. 1509-1514, 1999.
[3] C. Hang, W. Deal, T. Qian, and T. Itoh, High
efficiency transmitter front-ends integrated with planar
an PBG, Asia-Pacific Microwave Conf. Dig., pp. 888894, Dec. 2000.
[4] A. Safwat, F. Podevin, P. Ferrari, and A. Vilcot,
Tunable band-strop defected ground structure
resonator using reconfigurable dumbbell-shaped
coplanar waveguide, IEEE Trans. Microw. Theory
Tech., Vol. 54, No. 9, pp. 3559-3564, Sep. 2006.
[5] X. Chen, X. Shi, Y. Guo, and M. Xiao, A novel dual
band transmitter using microstrip defected ground
structure, Progress In Electromagnetics Research, Vol.
83, pp. 1-11, 2008.
[6] R. Marques, F. Martin, and Sorolla, M., Metamaterials
with negative parameters: theory, design and microwave
applications, John Wiley and Sons Inc., 2008.
[7] R. Marques, F. Mesa, J. Martel, and F. Medina,
Comparative analysis of edge- and broadside- coupled
split ring resonators for metamaterial design - theory
and experiments, IEEE Transactions on Antennas
Propagation, Vol. 51, Issue 10, pp. 2572-2581, Oct.
2003.
[8] J. Bonache, M. Gil, I. Gil, J. Garcia-Garcia, and F.
Martin, On the electrical characteristics of
complementary metamaterial resonators, IEEE
Microwave Wireless Components Letters, Vol. 16, Issue
10, pp. 543-545, Oct. 2006.
[9] J.B. Pendry, A.J. Holden, D.J. Robbins, and W.J.
Stewart, Magnetism from conductors and enhanced
nonlinear phenomena, IEEE Transactions on
Microwave Theory Techniques, Vol. 47, Issue 11, pp.
20752084, Nov 1999.
[10] D. R. Smith, W. Padilla D. Vier, S. Nemat-Nasser, S.
Schultz, Composite medium with simultaneously
negative permeability and permittivity, Phys. Rev.
Lett., 84, No. 18, pp. 4184, May 2000.
[11] V. Veselago, The electrodynamics of materials with
negative permittivity and negative permeability, Soviet
Physics USPEKI, 10, 509, 1968.
[12] F. Falcone, T. Lopetegi, J.D. Baena, R. Marques, F.
Martin, and M. Sorolla, Effective negative- stopband
microstrip lines based on complementary split ring
resonators, IEEE Microwave Wireless Components
Letters, Vol. 14, Issue 6, pp. 280-282, 2004.
[13] F. Falcone, T. Lopetegi, M. A. G. Laso, J. D. Baena, J.
Bonache, M. Beruete, R. Marques, F. Martin, and M.
Sorolla, Babinet principle applied to the design of
metasurfaces and metamaterials, Phys. Rev. Lett., Vol.
93, No. 19, pp. 197401-197404, Nov 2004.
407