SATNAC 2007 Conference Papers

Network Services

Title:                   ** A Grid-Enabled E-Business Resource Sharing With Cooperative Agent

Authors:              Reuben Dayo Aremu (University of Zululand),
M. O. Adigun (University of Zululand) 

Abstract:             In this paper we present a new intermediary agent, called Cooperative Agent, for mediating negotiation interaction between providers of resources and consumers of resources. In this model, the providers of resources form a cooperative group for the purpose of trading grid resources. In other words, the resource providers sell their resources through the cooperative group. The clients express their need for resources to the cooperative center through their agent. Clients are usually charge per unit of the resources they consume. By pooling their resources together, this model enables providers of resources to combine sales returns, and operating expenses, and distributing sales among members in proportion to volume each provides through the cooperative over a specified time. The model enables multiple users to access a virtualized pool of resources in order to obtain the best possible response time overall by maximizing utilization of the computing resources. It promotes collaboration between grid resource providers so that grid resources can be shared and utilized collectively and efficiently. It guarantees improved business agility by aggregating the resources of the providers in the grid into a pool where clients can easily access, negotiate and buy.

 

Title:                   Defining Generic Architectural Requirements for the Service Delivery Platform

Authors:              Rolan Christian (University of the Witwatersrand),
Hu Hanrahan (University of the Witwatersrand) 

Abstract:             The Service Delivery Platform (SDP) is a complex IT-based system that integrates into the telco network. The SDP supports convergence between telco and IT domains by simplifying access to telco resources and capabilities. As a result, the SDP hides technology, implementation and distribution specifics of underlying telco resources. However, the SDP is not standardised but has vendor-specific interpretations. In addition, SDP products use mixes of standards-based and proprietary technologies. Our research aims to contribute towards SDP standardisation by defining a framework of generic architectural concepts. The framework abstracts technologies and applies its concepts to SDP development. We define concepts for the framework, that is, SDP architectural requirements. To define the requirements we extract technology-neutral architectural concepts from various SDP interpretations. In this paper we discuss the SDP and evaluate a proposed interpretation. We describe the method used to uncover SDP requirements. Also, we define the SDP and present the requirements. We conclude that the requirements contribute to SDP standardisation, by promoting the development of SDP architectures, independent of technologies, implementation and distribution.

 

Title:                   The suitability of P2P for live video streaming

Authors:              Jeffrey Hinds (Telkom SA)

Abstract:             This paper discusses peer-to-peer technologies with the focus on video streaming. The primary objective is to determine the suitability of peer-to-peer networking as a platform for live video streaming by assessing available alternatives and developing a reference implementation. This implementation provides a platform for analysis and simulation as a means to determine potential gains derived by implementing video streaming using a peer-to-peer network. Peer-to-peer technology brings the capability to stream live video to any regular PC thus allowing almost any Internet connected computer to become a broadcast station with an almost unlimited number of viewers or clients. An analysis of available codecs was carried out and showed that MPEG-4 was the most optimal codec. The reference implementation showed that a relatively simple peer-to-peer streaming system can be developed without the need for an extensive protocol or overlay network.

 

Title:                   ** A Tutorial on Distributive Speech Recognition for Wireless Mobile Devices

Authors:              Dale Isaacs (University of Cape Town),
Daniel Mashao (University of Cape Town) 

Abstract:             With the expansion in wireless communication technology and the introduction of powerful smart-phones, users are demanding systems which will allow for ubiquitous computing. A critical requirement is a simpler means of interacting with mobile devices. Instead of struggling with small keypads on smart-phones or a stylus on a PDA it would be much simpler if we could use a more natural and familiar medium of communication, speech. There are currently 3 architectures, Embedded Speech Recognition, Network Speech Recognition (NSR) and Distributed Speech Recognition (DSR), each with their own pros and cons, which aim to incorporate an Automatic Speech Recognition (ASR) system on mobile devices. DSR proposes to be the best solution due to its superior performance in the presence of transmission errors and noisy environments. The main aim of this paper is to give the reader a broad outline of the DSR architecture, but focuses mainly on the front-end system, which literature suggests is the most researched area of DSR.We present an outline of the current advanced front-end DSR standards in detail, investigating its architecture and possible permutations. We briefly touch on the back-end system of DSR and also look at issues relating to this technology.

 

Title:                   ** Automatic Speech Recognition of Spoken Proper Names

Authors:              Thipe Modipa (University of Limpopo),
Hendrik Oosthuizen (University of Limpopo), Jonas Manamela (University of Limpopo)

Abstract:             This paper covers the recognition of spoken Northern Sotho names focusing on first and second names. The speech recognizer was developed using sizeable collection of names of people with high frequency from the University of Limpopo database of registered students. The hidden Markov model toolkit was used to train the recognizer. The HTK toolkit uses phoneme recognition that indicates speech sound categories that are sufficient to differentiate between different words in a language.

 

Title:                   Secure Remote User Authentication over an Unsecure Telecommunications Network

Authors:              Alexander Rossudowski (University of Pretoria),
H Venter (University of Pretoria) 

Abstract:             The Identification and Authentication process is an important step within any organisation to maintain security. The Identification and Authentication process itself needs to be performed securely to prevent replay attacks. However, some organisations offer certain services over unsecure telecommunication networks, such telephonic banking. Telecommunication networks are susceptible to eavesdropping and interception. Hence, if the identification and authentication information is successful interception, a replay attack can be preformed. However, legislation, such as the RICA and PATRIOT Act, make the interception of communication easier. This paper proposes the uses of a smart card architecture to secure the Identification and Authentication process over a unsecure telecommunication channel, thwarting replay attacks, while staying within the legal bounds of legislation.

 

Title:                   ** Mobil-e-Com: A SIM-based Application to Support Second Economy Entrepreneurship

Authors:              Hannah Slay (Rhodes University),
Mamello Thinyane (Rhodes University), Alfredo Terzoli (Rhodes University)

Abstract:             The e-commerce infrastructure in developing countries can greatly benefit from the implementation of SIM solutions that enable and facilitate second economy entrepreneurship. Our solution, Mobil-e-Com, is a micro-payment ecommerce platform that gives second economy entrepreneurs the ability to manage their virtual e-shops via their cell phone, placing products in e-shops, tracking orders and views, and also performing basic account management functions.  The solution also allows for payments to be made between cell phones, i.e. inter-cell phone money transfer. The SIM card not only becomes an electronic wallet, but also allows the operators to actively participate in the facilitation of commercial transactions between subscribers.

 

Title:                   Exploring a novel service deployment framework, PIASK, through the design and implementation of an e-commerce function for a rural community

Authors:              Mamello Thinyane (Rhodes University),
Peter Clayton (Rhodes University), Alfredo Terzoli (Rhodes University)

Abstract:             ICT solutions deployed in rural, marginalized areas seldom encapsulate the cultural and contextual considerations needed to ensure communities' buy-in, ownership, and sustainability. Today, knowledge has become a major commercial commodity, and access to knowledge networks has paramount financial benefits for communities, and can help bootstrap and leapfrog community development. We have developed an architecture, called PIASK, for the provision of semantically rich, multimedia and multi-modal access, ontology-based services for communities. In this paper the adequacy of this service framework is explored through the initial design and the development of an ecommerce function. We envisage that this culturally sensitive e-commerce solution will activate local entrepreneurship and provide a rich end-user experience.

 

Title:                   Extended Call Control Telecom Web Service

Authors:              David Vannucci (University of the Witwatersrand),
Hu Hanrahan (University of the Witwatersrand) 

Abstract:             This paper investigates the requirements for a Parlay-X Extended Call Control (ECC) Web Service, and why it is necessary to support convergence of Internet and telecommunications. A Virtual Private Branch Exchange application is used to illustrate how advanced call control can be facilitated using an ECC Web Service. Using the example a methodology to develop the ECC methods is shown. A call model suitable for ECC is proposed.
 
 
< Back to Conference Paper Topics