SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The International Conference on Computing, Networking and Digital Technologies (ICCNDT2012)
-
SIMULATION STUDY OF N-ZNO/P-SI HETERO-JUNCTION SOLAR CELL
In this paper the simulation program SCAPS–1.0 is used to study the structure of n-ZnO/p-Si hetero-junction solar cell. This program is designed basically for the simulation and studying the ...Authors: Alexender Demetrech Pogrebnyak, Khalaf Hassn Ali, Abid al kareem Muhammed
Year Published: 2012 | 1-7 | ICCNDT2012 -
IDENTIFICATION OF AN ACCEPTABLE NONLINEAR MODEL USING OPTIMIZATION OF LINEAR IDENTIFICATION AND ARTIFICIAL NEURAL NETWORKS
Today, there is a great interest in various fields to develop better model description of real systems. In this paper we applied two identification procedures for the nonlinear ...Authors: Elfituri Lahmer, Ahmed. G. Abogarir , Abd hamed M.Alcrewi
Year Published: 2012 | 8-18 | ICCNDT2012 -
DOCUMENT SIGNING BASED ON ANTI SPOOFING BIOMETRIC (FACE) KEYS
As commercial environment becomes big, an online secured document exchange, secured bank transactions, and other e-commerce requirements need to be protected. Digital signature (DS) ...Authors: Ahmed Elmadani
Year Published: 2012 | 19-26 | ICCNDT2012 -
BRIDGING THE GAP BETWEEN GAMING AND GAMBLING. USER BEHAVIOR IN THE CONTEXT OF MOBILE GAMES WITH REGARD TO MONETARY OR NON-MONETARY GAMING MOTIVES
In this paper we present the development of a research model of mobile gaming acceptance that includes a motivational point of view regarding monetary and non- monetary incentives. A set of twelve ...Authors: Elisabeth Pergler, Thomas Wernbacher
Year Published: 2012 | 27-37 | ICCNDT2012 -
SIMULATION AND EVALUATE THE PERFORMANCE OF GROVER’S ALGORITHM WITH RESPECT TO CLASSICAL ALGORITHM
Quantum computing uses the harness of atoms and molecules to perform information processing. We have already known about how our classical computer performs operation on data. There ...Authors: Md Adit Hasan, Atahar Hossain, Jahangir Kabir
Year Published: 2012 | 38-43 | ICCNDT2012 -
COMBINING THINNING ALGORITHM WITH SHOCKING FILTERS FOR POSITRON EMISSION TOMOGRAPHY IMAGE RESOLUTION ENHANCEMENT
In this paper, we present an image de-blurring algorithm for Positron emission tomography (PET). PET medical image is fuzzy and blurred. The PET image needs to enhance in order to ...Authors: Hanan Bayyoumi, Hala Ebied, Gamal Seleam
Year Published: 2012 | 44-54 | ICCNDT2012 -
FUZZY LOGIC BASED ADAPTIVE UPDATE MECHANISM FOR ROUTING INFORMATION PROTOCOL
Routing Information Protocol is one of the oldest in- terior gateway routing protocols which is still being used in a lot of small networks. An important feature of this protocol is that periodic ...Authors: Shaleeza Sohail, Aasia Khannum
Year Published: 2012 | 55-60 | ICCNDT2012 -
USING THE ENVI-MET PROGRAM TO SIMULATE THE MICRO CLIMATE IN NEW TOWN HASHTGERD
ENVI-met is a computer program to simulate the microclimate in urban environment. It is a helpful program to simulate the urban climate in cities and can assist for ...Authors: Ines Langer, Sahar Sodoudi and Ulrich Cubasch
Year Published: 2012 | 61-64 | ICCNDT2012 -
BIO-INSPIRED ALGORITHMS FOR COVERAGE EFFICIENCY IN WIRELESS SENSOR NETWORKS
A wireless sensor network (WSN) generally consists of a large number of inexpensive power constrained sensors that are small in size and communicate over short distances to perform ...Authors: Suat Ozdemir, Bara'a Attea, Onder Khalil
Year Published: 2012 | 65-73 | ICCNDT2012 -
EMOTIONAL INTELLIGENCE BASED ON EMPATHY NEUROLOGY FOR VISUAL STRESS STUDY USING INTELLIGENT AGENTS PARADIGM
This article shows the progress of brain signals interpretation which identify primary emotions, using empathy neurological basis, on the visual stress environment, such behavior is ...Authors: Arnulfo Alanis, Miguel Angel Lopez, Bogart Yail Marquez, Jose Sergio Magdaleno-Palencia, Karina Romero
Year Published: 2012 | 74-82 | ICCNDT2012 -
ORGANIZATIONAL e-READINESS; AN AUDIT PERSPECTIVE
This paper discuss the importance of e- readiness assessment in a structured and quantitative way that contains relevant and valid criteria to assess readiness within ...Authors: Aqel Aqel
Year Published: 2012 | 83-94 | ICCNDT2012 -
WIRELESS MONITORING USING CELLULAR NETWORKS
Remote monitoring exists ever since the communication and wireless sensor technology innovation took place. But, it did not reach the masses. Mobile cellular networks made it easy ...Authors: Akram Aburas, Khalid Al-Mashouq, Zeyad Alhekail
Year Published: 2012 | 95-100 | ICCNDT2012 -
CONTENT BASED FACE IMAGE RETRIEVAL IN WALSH HADAMARD TRANSFORM (WHT) DOMAIN
This paper investigates the problem of features selection, for Content Based Face Image Retrieval in Walsh Hadamard Transform (WHT) domain. The face image features extraction in the ...Authors: W.S. Besbas, M.A. Artemi, R.M. Suliman, M.M. AL_Rjebi
Year Published: 2012 | 101-106 | ICCNDT2012 -
PROXY SIGNATURE SCHEME FOR WARRANT PARTIAL DELEGATION
A proxy signature scheme is a variation of the ordinary digital signature scheme which enables a proxy signer to generate signatures on behalf of an original signer. In this paper, ...Authors: Sattar Aboud, Mohammad Al-fayoumi
Year Published: 2012 | 107-113 | ICCNDT2012 -
PERSON IDENTIFICATION PROTOTYPE USING HAND GEOMETRY
This paper describes our recent research work on hand-based person identification. The main focus is on the use of geometrical characteristics of the hand in the identification process. ...Authors: Abdelhamid Abdesselam, Ameera Al-Busaidi
Year Published: 2012 | 114-122 | ICCNDT2012 -
EMAIL SPAM IN SAUDI ARABIA AND HOW DO END USERS DEAL WITH IT?
This paper presents the results of a survey of email users in Saudi Arabia about email SPAM. The survey investigated the nature of email SPAM, how email users dealt with it, and the efforts ...Authors: Hasan Alkahtani, Paul Gardner-Stephen, Robert Goodwin
Year Published: 2012 | 123-135 | ICCNDT2012 -
OPTIMAL QOS AWARE MULTI-PATH WEB SERVICE COMPOSITION USING HEURISTICS ALGORITHM AND DATA MINING
In QoS aware service composition, specifically in multiple execution paths compositions, how can we produce optimal composite services that satisfy QoS requirements supplied by ...Authors: Osama Qtaish, Zulikha Jamaludin, Massudi Mahmuddin
Year Published: 2012 | 136-141 | ICCNDT2012 -
SOLVING THE MAXIMUM CLIQUE PROBLEM USING INTELLIGENT WATER DROPS ALGORITHM
In this study, we propose an Intelligent Water Drops (IWDs) approach is to solve the Maximum Clique problem (MCP). The IWDs algorithm is considered as one of the newest ...Authors: Ahmad Al-Taani, Mohammad K. Nemrawi2
Year Published: 2012 | 142-151 | ICCNDT2012 -
DOMAIN REQUIREMENTS MODELING FRAMEWORK FOR CROSS-DISCIPLINARY SERVICE SYSTEMS DEVELOPMENT
This paper introduces Domain Requirement Modeling to improve the understanding of domain requirements acquisition for cross- disciplinary IT-service systems developments. The Domain ...Authors: Sankha Amarakoon, Ajantha Dahanayake, Bernhard Thalheim
Year Published: 2012 | 152-166 | ICCNDT2012 -
PERFORMANCE ENHANCEMENT OF OFDM SYSTEM
An Orthogonal frequency division multiplexing (OFDM) is a multicarrier communication technique, which has received a lot of attention in the last few years. This is due to its ability to ...Authors: Farouk Al-fuhaidy, Mahdi Shagloof, Hossam Eldin Hassan
Year Published: 2012 | 167-175 | ICCNDT2012 -
VISUAL ANALYSIS OF TIME AND LOCATION DEPENDENT DATA ON THE MAPS
Advances in satellite end map technology have provided various opportunities such as analysis and interpretation of time and location dependent data. In this study, graphical tools ...Authors: Suleyman Eken, Ahmet Sayar
Year Published: 2012 | 176-182 | ICCNDT2012 -
AN AGENT-BASED FRAMEWORK FOR ENHANCING THE AVAILABILITY OF WEB SERVICES
Applications based on Web service technology have witnessed rapid growth in recent years. This may be attributed to maturity of a wide range of specifications developed to ...Authors: Manoj Lall, John van der Poll, Lucas Venter
Year Published: 2012 | 183-196 | ICCNDT2012 -
NEW APPROACH FOR INITIAL DETECTION OF POWER QUALITY DISTURBANCES BASED ON CONTINUOUS S-TRANSFORM (CST)
This paper produces a new approach for power quality analysis using a windowing technique based on Continuous S-transform (CST). This half-cycle window technique approach can detect ...Authors: K. Daud, A. Abidin, N. Hamzah, H. Singh
Year Published: 2012 | 197-201 | ICCNDT2012 -
SOFTWARE SIMULATION THE HYBRID DISPERSION COMPENSATION SCHEMES BASED ON THE 16 × 40Gb/s DWDM USING RZ MODULATION FORMAT
In this paper the hybrid dispersion compensation schemes with 16 × 40Gbps using RZ modulation format over standard single mode fiber (SSMF) link based on DWDM optical network ...Authors: Essa Ibrahim Essa
Year Published: 2012 | 202-208 | ICCNDT2012 -
USING SOLID STATE DISKS FOR HPC APPLICATIONS
This paper aims to analyze the behavior of SSDs in a HPC context. The characteristics of HPC applications are captured from real and long term HPC running applications, then they are used to generate ...Authors: Soraya Zertal
Year Published: 2012 | 209-217 | ICCNDT2012 -
NEW RANDOM MOTION GENERATOR FOR WIRELESS MOBILE NETWORK SIMULATOR NS2
Simulation of mobile networks requires reliable movement generation. Random movement pattern is frequently used in simulators. We investigate the performance of the popular setdest ...Authors: Raid Alghamdi, John DeDourek, Przemyslaw Pochec
Year Published: 2012 | 218-224 | ICCNDT2012 -
EXTENSIONS TO THE DESCARTES SPECIFICATION LANGUAGE FOR THE DEVELOPMENT OF REAL-TIME OBJECT ORIENTED SYSTEMS
Traditionally, real-time system software focuses on low-level programming techniques to increase timeliness and operate within constraints; however, more recently higher-level, object-oriented ...Authors: Benjamin Horne, Vinitha Hannah Subburaj, Joseph Urban
Year Published: 2012 | 225-236 | ICCNDT2012 -
PERFORMANCE ANALYSIS OF CALL ADMISSION CONTROL IN WCDMA FOR CELLULAR SYSTEM
The quality of service (QoS) is a key element in the communication system; many call admission control algorithms are being used to improve the performance of the system as well as the ...Authors: Wail Hadi, Ghaidaa Salih
Year Published: 2012 | 237-244 | ICCNDT2012 -
ARABIC EMAIL SPAM DETECTION TECHNIQUES AND RELATED ARABIC TEXT PREPROCESSING OPTIONS: A SURVEY
Email spam is a huge problem for every user of email application, irrespective of the language used for sending emails. For filtering English spam emails a large number of ...Authors: Shaleeza Sohail, Elham Hassanain
Year Published: 2012 | 245-254 | ICCNDT2012 -
DESIGNING A MOBILE APPLICATION TESTING MODEL
In order to ensure that the software developed is at its highest quality, testing should be done all throughout the software life cycle and should start as early as possible. ...Authors: Tan Ping Ping, Hamizan Sharbini, Wee Bui Lin
Year Published: 2012 | 255-260 | ICCNDT2012 -
LANGUAGES FOR THE PUBLICATION AND DISCOVERY OF CONTEXT-DEPENDENT SERVICES
FrSeC is a framework for the provision and composition of trustworthy context-dependent services. To support FrSeC, this paper introduces the ConfiguredService Description Language ...Authors: Naseem Ibrahim, Ismail Al-Ani
Year Published: 2012 | 261-272 | ICCNDT2012 -
TOWARDS A FORMAL DEFINITION OF AVAILABILITY OF WEB SERVICES
The utilization of a Web services based application depends not only on meeting its functional requirements but also its non- functional requirements. Availability is among the ...Authors: Manoj Lall, John van der Poll, Lucas Venter
Year Published: 2012 | 273-284 | ICCNDT2012 -
BUILDING A DIGITAL FORENSIC LABORATORY FOR AN EDUCATIONAL INSTITUTE
The fast growing rates of cyber crimes in recent years has raised the need for qualified digital crime investigators to be on high demand. At the present, various educational institutions start to ...Authors: Mousa Al Falayleh
Year Published: 2012 | 285-293 | ICCNDT2012 -
DESCRIPTION LOGICS FOR CONTENT-BASED INDEXING AND RETRIEVAL OF VIDEO SURVEILLANCE
The paper presents The VIGILANT model which uses description logics to enhance object model for content and event-based indexing and retrieval of video surveillance. Annotations and ...Authors: Farhi Marir
Year Published: 2012 | 294-305 | ICCNDT2012 -
CASE-BASED REASONING FOR AN ADAPTIVE WEB USER INTERFACE
This paper presents the design and development of a widget (CBaUI) which resides on top of a web user interface and which uses case-based reasoning paradigm to model the user ...Authors: Farhi Marir
Year Published: 2012 | 306-315 | ICCNDT2012 -
AN ENHANCED VR INTERFACE FOR ONTOLOGY-BASED INTEGRATED CONSTRUCTION INFORMATION
This paper presents the mapping of an exist- ing OSCON integrated object model into construction domain ontology within seman- tic web. For the main reasons that web se- mantic ontology ...Authors: Farhi Marir, Ghassan Aouad
Year Published: 2012 | 316-326 | ICCNDT2012 -
ENTERPRISE NETWORK ANALYSIS: A CASE STUDY OF THE KUWAIT CIVIL SERVICE COMMISSION COMPUTER NETWORK
The Kuwait Civil Service Commission (KCSC) built an enterprise to allow clients to access those systems. This network covers two buildings: Headquarters (HQ) and Disaster ...Authors: Abdullah Alnusef, Muhanned Alfarras
Year Published: 2012 | 327-334 | ICCNDT2012 -
FEATURE SPACES AND MACHINE LEARNING REGIME FOR AUDIO CONTENT CLASSIFICATION AND INDEXING
Rapid advancement in computer science and internet technology has resulted in a large volume of media files including broadcasted radio, television, recorded meetings, and voice ...Authors: Muhammad Al-Maathidi, Francis F. Li
Year Published: 2012 | 335-347 | ICCNDT2012 -
BARRIERS TO SOCIAL NETWORK SITE (SNS) USE IN EDUCATION
Social Networking Sites (SNSs), particularly Facebook, which has captured the largest market share, continue to grow in popularity. Approximately ¾ of all online adults maintain at ...Authors: Alan Weber
Year Published: 2012 | 348-358 | ICCNDT2012 -
REMOTE VISUALIZATION USING 2D ARRAY OF IMAGES
Interactive distributed visualization is an emerging technology with numerous applications. However, many of the present approaches to interactive distributed visualization have limited ...Authors: Asma Al-Saidi
Year Published: 2012 | 359-363 | ICCNDT2012 -
AUTOMATIC GENERATION OF FUZZY PAYOFF MATRIX IN GAME THEORY
In fact, all the updated available research on game theory consider only the explicitly playoff matrix; where both opponents are assumed to be very clever such that the strategies of each ...Authors: Farhan Al Ani, Muhanned Alfarras
Year Published: 2012 | 364-368 | ICCNDT2012