SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
International Journal of Digital Information and Wireless Communications (IJDIWC)
-
AUTOMATIC REGISTRATION OF CEREBRAL VASCULAR STRUCTURES
In this paper we present a registration method for cerebral vascular structures in the 2D MRA images. The method is based on bifurcation structures. The usual registration methods, based on ...Authors: Marwa HERMASSI, Hejer JELASSI, Kamel HAMROUNI
Year Published: 2011 | 1-13 | IJDIWC | Vol. 1 No. 1 -
CONNECTIONIST PROBABILITY ESTIMATORS IN HMM USING GENETIC CLUSTERING APPLICATION FOR SPEECH RECOGNITION AND MEDICAL DIAGNOSIS
The main goal of this paper is to compare the performance which can be achieved by five different approaches analyzing their applications’ potentiality on real world paradigms. We compare the ...Authors: Lilia Lazli, Boukadoum Mounir, Abdennasser Chebira, Kurosh Madani, Mohamed Tayeb Laskri
Year Published: 2011 | 14-31 | IJDIWC | Vol. 1 No. 1 -
PRESERVING IDENTITY OF USERS IN SOCIAL NETWORK SITES BY INTEGRATING ANONYMIZATION AND DIVERSIFICATION ALGORITHMS
Currently, Social Networking Sites (SNSs) expand internet users’ relationships and their businesses. Despite the huge benefits gained by SNS users, the huge amount of information exchanged by ...Authors: Sanaz Kavianpour, Zuraini Ismail, and Amirhossein Mohtasebi
Year Published: 2011 | 32-40 | IJDIWC | Vol. 1 No. 1 -
PRESENTATION OF AN EFFICIENT AND SECURE ARCHITECTURE FOR GUILAN HEALTH INFORMATION NETWORK WITH SMART CARDS
Nowadays a great number of activities are performed via internet. With increment in such activities, two groups of services are required for providing a secure platform: 1- Access control ...Authors: Mohamad Nejadeh, Shahriar Mohamadi
Year Published: 2011 | 41-53 | IJDIWC | Vol. 1 No. 1 -
ERADICATION OF POVERTY WITH THE USE OF ICT IN THE THIRD WORLD: BOTSWANA AS AN EXAMPLE IN SADC
Penetration of information and communication technologies (ICTs) have managed to cover even some of the least developed nations. Mobile phones in particular have experienced phenomenal growth ...Authors: Tiroyamodimo M. Mogotlhwane, Mohammad Talib, Malebogo Mokwena
Year Published: 2011 | 54-63 | IJDIWC | Vol. 1 No. 1 -
VERIFYING SEMANTIC GRAPHS WITH THE MODEL CHECKER SPIN
The most frequently used language to represent the semantic graphs is the RDF (W3C standard for meta-modeling). The construction of semantic graphs is a source of numerous errors of ...Authors: Mahdi Gueffaz, Sylvain Rampacek, Christophe Nicolle
Year Published: 2011 | 64-74 | IJDIWC | Vol. 1 No. 1 -
DYNAMIC CHANNEL ESTIMATION FOR MIMO-CONSTANT ENVELOPE MODULATION
The Multi-Input Multi-Output (MIMO)- Constant Envelope Modulation MIMOCEM is introduced as power and complexity efficient alternative to MIMO-OFDM for wireless backhaul networks. Due to a ...Authors: Ehab Mahmoud Mohamed, Osamu Muta, and Hiroshi Furukawa
Year Published: 2011 | 75-93 | IJDIWC | Vol. 1 No. 1 -
TOWARDS THE USE OF A COMPUTING ONTOLOGY: A CURRICULA MANAGEMENT SYSTEM PROPOSAL
Semantic Web components are proposed to develop a Computing Curricula Management System. Such a system is envisaged to alleviate the labour-intensive and time-consuming activities that ...Authors: Adelina Tang
Year Published: 2011 | 94-108 | IJDIWC | Vol. 1 No. 1 -
IMPLEMENTING TEST MANAGEMENT TRACEABILITY MODEL TO SUPPORT TEST DOCUMENTS
Documentation is one of the key quality factors in software development. However, many developers are still putting less effort and less priority on documentation. To them writing documentation ...Authors: Azri Azmi, Suhaimi Ibrahim
Year Published: 2011 | 109-125 | IJDIWC | Vol. 1 No. 1 -
AVOIDING QUALITY OSCILLATIONS DURING ADAPTIVE STREAMING OF VIDEO
A high number of videos, encoded in several bitrates, are nowadays available on Internet. A high bitrate needs a high and stable bandwidth, so a lower bitrate encoding is usually chosen and ...Authors: Wassim Ramadan, Eugen Dedu, and Julien Bourgeois
Year Published: 2011 | 126-145 | IJDIWC | Vol. 1 No. 1 -
A CONCEPTUALIZATION OF ORGANIZATIONS INVOLVED IN PRODUCT DESIGN: A FIRST STEP TOWARDS REASONING AND KNOWLEDGE MANAGEMENT
The aim of this paper is to build an ontology of organizations. This ontology will be used to analyze, reason and understandorganizations. The targeted organizations are those composed of ...Authors: Yishuai Lin, Vincent Hilaire, Nicolas Gaud, and Abderrafiaa Koukam
Year Published: 2011 | 146-160 | IJDIWC | Vol. 1 No. 1 -
A METADATA EXTRACTION APPROACH FOR SELECTING MIGRATION SOLUTIONS
Preservation becomes an important infrastructural service for information systems. Many research works have done in past decades. The most popular preservation approach is migration, which ...Authors: Feng Luan, Mads Nygard
Year Published: 2011 | 161-174 | IJDIWC | Vol. 1 No. 1 -
AN EFFICIENT HIERARCHICAL DUAL CACHE SYSTEM FOR NAND FLASH MEMORIES
NAND flash memories are the most important storage media in mobile computing and tend to be less confined to this area. Nevertheless, it is not mature enough to allow a widespread use. This is due ...Authors: Jalil Boukhobza, Pierre Olivier
Year Published: 2011 | 175-194 | IJDIWC | Vol. 1 No. 1 -
INTELLIGENT BUBBLE RECOGNITION ON CARDIAC VIDEOS USING GABOR WAVELET
In cardiology, automatic recognition and image analysis still conserve computational challenges in terms of medical guidance and diagnosis. Bubbles or microemboli that circulate into ...Authors: Ismail Burak PARLAK, Salih Murat EGI, Ahmet ADEMOGLU, Costantino BALESTRA, Peter GERMONPRE, Alessandro MARRONI
Year Published: 2011 | 195-203 | IJDIWC | Vol. 1 No. 1 -
HAPTICTRANSIT: TACTILE FEEDBACK TO NOTIFY PUBLIC TRANSPORT USERS
To attract people to use public transport, efficient transit information systems providing accurate, real-time, easy-tounderstand information must be provided to users. In this paper we ...Authors: Ricky Jacob, Peter Mooney, Bashir Shalaik, Adam Winstanley
Year Published: 2011 | 204-218 | IJDIWC | Vol. 1 No. 1 -
DOCFLOW: AN INTEGRATED DOCUMENT WORKFLOW FOR BUSINESS PROCESS MANAGEMENT
Document management and workflow management systems have been widely used in large business enterprises to improve productivity. However, they still do not gain large acceptance in small and ...Authors: Boonsit Yimwadsana, Chalalai Chaihirunkarn, Apichaya Jaichoom, Apichaya Thawornchak
Year Published: 2011 | 219-229 | IJDIWC | Vol. 1 No. 1 -
STRUCTURED WIKI WITH ANNOTATION FOR KNOWLEDGE MANAGEMENT: AN APPLICATION TO CULTURAL HERITAGE
In this paper, we highlight how semantic wikis can be relevant solutions for building cooperative data driven applications in domains characterized by a rapid evolution of knowledge. We will ...Authors: Eric Leclercq, Marinette Savonnet
Year Published: 2011 | 230-246 | IJDIWC | Vol. 1 No. 1 -
AN EVALUATIONOF LICENSE PLATE RECOGNITION ALGORITHMS
In the last decades vehicle license plate recognition systems are as central part in many traffic management and security systems such as automatic speed control, tracking stolen cars, automatic ...Authors: Hadi Sharifi Kolour, Asadollah Shahbahrami
Year Published: 2011 | 247-253 | IJDIWC | Vol. 1 No. 1 -
NEW PRACTICE IN ENGLISH READING COMPREHENSION IN ALGERIA
Authors: Samir Zidat, Mahieddine Djoudi
Year Published: 2011 | 254-266 | IJDIWC | Vol. 1 No. 1 -
MOBILE AND WIRELESS ACCESS IN VIDEO SURVEILLANCE SYSTEM
Wireless communication and mobile technologies are already well established in modern surveillance systems. Mobile-based client applications are commonly used to provide the basic access to ...Authors: Aleksandra Karimaa
Year Published: 2011 | 267-272 | IJDIWC | Vol. 1 No. 1 -
CONTENTION WINDOW OPTIMIZATION: AN ENHANCEMENT TO IEEE 802.11 DCF TO IMPROVE QUALITY OF SERVICE
Wireless communication technology has gained widespread acceptance in recent years. Wireless Local Area Networks (WLANs) are becoming more and more popular and widely used, since they provide ...Authors: Sedrati Maamar, Maamri Ramdane, Bilami Azeddine, Benmohammed Mohamed
Year Published: 2011 | 273-283 | IJDIWC | Vol. 1 No. 1 -
RECOGNITION OF PLANT LEAVES USING THE DENDRITIC CELL ALGORITHM
In this paper, we propose a new approach of plant classification based on leaves recognition. The approach uses the dendritic cell algorithm, from the danger theory, as a classifier and the ...Authors: Esma Bendiab, Mohamed Kheirreddine Kholladi
Year Published: 2011 | 284-292 | IJDIWC | Vol. 1 No. 1 -
CONCEPTION OF SERVICE OVER HETEROGENEOUS NETWORK, EXPERIMENTATION
Mapping between two heterogeneous networks, Multi Protocol Label Switching (MPLS) and IEEE 802.11e is choice of future technology as it has ability to perform traffic engineering and create ...Authors: Jawad Oubaha, Adel Echchaachoui, Ali Ouacha and Mohammed Elkoutbi
Year Published: 2011 | 293-305 | IJDIWC | Vol. 1 No. 1 -
INFORMATION AND COMMUNICATION SYSTEMS E-FORENSIC FRAMEWORK
Early identification, discovering and taking legal proceedings against the perpetrator of an electronic incident are necessary. It is necessary to investigate all electronic ...Authors: Vladimir Remenar, Dragan Perakovic, Goran Zovak
Year Published: 2011 | 306-313 | IJDIWC | Vol. 1 No. 2 -
MEASURING THE INFORMATION SOCIETY - STATE OF THE ART OF THE "GRAND CHALLENGE"
The problem of measurement is the Achilles heel of the information society research. Despite, or possibly because of this reason, one can find a number of quantitative studies on the ...Authors: Michal Golinski
Year Published: 2011 | 314-331 | IJDIWC | Vol. 1 No. 2 -
MAPPING SPARQL QUERY TO TEMPORAL LOGIC QUERY BASED ON NµSMV MODEL CHECKER TO QUERY SEMANTIC GRAPHS
The RDF (W3C standard for meta-modeling) language is the most frequently used to represent the semantic graphs. This paper presents a new research combining different fields ...Authors: Mahdi Gueffaz, Sylvain Rampacek, Christophe Nicolle
Year Published: 2011 | 332-345 | IJDIWC | Vol. 1 No. 2 -
USING THE BPM METHOD AND SYSTEM DYNAMICS FOR SIMULATION OF SOFTWARE PROCESSES
Modeling and simulation of a software process is one way a company can decide which software process and/or its adjustment is the best solution for its current project. Since there ...Authors: stepan Kuchar, David Jezek, Jan Kozusznik, Svatopluk stolfa
Year Published: 2011 | 346-365 | IJDIWC | Vol. 1 No. 2 -
AN EXTENSION AND IMPROVEMENT OF THE CLOUDSIM SIMULATOR
Cloud computing has become a significant technology trend. With the cloud computing technology, users use a variety of devices to access programs, storage, and application- development ...Authors: Ghalem Belalem, Said Limam
Year Published: 2011 | 373-383 | IJDIWC | Vol. 1 No. 2 -
BIT ERROR RATIO CONCEPT AND 3D EYE DIAGRAM TO ANALYSIS OF M STATE DIGITALLY MODULATED SIGNALS
When designing digital systems and incorporating a high-speed digital device with the need of quick transfer of large data amounts between chips and peripherals, jitter will be a key ...Authors: Mohamed Al-Wohaishi, Jan Zidek
Year Published: 2011 | 384-393 | IJDIWC | Vol. 1 No. 2 -
COOPERATIVE MULTI-AGENTS DETECTION WITH SPATIALLY DISTRIBUTED ARRAY SENSORS
The aim of this paper deals with the design of a multi-agents system associated with array sensors dedicated to wireless telecommunications. We will present as first part, the spatially ...Authors: Belkacem BENADDA, Fethi Tarik BENDIMERAD
Year Published: 2011 | 394-400 | IJDIWC | Vol. 1 No. 2 -
TOWARDS A VERSATILE WIRELESS PLATFORM FOR LOW-POWER APPLICATIONS
Traditional wireless sensor network architectures are based on low-power microcontrollers and highly integrated short range radio transceiver chips operating in one of the few ISM ...Authors: Sandor Szilvasi, Benjamin Babjak, Akos Ledeczi, Peter Volgyesi
Year Published: 2011 | 401-414 | IJDIWC | Vol. 1 No. 2 -
AUTOMATIC SLEEP/WAKE STAGING OF RAT POLYSOMNOGRAPHIC RECORDINGS USING TWO-STEP SYSTEM
This article describes application of an automatic classification system on a database of rat polysomnographic recordings. A two-step automatic system is used to analyze and score the ...Authors: Lukas Zoubek, Florian Chapotot
Year Published: 2011 | 415-425 | IJDIWC | Vol. 1 No. 2 -
AN APPLICATION OF LINEAR ERROR-BLOCK CODES IN STEGANOGRAPHY
We use Linear error-block codes (LEBC) to design a new method of gray-scale image steganography. We exploit the fact that in an image there are bits that better hide distortion ...Authors: Rabi DARITI, El Mamoun SOUIDI
Year Published: 2011 | 426-433 | IJDIWC | Vol. 1 No. 2 -
A WEB SERVICE FOR SIGNING AND AUTHENTICATING DIGITAL DOCUMENTS BASED ON SYMMETRIC CRYPTOGRAPHY PROTOCOL
Nowadays, recognizing whether or not a digital document has been counterfeit is a priority issue, particularly in organizations where legal information is handled digitally. Signing a ...Authors: Juan Carlos Lopez Pimentel, Victor Fernando Ramos Fon Bon, Raul Monroy
Year Published: 2011 | 434-444 | IJDIWC | Vol. 1 No. 2 -
THE IMPROVEMENT OF MOBILE SERVICES PROVIDING INFRASTRUCTURE BASED ON PRIORITY SETTINGS
Industrial process control is becoming very important nowadays as more and more systems are integrated with most modern information technology based tools to achieve better ...Authors: Danielius Adomaitis
Year Published: 2011 | 445-454 | IJDIWC | Vol. 1 No. 2 -
ARCHITECTURAL FRAMEWORK FOR GENERIC MODELING AND DIAGRAMMING IN THE CLOUD
This paper is aimed at presenting a concept of a flexible diagramming framework for building engineering and educational applications. The framework was designed to serve as a ...Authors: Laszlo Juracz, Larry Howard
Year Published: 2011 | 455-465 | IJDIWC | Vol. 1 No. 2 -
GAIT ANALYSIS AND RECOGNITION USING MULTI-VIEWS GAIT DATABASE
This paper presents an automatic gait recognition system that recognizes a person by the way he/she walks. The gait signature is obtained based on the contour width information of ...Authors: Tee Connie, Michael Kah Ong Goh, Andrew Beng Jin Teoh
Year Published: 2011 | 466-478 | IJDIWC | Vol. 1 No. 2 -
A MULTI-AGENT MODEL OF KNOWLEDGE SOCIETY FOR BUSINESS AND MANAGEMENT SYSTEM: MODELING DISTRIBUTED AGENCY USING DATA MINING AND NEURO-FUZZY SYSTEM
This work is motivated by the need for a model that addresses the study of Knowledge Society in specific environments such as Business and Management, where several situations are ...Authors: Eduardo Ahumada-Tello, Manuel Castanon-Puga, Juan Ramon Castro, Eugenio D.Suarez, Bogart Yail Marquez, Carelia Gaxiola-Pacheco, Dora Luz Flores
Year Published: 2011 | 479-488 | IJDIWC | Vol. 1 No. 2 -
TOWARDS NEW COMPUTATIONAL ARCHITECTURES FOR MASS-COLLABORATIVE OPENEDUCATIONAL RESOURCES
Open Educational Resources offer several benefits mostly in education and training. Being potentially reusable, their use can reduce time and cost of developing educational ...Authors: Ismar Frango Silveira, Xavier Ochoa, Antonio Silva Sprock, Pollyana Notargiacomo Mustaro, Yosly C. Hernandez Bieluskas
Year Published: 2011 | 489-503 | IJDIWC | Vol. 1 No. 2 -
DEFUSING THE HAZARDS OF SOCIAL NETWORK SERVICES
Over the past few years, hundreds of millions of users have employed social network services (SNS) to exchange information. In spite of the pros of using SNS, there are certain ...Authors: SeyedHossein Mohtasebi, Ali Dehghantanha
Year Published: 2011 | 504-515 | IJDIWC | Vol. 1 No. 2 -
QUERY PROCESSING FOR PROBABILISTIC STATE DIAGRAMS DESCRIBING MULTIPLE ROBOT NAVIGATION IN AN INDOOR ENVIRONMENT
This paper describes the syntax and semantics of multi-level state diagrams to support probabilistic behavior of cooperating robots. The techniques are presented to analyze these ...Authors: Bogdan Czejdo, Sambit Bhattacharya, Erik Ferragut
Year Published: 2011 | 516-535 | IJDIWC | Vol. 1 No. 2 -
OPEN USER INVOLVEMENT IN DATA CLEANING FOR DATA WAREHOUSE QUALITY
High quality of data warehouse is a key to make smart strategic decisions. The data cleaning is program that performs to deal with the quality problems of data extracted from operational sources ...Authors: Louardi BRADJI, Mahmoud BOUFAIDA
Year Published: 2011 | 536-544 | IJDIWC | Vol. 1 No. 2 -
FROM RELATIONAL DATABASES TO XML DOCUMENTS: EFFICIENT ALTERNATIVES FORPUBLISHING
XML language tends to become a standard for data exchanges between various Web applications. However, despite the big extent of the XML language, most of this applications store their information ...Authors: Mihai Stancu
Year Published: 2011 | 545-553 | IJDIWC | Vol. 1 No. 2 -
A COMPRESS FILESYSTEM TO IMPROVE THE FILES CONTENTS SEARCH
SquashFS is a Linux compress filesystem. Hixosfs is a filesystem to improve file content search by using metadata informations. In this paper we propose to use Hixosfs idea in SquashFS context by ...Authors: Nicola Corriero, Emanuele Covino, Giovanni Pani
Year Published: 2011 | 554-562 | IJDIWC | Vol. 1 No. 2 -
CONTEXTUAL ADAPTABILITY PLATFORM FOR MOBILE AND UBIQUITOUS LEARNING:A STEP TOWARDS A PERVASIVE LEARNING ENVIRONMENT
The evolution and convergence of wireless technologies, mobile devices and sensors, has caused profound mutation in applications. Applications for e-learning are no exception to this ...Authors: Amal Elhamdaoui, Mounia Abik, Rachida Ajhoun
Year Published: 2011 | 563-571 | IJDIWC | Vol. 1 No. 2 -
CHARACTER RECOGNITION APPROACH BASED ON ONTOLOGY
In this paper, we present a general description of a new character recognition process based on ontology, semantically annotated by a domain expert. Such process is based essentially on a matching ...Authors: Hacene Belhadef, Aicha Eutamene, Mohamed Khireddine Kholadi
Year Published: 2011 | 572-581 | IJDIWC | Vol. 1 No. 2 -
THE EFFECTS OF VARIED ANIMATION IN MULTIMEDIA LEARNING: IS THE EXTRA EFFORT WORTHY?
Animation in multimedia is said to be beneficial to learning especially when the learning material demands visual movements. The emergence of 3- Dimensional animated visuals has ...Authors: Riaza Mohd Rias, Halimah Badioze Zaman
Year Published: 2011 | 582-590 | IJDIWC | Vol. 1 No. 3 -
WIRELESS AD-HOC NETWORK UNDER BLACK-HOLE ATTACK
Wireless Ad-hoc Network is a temporary and decentralized type of wireless network. Due to security vulnerabilities in the routing protocol currently, this type of network is ...Authors: Shree Om, Mohammad Talib
Year Published: 2011 | 591-596 | IJDIWC | Vol. 1 No. 3 -
EXPLORING RUBY AND JAVA INTEROPERABILITY FOR BUILDING CONVERGED WEB AND SIP APPLICATIONS
In this paper we present a Ruby infrastructure that can be used for rapid development of Web applications with SIP signaling capabilities. We construct this infrastructure by combining the Java based ...Authors: Edin Pjanic, Amer Hasanovic
Year Published: 2011 | 597-610 | IJDIWC | Vol. 1 No. 3 -
EFFICIENT FINGERPRINT CLASSIFICATION USING SINGULAR POINT
Singular point is one of the local fingerprint features, and it is used as a landmark due its scale and rotation immutability. Singular point charac- teristics have been widely used as a feature ...Authors: Ali Ismail Awad, Kensuke Baba
Year Published: 2011 | 611-616 | IJDIWC | Vol. 1 No. 3 -
KNOWLEDGE BASED APPROACH TO SOFTWARE DEVELOPMENT PROCESS MODELING
Modeling a software process is one way a can company decide which software process and/or its adjustment is the best solution for the current project. Modeling is the way the process is ...Authors: Jan Kozusznik, Svatopluk Stolfa
Year Published: 2011 | 617-630 | IJDIWC | Vol. 1 No. 3 -
SOFTWARE ENGINEERING OF AUGMENTED REALITY REMEDIAL PARADIGM FOR NEGATIVE NUMBERS: AN ALGORITHM VISUALIZATION OF CORRECT THINKING PROCESS FLOWCHART
The aim of this study was about integrating augmented reality as visualization interface tool in software engineering process for mathematical remedial works. This study was based on the ...Authors: Elango Periasamy, and Halimah Badioze Zaman
Year Published: 2011 | 631-644 | IJDIWC | Vol. 1 No. 3 -
INVESTIGATION OF MALWARE DEFENCE AND DETECTION TECHNIQUES
Malwares are considered as a major threat vector which can be potentially caused huge damage to both network infrastructure as well as network applications. In this paper, different ...Authors: Farid Daryabar, Ali Dehghantanha, Hoorang Ghasem Broujerdi
Year Published: 2011 | 645-650 | IJDIWC | Vol. 1 No. 3 -
SMARTPHONE FORENSICS: A CASE STUDY WITH NOKIA E5-00 MOBILE PHONE
In the past few years, there has been an exponential increase in the number of smartphone users. By its very nature, smartphone saves and manages vast amount of information pertaining to ...Authors: SeyedHossein Mohtasebi, Ali Dehghantanha, Hoorang Ghasem Broujerdi
Year Published: 2011 | 651-655 | IJDIWC | Vol. 1 No. 3 -
FLEXI-ADAPTOR; AN AUTOMATED WEB CONTENT ADAPTATION FOR MOBILE DEVICES
Mobile web browsing usually involves a lot of horizontal and vertical scrolling, which makes web browsing time-consuming. A user may be interested in a section of a web page, which may not ...Authors: Rajibul Anam, Chin Kuan Ho, Tek Yong Lim
Year Published: 2011 | 656-670 | IJDIWC | Vol. 1 No. 3 -
MOBILE COMMERCE APPROACH BASED ON MOBILE AGENT
Telecommunications technologies are advanced; they introduced new technologies to meet the needs of individuals and organizations to make commercial transactions, where we find ...Authors: Oussama Zerdoumi, Okba Kazar, Saber Benharzallah
Year Published: 2011 | 671-681 | IJDIWC | Vol. 1 No. 3 -
MOBILE BUSINESS APPROACH BASED ON MOBILE AGENT
Users today want the opportunity to make (or manage) a businesses in anytime and anywhere via their mobile devices. This paper proposes the architecture with mobile agent for the ...Authors: Ahmed Aloui, Okba Kazar
Year Published: 2011 | 682-692 | IJDIWC | Vol. 1 No. 3 -
GENETIC AGENT TO OPTIMIZE THE AUTOMATIC GENERALIZATION PROCESS OF SPATIAL DATA
The automatic generalization processes consist to derive less detailed spatial data from data too detailed. The objective of this process is to provide the user a spatial data adapted to ...Authors: Brahim lejdel, Okba kazar
Year Published: 2011 | 693-701 | IJDIWC | Vol. 1 No. 3 -
GRAPH SPLITTING BASED SELF-ORGANIZATION APPROACH FOR ENERGY AND ROUTING OPTIMIZATION
Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. Both ...Authors: Ridha Ouni
Year Published: 2011 | 702-708 | IJDIWC | Vol. 1 No. 3 -
WIRELESS SENSOR NETWORK (WSN) FOR WATER MONITORING SYSTEM: CASE STUDY OF KUWAIT BEACHES
Firstly it is needed to realize Wireless Sensors Networks (WSN); we can define it as the most important technologies in the new century. during the last decades there was many ...Authors: Abdulrahman Alkandari, Meshal alnasheet, Yousef Alabduljader, Samer M. Moein
Year Published: 2011 | 709-717 | IJDIWC | Vol. 1 No. 4 -
NEW HEXAGONAL GEOMETRY IN CELLULAR NETWORK SYSTEMS
Motivated by the existence of two frequency bands and inspired from Lie algebra classification, we propose a new geometric cellular shape with double hexagonal structure. Based on a two dimensional ...Authors: Adil Belhaj, Abdelouahed Jraifi
Year Published: 2011 | 718-725 | IJDIWC | Vol. 1 No. 4 -
OPTIMUM COURSE ASSOCIATION METHOD WITH CLOUD SERVICE ORCHESTRATION
Finest Trail Setup Technique in Cloud Ambience[1] proposes a fuzzy logic based SVM approach to secure a collision free path avoiding multiple dynamic obstacles. The navigator ...Authors: Suresh Shanmugasundaram, Divyapreya Chidambaram
Year Published: 2011 | 726-732 | IJDIWC | Vol. 1 No. 4 -
SPECIAL MAGIC SQUARES OF ORDER SIX AND EIGHT
In this paper we introduce and study special types of magic squares of order six. We list some enumerations of these squares. We present a parallelizable code. This code is based on the principles of ...Authors: Saleem Al-Ashhab
Year Published: 2011 | 733-745 | IJDIWC | Vol. 1 No. 4 -
EFFECT OF MOODLE ON LEARNING: AN OMAN PERCEPTION
The world is emerging in a comprehensive society and internet and other related technologies are becoming dominant and widespread, nations are inflowing to the digital phase. In ...Authors: Nauman Ahmad, Zuhoor Al-Khanjari
Year Published: 2011 | 746-752 | IJDIWC | Vol. 1 No. 4 -
NEURAL NETWORK BASED AUTOMATIC TRAFFIC SIGNS RECOGNITION
Image recognition and understanding is one of the most interesting fields of researches. Its main idea is to bridge the gap between the high level human image understanding and the low level machine ...Authors: Mohammad A. N. Al-Azawi
Year Published: 2011 | 753-766 | IJDIWC | Vol. 1 No. 4 -
A NO-REFERENCE QUALITY METRIC FOR EVALUATING BLUR IMAGE IN WAVELET DOMAIN
In this paper, a no reference blur image quality metric based on wavelet transform is presented. As blur affects specially edges and image fine details, most blur estimation algorithms, are based ...Authors: F. Kerouh, A. Serir
Year Published: 2011 | 767-776 | IJDIWC | Vol. 1 No. 4 -
FRACTALS IMAGE RENDERING AND COMPRESSION USING GPUS
Fractal image compression provides immense advantages as compared to conventional image compressions. Though the fractal image encoding time is comparatively quite high as compared to the ...Authors: Munesh Singh Chauhan, Ashish Negi
Year Published: Jan. 2012 | 1-6 | IJDIWC | Vol. 2 No. 1 -
MIXED CONVECTION OVER AN ISOTHERMAL VERTICAL FLAT PLATE EMBEDDED IN A POROUS MEDIUM WITH MAGNETIC FIELD, RADIATION AND VARIABLE VISCOSITY WITH HEAT GENERATION
This paper focuses on the numerical solutions of the effects of magnetic field, radiation, variable viscosity and heat generation on similarity solutions of mixed convection adjacent to an isothermal ...Authors: T. RajaRani, C.N.B.Rao
Year Published: Jan. 2012 | 7-17 | IJDIWC | Vol. 2 No. 1 -
AGENT BASED MECHANISM FOR MAINTAINING CACHE CONSISTENCY IN MOBILE ENVIRONMENT
Caching at the mobile client is prospective technique that can reduce the number of uplink requests, lighten the server load .However, Variable data size, data updates ,limited client resource and ...Authors: G. Shanmugarathinam, N. Junath, K.ViveKanandan
Year Published: Jan. 2012 | 18-25 | IJDIWC | Vol. 2 No. 1 -
INVESTIGATION OF WI-FI INDOOR SIGNALS UNDER LOS AND NLOS CONDITIONS
In this work the propagation of radio waves at 2.4 GHz in NLOS conditions has been studied. The study was carried out using two transmitters operating on different standards: 802.11g (D-Link) and ...Authors: S. Japertas, E. Orzekauskas
Year Published: Jan. 2012 | 26-32 | IJDIWC | Vol. 2 No. 1 -
PRACTICAL NEURAL CONTROLLER FOR ROBOTIC MANIPULATOR
This paper presents the design and practical implementation of inverse neural controller which is used to control the operation of six Degree Of Freedom (6DOF) robotic manipulator. An efficient ...Authors: Baker Al-Bahri, Zainab Al-Qurashi
Year Published: Jan. 2012 | 33-39 | IJDIWC | Vol. 2 No. 1 -
DOUBLE DOMINATION NUMBER AND CONNECTIVITY OF GRAPHS
In a graph G, a vertex dominates itself and its neighbours. A subset S of V is called a dominating set in G if every vertex in V is dominated by at least one vertex in S. The domination number is ...Authors: C. Sivagnanam
Year Published: Jan. 2012 | 40-45 | IJDIWC | Vol. 2 No. 1 -
VEHICLE-TO-INFRASTRUCTURE COMMUNICATION BASED ON IEEE 802.11G
Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) IEEE 802.11 standard technology can support user in-motion to achieve preferable Internet connectivity. ...Authors: Janis Jansons, Nikolajs Bogdanovs, Aleksandrs Ipatovs
Year Published: Jan. 2012 | 46-50 | IJDIWC | Vol. 2 No. 1 -
AN ENHANCED WORKFLOW REENGINEERING METHODOLOGY FOR SMES
Business process reengineering (BPR) is not just the program of business process improvement, but it improves the operations of the business process as a whole. Workflow Reengineering Methodology ...Authors: Jamaiah H. Yahaya, Syafrani Fithri, Aziz Deraman
Year Published: Jan. 2012 | 51-65 | IJDIWC | Vol. 2 No. 1 -
HIGH PERFORMANCE OFDM SYSTEMS FOR DIGITAL VIDEO BROADCASTING-TERRESTRIAL (DVB-T)
Digital wireless communication has become one of the most exciting research topics in the electrical and electronic engineering field due to the explosive demands for high-speed wireless services, ...Authors: Yhya A. Lafta, P. JOHNSON
Year Published: Jan. 2012 | 66-74 | IJDIWC | Vol. 2 No. 1 -
SOURCE SEPARATION FROM SINGLE CHANNEL BIOMEDICAL SIGNAL BYCOMBINATION OF BLIND SOURCE SEPARATION AND EMPIRICAL MODE DECOMPOSITION
These days, Blind Source Separation (BSS) techniques are the most common and beneficial method, in signal processing. In the field of multichannel recording, over the past years, many techniques of ...Authors: N. Abdolmaleki, M. Pooyan
Year Published: Jan. 2012 | 75-81 | IJDIWC | Vol. 2 No. 1 -
A NEW CONVERGE CAST ALGORITHM: APPLICATION OF PROCEDURAL DISTRIBUTED RECURSIVE WAVE MODEL AND FEEDBACK FUNCTION
The distributed recursive wave is a programming model based on distributed procedure call, allowing distributed algorithm definition using central algorithm. For returning result to calling process, ...Authors: Ha Quoc Trung
Year Published: Jan. 2012 | 82-85 | IJDIWC | Vol. 2 No. 1 -
SECURITY-EFFECTIVE LOCAL-LIGHTED AUTHENTICATION MECHANISM IN NEMO-BASED FAST PROXY MOBILE IPV6 NETWORKS
This paper reinforced security under the network evaluation of wire/wireless integration of NEMO (NEwork MObility) supporting mobility and network-based PMIPv6 (Proxy Mobile IPv6). It also proposes ...Authors: Illkyun Im, Jongpil Jeong
Year Published: Jan. 2012 | 86-103 | IJDIWC | Vol. 2 No. 1 -
ROUTE DISCOVERY METHODS BASED ON RECEIVED POWER OF REPEATER NODES FOR WIRELESS SENSOR NETWORKS
In this paper, two route discovery methods based on received power of repeater nodes for sensor networks are studied. The first proposed method is a simple one and the second proposed method is in ...Authors: Makoto SUGITA, Yoshihiro KAINUMA, Hiroaki INOUE, Kenko OTA, Syunji SHIMIZU Yukihiro HIRATA, Hideaki MATSUE
Year Published: Jan. 2012 | 104-114 | IJDIWC | Vol. 2 No. 1 -
OPTIMAL ELLIPTIC CURVE SCALAR MULTIPLICATION USING DOUBLE-BASE CHAINS
In this work, we propose an algorithm to produce the double-base chain that optimizes the time used for computing an elliptic curve scalar multiplication, i.e. the bottleneck operation of the ...Authors: Vorapong Suppakitpaisarn, Hiroshi Imai, Masato Edahiro
Year Published: Jan. 2012 | 115-134 | IJDIWC | Vol. 2 No. 1 -
AN AUTONOMOUS ACCELERATED COORDINATION OF STOCHASTIC MOVING MULTI-AGENTS UNDER VARIATIONS AND RESOURCE UTILIZATION
This paper presents a new behavior of autonomous moving multi-agents, whose agents stochastically move over a resource consisting of cells in accordance with transition probabilities, depending on ...Authors: Isamu Shioya, Takao Miura
Year Published: Jan. 2012 | 135-149 | IJDIWC | Vol. 2 No. 1 -
TWO-LEVEL DECOMPOSITION METHOD FOR RESOURCE ALLOCATION IN TELECOMMUNICATION NETWORKS
In this paper, we consider a two-level problem of resource allocation in a telecommunication network divided into zones. At the upper level the network manager distributes homogeneous resource ...Authors: Igor Konnov, Olga Kashina, Erkki Laitinen
Year Published: Apr. 2012 | 150-155 | IJDIWC | Vol. 2 No. 2 -
OBJECT RECOGNITION SYSTEM USING TEMPLATE MATCHING BASED ON SIGNATURE AND PRINCIPAL COMPONENT ANALYSIS
In this paper an object recognition system using template matching is implemented. Since objects are represented by either an external or internal descriptors, a combination of using signature, ...Authors: Inad A. Aljarrah, Ahmed S. Ghorab, Ismail M. Khater
Year Published: Apr. 2012 | 156-163 | IJDIWC | Vol. 2 No. 2 -
LOCAL AND GLOBAL KNOWLEDGE TO IMPROVE THE QUALITY OF SENSED DATA
Sensor networks are driven by the activities of their deployed environment and they have the potential to use data that has previously been sensed in order to classify current sensed data. In this ...Authors: C. Gwilliams, A. Preece, A. Hardisty, Benoit Goossens, Laurentius N. Ambu
Year Published: Apr. 2012 | 164-180 | IJDIWC | Vol. 2 No. 2 -
GREENSTONE OPEN SOURCE DIGITAL LIBRARY SOFTWARE IN THE CONTEXT OF ARABIC CONTENT
The aim of this paper is to explore Greenstone open source digital library software which considered to be one of most essential open-source Content Management Systems (CMSs) that are ...Authors: Ramadan Elaiess
Year Published: Apr. 2012 | 181-196 | IJDIWC | Vol. 2 No. 2 -
THE EVALUATION OF WEBCOST USING SOFTWARE USABILITY MEASUREMENT INVENTORY (SUMI)
One of the crucial matters in software development is to what extent users can satisfy with the interfaces and functions provided. In order to measure whether the users are satisfied to use the ...Authors: Zulkefli Mansor, Zarinah Mohd Kasirun, Saadiah Yahya, Noor Habibah Arshad
Year Published: Apr. 2012 | 197-201 | IJDIWC | Vol. 2 No. 2 -
ARE ANIMATIONS EFFECTIVE TOOLS FOR TEACHING COMPUTER SCIENCE COURSES IN DEVELOPING COUNTRIES?
Teaching computer science courses is a big challenge to majority of teachers in developing countries institutions. Most of these courses consist of abstract concepts where traditional ...Authors: Joel Mtebe, Hashim Twaakyondo
Year Published: Apr. 2012 | 202-207 | IJDIWC | Vol. 2 No. 2 -
APPLICATION OF SYNTHETIC INSTRUMENTATION THAT APPLIES THE TREND OF SOFTWARE-BASED APPROACH FOR MEASURING ON THE FIELD OF MODERN WIRELESS TRANSFER SYSTEMS
This paper describes modern software based flexible measuring systems for analysis of digitally modulated systems. The latest methods for evaluation of modulation parameters using new ...Authors: Radek Martinek, Jan Zidek
Year Published: Jul. 2012 | 208-221 | IJDIWC | Vol. 2 No. 3 -
CAN A SINGLE SECURITY FRAMEWORK ADDRESS INFORMATION SECURITY RISKS ADEQUATELY?
There is no doubt that modern society depends heavily on information technology in nearly every facet of human activity. Organizations of all kinds are increasingly exposed ...Authors: Walid Al-Ahmad, Bassil Mohammad
Year Published: Jul. 2012 | 222-230 | IJDIWC | Vol. 2 No. 3 -
MOBILEQUIZ – A LECTURE SURVEY TOOL USING SMARTPHONES AND QR TAGS
In this paper, we present first experiences with the use of a lightweight, media-supporting quiz application for mobile devices. The idea is to use the students’ own smartphones ...Authors: Daniel Schon, Melanie Klinger, Stephan Kopf, Wolfgang Effelsberg
Year Published: Jul. 2012 | 231-244 | IJDIWC | Vol. 2 No. 3 -
COMMUNICATION SUPPORT NEEDS FOR EDUCATION IN A GLOBAL CONTEXT BASED ON SUITABLE INFORMATION TECHNOLOGIES
This paper is centered on the implementation problems of learning activities for better education in a global and information society. Modern education must respect dynamic changes in society ...Authors: Milena Janakova
Year Published: Jul. 2012 | 245-255 | IJDIWC | Vol. 2 No. 3 -
WHEN IS A STUDENT-CENTERED, TECHNOLOGY SUPPORTED LEARNING A SUCCESS?
The iPad as a learning tool has made its way into many elementary school classrooms worldwide. It holds a promise to be a game changer in elementary school education supporting more ...Authors: Alma Leora Culen, Andrea Alessandro Gasparini
Year Published: Jul. 2012 | 256-269 | IJDIWC | Vol. 2 No. 3 -
PAPER REGISTRATION TO REPOSITORY FROM RESEARCHER DATABASE
This paper introduces a system that realizes a simultaneous registration of scholarly papers for both a researcher database and a repository. An institutional repository is a method to realize free ...Authors: Kensuke Baba, Masao Mori
Year Published: Oct. 2012 | 270-275 | IJDIWC | Vol. 2 No. 4 -
A FRAMEWORK FOR MODELING MEDICAL DIAGNOSIS AND DECISION SUPPORT SERVICES
This paper introduces a framework and a service model improving the understanding of domain requirements acquisition for IT-service systems development. The service model fills the gap in domain ...Authors: Sankha Amarakoon, Ajantha Dahanayake, Bernhard Thalheim
Year Published: Oct. 2012 | 276-295 | IJDIWC | Vol. 2 No. 4 -
A PRACTICAL PROXY SIGNATURE SCHEME
A proxy signature scheme is a variation of the ordinary digital signature scheme which enables a proxy signer to generate signatures on behalf of an original signer. In this paper, we ...Authors: Sattar Aboud, Sufian Yousef
Year Published: Oct. 2012 | 296-305 | IJDIWC | Vol. 2 No. 4 -
CONSIDERATIONS FOR SOCIAL NETWORK SITE (SNS) USE IN EDUCATION
Social Networking Sites (SNSs) such as Facebook, Google+, Myspace, LinkedIn and Twitter have now become commonplace in international virtual space. Approximately 75% of all online ...Authors: Alan Weber
Year Published: Oct. 2012 | 306-321 | IJDIWC | Vol. 2 No. 4 -
FORMAL SPECIFICATION FOR REAL-TIME OBJECT ORIENTED SYSTEMS WITH UML DESIGN
Traditionally, real-time software system development focuses on low-level programming techniques to increase timeliness and operate within constraints; however, more recently ...Authors: Benjamin D. Horne, Vinitha Hannah Subburaj, Joseph E. Urban
Year Published: Oct. 2012 | 322-334 | IJDIWC | Vol. 2 No. 4 -
NNET BASED AUDIO CONTENT CLASSIFICATION AND INDEXING SYSTEM
Rapid advancement in computers and internet technology has led large volume of multimedia files. The archiving and digitization of the old media contents also contributes to the growth of the digital ...Authors: Muhammad Al-Maathidi, Francis Li
Year Published: Oct. 2012 | 335-347 | IJDIWC | Vol. 2 No. 4 -
REMOTE MONITORING USING WIRELESS CELLULAR NETWORKS
Remote sensing and alerting exists from long time and it has been under focus to improve the quality of sensing and alerting from long time. Due to major technology innovation in communication and ...Authors: Akram Aburas, Khalid Al-Mashouq, Zeyad Al-Hokail
Year Published: Oct. 2012 | 348-352 | IJDIWC | Vol. 2 No. 4 -
EVALUATION AND IMPROVEMENTS TO MOTION GENERATION IN NS2 FOR WIRELESS MOBILE NETWORK SIMULATION
Simulation of mobile networks requires reliable movement generation. Evaluation of the performance of the existing random movement generator used in ns2 shows a bias for placing ...Authors: Raid Alghamdi, John DeDourek, Przemyslaw Pochec
Year Published: Oct. 2012 | 353-361 | IJDIWC | Vol. 2 No. 4 -
A NEW METHOD TO CHANNEL ESTIMATION IN OFDM SYSTEMS BASED ON WAVELET TRANSFORM
In OFDM systems, it is necessary to estimate the channel to overcome the distortion caused by channel fading’s which can be induced by many phenomena such as: delay spread, multipath effect, ...Authors: Ali Asadi, Behzad Mozaffari Tazehkand
Year Published: 2013 | 1-9 | IJDIWC | Vol. 3 No. 1 -
BICLUSTERING GENE EXPRESSION DATASET USING ENHANCED BARYCENTER CROSSING MINIMIZATION
There are two main categories of bi-clustering approaches graph-based bi-clustering, and non-graph based bi-clustering. In graph-based bi-clustering algorithm the input dataset is converted into ...Authors: Tamer Mohamed
Year Published: 2013 | 10-18 | IJDIWC | Vol. 3 No. 1 -
IMPROVING AND MEASURING COLOR EDGE DETECTION ALGORITHM IN RGB COLOR SPACE
Edge detection process has a widespread usage in computer vision applications. But it has a different output when its input image changes from color to grayscale. This changeability of results make ...Authors: Mohamed Almadhoun
Year Published: 2013 | 19-24 | IJDIWC | Vol. 3 No. 1 -
COLLABORATIVE PROBLEM SOLVING USING PUBLIC SOCIAL NETWORK MEDIA: ANALYZING STUDENT INTERACTION AND ITS IMPACT TO LEARNING PROCESS
This paper examines the use of social network media at three aspects in African and Libyan perspective. Firstly, to use social network media as an open network learning environment that provide ...Authors: Melvin Ballera, Ismail Ateya Lukandu, Abdalla Radwan
Year Published: 2013 | 25-42 | IJDIWC | Vol. 3 No. 1 -
IMPACT OF A FORM OF ONLINE MATERIALS ON THE QUALITY OF EDUCATION – A CASE STUDY
With a massive arrival of information technologies in the past quarter century there has been a change of the set processes in the society. These changes concerns also education. Online courses are ...Authors: Blanka Frydrychova Klimova, Petra Poulova
Year Published: 2013 | 43-49 | IJDIWC | Vol. 3 No. 1 -
SEPARATION IN DATA MINING BASED ON FRACTAL NATURE OF DATA
The separation of the searched data from the rest is an important task in data mining. Three separation/classification methods are presented. We use a singularity exponent in classifiers that are ...Authors: Marcel Jirina, Marcel Jirina Jr.
Year Published: 2013 | 50-66 | IJDIWC | Vol. 3 No. 1 -
ADAPTIVITY OF A COLORING ALGORITHM TO UNRELIABLE COMMUNICATIONS FOR DATA GATHERING IN WIRELESS SENSOR NETWORKS
Wireless sensor networks (WSNs) are prone to node/link failures, message losses, and dynamic node joins and departures. For instance, in data gathering applications that constitute a common type of ...Authors: Ichrak Amdouni, Pascale Minet, Cedric Adjih
Year Published: 2013 | 67-80 | IJDIWC | Vol. 3 No. 1 -
PRESENTATION AND ANALYSIS OF A NEW TECHNOLOGY FOR LOW-POWER WIRELESS SENSOR NETWORK
The tremendous and rapid development in sensors technology allowed their application in various fields requiring monitoring, such as, transportations, rare species surveillance, agriculture, military ...Authors: Sabri Khssibi, Hanen Idoudi, Adrien Van Den Bossche, Thierry Val, Leila Azzouz Saidane
Year Published: 2013 | 81-92 | IJDIWC | Vol. 3 No. 1 -
A COMPARISON OF WIRELESS SENSOR NETWORKS CO-SIMULATION PLATFORMS FOR SMART GRID APPLICATIONS
In the past few years, the smart grids have attracted more and more attention. The fact that these systems are based on the pervasive use of new Information and Communications Technologies (ICTs) ...Authors: Samira Chouikhi, Ines El Korbi, Yacine Ghamri-Doudane, Leila Azouz Saidane
Year Published: 2013 | 93-102 | IJDIWC | Vol. 3 No. 1 -
CMSA: A CENTRALIZED MAINTENANCE STRATEGY WITH ANTICIPATION FOR WIRELESS SENSOR NETWORKS
Providing a continuous service is the main requirement for many application types deployed in Wireless Sensor Networks (WSNs). In this paper, we study two maintenance strategies using a small number ...Authors: Skander Azzaz, Leila Azouz Saidane
Year Published: 2013 | 103-111 | IJDIWC | Vol. 3 No. 1 -
ROMAN LAW AND CONTEMPORARY LEGISLATION
Simple rules and laws are necessary for the understanding of the meaning and of the content. This is a fundamental claim of all citizens. The instruments of legislation are deeply connected in many ...Authors: Wolfgang Kahlig, Eleonora Kahlig
Year Published: 2013 | 112-124 | IJDIWC | Vol. 3 No. 1 -
WIRELESS NETWORKS: DEVELOPMENTS, THREATS AND COUNTERMEASURES
This paper discusses current threats in wireless networks and some academia research reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man In the Middle Attack ...Authors: Mardiana Mohamad Noor, Wan Haslina Hassan
Year Published: 2013 | 125-140 | IJDIWC | Vol. 3 No. 1 -
PEER KNOWLEDGE ASSISTED SEARCH USING COMMUNITY SEARCH LOGS
Search engines have become an increasingly important educational tool. By just typing a few keywords into a search engine text-box, finding information has become an easy exercise. However, some ...Authors: Brendan Flanagan, Takahiko Suzuki, Jun Zeng, Chengjiu Yin, Toshihiko Sakai, Kiyota Hashimoto, Sachio Hirokawa
Year Published: 2013 | 141-148 | IJDIWC | Vol. 3 No. 2 -
MODIFIED PROPORTIONAL FAIR SCHEDULING FOR RESOURCE REUSE AND INTERFERENCE COORDINATION IN TWO-TIER LTE-ADVANCED SYSTEMS
In this paper, a two-tier Long Term Evolution-Advanced (LTE-Advanced) system where the second tier is deployed as femtocells is investigated. Although the reuse factor of one has been a generic ...Authors: Rony Kumer Saha
Year Published: 2013 | 149-168 | IJDIWC | Vol. 3 No. 2 -
A MATLAB BASED CELLULAR MOBILE COMMUNICATION LABORATORY
In this paper, we present a novel MATLAB based Cellular mobile communication (CMC) laboratory course that comprises a total of ten experiments, covering the fundamental design parameters, ...Authors: Rony Kumer Saha, A B M Siddique Hossain
Year Published: 2013 | 169-180 | IJDIWC | Vol. 3 No. 2 -
AN OPTIMIZED ENERGY AWARE CHAINING TECHNIQUE FOR DATA GATHERING IN WIRELESS SENSOR NETWORKS
Wireless Sensor Network (WSN) is a collection of small sensor nodes with aptitude to sense, compute and transmit data that are deployed to observe a physical environment. The sensor node has limited ...Authors: Ouadoudi Zytoune, Driss Aboutajdine
Year Published: 2013 | 181-189 | IJDIWC | Vol. 3 No. 2 -
AN INTERSECTION BASED TRAFFIC AWARE ROUTING WITH LOW OVERHEAD IN VANET
Vehicular Ad-hoc network is an emerging class of wireless network that provide efficient communication between vehicles and between vehicles and road side units. VANETs are gaining attention from ...Authors: Lakshmi Ramachandran, Sangheethaa Sukumaran, Surya Rani Sunny
Year Published: 2013 | 190-196 | IJDIWC | Vol. 3 No. 2 -
AN ALGORITHMIC APPROACH TO DATABASE NORMALIZATION
When an attempt is made to modify tables that have not been sufficiently normalized undesirable side-effects may follow. This can be further specified as an update, insertion or deletion anomaly ...Authors: M. Demba
Year Published: 2013 | 197-205 | IJDIWC | Vol. 3 No. 2 -
ELLIPTIC JES WINDOW FORM 2 IN SIGNAL PROCESSING
The Elliptic Jes window form 2 is an original study introduced by the author in Mathematics and in Signal Processing in 2012. Similar to other windows used in signal processing such as: Hamming, ...Authors: Claude Ziad Bayeh
Year Published: 2013 | 206-214 | IJDIWC | Vol. 3 No. 3 -
BETWEEN PEDAGOGY AND TECHNOLOGY: A TWO COLLEGE CASE STUDY - TRAINING ISRAEL’S TEACHERS TO MEET THE CHALLENGES OF THE 21ST CENTURY
Since 2012, the Israeli Ministry of Education has administered a program to prepare the education system for the requirements of the 21st century, beginning in the state’s peripheral regions. The ...Authors: Batia Riechman, Eitan Simon
Year Published: 2013 | 215-230 | IJDIWC | Vol. 3 No. 3 -
SPATIAL VARIABILITY OF VHF/UHF ELECTRIC FIELD STRENGTH IN NIGER STATE, NIGERIA
This study investigates the coverage areas of VHF and UHF signals from three television stations in Niger State, Nigeria, by quantitatively measuring the signal levels of these signals. The signal ...Authors: Moses Oludare Ajewole, Onyedi David Oyedum, Adekunle Titus Adediji, Abiodun Stephen Moses, Julia Ofure Eiche
Year Published: 2013 | 231-239 | IJDIWC | Vol. 3 No. 3 -
HUMAN RESOURCES PREPARATION FOR DIGITAL INFORMATION PROCESSING
The article describes the content and teaching methodology of information systems development and processing of information sources. The authors present the structure of courses, motivational aspects ...Authors: Ladislav Burita, Vojtech Ondryhal
Year Published: 2013 | 240-246 | IJDIWC | Vol. 3 No. 3 -
RECEIVED SIGNAL STRENGTH ESTIMATION IN VEHICLE-TO-VEHICLE COMMUNICATIONS USING NEURAL NETWORKS
Received signal strength (RSS) is a major performance metric in vehicular communication system design. Experimental measurements of the RSS for vehicular communications are not cost effective. ...Authors: Zeinab Talepour, Hamide Kondori, Masoud Barakati, Mehri Mehrjoo, Javad Ahmadi Shokouh
Year Published: 2013 | 247-252 | IJDIWC | Vol. 3 No. 3 -
KNOWLEDGE SYSTEMS APPLICATIONS BASED ON SW ATOM
The article presents the knowledge systems developed by using the software AToM and the experience with their application for teaching and universities cooperation. The theoretical bases of the ...Authors: Ladislav Burita, Pavel Gardavsky
Year Published: 2013 | 253-260 | IJDIWC | Vol. 3 No. 3 -
SKIP TRIE MATCHING: A GREEDY ALGORITHM FOR REAL-TIME OCR ERROR CORRECTION ON SMARTPHONES
Proactive nutrition management is considered by many nutritionists and dieticians as a key factor in reducing diabetes, cancer, and other illnesses caused by mismanaged diets. As more individuals ...Authors: Vladimir Kulyukin, Aditya Vanka, Haitao Wang
Year Published: 2013 | 261-270 | IJDIWC | Vol. 3 No. 3 -
OPTIMUM VDBSCAN(O-VDBSCAN) FOR IDENTIFYING DOWNTOWN AREAS
Clustering is an important part of data mining techniques, and VDBSCAN is a well-known density-based one. VDBSCAN is robust against noise and can recognize arbitrary shapes of clusters. Besides, it ...Authors: Wei Wang, Shuang Zhou, Qingqing Xiao
Year Published: 2013 | 271-276 | IJDIWC | Vol. 3 No. 3 -
A MARKET-ORIENTED AGENTS-BASED MODEL FOR INFORMATION RETRIEVAL
Information Retrieval in the World Wide Web (Web IR) is essential for a number of activities and it is an active domain of research and development. The main challenges concern the relevance of the ...Authors: Djamel Eddine Menacer, Christophe Sibertin-Blanc, Habiba Drias
Year Published: 2013 | 277-289 | IJDIWC | Vol. 3 No. 3 -
LEARNING GAMES OR LEARNING STIMULATING GAMES: AN INDIRECT APPROACH TO LEARNING STIMULATING EFFECTS FROM OFF-THE-SHELF GAMES
Playing games to support learning is a classic concept that is seeing a revival today in the widespread use of computer games. Inserting educational content into various types of computer games is a ...Authors: Mats Wiklund, Peter Mozelius
Year Published: 2013 | 290-300 | IJDIWC | Vol. 3 No. 3 -
A FRAMEWORK FOR ADOPTING BLENDED LEARNING IN TRADITIONAL SCHOOL BASED LEARNING
Poor traditional learning methods have been a main concern in learning and teaching activity. These traditional methods (“talk and chalk”) is being replaced by online learning, it helps students ...Authors: Aisha Othman, Crinela Pislaru, Ahmed Impes
Year Published: 2013 | 301-318 | IJDIWC | Vol. 3 No. 3 -
ANALYSING THE EFFECTIVENESS OF IT STRATEGY IN LIBYAN HIGHER EDUCATION INSTITUTES
The use of Information and Communications Technology (ICT) has increased rapidly in the entire education sector and teaching process. Libyan universities, and most Libyan Higher Education Institutes ...Authors: Aisha Othman, Crinela Pislaru, Thuraya Kenan, Ahmed Impes
Year Published: 2013 | 319-334 | IJDIWC | Vol. 3 No. 3 -
DEVELOPMENT OF A NETWORKING LABORATORY COMPLEX
This paper reviews the complex system implemented for teaching the network design and management topics, taught at Vilnius University. The special attention to sustain the practical skills is ...Authors: Feliksas Kuliesius, Evaldas Ousinskis
Year Published: 2013 | 335-340 | IJDIWC | Vol. 3 No. 4 -
THE DIRECT INFLUENCE OF THE CELL PERIMETER ON THE HANDOVER DELAY IN THE BROADBAND NETWORK
One of the main keys of positioning and ranging technologies in wireless telecommunication networks is the values of distance and RSSI (Received Signal Strength Indication), side along with the cell ...Authors: Elmabruk Elgembari, Kamaruzzaman Seman
Year Published: 2013 | 341-349 | IJDIWC | Vol. 3 No. 4 -
CONSTRUCTING A COURSE PROFILE BY MEASURING COURSE OBJECTIVES
An ongoing goal in higher education is to provide quality education programs and to produce high quality graduates. While much of the attention to quality matters is focussed on outputs, there is ...Authors: Neville I. Williams
Year Published: 2013 | 350-362 | IJDIWC | Vol. 3 No. 4 -
STATE OF THE ART OF A MULTI-AGENT BASED RECOMMENDER SYSTEM FOR ACTIVE SOFTWARE ENGINEERING ONTOLOGY
Software engineering ontology was first developed to provide efficient collaboration and coordination among distributed teams working on related software development projects across the sites. It ...Authors: Udsanee Pakdeetrakulwong, Pornpit Wongthongtham
Year Published: 2013 | 363-376 | IJDIWC | Vol. 3 No. 4 -
ORGANIZATIONAL COMMITMENT AMONG PURCHASING AND SUPPLY CHAIN PERSONNEL
The concept of organizational commitment has been studied extensively during the past decades, and remains one of the most challenging and studied concepts in organizational research. In purchasing ...Authors: Jarno Einolander, Hannu Vanharanta
Year Published: 2013 | 377-384 | IJDIWC | Vol. 3 No. 4 -
A NOVEL RULE-BASED FINGERPRINT CLASSIFICATION APPROACH
Fingerprint classification is an important phase in increasing the speed of a fingerprint verification system and narrow down the search of fingerprint database. Fingerprint verification is still a ...Authors: Faezeh Mirzaei, Mohsen Biglari, Hossein Ebrahimpour-komleh
Year Published: 2013 | 385-389 | IJDIWC | Vol. 3 No. 4 -
E-GOVERNMENT WEB ACCESSIBILITY: WCAG 1.0 VERSUS WCAG 2.0 COMPLIANCE
Most e-governments have traditionally used version 1.0 of the Web Content Accessibility Guidelines (WCAG) as a basis to ensure that their websites are accessible by people with disabilities. This was ...Authors: Faouzi Kamoun, Basel M. Al Mourad, Emad Bataineh
Year Published: 2013 | 390-399 | IJDIWC | Vol. 3 No. 4 -
ADAPTIVE CHANNEL EQUALIZATION FOR FBMC BASED ON VARIABLE LENGTH STEP SIZE AND MEAN-SQUARED ERROR
Recently, increasing data transmission rates and the demand of more bandwidth at the same time have been a challenge. The trend now is to support high data rates in wireless communications. ...Authors: Mashhoor AlTarayrah, Qasem Abu Al-Haija
Year Published: 2013 | 400-410 | IJDIWC | Vol. 3 No. 4 -
ELLIPTIC JES WINDOW FORMS IN SIGNAL PROCESSING
The Elliptic Jes window forms are original studies introduced by the author in Mathematics and Signal Processing in 2012. They are based on an Elliptical Trigonometry function “Ejes” in which it ...Authors: Claude Ziad Bayeh
Year Published: 2013 | 411-429 | IJDIWC | Vol. 3 No. 4 -
SMART ON-BOARD TRANSPORTATION MANAGEMENT SYSTEM USING GPS/GSM/GPRS TECHNOLOGIES TO REDUCE TRAFFIC VIOLATION IN DEVELOPING COUNTRIES
Nowadays, the evolution in transportation technologies makes the necessity for increasing road safety. In this context, we propose the implementation of a smart onboard GPS/GPRS system to be attached ...Authors: Saed Tarapiah, Shadi Atalla, Rajaa AbuHania
Year Published: 2013 | 430-439 | IJDIWC | Vol. 3 No. 4 -
OBJECT-ORIENTED IN ORGANIZATION MANAGEMENT: ORGANIC ORGANIZATION
In a time when virtual organizations are fast becoming a phenomenon, this paper aims to explore how IT-based approaches—and in specific the object-oriented (organic) approach—can be used ...Authors: AmrBadr El-Din
Year Published: 2013 | 440-450 | IJDIWC | Vol. 3 No. 4 -
AN EFFECTIVENESS TEST CASE PRIORITIZATION TECHNIQUE FOR WEB APPLICATION TESTING
Regression tests are executed when some changes are made in the existing application in order to check the negative impact of the changes in the rest of the system or on the expected behavior of ...Authors: Mojtaba Raeisi Nejad Dobuneh, Dayang N. A. Jawawi, Mohammad V. Malakooti
Year Published: 2013 | 451-459 | IJDIWC | Vol. 3 No. 4 -
RISK MANAGEMENT AND INFORMATION TECHNOLOGY PROJECTS
IT projects management is not free from risks which are created from various sources of the environment. Thus a comprehensive understanding of these possible risks and creating strategic policies to ...Authors: Amine Nehari Talet, Razali Mat-Zin, Maaradj Houari
Year Published: 2014 | 1-9 | IJDIWC | Vol. 4 No. 1 -
STRUCTURING HETEROGENEOUS BIG DATA FOR SCALABILITY AND ACCURACY
Structured data has an inherently great automation value. It renders itself readily for software tools to help store, organize and search effectively. With the growing dependence of data, we face ...Authors: Ashraf Gaffar, Eman Monir Darwish, Abdessamad Tridane
Year Published: 2014 | 10-23 | IJDIWC | Vol. 4 No. 1 -
A NEW APPROACH TOWARDS INTEGRATED CLOUD COMPUTING ARCHITECTURE
Cloud computing concept and technology and its abundant advancement in addition to its inherent advantages has created a new ecosystem in the world of computing and is driving IT industry one step ...Authors: Niloofar Khanghahi, Ramin Nasiri, Mahsa Razavi Davoudi
Year Published: 2014 | 24-34 | IJDIWC | Vol. 4 No. 1 -
ENRICHED ETOM FRAMEWORK IN SERVICE DELIVER OPERATION THROUGH ALIGNMENT WITH SOME OF COBIT5 STRATEGIC OBJECTIVES
eTOM is a standard framework that is defined in telecommunication business processes area. It contains of three phases, 1. Operations 2. Infrastructure, Strategy and Product 3. Enterprise Management. ...Authors: Faride Latifi, Ramin Nasiri, Mehran Mohsenzadeh
Year Published: 2014 | 35-42 | IJDIWC | Vol. 4 No. 1 -
A HIERARCHICAL SELF-HEALING SLA FOR CLOUD COMPUTING
The service level agreement (SLA) is a mutual contract between the service provider and consumer which determines the agreed service level objective (SLO). The common SLA is a plain documental ...Authors: Ahmad Mosallanejad, Rodziah Atan, Masrah Azmi Murad, Rusli Abdullah
Year Published: 2014 | 43-52 | IJDIWC | Vol. 4 No. 1 -
A MODEL FOR RECALIBRATING CREDIBILITY IN DIFFERENT CONTEXTS AND LANGUAGES - A TWITTER CASE STUDY
Due to the growing dependence on the WWW User-Generated Content (UGC) as a primary source for information and news, the research on web credibility is becoming more important than ever before. In ...Authors: Amal Abdullah AlMansour, Ljiljana Brankovic, Costas S. Iliopoulos
Year Published: 2014 | 53-62 | IJDIWC | Vol. 4 No. 1 -
FACTORS GENERATING RISKS DURING REQUIREMENT ENGINEERING PROCESS IN GLOBAL SOFTWARE DEVELOPMENT ENVIRONMENT
Challenges of Requirements Engineering become adequate when it is performed in global software development paradigm. There can be many reasons behind this challenging nature. “Risks” can be one ...Authors: Huma Hayat Khan, Mohd. Naz’ri bin Mahrin, Suriayati bt Chuprat
Year Published: 2014 | 63-78 | IJDIWC | Vol. 4 No. 1 -
REVIEW OF SUPPORT TO SITUATIONAL REQUIREMENT ENGINEERING FROM STANDARDS AND MODELS
Requirement engineering (RE) process clear description can be an important factor for guiding the team members involved in the RE process, which may help organizations not exceeding the estimated ...Authors: Huma Hayat Khan, Mohd. Naz’ri bin Mahrin, Suriayati bt Chuprat
Year Published: 2014 | 79-94 | IJDIWC | Vol. 4 No. 1 -
DEVELOPING USABLE SOFTWARE PRODUCT USING USABILITY RISK ASSESSMENT MODEL
Usability is an important factor in ensuring development of quality and usable software product. Ignorance and unawareness about the concept of usability and failure to address usability during ...Authors: Jayaletchumi Sambantha Moorthy, Suhaimi bin Ibrahim, Mohd Naz’ri Mahrin
Year Published: 2014 | 95-102 | IJDIWC | Vol. 4 No. 1 -
CRITICAL FACTORS AND COMPARATIVE ANALYSIS THAT INFLUENCING THE REGISTRATION OF DOMAIN NAME
Growth and increasing use worldwide domain is inconsistent with growth of world population. Although in terms of domain usage statistics across the world increased, but the distribution of the domain ...Authors: Norul Bahriyah Shaari, Harihodin Selamat
Year Published: 2014 | 103-113 | IJDIWC | Vol. 4 No. 1 -
LIGHTWEIGHT PRIORITY SCHEDULING SCHEME FOR SMART HOME AND AMBIENT ASSISTED LIVING SYSTEM
Smart Home and Ambient Assisted Living (SHAAL) systems utilize advanced and ubiquitous technologies including sensors and other devices that are integrated in the residential infrastructure or ...Authors: Hamdan Sayuti, Rozeha A.Rashid, Mu'azzah A. Latiff, A. H. F. A. Hamid, N. Fisal, M. A. Sarijari, Alias Mohd, Kamaludin M. Yusof, Rozaini Abd Rahim
Year Published: 2014 | 114-123 | IJDIWC | Vol. 4 No. 1 -
A GENETIC ALGORITHM ANALYSIS TOWARDS OPTIMIZATION SOLUTIONS
In today’s world, an optimal and intelligent problem solving approaches are required in every field, regardless of simple or complex problems. Researches and developers are trying to make machines ...Authors: Mujahid Tabassum, Kuruvilla Mathew
Year Published: 2014 | 124-142 | IJDIWC | Vol. 4 No. 1 -
EXPERIMENTAL COMPARISON OF UNINFORMED AND HEURISTIC AI ALGORITHMS FOR N PUZZLE AND 8 QUEEN PUZZLE SOLUTION
This paper compares the performance of popular AI techniques, namely the Breadth First Search, Depth First Search, A* Search, Greedy Best First Search and the Hill Climbing Search in approaching the ...Authors: Kuruvilla Mathew, Mujahid Tabassum
Year Published: 2014 | 143-154 | IJDIWC | Vol. 4 No. 1 -
PERFORMANCE EVALUATION OF ADAPTIVE LDPC CODED MODULATION COOPERATIVE WIRELESS COMMUNICATION SYSTEM WITH BEST-RELAY SELECTION
In this paper the performance of a cooperative wireless communication system based on combined best relay selection (BRS) and adaptive LDPC coded modulation (ACM) scheme is investigated. These ...Authors: Ahmed Mohamed, Mohammed Abd-Elnaby, Sami A. El-dolil
Year Published: 2014 | 155-168 | IJDIWC | Vol. 4 No. 1 -
A NEW APPROACH TO WIRELESS CHANNEL MODELING USING FINITE MIXTURE MODELS
This paper presents a new approach to modeling a wireless channel using finite mixture models (FMM). Instead of the conventional approach of using non mixtures (single) probability distribution ...Authors: Divya Choudhary, Aaron L. Robinson
Year Published: 2014 | 169-183 | IJDIWC | Vol. 4 No. 2 -
TOWARDS CARBON EMISSION REDUCTION USING ICT
The impact of global warming is now showing its ability to disturb human and other forms of life on the earth. Environmental pollution and how it can be minimised is a global issue for discussion. ...Authors: Tiroyamodimo Mogotlhwane
Year Published: 2014 | 184-190 | IJDIWC | Vol. 4 No. 2 -
INTERFERENCE ANALYSIS AND SPECTRUM SENSING OF MULTIPLE COGNITIVE RADIO SYSTEMS
Conventional fixed spectrum allocation results in a large part of frequency band remaining underutilized. Channels that are dedicated to licensed (primary) users are out of reach of unlicensed ...Authors: Sowndarya Sundar, M. Meenakshi
Year Published: 2014 | 191-201 | IJDIWC | Vol. 4 No. 2 -
A LICENSE MANAGEMENT SYSTEM FOR CONTENT SEPARATE DELIVERY OVER P2P NETWORK
We propose a license management system for content separate delivery over P2P network. In trivial content delivery systems, a content file is delivered to a user bound license data within content-key ...Authors: Masaki Inamura, Keiichi Iwamura
Year Published: 2014 | 202-212 | IJDIWC | Vol. 4 No. 2 -
ROBUST NONLINEAR COMPOSITE ADAPTIVE CONTROL OF QUADROTOR
A robust nonlinear composite adaptive control algorithm is done for a 6-DOF quadrotor system. The system is considered to suffer from the presence of parametric uncertainty and noise signal. The ...Authors: Bara Emran, Aydin Yesildirek
Year Published: 2014 | 213-225 | IJDIWC | Vol. 4 No. 2 -
A NEW ORTHOGONAL CRYPTOGRAPHIC SYSTEM FOR DATABASE SECURITY BASED ON CELLULAR AUTOMATA AND HASH ALGORITHM
In this paper, we have developed a new orthogonal cryptographic system for database security that has used both Cellular automata and Hash Algorithm. Our Algorithm consists of two different parts; ...Authors: Mohammad V. Malakooti, Ebrahim Akhavan Bazofti
Year Published: 2014 | 226-235 | IJDIWC | Vol. 4 No. 2 -
DESIGNING AND IMPLEMENTING BI-LINGUAL MOBILE DICTIONARY TO BE USED IN MACHINE TRANSLATION
This paper describes the multistage process for building Arabic WordNet (ArWn) to be used in mobile device. The goal of this paper is how to create corpus, starting with selecting an annotation task, ...Authors: Hassanin M. Al-Barhamtoshy, Fatimah M. Mujallid
Year Published: 2014 | 236-247 | IJDIWC | Vol. 4 No. 2 -
GROUP DECISION SUPPORT SYSTEM BASED ON ENHANCED AHP FOR TENDER EVALUATION
Application of model base in group decision making that makes up a Group Decision Support System (GDSS) is of paramount importance. Analytic Hierarchy Process (AHP) is the multi-criteria decision ...Authors: Fadhilah Ahmad, M Yazid M Saman, Fatma Susilawati Mohamad, Zarina Mohamad, Wan Suryani Wan Awang
Year Published: 2014 | 248-257 | IJDIWC | Vol. 4 No. 2 -
BUILDING AN ADVANCE DOMAIN ONTOLOGY MODEL OF INFORMATION SCIENCE (OIS)
The paper describes the process of modelling domain knowledge of Information Science (IS) by creating an Ontology of Information Science domain (OIS). It also reports on the life cycle of the ...Authors: Ahlam Sawsaa, Joan Lu
Year Published: 2014 | 258-266 | IJDIWC | Vol. 4 No. 2 -
CLOUD-LINKED AND CAMPUS-LINKED STUDENTS’ PERCEPTIONS OF COLLABORATIVE LEARNING AND DESIGN BASED LEARNING IN ENGINEERING
The aim of this paper is to analyse and present cloud- link as well as campus-linked students’ perceptions of collaborative learning and design based learning in engineering. Project oriented ...Authors: Sivachandran Chandrasekaran, Guy Littlefair, Matthew Joordens, Alex Stojcevski
Year Published: 2014 | 267-275 | IJDIWC | Vol. 4 No. 3 -
AN APPLICATION OF DBR TO THE DEVELOPMENT OF A FRAMEWORK FOR ENGLISH LANGUAGE EDUCATION
This paper explains how to develop an integrated framework for English language education based on the four phases of design-based research (DBR). In the first phase of the DBR we conducted a ...Authors: Sei Sumi, Thomas Schalow
Year Published: 2014 | 276-283 | IJDIWC | Vol. 4 No. 3 -
AN ACTIVE MIDDLEWARE FOR SECURE AUTOMATIC RECONFIGURATION OF APPLICATIONS FOR ANDROID DEVICES
With the prevalence of smart phones and the role they play in the lives of consumers, the demand for high performing mobile computing is apparent. Although smartphones today are feature-rich, they ...Authors: S. Kami Makki, Karim Abdelrazek, Shui Yu
Year Published: 2014 | 284-291 | IJDIWC | Vol. 4 No. 3 -
MINIMIZATION OF MUTUAL COUPLING USING NEUTRALIZATION LINE TECHNIQUE FOR 2.4 GHZ WIRELESS APPLICATIONS
This paper presented a planar printed multiple-input-multiple-output (MIMO) antenna with a dimension of 100 x 45 mm2. It composed of two crescent shaped radiators placed symmetrically with respect to ...Authors: W.N.N.W. Marzudi, Z.Z. Abidin, S.Z. Muji, Ma Yue, Raed A. Abd-Alhameed
Year Published: 2014 | 292-298 | IJDIWC | Vol. 4 No. 3 -
FRAMEWORK-BASED DATA REQUIREMENTS FOR IT TOP MANAGEMENT
There are several challenges on the adoptions of the frameworks (e.g., standards). If the main target is semantic interoperability, then data should be taken into consideration. The main aim of this ...Authors: Virpi Hotti
Year Published: 2014 | 299-304 | IJDIWC | Vol. 4 No. 3 -
LITERATURE-BASED AND ARCHITECTURE-BASED MODERNIZATION
Organizational purpose or function changes usually concern with information systems that have to be modernized. However, there are difficulties of making information system modernization decisions ...Authors: Virpi Hotti, Miia-Maarit Saarelainen
Year Published: 2014 | 305-313 | IJDIWC | Vol. 4 No. 3 -
A MEDIUM ACCESS PROTOCOL FOR COGNITIVE RADIO NETWORKS BASED ON PACKET'S COLLISION AND CHANNELS' USAGE
In Cognitive Radio Networks (CRNs); the unlicensed users named Secondary Users (SUs) are allowed to share the licensed wireless spectrum band with its licensed users name Primary Users (PUs) but ...Authors: Dina Tarek Mohamed, Amira M. Kotb, S.H.Ahmed
Year Published: 2014 | 314-332 | IJDIWC | Vol. 4 No. 3 -
ICT GOVERNANCE: LITERATURE REVIEW AND SURVEY IN NORTHERN SAVONIA
IT decision making is supported by frameworks of the different kind for IT governance, IT management, and enterprise architecture. Organizations are adopting Enterprise Architecture (EA) frameworks ...Authors: Virpi Hotti, Heikki Merilainen, Harri Salomaa, Antti Lahtela
Year Published: 2014 | 333-340 | IJDIWC | Vol. 4 No. 3 -
PERSPECTIVE FOR SUGGESTION ABOUT COMMUNICATION PLAN / STRATEGY OF THAILAND USING FOR ASEAN ONE COMMUNITY RELEVANT TO THE 3 PILLARS: APSC, AEC, AND ASCC
ASEAN leaders agreed to shorten the time to establish and integration of the ASEAN Community by year 2015; the community has been divided into 3 different communities which are ASEAN ...Authors: Nattanun Siricharoen, Waralak Siricharoen
Year Published: 2014 | 341-354 | IJDIWC | Vol. 4 No. 3 -
AN INSTRUCTIONAL DESIGN MODEL AND CRITERIA FOR DESIGNING AND DEVELOPING ONLINE VIRTUAL LABS
The purpose of this work is to propose a general instructional design model to teach students in faculty of education, especially in department of educational technology how to design and develop ...Authors: Mohamed Elsayed Ahmed, Shinobu Hasegawa
Year Published: 2014 | 355-371 | IJDIWC | Vol. 4 No. 3 -
APPLICATIONS OF THE ROTATING CALIPERS TO GEOMETRIC PROBLEMS IN TWO AND THREE DIMENSIONS
A paper published in 1983 established that the rotating calipers paradigm provides an elegant, simple, and yet powerful computational tool for solving several two-dimensional geometric problems. ...Authors: Godfried Toussaint
Year Published: 2014 | 372-386 | IJDIWC | Vol. 4 No. 3 -
VIRTUAL LEARNING ENVIRONMENTS: PROPOSALS FOR AUTHORING AND VISUALIZATION OF EDUCATIONAL CONTENT
Heated debates involving reforms in the educational system are becoming more and more frequent in recent years. This is due to the increasingly evident shortcomings in the educational system and its ...Authors: Tiago Cinto, Harlei M. A. Leite, Cecilia S. A. Peixoto, Dalton S. Arantes
Year Published: 2014 | 387-400 | IJDIWC | Vol. 4 No. 3 -
MINIATURIZED BANDSTOP FILTERS USING SLOTTED-COMPLEMENTARY RESONATORS
This paper presents a technique to miniaturize bandstop filters applicable for radio- frequency/microwave applications. The technique comprises the use of small resonant inclusions bridged with a ...Authors: Mohammed Bait-Suwailam
Year Published: 2014 | 401-407 | IJDIWC | Vol. 4 No. 3 -
WIRELESS SENSOR NETWORK (WSN) BASED AUTOMATIC FIRING PRACTICE SYSTEM (AFPS) FOR TRAINING OF LAW ENFORCEMENT AGENCIES (LEAS)
The critical importance of an efficient infantryman in special operations force, tactical paramilitary and Law Enforcement Agencies (LEAs) is insurmountable. One of the many vital aspects of an ...Authors: Imran Jattala, Junaid Farooqi, Shakeel Durrani, Nassar Ikram, Irfan Hussian, Muazzam A. Goraya, Obaid B. Zakria
Year Published: 2014 | 408-417 | IJDIWC | Vol. 4 No. 4 -
INFORMATION TRANSPARENCY IN ADMISSION SELECTION OF STATE ISLAMIC HIGHER EDUCATION IN INDONESIA USING INFORMATION TECHNOLOGY APPROACH
The right to information is one of fundamental human right essential. The transparency, availability and accessibility of information enable people to hold policy-makers to account and participate in ...Authors: Linda Salma Angreani
Year Published: 2014 | 418-427 | IJDIWC | Vol. 4 No. 4 -
HYBRID BOUNDARY DETECTION METHOD FOR IMAGE WITH APPLICATION TO CORONARY PLAQUE
This paper proposes a hybrid boundary detection method for image based on a new modified level set method and a fuzzy model. It is applied to a boundary detection problem of coronary plaque. Level ...Authors: Syaiful Anam, Eiji Uchino, Noriaki Suetake
Year Published: 2014 | 428-437 | IJDIWC | Vol. 4 No. 4 -
A MULTI TREE BASED APPROACH FOR PERFORMANCE ANALYSIS IN HIERARCHICAL WIRELESS SENSOR NETWORKS
A wireless sensor network consisting of heterogeneous sensors is capable of dealing with more than one type of information about any region at a time. Sensor applications that cater to disaster ...Authors: Itu Snigdh, Swarn Saurabh
Year Published: 2014 | 438-446 | IJDIWC | Vol. 4 No. 4 -
RELIABILITY AND ACCURACY OF NEURAL NETWORKS FOR EXCHANGE RATE
Most exchange rates are volatile and mainly rely on the principle of supply and demand. Millions of people around the world are influenced, one way or another, by the variation in exchange rates. In ...Authors: David Semaan, Atef Harb, Abdallah Kassem
Year Published: 2014 | 447-457 | IJDIWC | Vol. 4 No. 4 -
ANALYTICAL APPROACH OF COST-EFFECTIVE AND SECURE SIP-BASED MOBILITY MANAGEMENT SCHEME FOR NEMO ENVIRONMENTS
The mobile Virtual Private Network (MVPN) of the Internet Engineering Task Force (IETF) is not designed to support NEtwork MObility (NEMO) and is not suitable for real-time applications. Therefore, ...Authors: Chulhee Cho, Jae-Young Choi, Jun-Dong Cho, Jongpil Jeong
Year Published: 2014 | 458-473 | IJDIWC | Vol. 4 No. 4 -
FALL DETECTION SYSTEM DESIGN BY SMART PHONE
Fall detection is one of the major issues in health care filed. Falls can cause serious injury both in physiology and psychology, especially to the old people. A reliable fall detector can provide ...Authors: Yung-Gi Wu, Sheng-Lun Tsai
Year Published: 2014 | 474-485 | IJDIWC | Vol. 4 No. 4 -
PERSIAN/ARABIC HANDWRITTEN DIGIT RECOGNITION USING LOCAL BINARY PATTERN
Automated handwritten character recognition seems to be necessary due to the increasing number of Persian/Arabic handwritten documents. A new approach for Persian/Arabic handwritten digit recognition ...Authors: Mohsen Biglari, Faezeh Mirzaei, Jalil Ghavidel Neycharan
Year Published: 2014 | 486-492 | IJDIWC | Vol. 4 No. 4 -
NAVIGATION ERROR REDUCTION IN SWARM OF UAVS
For large area surveillance, a number of UAVs are preferred. In such situation, navigation becomes a prime factor, which reduces the chance of collision. UAVs primarily depend on GPS, which has an ...Authors: Shibarchi Majumder, Rahul Shankar, Mani Shankar Prasad
Year Published: 2014 | 493-498 | IJDIWC | Vol. 4 No. 4 -
AN IN-MEMORY APPROACH TO SENTIMENT ANALYSIS BASED ON SAP HANA
Sentiment analysis (SA) is one of a number of fields in which "big data" requires processing. The term "sentiment" refers to the feelings, beliefs, emotions, and opinions that people express in ...Authors: Karl Kurbel, Dawid Nowak, Florian Jatzold, Pavlo Glushko
Year Published: 2015 | 1-13 | IJDIWC | Vol. 5 No. 1 -
IMPLEMENTATION OF RESOURCE DISCOVERY MECHANISMS ON PEERSIM: ENABLING UP TO ONE MILLION NODES P2P SIMULATION
The objective of this study was to implement resource discovery mechanisms onto a Peer-to-Peer (P2P) simulator. Resource discovery mechanisms such as random walk, restricted random walk, ...Authors: Azrul Amri Jamal, Wan Suryani Wan Awang, Mohd Fadzil Abdul Kadir, Azwa Abdul Aziz, William John Teahan
Year Published: 2015 | 14-20 | IJDIWC | Vol. 5 No. 1 -
MANUAL LOGIC CONTROLLER (MLC)
The “Manual Logic Controller” also called MLC, is an electronic circuit invented and designed by the author in 2008, in order to replace the well known PLC (Programmable Logic Controller) in many ...Authors: Claude Ziad Bayeh
Year Published: 2015 | 21-43 | IJDIWC | Vol. 5 No. 1 -
SPATIAL SPECTRUM UTILIZATION EFFICIENCY METRIC FOR SPECTRUM SHARING SYSTEM
Increasing demand for spectrum in recent years has led to a greater emphasis on spectrum efficiency. A metric is needed to efficiently evaluate the utilization of the spectrum in a spectrum sharing ...Authors: A. A. Ayeni, N. Faruk, N. T. Surajudeen-Bakinde, R. A. Okanlawon, Y. A. Adediran
Year Published: Jan. 2015 | 44-51 | IJDIWC | Vol. 5 No. 1 -
CIPHERTEXT DIVERGE-MERGE SCHEME OF IDENTITY-BASED ENCRYPTION FOR CLOUD-BASED FILE TRANSMISSION SERVICE
Cloud-based file transmission services have attracted attention as the way of sending files. However, not a few people have a reluctance to put their serious information on cloud servers. Encrypting ...Authors: Makoto Sato, Masami Mohri, Hiroshi Doi, Yoshiaki Shiraishi
Year Published: 2015 | 52-59 | IJDIWC | Vol. 5 No. 1 -
AN EMPIRICAL ANALYSIS OF END USER’S ADOPTION OF ICT IN A DEVELOPING COUNTRY
Information and Communication Technologies (ICT) have the power to provide substantial economic and social benefits. Thus, it is important to be familiar with the process of technology diffusion ...Authors: Saleh Alwahaishi
Year Published: 2015 | 60-74 | IJDIWC | Vol. 5 No. 2 -
DESIGN, DEVELOPMENT AND USABILITY EVALUATION OF AN ONLINE WEB-BASED LOST AND FOUND SYSTEM
Losing your personal belongings can be a very frustrating experience. The main goal of this research paper is to address the lost and found issues by automating all the manual steps involved in the ...Authors: Emad Bataineh, Bilal Bataineh, Shama Al Kindi
Year Published: 2015 | 75-81 | IJDIWC | Vol. 5 No. 2 -
POPULATION MEAN ESTIMATE FOR ADAPTIVE MODULATION UNDER LARGE PHASE ERROR IN SINGLE BEAMFORMING SENSOR ARRAY
Beamforming is a signal processing technique to focus the transmitted energy so that maximum energy is radiated in the intended destination and communication range is enhanced. Data rate improvement ...Authors: G. Vaikundam, G.F.Sudha
Year Published: 2015 | 82-94 | IJDIWC | Vol. 5 No. 2 -
MINING SEMANTICS FROM MEDICAL STRUCTURED CORPUSES TO BUILD AND ENRICH DOMAIN ONTOLOGIES
Ontologies have become an important means for structuring knowledge, building knowledge-intensive systems and applying to open and dynamic environments wherever the knowledge they model, as well as ...Authors: Driouche Razika
Year Published: 2015 | 95-110 | IJDIWC | Vol. 5 No. 2 -
FACTORS PREDICTING CONSUMERS' ASSESSMENT OF ADVERTISEMENTS ON SOCIAL NETWORKING SITES
Marketers act on social networking sites (SNSs) in order to be more efficient in merchandising their products and/or services. Even so, the scope of the published studies regarding the assessment of ...Authors: Hossam Deraz, Gabriel Baffour Awuah, Desalegn Abraha Gebrekidan
Year Published: 2015 | 111-123 | IJDIWC | Vol. 5 No. 2 -
HEURISTIC METHODS TO IDENTIFY FUZZY MEASURES APPLIED TO CHOQUET INTEGRAL CLASSIFICATION OF BREAST CANCER DATA
When the search space for optimisation or classification problems gets large heuristics and soft computing are often used to find the needed parameters. The Choquet integral methods needs one ...Authors: Ken Adams
Year Published: 2015 | 124-140 | IJDIWC | Vol. 5 No. 2 -
KOREAN MOBILE OPERATORS' VALUE MAP FOR LTE D2D
Managing the wireless data traffic is a main concern for mobile network operators in Information of Things (IoT) environment. Long Term Evolution Device to Device (LTE D2D) is regarding as a solution ...Authors: Taisiya Kim, Soo Kyung Park, Bong Gyou Lee
Year Published: 2015 | 141-151 | IJDIWC | Vol. 5 No. 2 -
BANDWIDTH GUARANTEE USING CLASS BASED WEIGHTED FAIR QUEUE (CBWFQ) SCHEDULING ALGORITHM
In this paper class based weighted fair queue (CBWFQ) algorithm with generic traffic shaping mechanism were simulated on an IP router for applications bandwidth guarantee. IP Telephone, Voice, and ...Authors: Idris Zakariyya, M Nordin A Rahman
Year Published: 2015 | 152-157 | IJDIWC | Vol. 5 No. 3 -
INCLUSIVE PARTICIPATORY WORKSHOP: ACCESSIBLE ICONOGRAPHY DESIGN
The World Report on Disability, produced jointly by the World Health Organization and the World Bank [1], states that about 15% of the world’s population experiences some form of disability. This ...Authors: Tiago Cinto, Ismael Avila, Fabiani de Souza
Year Published: 2015 | 158-164 | IJDIWC | Vol. 5 No. 3 -
PATTERNS MINING IN SEQUENCES USING CONSTRAINTS
Data mining is a set of methods used in the process of KDD( Knowledge Discovery in Data) in order to distinguish relationships and unknown patterns in the data. Mining patterns is an interesting ...Authors: Rajeb Akram, Ben Hamadou Abdelmajid, Loukil Zied
Year Published: Apr. 2015 | 165-170 | IJDIWC | Vol. 5 No. 3 -
UNDERSTANDING THE MOBILE USER’S PURCHASE-DECISION INVOLVEMENT
With smart devices starting to become truly context-aware and mobile devices establishing themselves within the on-line purchasing cycle we are finding m-commerce becoming more astute to our needs. ...Authors: Mark Hooper, Paul Sant
Year Published: Jul. 2015 | 171-184 | IJDIWC | Vol. 5 No. 3 -
A FRAMEWORK FOR COMMENTS ANALYSIS AND VISUALIZATION
The number of user-contributed comments is increasing exponentially. Such comments are found widely in social media sites including internet discussion forums and news agency websites. Individual ...Authors: D. Ramamonjisoa, R. Murakami, B. Chakraborty
Year Published: Jul. 2015 | 185-193 | IJDIWC | Vol. 5 No. 3 -
DATA STRUCTURE AND ALGORITHM: A VISUALIZED WEB BASED COURSEWARE IMPROVES COGNITIVE LEARNING
The most powerful educational tool is interactive visualization platform. The purpose of educational visualization is to facilitate learners to learn quality based knowledge by considering different ...Authors: Junaid Akram, Luping Fang
Year Published: Jul. 2015 | 194-202 | IJDIWC | Vol. 5 No. 3 -
DECISION TREES ALGORITHMS AND CLASSIFICATION WITH INCREMENTAL NEURAL NETWORK
The purpose of this paper is to present a set of algorithms for rule extraction using direct and indirect methods and the use of Neural Network for classification. A direct method with simplification ...Authors: John Tsiligaridis
Year Published: Jul. 2015 | 203-209 | IJDIWC | Vol. 5 No. 3 -
A FRAMEWORK FOR STATISTICAL CHARACTERIZATION OF INDOOR DATA TRAFFIC FOR EFFICIENT DYNAMIC SPECTRUM ACCESS IN THE 2.4 GHZ ISM BAND
The key for efficient dynamic spectrum access (DSA) is to model the spectral resources accurately. A large number of measurement campaigns have been performed to estimate the spectrum usage in ...Authors: Muhammad Khurram Ehsan, Dirk Dahlhaus
Year Published: Oct. 2015 | 210-220 | IJDIWC | Vol. 5 No. 4 -
ELUCIDATING DIGITAL INFORMATION AND WIRELESS COMMUNICATIONS TECHNOLOGY FOR AN ELECTRONIC WORKING LOGS AND APPLICATIONS
This work focuses on the troublesomeness of the traditional hardcopy working log sheets used in officers, proposing a Digital Information and Wireless Communications Technology based a Noble Design ...Authors: De-Ji Jang, Chih-Yung Chen, Shieh-Shing Lin
Year Published: Oct. 2015 | 221-232 | IJDIWC | Vol. 5 No. 4 -
SUBROUTINE ENTRY POINT RECOGNITION USING DATA MINING
This paper introduces a novel approach to subroutine entry point recognition using data mining. The proposed method applies a Naïve Bayes classifier over features consisting of sequences of ...Authors: Brian Knudson
Year Published: Oct. 2015 | 233-242 | IJDIWC | Vol. 5 No. 4 -
LYAPUNOV STABILITY ANALYSIS FOR CONSEQUENTIAL MESSAGE PATH IN GRADED COGNITIVE NETWORKS
In the domain of network routing, one of the key measure belongs to the stability analysis of the paths obtained by routing algorithms. Lyapunov analysis has been used widely for understanding the ...Authors: Kavitha Sooda, T. R. Gopalakrishnan Nair
Year Published: Oct. 2015 | 243-256 | IJDIWC | Vol. 5 No. 4 -
DETERMINATION OF PERFORMANCE ENHANCEMENT IN IEEE 802.11 MULTI-RATE WLAN
This work investigates performance anomaly of IEEE 802.11 multi-rate WLAN with respect to throughtput and fairness. Even though in a given WLAN, hosts with different transmission rates exist, IEEE ...Authors: Ibrahim Abubakar Alhaji, Bello Idrith Tijjani, Mutari Hajara Ali
Year Published: Oct. 2015 | 257-269 | IJDIWC | Vol. 5 No. 4 -
THE STAKEHOLDERS OF A USER-CENTRED DESIGN PROCESS IN MOBILE SERVICE DEVELOPMENT
The use of agile methods in mobile service development has gained much attention in software design research. In addition, involving the potential stakeholders of the mobile service in the design and ...Authors: Ari Alamaki, Amir Dirin
Year Published: Oct. 2015 | 270-284 | IJDIWC | Vol. 5 No. 4 -
EVALUATING CLOUD COMPUTING CHALLENGES FOR NON-EXPERT DECISION-MAKERS
Non-expert managers in various types of organizations usually find it challenging to decide whether to adopt cloud computing services, which are internet-based, instead of the conventional in-house ...Authors: Karim Mualla, David Jenkins
Year Published: Oct. 2015 | 285-296 | IJDIWC | Vol. 5 No. 4 -
BUILDING ACCURATE TEXT CLASSIFIERS
This paper brings out the various techniques we have followed to build a production ready scalable classifier system. This system is used to classify the tickets raised by employees of an ...Authors: Arthi Venkataraman
Year Published: Jan. 2016 | 1-15 | IJDIWC | Vol. 6 No. 1 -
GAUSSIAN AND FAST FOURIER TRANSFORM FOR AUTOMATIC RETINAL OPTIC DISC DETECTION
Optic Disc (OD) segmentation with a combination of Gaussian and Fast Fourier Transform is proposed in this research. Three stages are required in this proposed research, i.e., first, Gaussian and ...Authors: Arif Muntasa, Indah Agustien Siradjuddin, Moch Kautsar Sophan
Year Published: Jan. 2016 | 16-20 | IJDIWC | Vol. 6 No. 1 -
COMBINING THE BEST FEATURES OF SOAP AND REST FOR THE IMPLEMENTATION OF WEB SERVICES
The two leading technologies being used to implement Web services are SOAP and REST. SOAP-based services have been widely used for interfacing software applications within and across boundaries of ...Authors: Roopesh Kevin Sungkur, Sachin Daiboo
Year Published: Jan. 2016 | 21-33 | IJDIWC | Vol. 6 No. 1 -
EMERGING MOBILE TECHNOLOGIES FOR CONSTRUCTING ENGINEERING AND SCIENTIFIC REMOTE LABORATORIES IN DISTANCE LEARNING SYSTEM
This paper presents utilization of mobile technologies for supporting distance learning system in open universities or online courses. The architectural framework of learning module is proposed ...Authors: Khajitpan Makaratat Kritpolviman
Year Published: Jan. 2016 | 34-40 | IJDIWC | Vol. 6 No. 1 -
IMPROVING QUALITY AND ACCESS TO HEALTHCARE BY ADOPTING EMERGING TECHNOLOGIES
Shortage of healthcare workers (HCWs) hampers treatment outcomes in Sub-Sahara Africa (SSA). There is also a great need for scalable, cost-effective and long-term strategies in healthcare. The ...Authors: Paul Macharia, Upasana Gitanjali Singh, Tranos Zuva
Year Published: Jan. 2016 | 41-45 | IJDIWC | Vol. 6 No. 1 -
ON SIGNAL AND IMAGE RECONSTRUCTION FROM DISCRETE DATA
Many information-processing applications are based on digital data although the origin of most sources of information is analog. A new signal sampling and representation framework for such purposes ...Authors: Alex Kopaigorodski, Moshe Porat
Year Published: Jan. 2016 | 46-55 | IJDIWC | Vol. 6 No. 1 -
ADAPTIVE SEMANTICS WEB-BASED APPROACH FOR E-EDUCATION USING THE STATIC ANNOTATED CORPUS
In recent era popularity of E-education has been increased. Task of selecting an appropriate content for right education become a real challenge. This paper outline a semantic web based approach for ...Authors: Prakash Choudhary, Neeta Nain
Year Published: Jan. 2016 | 56-62 | IJDIWC | Vol. 6 No. 1 -
AN OPEN SOURCE ARCHITECTURE OF A WIRELESS BODY AREA NETWORK IN A MEDICAL ENVIRONMENT
This contribution describes the design and implementation of a novel Wireless Body Area Network system for healthcare monitoring, the architecture of which is based on commercially available and ...Authors: George Kokkonis, Sotirios Kontogiannis, Dimitrios Tomtsis
Year Published: Apr. 2016 | 63-77 | IJDIWC | Vol. 6 No. 2 -
ENHANCEMENT OF THE FUSION OF INCOMPATIBLE LISTS OF RESULTS
This work is located in the domain of distributed information retrieval (DIR). A simplified view of the DIR requires a multi-search in a set of collections, which forces the system to analyze results ...Authors: Guezouli Larbi, Azzouz Imane
Year Published: Apr. 2016 | 78-86 | IJDIWC | Vol. 6 No. 2 -
ONTOLOGY FOR PERFORMANCE MEASUREMENT INDICATORS’ COMPARISON
Indicators are widely used by organizations as a way of evaluating, measuring and classifying organizational performance. As part of performance evaluation systems, indicators are often shared or ...Authors: Vanderlei Freitas Junior, Victoria Uren, Christopher Brewster, Alexandre Leopoldo Gonçalves
Year Published: Apr. 2016 | 87-96 | IJDIWC | Vol. 6 No. 2 -
A CASE BASED REASONING ARCHITECTURE AND COMPONENT BASED MODEL FOR GREEN IS IMPLEMENTATION AND DIFFUSION IN ORGANISATION
Green Information Systems (IS) offers promise for IS scholars to make significant contribution in reducing greenhouse gas emissions, achieve sustainability and reducing the effects of global climate ...Authors: Bokolo Anthony Jnr, Noraini Che Pa
Year Published: Apr. 2016 | 97-111 | IJDIWC | Vol. 6 No. 2 -
SIMPLE METHOD FOR DETERMINING HARMONIC SEQUENCES IN A MACHINE, TRANSFORMER OR NETWORK
Harmonics in power systems are very dangerous and may cause different problems for equipment, i.e. the third harmonic has the same amplitude and angle in each phase of a three phase system. It enters ...Authors: Claude Ziad Bayeh
Year Published: Apr. 2016 | 112-121 | IJDIWC | Vol. 6 No. 2 -
MODELING PERFORMANCE OF VOIP TRAFFIC OVER 802.11WIRELESS MESH NETWORK UNDER CORRELATED INTER-ARRIVAL TIMES
Wireless Mesh Networks (WMN) are an attractive communication paradigm for VOIP traffic due to their low cost and relative ease of deployment. In a recent study, the end to end delay of VOIP packets ...Authors: Barbara Kabwiga Asingwire, Barbara Kabwiga Asingwire, Okopa Michael, Tonny Bulega
Year Published: Apr. 2016 | 122-138 | IJDIWC | Vol. 6 No. 2 -
STANDARDIZING SUSTAINABILITY BENEFITS OF CLOUD COMPUTING FOR NON-EXPERT DECISION-MAKERS
Cloud computing is currently being provisioned and utilized by organisations in various and unstandardized approaches depending on the contract between the service provider and the end-user. The ...Authors: Karim Mualla, Gareth Pender, David Jenkins
Year Published: Apr. 2016 | 139-152 | IJDIWC | Vol. 6 No. 2 -
DEVELOPMENT OF AN AUTOMATIC HEALTH SCREENING SYSTEM FOR RELIABLE AND SPEEDUP MEASUREMENT OF PERSONAL HEALTH DATA
This paper describes the detail of an Automatic Health Screening System, which has been designed and implemented with PC connected to campus network, IC card reader and special interfaces for ...Authors: Eiichi Miyazaki, Hiroshi Kamano, Kazuaki Ando, Yoshiro Imai
Year Published: Jul. 2016 | 153-162 | IJDIWC | Vol. 6 No. 3 -
AN E-HEALTHCARE SYSTEM FOR UBIQUITOUS AND LIFE-LONG HEALTH MANAGEMENT
An e-Healthcare system with IC card authentication, automatic health screening sub-system and Web-based health information monitoring, has been designed and implemented for university health ...Authors: Eiichi Miyazaki, Hiroshi Kamano, Kazuaki Ando, Yoshiro Imai
Year Published: Jul. 2016 | 163-172 | IJDIWC | Vol. 6 No. 3 -
ENCAPSULATION OF REAL TIME COMMUNICATIONS OVER RESTRICTIVE ACCESS NETWORKS
The mechanisms of firewall traversal used to overcome the problems that impact Real Time Communications (RTC) in restrictive access networks introduce, among other impediments, excessive latency that ...Authors: Rolando Herrero
Year Published: Jul. 2016 | 173-183 | IJDIWC | Vol. 6 No. 3 -
DEVELOPMENT OF A WEB-BASED PROXIMITY BASED MEDIA SHARING APPLICATION
This article reports the development of Vissou, which is a location based web application that enables media recording and sharing among users who are in close proximity to each other. The ...Authors: Erol Ozan
Year Published: Jul. 2016 | 184-191 | IJDIWC | Vol. 6 No. 3 -
SIMULATION OF KNOWLEDGE SHARING IN BUSINESS INTELLIGENCE
Knowledge sharing is one of the most critical elements in a knowledge based society. With huge concentration on communication facilities, there is a major shift in world-wide access to codified ...Authors: Pornpit Wongthongtham, Behrang Zadjabbari , Hassan Marzooq Naqvi
Year Published: Jul. 2016 | 192-205 | IJDIWC | Vol. 6 No. 3 -
KIWILOD: A FRAMEWORK TO TRANSFORM NEW ZEALAND OPEN DATA TO LINKED OPEN DATA
In this paper we present the theoretical framework to shift the New Zealand Open Data initiative to the next level by designing a scalable, queryable, and thus more accessible a Linked Data cloud, ...Authors: Rivindu Perera, Parma Nand
Year Published: Jul. 2016 | 206-212 | IJDIWC | Vol. 6 No. 3 -
AN EFFICIENT ALGORITHM FOR SHORTEST COMPUTER NETWORK PATH
To find the shortest path in computer network problem is always a challenge for the network designers and many algorithms have been developed in past to solve this problem. One of these algorithms is ...Authors: Muhammad Asif Mansoor, Taimoor Karamat
Year Published: Jul. 2016 | 213-218 | IJDIWC | Vol. 6 No. 3 -
ENGINEERING MINING A LARGE SCALE DATA BASED ON FEATURE ENGINEERING, METADATA, AND ONTOLOGIES
The growth of web especially in a social network in a continuously increasing. Multiplicity of offered items such as products or web pages, has made pick up relevant items for a user which searching ...Authors: Ahmed Adeeb Jalal, Oğuz Altun
Year Published: Oct. 2016 | 219-229 | IJDIWC | Vol. 6 No. 4 -
PROPOSAL OF REPRODUCTIVE DESIGN EDUCATION BASED ON KNOWLEDGE AND RESOURCE DISCOVERY THROUGH SNS COMMUNITY
Design education is one of the most creative topics and themes in Higher Educations and Trainings. Students of the design education course also need to learn both of knowledge and techniques, the ...Authors: Masatoshi Imai, Yoshiro Imai
Year Published: Oct. 2016 | 230-240 | IJDIWC | Vol. 6 No. 4 -
ASSESSMENT OF QUALITY-OF-EXPERIENCE IN TELECOMMUNICATION SERVICES
In recent years, the number of researches in Quality-ofExperience (QoE) is increasing because this concept is used in several areas. In telecommunication services, the subscriber loyalty depends on ...Authors: Demóstenes Z. Rodriguez, Renata L. Rosa, Rodrigo D. Nunes, Emmanuel T. Affonso
Year Published: Oct. 2016 | 241-259 | IJDIWC | Vol. 6 No. 4 -
MUSIC EMOTION RECOGNITION WITH AUDIO AND LYRICS FEATURES
Music Emotion Recognition (MER) is a field of science dedicated to recognizing emotions associated with music pieces. With the new interest in music therapy and music recommendation systems, MER has ...Authors: C. V. Nanayakkara, H. A. Caldera
Year Published: Oct. 2016 | 260-273 | IJDIWC | Vol. 6 No. 4 -
PROPOSITION OF AN INTELLIGENT SYSTEM FOR PREDICTIVE ANALYSIS USING MEDICAL BIG DATA
Emerging technologies such as mobile application, cloud computing, big data analytics, predictive analytics revolutionized all sectors. This is particularly true for the healthcare system as a ...Authors: Basma Boukenze, Abdelkrim Haqiq
Year Published: Oct. 2016 | 274-280 | IJDIWC | Vol. 6 No. 4 -
A HYBRID CREDIBILITY ANALYSIS METHOD APPLIED ON TURKISH TWEETS WITH TV NEWS AND DISCUSSION PROGRAMS RELATED CONTENT
In this paper, credibility analysis of microblog messages is studied. We collected our data from one of the most important microblogging services, Twitter. Our data set is created from the Turkish ...Authors: Ali Fatih Gunduz, Pınar Karagöz
Year Published: Oct. 2016 | 281-291 | IJDIWC | Vol. 6 No. 4 -
A QUESTION-ANSWERING INFERENCING SYSTEM BASED ON DEFINITION AND ACQUISITION OF KNOWLEDGE IN WRITTEN ENGLISH TEXT
In recent years, question-answering systems have become a major area of research and development in information search technologies. We have proposed a new question answering system that can produce ...Authors: Kenta Hiratsuka, Hiroki Imamura
Year Published: Oct. 2016 | 292-298 | IJDIWC | Vol. 6 No. 4 -
COMPARATIVE ANALYSES ON LOGO IMAGE DESIGNS BETWEEN ARAB AND JAPAN
With the present announcement of the International Olympic Committee (IOC) that upcoming 2020 Olympic Games is scheduled to be held in Tokyo and with various initiatives of Japanese government aimed ...Authors: Ahmad Eibo, Toshiyuki Yamashita, Keiko Kasamatsu
Year Published: Jan. 2017 | 1-9 | IJDIWC | Vol. 7 No. 1 -
PRIORITY ACCESS MECHANISM FOR IMPROVING RESPONSIVENESS TO USERS THROUGH CACHE SERVER AND PRIORITY ACCESS MANAGEMENT MECHANISM
This research aims at caching non-interactive dynamic contents such as news and weather, and blogs for read only users. We think that there is no problem for users even if they browse these dynamic ...Authors: Hisanori Mizobuchi, Keizo Saisho
Year Published: Jan. 2017 | 10-17 | IJDIWC | Vol. 7 No. 1 -
THE STRESS RELIEF EFFECTS OF WRIST WARMING AFTER MENTAL WORKLOAD
To clarify the mental stress relief effects of wrist warming, we conducted an experiment involving 8 healthy participants and evaluated the differences in psychological and physiological responses ...Authors: Ayami Ejiri, Keiko Kasamatsu
Year Published: Jan. 2017 | 18-25 | IJDIWC | Vol. 7 No. 1 -
ACCELERATED TRAFfiC MODEL BASED ON PSYCHOLOGICAL EFFECTS
This paper presents an acceleration model of traffic resource utilization from psychological effects of car drivers on a single lane traffic resource. Two kinds of acceleration, boundary and ...Authors: Takahiro Suzuki, Shihoko Tanabe
Year Published: Jan. 2017 | 26-34 | IJDIWC | Vol. 7 No. 1 -
FINDING WEAK LINKS IN SUPPLY CHAIN CASE STUDY: THAI FROZEN SHRIMP INDUSTRY
Usually, a manufacture receives materials from one or more suppliers in a supply chain. Performance of each supplier in a chain affects on the chain’s performance. Thus, evaluating suppliers in a ...Authors: Patchanee Patitad, Hidetsugu Suto, Woramol Chaowarat
Year Published: Jan. 2017 | 35-41 | IJDIWC | Vol. 7 No. 1 -
ENERGY EXPENDITURE PER BIT MINIMIZATION INTO MB-OFDM UWB SYSTEMS
The growing demand of high data rates requires much energy consumption. For this, in this paper we examine energy efficiency (EE) through total energy expenditure per bit characterization when the ...Authors: Houda Chihi, Reza Zaeem and Ridha Bouallegue
Year Published: Jan. 2017 | 42-48 | IJDIWC | Vol. 7 No. 1 -
A SURVEY OF FOUR ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS
Routing protocols are the most important aspect in Wireless Sensor Networks, since they have a direct effect on the overall network performance like throughput, power consumption, packet loss, and ...Authors: Raid Zaghal, Fadi Alyounis and Saeed Salah
Year Published: Jan. 2017 | 49-59 | IJDIWC | Vol. 7 No. 1 -
A PROTOTYPE OF ADVANCED MANAGEMENT INFORMATION SYSTEM FOR CONFERENCES
This paper aims to describe the experience accumulated in building a sophisticated management information system for conferences. The accumulated experience is built over 6 years and it is ...Authors: Kota MORIGAKI, Keizo SAISHO
Year Published: Apr. 2017 | 60-65 | IJDIWC | Vol. 7 No. 2 -
DYNAMIC OPTIMIZATION OF IEEE 802.11 DCF BASED ON ACTIVE STATIONS AND COLLISION PROBABILITY
In IEEE 802.11 wireless networks, the back-off algorithm has an exponential Contention Window (CW) increment and resetting CW strategy. Under heavy network load conditions the traditional Binary ...Authors: Nithya Balasubramanian, Shreenivas Bharadwaj Venkataramanan and Aravind Aathma
Year Published: Apr. 2017 | 66-74 | IJDIWC | Vol. 7 No. 2 -
Modeling Improved Low Latency Queueing Scheduling Scheme for Mobile Ad Hoc Networks
An Enhanced Low Latency Queue scheduling algorithm that categorizes and prioritizes the realtime traffic was developed. In this algorithm the high priority queues are introduced for scheduling the ...Authors: Kakuba Samuel, Kyanda S. Kaawaase, Michael Okopa
Year Published: Jun. 2017 | 75-92 | IJDIWC | Vol. 7 No. 2 -
Mining Top-T Web Traversal Subsequences
There is rapid growth in the information over the internet from extensive range of sources thereby leading to information overload problem. Web mining is being used as solution to this problem. As ...Authors: Santosh Kumar, Neha Tyagi
Year Published: Jun. 2017 | 93-105 | IJDIWC | Vol. 7 No. 2 -
Development of Electronic Document Archive Management System (EDAMS): A Case Study of a University Registrar in the Philippines
The traditional method of data storage has shown its impact in managing documents from security, retrieval, and monitoring. Many kinds of literature suggest that this approach would result in low job ...Authors: Las Johansen B. Caluza
Year Published: Jun. 2017 | 106-117 | IJDIWC | Vol. 7 No. 2 -
Data Mining and Analysis for off Grid Solar PV Power System
Solar power generation systems production changes with respect to geographical location. By this paper we studied how solar systems behave in Gaza which is located in the Middle East. Log readings of ...Authors: Mohamed D. Almadhoun
Year Published: Jun. 2017 | 118-123 | IJDIWC | Vol. 7 No. 2 -
Vulnerability Assessment and Penetration Testing: A proactive approach towards Network and Information Security
With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, to identify common network threats and define countermeasures ...Authors: Muhammad Zeeshan, Shams Un Nisa, Tazeen Majeed, Nayab Nasir, Saadia Anayat
Year Published: Jun. 2017 | 124-142 | IJDIWC | Vol. 7 No. 2 -
Vulnerability Assessment of Some Key Nigeria Government Websites
Ministries, Department and Agencies (MDA‟s) websites are useful constituents for information dissemination and citizen centric services. Various vulnerabilities exist in this websites. In this ...Authors: Ismaila Idris, Mohammad Umar Majigi, Shafii Abdulhamid, Morufu Olalere, Saidu Isah Rambo
Year Published: Sep. 2017 | 143-152 | IJDIWC | Vol. 7 No. 3 -
Development of Weighted Round-Robin with Variable TTL to Improve of Load Balancing Mechanism in a Distributed Web System Using DNS
Progress of virtualization technology in recent years made it easy to build virtual servers on Cloud. They can be used as cache server for load balancing. However, expected responsiveness cannot be ...Authors: Kota MORIGAKI, Keizo SAISHO
Year Published: Sep. 2017 | 153-160 | IJDIWC | Vol. 7 No. 3 -
The Influences of Meteorological Parameters on Digital Terrestrial Television (DTT) Signal in the Tropics
The medium of propagation for Digital Terrestrial Television (DTT) is the troposphere, where most weather phenomena occur. Thus the need to study the effect of meteorological parameters on DTT signal ...Authors: Akinbolati Akinsanmi, Ajewole Moses Oludare, Adediji Adekunle Titus., Ojo Joseph Sunday
Year Published: Sep. 2017 | 161-172 | IJDIWC | Vol. 7 No. 3 -
Fluctuation Effects in Fast Traffic Flow
This paper discusses a traffic flow, which considers a fluctuation in car moving, based on a stochastic cellular automaton from the viewpoint in fundamental traffic diagrams. Suppose a future ...Authors: Tomoya Yamamoto, Takahiro Suzuki, Isamu Shioya
Year Published: Sep. 2017 | 173-177 | IJDIWC | Vol. 7 No. 3 -
Reviewing and Classifying the Effective Factors in Selection Telecommunication Antenna Towers Sites.
Telecommunications companies around the world attempted to cover most demand area in better services and low costs where the best distribution of antenna towers are represent one of the main factors ...Authors: Janah A, Asassfeh, Fadiya Samson, Mokhled AlTarawneh
Year Published: Sep. 2017 | 178-183 | IJDIWC | Vol. 7 No. 3 -
Pakistani University Students Perspective on Whatsapp Usage: From the Lens of Uses and Gratification Constructs
WhatsApp has greatly become popular text messaging technology among youth. It allows free exchange of text, pictures, videos and documents. From the lens of Uses and gratification perspective, this ...Authors: Alina Khan
Year Published: Dec. 2017 | 184-199 | IJDIWC | Vol. 7 No. 4 -
Towards a Framework Embedding Formalisms for Data Warehouse Specification and Design
The Data Warehousing use implies the establishment of Data Warehouse and business intelligence systems. A Data Warehouse is a subject oriented, integrated, time variant and nonvolatile data ...Authors: Isaac N. Mbala, John A. van der Poll
Year Published: Dec. 2017 | 200-214 | IJDIWC | Vol. 7 No. 4 -
Enterprise Architecture Development – Implications for a Seamless Government: A Case Study
The early stages of computerisation were preoccupied with managing activities such as operations, programming, data collection etc. This then developed into information systems. Such systems include: ...Authors: Oduronke T. Eyitayo
Year Published: Dec. 2018 | 1-12 | IJDIWC | Vol. 8 No. 1 -
PAPR Reduction of OFDM Signal with SPS-SLM Technique and Analysis of BER Performance through AWGN Channel
Orthogonal Frequency Division Multiplexing (OFDM) has been currently under intense research for broadband wireless transmission due to its robustness against multipath fading. However, implementation ...Authors: Md. Salim Raza, Md. Shahjahan Ali
Year Published: Dec. 2017 | 215-222 | IJDIWC | Vol. 7 No. 4 -
SWOT Analysis for Adopting of Big Data in the Higher Education Institutions (Yemen)
Big Data offers many opportunities to higher education institutions. This paper explores the attributes of big data that are relevant to higher educational institutions, investigates the factors ...Authors: Arwa Y. Aleryani
Year Published: Mar. 2018 | 13-26 | IJDIWC | Vol. 8 No. 1 -
Design a Petri Net Model for a Smart Hospital System
Today, the world is moving towards becoming smart. Tools and equipment are somewhat smart and now it’s time to use them for making smart the organizations and special places. Integration of smart ...Authors: Sasan Harifi, Alireza Nikravanshalmani
Year Published: Mar. 2018 | 41-46 | IJDIWC | Vol. 8 No. 1 -
Eigen frequencies and directivity patterns of a spherical acoustic transducer
In this work, a spherical acoustic sensor has been developed, and is composed of two Plexiglas half spheres and a PZ26 piezoelectric ring that can be either used as an exciter or as a sensor. The ...Authors: D. Diab, F. Lefebvre, G. Nassar, N. Smagin, A. Naja, F. El Omar
Year Published: Mar. 2018 | 47-51 | IJDIWC | Vol. 8 No. 1 -
Baselining: A Critical Approach Used for Soft Fault Detection in Wire Networks
During the last few decades, problems arising from faults affecting cable networks has became an issue of major concern in both industry and research. Consequently, vast efforts and enormous capitals ...Authors: Moussa Kafal, Jaume Benoit
Year Published: Mar. 2018 | 52-57 | IJDIWC | Vol. 8 No. 1 -
Speaker Identification Based On Vocal Cords Vibrations signal: Effect Of The Window
A new speaker identification technique was proposed and presented. It is based on the acquisition of the individual’s signal of its vocal cords’ vibrations by attaching a piezoelectric transducer ...Authors: Dany Ishac, Antoine Abche, Elie Karam, Georges Nassar, Dorothee Callens
Year Published: Mar. 2018 | 58-62 | IJDIWC | Vol. 8 No. 1 -
A Binary Sparse Signal Pruning Recovery Algorithm
This paper presents a novel compressive sensing recovery algorithm for binary sparse vectors. This algorithm is a variant of the linear regression coordinate descent algorithm with a suitable ...Authors: Elie Atallah
Year Published: Mar. 2018 | 63-69 | IJDIWC | Vol. 8 No. 1 -
Applying Partial Reconfiguration Technique on ARM-FPGA Systems in Context of Vertical Handover in Wireless Heterogeneous Networks
Nowadays wireless communication networks consist of multiple radio access technologies (LTE, WIFI, WIMAX ... ). Thus, end-nodes may use different radio technologies according to their availability ...Authors: Mohamad Al-Fadl Rihani, Mohamad Mroue, Jean-Christophe Prevotet, Fabienne Nouvel, and Yasser Mohanna
Year Published: Mar. 2018 | 70-74 | IJDIWC | Vol. 8 No. 1 -
Multiobjective Predictive Control for Three-Level NPC Grid Connected Converter
In recent years with higher levels of wind power penetration to the grid, beside active power production, Wind Energy Conversion Systems (WECS) are controlled to provide ancillary services such as ...Authors: L. Riachy, H. Alawieh, Y. Azzouz, B. Dakyo
Year Published: Mar. 2018 | 75-80 | IJDIWC | Vol. 8 No. 1 -
A Low Phase Noise Multi-Gigahertz Ring based Voltage-Controlled-Oscillator in 0.13 um CMOS Technology
in this paper, a low phase noise and low supply voltage ring based voltage-controlled-oscillator (VCO) is presented. The phase noise performance is improved by modifying the symmetrical load ...Authors: Hussein Bazzi, Mohammad AbouChanine, Mostafa Assaf, Adnan Harb
Year Published: Jun. 2018 | 81-84 | IJDIWC | Vol. 8 No. 2 -
Soft Fault Diagnosis in Wire Networks Using Time Reversal Concept and Subspace Methods
Time-reversal (TR) techniques recently adopted from acoustics to guided wave propagation along transmission lines have proven to be effectual in locating soft faults in different wire network ...Authors: Moussa Kafal, Jaume Benoit, Andrea Cozza, and Lionel Pichon
Year Published: Jun. 2018 | 85-89 | IJDIWC | Vol. 8 No. 2 -
Efficient Navigation System of Mobile Robot with Thermography Image Processing System and Mapping of Quadcopter
A generic approach for the real-time navigation and rescue of Mobile Robot through the control of the thermography mapping and image processing of Quadcopter. For navigation and position, mobile ...Authors: Moustafa M. Kurdi, Michael M. Tatur, Alex K. Dadykin, Imad Elzein
Year Published: Jun. 2018 | 90-95 | IJDIWC | Vol. 8 No. 2 -
Hybrid Power Generation: Thermal Power and Photovoltaic Units in Lebanon
Over the years, researches have been focused on different technological strategies to meet up with the increasing demand for high quality and reliable power supply. Prominent of these researches is ...Authors: Hassan Amine Osseily
Year Published: Jun. 2018 | 96-100 | IJDIWC | Vol. 8 No. 2 -
Classification of Contrast Ultrasound Images: Improvement of the GMM Using Gaussian Filter
Contrast agent microbubbles play an important role in ultrasound images. These agents are small and safe, and are administered intravenously in the systemic circulation to enhance the vascular zone ...Authors: Bilal Ghazal, Maha Khachab, Christian Cachard, Denis Friboulet, and Chafic Mokbel
Year Published: Jun. 2018 | 101-105 | IJDIWC | Vol. 8 No. 2 -
Wide Range Analog CMOS Multiplier for Neural Network Application
This paper presents the design of a four quadrant analog CMOS multiplier for neural network applications. The input range is 100% of the power supply voltage. The circuit has been designed and tested ...Authors: Hassan Jouni, Adnan Harb, Gilles Jacquemod, Yves Leduc
Year Published: Jun. 2018 | 106-109 | IJDIWC | Vol. 8 No. 2 -
Combined DCT-Haar Transforms for Image Compression
Discrete Cosine Transform (DCT) and Haar wavelet transform are very important transforms in image compression. While DCT works extremely well for highly correlated data, the Haar transform gives ...Authors: Mireille Saliba, Rachelle Farah, Issam Dagher
Year Published: Jun. 2018 | 110-117 | IJDIWC | Vol. 8 No. 2 -
A Study of Multi-Operator Resource Sharing using Markov Chain Model
In this paper, we model the interaction between the operators of a multi-operator sharing system using Markov chain. We investigate three pricing strategies to set the financial conciliation for the ...Authors: Soha Farhat, Ali Chour, and Abed Ellatif Samhat
Year Published: Jun. 2018 | 118-123 | IJDIWC | Vol. 8 No. 2 -
A Study on Priority-based Centralized TDMA Slot Scheduling Algorithm for Vehicular Ad hoc NETworks
Vehicular Ad hoc NETworks, known as VANETs, are deployed to reduce the risk of road accidents as well as to improve passenger comfort by allowing vehicles to exchange different kinds of data. Medium ...Authors: Mohamed Hadded, Anis Laouiti
Year Published: Jun. 2018 | 124-128 | IJDIWC | Vol. 8 No. 2 -
Low Noise Power Amplifier in 28-nm UTBB FDSOI Technology with Forward Body Bias
This paper presents a design of mm-wave LNPA which generates a large output power and low noise figure in one stage for a harmonic feedback oscillator block at the candidate of 5G; frequency 26 GHz. ...Authors: Adnan Harb, Ali Mohsen, Nathalie Deltimple and Abraham Serhane
Year Published: Jun. 2018 | 129-132 | IJDIWC | Vol. 8 No. 2 -
QoS/QoE Based Handover Decision in Multi-Tier LTE Networks
With the increasing demand on data rate in 5G mobile networks, the deployment of small cells such as Femto Access Points (FAP) and device-device (D2D) communications in parallel with macro-cells have ...Authors: Malak Sadik, Nadine Akkari, Ghadah Aldabbagh
Year Published: Jun. 2018 | 133-138 | IJDIWC | Vol. 8 No. 2 -
Trust Model for Group Leader Selection in VANET
In this paper, we propose a Trust Model for VANETs. It is a combination between centralized and distributed cooperation between vehicles and infrastructure to achieve the selection of the trustiest ...Authors: Hamssa Hasrouny, Abed Ellatif Samhat, Carole Bassil, Anis Laouiti
Year Published: Jun. 2018 | 139-143 | IJDIWC | Vol. 8 No. 2 -
Device-to-Device Communication in 5G: Towards Efficient Scheduling
5G wireless networks are expected to carry large traffic volumes due to the growth of mobile devices and the increasing demand for high data rates from applications. Device to device communication is ...Authors: Jana Fayek, Mohamad Aoude, Mohamad Raad, Raad Raad
Year Published: Sep. 2018 | 144-149 | IJDIWC | Vol. 8 No. 3 -
Energy-Aware Routing for CubeSat Swarms
CubeSats operating in a swarm are characterized by a mix of scheduled intermittent connectivity, high delays, and high failure rates. Each CubeSat is limited in size, usually has low data rates and ...Authors: Mohamed Atef Ali Madni, Raad Raad, Mohamad Raad
Year Published: Sep. 2018 | 150-155 | IJDIWC | Vol. 8 No. 3 -
Resource Sharing in 5G Multi-Operator Wireless Network
Abstract—In a multi-operator shared network, an appropriate decision is needed for how much to share resources in order to maintain user satisfaction, while maximizing cooperation benefits. In ...Authors: Soha Farhat, Abed Ellatif Samhat, Samer Lahoud, Bernard Cousin
Year Published: Sep. 2018 | 156-161 | IJDIWC | Vol. 8 No. 3 -
Full-Duplex Cognitive Radio based on Spatial Diversity
In this paper, a new Full-Duplex Cognitive Radio (FD-CR)is proposed based on the observations of multi secondary users (SUs) by exploiting the spatial diversity. Assuming that one SU and one Primary ...Authors: A. Nasser, A. Mansour, K.-C. Yao, H. Assaf and H. Abdallah
Year Published: Sep. 2018 | 162-167 | IJDIWC | Vol. 8 No. 3 -
Simulating Image Communication over Multi-Hop Wireless Sensor Networks Using TOSSIM
Abstract—Wireless camera sensor networks have been employed for different types of visual monitoring applications, promoting innovative services for Internet of Things scenarios and smart cities. ...Authors: Cristian Duran-Faundez, Pablo Saez-Srain, Daniel G. Costa and Gilbert Habib
Year Published: Sep. 2018 | 168-173 | IJDIWC | Vol. 8 No. 3 -
Learning Overcomplete Representations using Leaky Linear Decoders
Feature engineering is a complex and arduos undertaking that takes considerable amount of effort and domain expertise. Feature Learning, also called Representation learning, obviates manual Feature ...Authors: Sarthak Yadav, Ankur Singh Bist
Year Published: Sep. 2018 | 174-179 | IJDIWC | Vol. 8 No. 3 -
Development of an Access Point Positioning Optimization Algorithm Under the Analysis of SINR and Probability of Connectivity
The knowledge of the optimum number of base station is the most important parameter when designing wireless communication systems; as this assures quality of service. While stochastic geometry was ...Authors: Twahir Kazema
Year Published: Sep. 2018 | 180-188 | IJDIWC | Vol. 8 No. 3 -
Thermal and Electrical Load Management in Smart Home Based on Demand Response and Renewable Energy Resources
In Smart grids, the implementation of demand response in residential area has a significant importance and help the integration of renewable energy resources and electric vehicles. The current paper ...Authors: Fady Y. MELHEM, Olivier GRUNDER, Zakaria HAMMOUDAN, Nazih MOUBAYED
Year Published: Sep. 2018 | 189-194 | IJDIWC | Vol. 8 No. 3 -
An Intelligent Routing Protocol Based on DYMO for MANET
in this paper, intelligent routing protocols for mobile ad-hoc networks (MANET) will be proposed .Depending on the concepts of fuzzy and neural networks. The goal is to get good quality service by ...Authors: Rushdi A. Hamamreh, Omar I. Salah
Year Published: Sep. 2018 | 195-202 | IJDIWC | Vol. 8 No. 3 -
A Conceptual Development Of Cyberpreneurs Intention Among Higher Education Students
Cyberpreneurs intention has been an important element to cyber entrepreneurship (cyberpreneurship) activities in a new venture of business technology. Cyberpreneurship has a substantial potential to ...Authors: Salini Aina Mamat, Zailani Abdullah, Wan Ahmad Amir Zal Wan Ismail, Shahaliza Muhammad, Mat Redhuan bin Samsudin
Year Published: Sep. 2018 | 203-208 | IJDIWC | Vol. 8 No. 3 -
A Policy-based Mechanism for restricting Execution of malicious apps in Android Smartphone
Android is the most widely accepted and used open source Operating System (OS) developed and supported by Google. Compared to other OS, the source code of Android OS can be modified by users to ...Authors: Sanjeev Kumar Dwivedi, K.Muthumanickam, Ankur Singh Bist,Dr.P.C.Senthil Mahesh
Year Published: Sep. 2018 | 209-213 | IJDIWC | Vol. 8 No. 3 -
An Energy-Efficient Clustering Routing Protocol for WSN based on MRHC
currently the world is adopting Internet of Things (IoT) as the future technology and the interest IoT development is increasing. As it’s expected to be the leading technology by 2022 according to ...Authors: Rushdi A. Hamamreh, Moath M. Haji, Ahmad A. Qutob
Year Published: Sep. 2018 | 214-222 | IJDIWC | Vol. 8 No. 3 -
An Evaluation of RFID Security Systems for Tracking of Parcels in Kenya
Postal Corporation of Kenya (PCK), also known as Posta, and other courier service providers’ deliveries have always been governed by fair user policy (FUP) to safeguard on the operational ethics. ...Authors: Samuel Odoyo Nyiendo, Collins Oduor Ondiek
Year Published: Dec. 2018 | 223-231 | IJDIWC | Vol. 8 No. 4 -
Genetic and Firefly algorithm in Instance and Feature Selection: An Approach for Malware Detection
Instance selection is used to extract useful data from actual data samples in order to enhance the predictive performance. Feature selection is used to select important features from dataset. In an ...Authors: Ankur Singh Bist
Year Published: Dec. 2018 | 232-238 | IJDIWC | Vol. 8 No. 4 -
E-Government as an Anti-Corruption Tool in Yemen: Citizens Perspective
Corruption is one of the main challenges in government in developing countries. , it has been considered as one of the most prevalent and persistent Obstacles in improving economic growth and ...Authors: Ikhlas Alhammadi
Year Published: Dec. 2018 | 239-252 | IJDIWC | Vol. 8 No. 4 -
Geoclimatic Factor K Mapping in Nigeria through Spatial Interpolation
The most important component of all methods for approximating multipath outage probability on terrestrial microwave line-of-sight links (LOS) is the deep fading prediction method. Many of these ...Authors: M.O. Olla, I.B. Oluwafemi
Year Published: Dec. 2018 | 253-259 | IJDIWC | Vol. 8 No. 4 -
Radio Resource Allocation in PD-NOMA based HCN System Considering CoMP Technology
In this paper, a downlink resource allocation (RA) optimization problem is investigated in heterogeneous cellular network (HCN) which is based on power domain - nonorthogonal multiple access ...Authors: Mohammad Moltafet, Ali Mokdad, Paeiz Azmi, Nader Mokari
Year Published: Dec. 2018 | 260-264 | IJDIWC | Vol. 8 No. 4 -
The Growing Effect of Cloud Computing on Technological Innovation: A Decision- Making Framework for Hybrid Managers
Innovative companies must continually weave together technology, design, marketing and other key specialties into whole products and technology platforms. Innovation management is about creating and ...Authors: Karim Mualla
Year Published: Dec. 2018 | 265-279 | IJDIWC | Vol. 8 No. 4 -
Building a Generic Big Data Analytics Framework for E-commerce in Developing Countries
In the current era, big data have developed in many development areas of certain computing technologies. The big data analytics present broad range of benefits to the developing countries in ...Authors: Christina Albert Rayed Assad
Year Published: Dec. 2018 | 280-287 | IJDIWC | Vol. 8 No. 4 -
Implementation and Analysis of Fully Homomorphic Encryption in Resource-Constrained Devices
Currently, resource-constrained devices, which are known as one of the Internet of things (IoT) devices, have been widely used for healthcare systems. Most healthcare systems store users’ health ...Authors: Amonrat Prasitsupparote, Yohei Watanabe, Junichi Sakamoto, Junji Shikata, Tsutomu Matsumoto
Year Published: Dec. 2018 | 288-303 | IJDIWC | Vol. 8 No. 4 -
Development of interface of hydroponic culture management system using AR
In recent years, technology combining IT with existing ones has attracted attention. In this laboratory, we focused on hydroponic cultivation and proposed a new hydroponic cultivation management ...Authors: Masaki Sekimoto, Kazuo Ikeshiro, Hiroki Imamura
Year Published: Dec. 2018 | 304-309 | IJDIWC | Vol. 8 No. 4 -
A Proposal of a 3-Dimensional Object Recognition Method Using Color-SHOT and List Matching
In recent years, robots that support the lives of people are collectively referred to as life support robots. This robot is required to perform various tasks to support the human. Especially, objects ...Authors: Hiroyuki KUDO, Kazuo IKESHIRO, Hiroki IMAMURA
Year Published: Dec. 2018 | 310-320 | IJDIWC | Vol. 8 No. 4 -
Refutation of Artificial Intelligence’ Myth "Artificial Intelligence will ultimately replace human employees " (Reality and Fiction)
Always with the technology’s developments there are many myths going around between people. The artificial intelligence (AI) is not excluded from that. The biggest myth is that Artificial ...Authors: Arwa Y. Aleryani
Year Published: Mar. 2019 | 1-7 | IJDIWC | Vol. 9 No. 1 -
Improvement of Mitigation Techniques against SYN Flood Attack for Free and Open Source Firewalls
Firewalls are very potential solutions to network security. Cyber-attacks have been seriously impacting technology operations and security applications which support many business processes and ...Authors: Kosmas Kapis, Davis Nico Kyando
Year Published: Mar. 2019 | 8-21 | IJDIWC | Vol. 9 No. 1 -
Modeling the Traffic Load of Selected Key Parameters for GSM Networks in Nigeria
Global System for Mobile Communications (GSM) enabled voice traffic to go wireless, with the number of mobile phones tripled the number of landline ones, and the mobile phone penetration going beyond ...Authors: G.S.M Galadanci, S. B. Abdullahi, A. U. Usman
Year Published: Mar. 2019 | 22-32 | IJDIWC | Vol. 9 No. 1 -
Adoption of Extended RBV Model in Information Systems Technology, Processes and People’s Value Chain in Postal: A Case of Postal Corporation of Kenya
The study reviews the adoption of extendable resources-based view business concept for improved efficiency in postal and courier processes in Kenya. The paper compares service delivery ...Authors: Samuel Odoyo Nyiendo, Amos Omamo
Year Published: Mar. 2019 | 33-43 | IJDIWC | Vol. 9 No. 1 -
A Non-Rigid Force Sense Presentation Method for a Finger-Mounted Type Haptic Device
Recently, several researches of haptic devices have been conducted. Haptic devices provide users with a sense of touching virtual objects such as Computer Graphics (CG) by force feedback. Since they ...Authors: Koshiro Tsukamoto, Kazuo Ikeshiro, Hiroki Imamura
Year Published: Mar. 2019 | 44-49 | IJDIWC | Vol. 9 No. 1 -
Comparison of Power Law of Street Sections/Blocks in Towns
This paper discusses the comparison of residential/ business street sections/blocks from the view point of the distributions on the boundary line lengths in typical world towns, and presents their ...Authors: Yukitaka Kobayashi, Takahiro Suzuki, Mitsuru Usui, Isamu Shioya
Year Published: Mar. 2019 | 50-60 | IJDIWC | Vol. 9 No. 1 -
Design and Implementation of Multipurpose Radio Controller Unit Using nRF24L01 Wireless Transceiver Module and Arduino as MCU
Nowadays wireless technology is one of the most common technologies used in our day to day life. As wireless technology is very much easier to implement rather than wired, day by day its application ...Authors: Mobasshir Mahbub
Year Published: Jun. 2019 | 61-72 | IJDIWC | Vol. 9 No. 2 -
Development of an Algorithm for Optimizing Array Antenna Elements for Cellular Networks Using Evolutionary Computation
The discussion on a number of important issues and the state-of-the-art development of the model for optimizing antenna array element was done. An optimal radiation pattern as well as minimum side ...Authors: Twahir Kazema, Kisangiri Michael
Year Published: Jun. 2019 | 73-89 | IJDIWC | Vol. 9 No. 2 -
A Review on the State of the Art for Failure Diagnosis and Prognosis Techniques for Wind Conversion System.
Due to gradual depletion of fossil energy resources and the increasingly serious issue of environmental pollution, the scale of renewable energy has been increasing. The demand for wind energy has ...Authors: Anissia Beainy, Chantal Maatouk, Nazih Moubayed, Fouad Kaddah
Year Published: Jun. 2019 | 90-112 | IJDIWC | Vol. 9 No. 2 -
Evaluation of Authentication and User Identication on Simultaneous Session Limitation Mechanism
Responsiveness of Web servers is lowered when they are overloaded caused by a lot of requests from clients. Moreover, Web servers are required to be not only available but also stable responsiveness ...Authors: Ryo SHIBAHARA, Keizo SAISHO
Year Published: 2019 | 113-123 | IJDIWC | Vol. 9 No. 2 -
A Revocable Attribute-based Cloud Security for Data Access using Encryption and Biometric Identification
Cloud computing is an emerging technology in which it has been used to provide an efficient solution for the affordable, trustable, and fastest storage and retrieval of the information. The only ...Authors: Safarian Nejad Maryam, Mohammad V. Malakooti, Navid Hashemi Taba
Year Published: Sep. 2019 | 137-142 | IJDIWC | Vol. 9 No. 3 -
A Cooperative Spectrum Sensing Scheme Based on Compressive Sensing for Cognitive Radio Networks
In this paper, a cooperative spectrum sensing scheme based on compressive sensing is proposed. In this scheme, secondary users (SUs) are organized in clusters. In each cluster, SUs forward their ...Authors: Fatima Salahdine, Elias Ghribi, Naima Kaabouch
Year Published: 2019 | 124-136 | IJDIWC | Vol. 9 No. 2 -
An Application-centric Trust Management Framework for Mobile Ad Hoc Networks
Trust is an important computer network concept and remains an issue not just in social platforms but also in networks in delivering Quality of service (QoS). Video Streaming has, over the years ...Authors: Thulani Phakathi, Francis Lugayizi, B. Esiefarhenrhe, Bassey Isong
Year Published: Sep. 2019 | 143-156 | IJDIWC | Vol. 9 No. 3 -
Implementation of Proof of Retrievability on the Cloud
Data integrity is among the important aspects for the clients to make full use of the benefits brought by the use of cloud computing. However, clients are worried of the protection of their ...Authors: Kosmas Kapis, Baraka Mwasampeta
Year Published: Sep. 2019 | 157-164 | IJDIWC | Vol. 9 No. 3 -
The Impact of the User Experience (UX) on the Quality of the Requirements Elicitation
The present study aims to examine the advantages of the user experience (UX) and its impact on raising the efficiency of the systems analyst to understand the requirements of the user correctly and ...Authors: Arwa Y. Aleryani
Year Published: Mar. 2020 | 1-9 | IJDIWC | Vol. 10 No. 1 -
Efficient FPGA Implementation of Lightweight Authenticated Encryption and Authenticated Key Distribution Methods for IoT Security
Internet of Things applications are expanding in various fields. The number of connected smart objects are tremendously increasing. Consequently, volume of transmitted sensitive data using ...Authors: Abiy Tadesse Abebe
Year Published: Sep. 2019 | 165-186 | IJDIWC | Vol. 9 No. 3 -
Revocable Attribute based Cloud Security for Data Access using Encryption and Biometric Identification
Cloud computing is an emerging technology in which it has been used to provide an efficient solution for the affordable, trustable, and fastest storage and retrieval of the information. The only ...Authors: Maryam Safarian Nejad, Mohammad V. Malakooti, Navid Hashemi Taba
Year Published: Dec. 2019 | 187-192 | IJDIWC | Vol. 9 No. 4 -
A Study for Development of Home Appliances Identification Method using Load Current
Among the advanced countries, especially in Japan, we are facing on the decreasing birthrate and aging population ahead of the world. In recent, population of single-living elder, and elderly people ...Authors: Kaisei OKINISHI, Shinji TSUZUKI, Masatsugu HIRANO, Masashi SUGIMOTO
Year Published: Dec. 2019 | 193-202 | IJDIWC | Vol. 9 No. 4 -
A Study for Development of Route Prediction Method for Vessel using Machine Learning
Nowadays, vessels such as cargo vessels, ferries, and fishing boats are constantly coming and going on all over the sea. On the other hands, unfortunately, collisions among vessels account for about ...Authors: Jumpei MATSUE, Kotetsu KAWAKAMI, Ryota ISOZAKI, Shunsuke INADA, Masashi SUGIMOTO, Shinji TSUZUKI, Kazuhiko NAGAO
Year Published: Dec. 2019 | 203-207 | IJDIWC | Vol. 9 No. 4 -
A Context-Aware Clustered Routing Approach for Video Transmission over VANETs with Long Lifetime Neighbourhood
This paper conducts a new context-aware clustered routing approach for video transmission over VANETs (CACVANET) that tries to make vehicles communicate with each other using a context-aware concept ...Authors: Ammar Thabit Zahary, Rim Fatoan Al-Shaibani
Year Published: Mar. 2020 | 10-20 | IJDIWC | Vol. 10 No. 1 -
Utilization of the Fast Discrete Curvelet Transform in the OFDM System
With the high demand for high data rates, there is also a need to develop more efficient wireless communication systems so Orthogonal frequencydivision multiplexing (OFDM) was one of the options ...Authors: Mohamed H. M. Nerma
Year Published: Jun. 2020 | 21-28 | IJDIWC | Vol. 10 No. 2 -
Investigating the Efficiency of Secret Key Encryption Algorithms with similar key length and block size
A secure communication over the web is being provided by encryption algorithms and so they still play a serious role in any security system. However, a substantial amount of your time and resources ...Authors: Tabu S. Kondo
Year Published: Jun. 2020 | 29-34 | IJDIWC | Vol. 10 No. 2 -
Resource Discovery Classification for Internet of Things: a Survey
Internet of Things (IoT) is widely implemented in applications that require immediate interaction and fast response. Resource discovery is an essential step in any IoT system where the resource can ...Authors: Mohamed Y. Elmahi, Niemah I. M. Osman, Haitham S. Hamza
Year Published: Sep. 2020 | 35-50 | IJDIWC | Vol. 10 No. 3 -
Performance Assessment of 5G Wireless Access for Development in Sub-urban Center of Lake-Zone Region; the Case of Mwanza Tanzania
With the increase of wireless services, 5G is expected to mitigate the throughput challenges that exist in the previous generations. It is in this context, planning a fixed 5G wireless access link ...Authors: Twahir Kazema, Bonny Mgawe
Year Published: Dec. 2020 | 51-57 | IJDIWC | Vol. 10 No. 4 -
Evaluating the Impact of Regulations and Alliances on the Sixth Generation of Technology and Innovation Management
Technology management in recent years has proven that today’s success is the enemy of tomorrow's success. Recent technology management examples show that the unstable, and rapidly evolving ...Authors: Karim Mualla, Sameen V. Puri, Krishan Raithatha
Year Published: 2021 | 1-11 | IJDIWC | Vol. 11 No. 1 -
Innovative Architectural Framework Design for an Effective Machine Learning Based APT Detection
Generating regular rules to be passed to different security appliances set within the work environment, is a stressing job to be carefully set; since even the data bouncing and the data collision ...Authors: Mourad M.H Henchiri, Sharyar Wani
Year Published: 2021 | 12-22 | IJDIWC | Vol. 11 No. 1 -
On power allocation for congestion control into NR 5G V2V
The main challenging issue in vehicular communication is the traffic jam which implies interferences towards awareness messages exchange between vehicles. Furthermore, the great increase of traffic ...Authors: Houda CHIHI Ridha BOUALLEGUE, Ahmed ASHORA
Year Published: Jun. 2021 | 23-28 | IJDIWC | Vol. 11 No. 2 -
Planning and IT Solution Definition for Telecommunication BPO Enterprises Viewing the IT Environment Restructuring and VoIP Support
The present work offers the creation of an IT solution to a fictitious company called SMART CONEX, located in the city of Campinas – SP, Brazil. This company is an integrator with specialization in ...Authors: Daniel Katz Bonello, Yuzo Iano, Umberto Bonello Neto
Year Published: Jun. 2021 | 29-45 | IJDIWC | Vol. 11 No. 2 -
Classification of Eye Refractive Error using Classifier-Fusion
Classifying eye refractive error is always challenging due to several factors including the selection of the right classifier. Similarly, correct classification of refractive error is very much ...Authors: Sallam Osman Fageeri, S M Emdad Hossain, Arockiasamy Soosaimanickam
Year Published: 2021 | 46-52 | IJDIWC | Vol. 11 No. 3 -
Micro Text Messaging as a Flipped Learning Approach within a Hybrid Learning Atmosphere
Nelson Mandela had said that the success of a country is based on the quality of its education. Today, information and communication technologies are essential parts of educational progressions. ...Authors: Nauman Ahmad
Year Published: 2021 | 53-63 | IJDIWC | Vol. 11 No. 3 -
Disassembly and detection of self-modifying malicious software
There are many risks associated with IT security. Computer users want to protect their privacy data. Businesses run the risk of losses from disclosure of their intellectual property or trade secrets. ...Authors: Mourad M.H Henchiri, Sharyar Wani
Year Published: 2021 | 64-74 | IJDIWC | Vol. 11 No. 4 -
Data at rest analysis for an APT detection Treatment of code overlap by static analysis
Computer users want to trespass the risks towards their private data. It is required to scan as much code as possible in order to approximate the perfect control flow graph. It is then necessary to ...Authors: Mourad M.H Henchiri, Sharyar Wani
Year Published: 2021 | 75-80 | IJDIWC | Vol. 11 No. 4 -
Numerical Analysis of Next-Generation Wireless Networks Using Modified PLS-SEM Model
In this paper, three constructs are initialized in conventional Structural Equation model (SEM) to minimize large-scale extensive pre-deployed model simulations in wireless networks while observing ...Authors: A.U USMAN, S.B. ABDULLAHI, Z. ABDULLAHI, K. TUKUR, A. MUHAMMAD, R.S. ALKASSIM & A.H. IBRAHIM
Year Published: 2022 | 1-14 | IJDIWC | Vol. 12 No. 1