SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The Third International Conference on Digital Information and Communication Technology and its Applications (DICTAP2013)
-
SKIP TRIE MATCHING FOR REAL TIME OCR OUTPUT ERROR CORRECTION ON ANDROID SMARTPHONES
Proactive nutrition management is considered by many dieticians as a key factor in reducing cancer, diabetes, and other illnesses caused by mismanaged diets. As more individuals manage their daily ...Authors: Vladimir Kulyukin, Aditya Vanka
Year Published: Jul. 2013 | 1-11 | DICTAP2013 -
MEDIA SELECTION FOR THE ANNOUNCEMENT OF CHILDBIRTH- THE SOCIAL CAPITAL ASPECT
This paper investigates the choice of media systems to use for the announcement of childbirth in relation to media perception theories. We focus on the usage of different social networks theories ...Authors: Oren Malberger Malberger, Sheizaf Rafaeli, Dan Waisman, David Bader, Arie Drugan
Year Published: Jul. 2013 | 12-23 | DICTAP2013 -
MULTILEVEL VERIFICATION FOR PREVENTION OF INFORMATION THEFT BY REMOVABLE DEVICES
With the advances of storage technology both personal and corporate data are becoming more vulnerable and prone to loss. Recently, data theft is becoming the biggest challenge for corporates, because ...Authors: S. Kami Makki, Md. Sadekur Rahman
Year Published: Jul. 2013 | 24-30 | DICTAP2013 -
FACTORS INFLUENCING THE CONSUMERS’ ADOPTION OF MOBILE INTERNET
The Internet and mobile technology, the two most dynamic technological forces in modern information and communication technologies are converging into one ubiquitous mobile Internet service, which ...Authors: Saleh Alwahaishi, Václav Snášel
Year Published: Jul. 2013 | 31-39 | DICTAP2013 -
ADAPTIVE VIRTUAL TRAFFIC LIGHT BASED ON VANETS FOR MITIGATING CONGESTION IN SMART CITY
Fixed cycle traffic lights decrease the throughput of traffic at intersections. Adaptive traffic light approaches dynamically change the cycle of traffic lights according to current traffic, these ...Authors: Li-Der Chou, Jin-Hua Tseng, Jyun-Yan Yang
Year Published: Jul. 2013 | 40-44 | DICTAP2013 -
MOBILE LOCATION BASED SERVICES: NON-VISUAL FEEDBACK USING HAPTICS
Haptics is a feedback technology that takes advantage of the human sense of touch by applying forces, vibrations, and/or motions to a haptic-enabled device such as a mobile phone. Historically, ...Authors: Ricky Jacob, Adam Winstanley
Year Published: Jul. 2013 | 45-53 | DICTAP2013 -
ACCELERATED STABLE STOCHASTIC MOBILE MULTI-AGENTS USING BOUNDARY EFFECTS
This paper describes how to coordinate stable autonomous multi-agents which move over finite resources consisting of cells using boundary effects. Each of the agents stochastically moves in ...Authors: Isamu Shioya
Year Published: Jul. 2013 | 54-67 | DICTAP2013 -
A TRIAD-BASED INCONSISTENCY DETECTION MECHANISM FOR ELICITING TACIT KNOWLEDGE
In conventional online questionnaires, the respondents are always provided with a complete set of static questions, for determining both the relative importance and the degree of relative importance ...Authors: Chia Yean Lim, Vincent K.T. Khoo
Year Published: Jul. 2013 | 68-73 | DICTAP2013 -
MOBILE SOLUTION FOR DIABETES PATIENTS IN DEVELOPING COUNTRIES
In this modern world when we think about efficiency and productivity we think about Information Technology, which increase the mentioned factors concerning in every sectors. This paper describes ...Authors: Tharshini Partheepan, Sumathy Kumarasamy
Year Published: Jul. 2013 | 81-84 | DICTAP2013 -
ON ACCURATE, LOW-COMPLEXITY QUASI DOPPLER BASED LOCALIZATION
The aim of this paper is to discuss the Quasi Doppler or Pseudo Doppler bearing estimation method and show how contemporary digital signal processing and some minimal a priori knowledge of the signal ...Authors: Benjamin Babjak, Sandor Szilvasi, Peter Volgyesi
Year Published: Jul. 2013 | 85-92 | DICTAP2013 -
COGNITIVE RADIO USAGE IN 6LOWPAN WIRELESS SENSOR NETWORKS
Wireless Sensor Networks (WSNs) are becoming more and more important every last day. In order to integrate to the Internet, WSNs should communicate with Internet protocol as Internet runs on IP. IPv6 ...Authors: Gün Demirbaş, Bülent Gürsel Emiroğlu
Year Published: Jul. 2013 | 93-98 | DICTAP2013 -
A NEW METHOD TO ESTIMATE THE SENSITIVITY OF A PHOTO-TRANSISTOR IN AN IMAGE SENSOR
A new method to predict the sensitivity of a photo transistor used in a pixel of an image sensor is proposed. The sensitivity of an image sensor should be measured after the assembly process. The ...Authors: Sangsik Park, Hyungsoo Uh
Year Published: Jul. 2013 | 99-103 | DICTAP2013 -
REAL-TIME LANE DETECTION FOR DRIVING SYSTEM USING IMAGE PROCESSING BASED ON EDGE DETECTION AND HOUGH TRANSFORM
Real-time Lane Detection for Driving System Using Image Processing Based on Edge Detection and Hough Transform has been developed to aid a driver in the lane departure decision-making, to reduce a ...Authors: Thittaporn Ganokratanaa, Mahasak Ketcham, Sasipa Sathienpong
Year Published: Jul. 2013 | 104-109 | DICTAP2013 -
IMMOBILE RANDOM SENSOR NETWORKS FOR INTRUDER DETECTION
Networks consisting of large number of small sensors can be used to watch over areas for intruders, fires and other threats. In the work presented here, we have used computer simulations to study how ...Authors: R.R. Hordijk, O.J.G. Somsen
Year Published: Jul. 2013 | 110-123 | DICTAP2013 -
PRIVACY PRACTICES TOWARDS UBIQUITOUS SERVICES: A PROACTIVE APPROACH
While ubiquitous services (u-services) are likely to be recognized as the next trend in e-services, privacy issues are considered as a major obstacle to thrust uservices. This study endeavors to ...Authors: Shu-Ching Wang, Hao-Yun Kao
Year Published: Jul. 2013 | 124-133 | DICTAP2013 -
THE CHALLENGES OF COLLABORATIVE LEARNING IN CLOUD AND A THREE LAYERED ARCHITECTURE TOWARDS THE SOLUTION
Cloud computing is the emerging technology providing IT as a utility through internet. The benefits of cloud computing are but not limited to service based, scalable, elastic, shared pool of ...Authors: Sai Manoj Marepalli, Razia Sultana, Andreas Christ
Year Published: Jul. 2013 | 134-139 | DICTAP2013 -
INFORMATION RETRIEVAL IN EDUCATION
The article describes the content and teaching methodology for students’ work with information sources. The authors present the structure of courses in information retrieval and the approaches ...Authors: Ladislav Burita, Vojtech Ondryhal
Year Published: Jul. 2013 | 140-143 | DICTAP2013 -
AUTOMATIC SCENE GENERATING WITH FUZZY SPATIAL RELATIONS
This is an automatic static scene generator. It is based on fuzzy natural language. When the spatial relationships between objects are not clear and exact, our generator can give a scene that looks ...Authors: Chun Ming Gao, Sen Zhou
Year Published: Jul. 2013 | 144-147 | DICTAP2013 -
AN EVALUATION OF TURKISH RETRIEVAL PERFORMANCE OF POPULAR SEARCH ENGINES FOR INTERNET AND IMAGE SEARCH BY USING COMMON LISTS
In this paper, Internet search and image search performances of the popular search engines Google, Yahoo, Yandex, and Bing were investigated by using twenty four Turkish queries from eight ...Authors: Burak Tokgöz, Zeynep Nur Özçılnak, Çağla Çınar, Mustafa Tarcan Yalun, Yıltan Bitirim
Year Published: Jul. 2013 | 148-153 | DICTAP2013 -
MP-IR: TOWARDS A MARKET-ORIENTED MULTI-AGENTS SYSTEM FOR INFORMATION RETRIEVAL IN THE WORLD WIDE WEB
Recently, there are many works about agent-based approaches for the World Wide Web Information Re-search (IR). While agent-based market systems prove to be efficient for implementing e-commerce ...Authors: Djamel Eddine Menacer, Habiba Drias, Christophe Sibertin-Blanc
Year Published: Jul. 2013 | 154-160 | DICTAP2013 -
IMPLEMENTING GEOSPATIAL WEB SERVICES USING SERVICE ORIENTED ARCHITECTURE AND NOSQL SOLUTIONS
Today a huge amount of geospatial data is being created, collected and used more than ever before. The ever increasing observations and measurements of geo- sensor networks, satellite imageries, ...Authors: Pouria Amirian, Anahid Basiri, Adam Winstanley
Year Published: Jul. 2013 | 161-169 | DICTAP2013 -
DATA SECURITY DESIGN AS A COOPERATION FACILITATOR
Different Safety (such as Fire & Rescue) and Security (such as Police and Border Guard) organizations handle sensitive data and material both in office and in field work. Some of this data is ...Authors: Marko Hassinen, Maija Marttila-Kontio, Niina Päivinen
Year Published: Jul. 2013 | 170-175 | DICTAP2013 -
KNOWLEDGE SYSTEMS SUPPORTING EDUCATION AND UNIVERSITY COOPERATION
The article presents the knowledge-based systems developed by using the ATOM software and the experience with their application for teaching and university cooperation. The theoretical bases of the ...Authors: Ladislav Burita, Pavel Gardavsky
Year Published: Jul. 2013 | 176-183 | DICTAP2013 -
PROPOSED MODEL FOR CONTROLLING ISO9001:2000 DOCUMENTS
ISO 9001:2000 system is a management concept focuses in continuous improvement and works as a foundation of Total Quality Management (TQM). Many research handle ISO 9001:2000 system from different ...Authors: Thoria Alghamdi, Kamel Khoualdi
Year Published: Jul. 2013 | 184-190 | DICTAP2013 -
A NOVEL SCHEME TO SECURE CLOUD COMPUTING ENVIRONMENT
The cloud computing is getting more and more important due to the large size of files that need to be shared and cannot be sent through the email. The need for cloud computing create a new challenges ...Authors: Mashael ALDrees, Eyas El-Qawasmeh
Year Published: Jul. 2013 | 191-196 | DICTAP2013 -
SPATIO-TEMPORAL DATA MINING IN MEDICAL IMAGES
Magnetic Resonance Imaging (MRI) is frequently used as follow-up examination. Since there is always possibility of multiplication of cancer cells and recurrence of cancer tumors after first ...Authors: Anahid Basiri, Pouria Amirian, Adam Winstanley
Year Published: Jul. 2013 | 197-199 | DICTAP2013 -
DYNAMIC ACCESS CONTROL USING ONTOLOGICAL CONCEPTS
Access control is facing many challenges for information protection in ubiquitous and cloud computing. In particularly, dynamic access control is a central problem that contexts are ever-changing in ...Authors: Jeong-Dong Kim, Jiseong Son, Hoh Peter In, Doo-Kwon Baik
Year Published: Jul. 2013 | 200-208 | DICTAP2013 -
LOSSLESS DATA HIDING SCHEME BASED ON LSB MATCHING
In this paper, a simple reversible least-significant-bit (LSB) matching algorithm, which can completely recover the host images without any distortion from the stego images by utilizing the parity ...Authors: Xiaomei Quan, Hongbin Zhang
Year Published: Jul. 2013 | 209-214 | DICTAP2013 -
HARMONY SEARCH BASED ALGORITHM FOR DYNAMIC SHORTEST PATH PROBLEM IN MOBILE AD HOC NETWORKS
Recently, more and more attention is drawn to wireless communication especially Mobile Ad Hoc Networks (MANET) for the flexibility they provide. In MANETs mobile nodes make use of the ...Authors: Amir Amin, Haitham S. Hamza, Imane A. Saroit
Year Published: Jul. 2013 | 215-224 | DICTAP2013 -
IMPROVED VDBSCAN WITH GLOBAL OPTIMUM K
Density-based clustering methods are an important part of clustering techniques. VDBSCAN is a well-known density-based one. VDBSCAN is robust against noise and it can recognize arbitrary shapes of ...Authors: Wei Wang, Shuang Zhou, Bingfei Ren, Suoju He
Year Published: Jul. 2013 | 225-228 | DICTAP2013 -
DISTRIBUTION OF TRADE-AREA BASED ON THE POI POSITION INFORMATION
The purpose of this paper is to find a clear geography distribution of trade areas, with the help of cluster method DBSCAN and Raleigh Law. DBSCAN algorism is a density-based cluster method. In this ...Authors: Qun Wu, Xinchao Jiang, Yue Sun, Suoju He
Year Published: Jul. 2013 | 229-233 | DICTAP2013 -
TOWARDS ASSESSING THE QUALITY OF FUNCTIONAL REQUIREMENTS USING ENGLISH/SPANISH CONTROLLED LANGUAGES AND CONTEXT FREE GRAMMAR
Most software applications are derived from customer requirements, which mainly are expressed as functional requirements. These requirements are the basis for software construction; therefore they ...Authors: Carlos Huertas, Reyes Juárez-Ramírez
Year Published: Jul. 2013 | 234-241 | DICTAP2013 -
THE PERFORMANCE OF LMA BASED ON RSSI AND DISTANCE ON HANDOVER DELAY IN WIMAX NETWORK
One of the main keys of positioning and ranging technologies in wireless telecommunication networks is the values of distance and RSSI (Received Signal Strength Indication), this relationship has a ...Authors: Elmabruk Elgembari, Kamaruzzaman Seman
Year Published: Jul. 2013 | 242-247 | DICTAP2013 -
ANALYSIS OF A BASIC MULTIPLE-IMAGE ALGORITHM FOR REMOVAL OF FOREGROUND OBJECTS
In this study I consider a multiple-image algorithm for automatic removal of foreground objects that block the view in the image of an object of interest. Such and other algorithms for image analysis ...Authors: Oscar John Gerald Somsen
Year Published: Jul. 2013 | 248-255 | DICTAP2013 -
BAYESIAN PROBABILISTIC INFORMATION PROCESSING FOR PHASE UNWRAPPING USING SAR INTERFEROMETRY DUE TO CONJUGATE GRADIENT METHOD
We investigate wave-front reconstruction in remote sensing using the synthetic aperture radar (SAR) interferometry on the basis of Bayesian inference both using the method of maximum entropy (ME) and ...Authors: Yohei Saika, Shouta Akiyama, Hiroki Sakaematsu
Year Published: Jul. 2013 | 256-267 | DICTAP2013 -
BAYESIAN PROBABILISTIC INFORMATION PROCESSING FOR PHASE UNWRAPPING USING SAR INTERFEROMETRY DUE TO CONJUGATE GRADIENT METHOD
We investigate wave-front reconstruction in remote sensing using the synthetic aperture radar (SAR) interferometry on the basis of Bayesian inference both using the method of maximum entropy (ME) and ...Authors: Yohei Saika, Shouta Akiyama, Hiroki Sakaematsu
Year Published: Jul. 2013 | 256-267 | DICTAP2013 -
TEMPORAL DATA MODELING - FUTURE VALID DATA PROCESSING
Data processing requires modeling not only current valid data, but also historical data must be provided without the markable time consuption and data extent. Data in the temporal model are bounded ...Authors: Michal Kvet, Karol Matiaško
Year Published: Jul. 2013 | 268-282 | DICTAP2013 -
SELF ASSESSMENT FRAMEWORK FOR DETECTING VULNERABILITY IN WEB APPLICATIONS
Security Assessment is widely used to audit the security protection of web applications. However, it is often performed by outside security experts or third party that has been appointed by the ...Authors: Nor Fatimah Awang, Azizah Abd Manaf
Year Published: Jul. 2013 | 283-287 | DICTAP2013