SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The Third International Conference on Digital Information Processing and Communications (ICDIPC2013)
-
A NOVEL ENCRYPTION STANDARD (DES) WITH TIME HOPPING SEQUENCE FOR RFID SYSTEM
This paper presents a novel authentication and encryption method for an RFID system. In this paper, DES (Data Encryption Standard), algorithm will be used to encrypt and verify accuracy data within ...Authors: Mohamed Mostafa Abd Allah, Gasim Alandjani
Year Published: 2013 | 1-7 | ICDIPC2013 -
ATTESTED GENUINENESS IN SERVICE ORIENTED ENVIRONMENTS
Authentication merely proves the identity of the parties during a SOA transaction. In order to trust the bona fide conduct of an operation there is also a need for trusting the software. The ...Authors: Anders Fongen, Federico Mancini
Year Published: 2013 | 8-17 | ICDIPC2013 -
HOW TO VIOLATE ANDROID’S PERMISSION SYSTEM WITHOUT VIOLATING IT
Android uses permissions for application security management. Android also allows inter-application communication (IAC) which enables cooperation between different applications to perform complex ...Authors: Kyoung Soo Han, Yeoreum Lee, Biao Jiang, Eul Gyu Im
Year Published: 2013 | 18-25 | ICDIPC2013 -
BOSF: BY-OWNER SCRIPT FILTERING
Cross-Site Scripting (XSS) attacks are one of the most prevalent security threats all over the world. Although various defense methods have been proposed, most of them lack usability. Motivated by ...Authors: Jungtae Kim, Kyoung-Soo Han, Biao Jiang, Eul Gyu Im
Year Published: 2013 | 26-30 | ICDIPC2013 -
ARBITRATED MULTIPARTY PROTOCOL
Assume that several people wish to have a meeting. For this to happen, they usually have to meet somewhere. If they cannot meet physically, then they can take part in a video (or audio) conference ...Authors: Khalil Challita
Year Published: 2013 | 31-36 | ICDIPC2013 -
A NOVEL METHOD FOR SECURE IMAGE DELIVERY OVER MOBILE NETWORKS BASED ON ORTHOGONAL TRANSFORMS AND SCRAMBLING ALGORITHMS
We have presented a novel method for secure image delivery over the mobile networks. Our method is based an Orthogonal Transform, Malakooti Orthogonal Transform (MOT), as well as Malakooti-Saffari ...Authors: Mohammad Malakooti, Vahid Saffari, Tawfik Saeed Zeki
Year Published: 2013 | 37- 41 | ICDIPC2013 -
IMAGE RECOGNITION METHOD BASED ON DISCRETE WAVELET TRANSFORM (DWT) AND SINGULAR VALUE DECOMPOSITION (SVD)
The search for one digital image among the vast quantity of images is a real dilemma when it is based on image content rather than metadata such as eigenvalues or frequency coefficients. The search ...Authors: Mohammad Malakooti, Zahed FerdosPanah, Seyyed Mohsen Hashemi
Year Published: 2013 | 42-47 | ICDIPC2013 -
PERFORMANCE ANALYSIS UNDER IMPERFECT CHANNEL STATE INFORMATION AND INTER-CELL INTERFERENCE IN LTE-ADVANCED SYSTEM
The standardization of Long Term Evolution–Advanced (LTE–Advanced) is based on orthogonal frequency division multiple access (OFDMA) and multiple–input multiple–output (MIMO) technologies. In ...Authors: Hunbae Kim, Sanggoo Kim, Kyungkook Cho, Dong-il Lee and Dongweon Yoon
Year Published: 2013 | 48-51 | ICDIPC2013 -
A NOVEL DATA COMPRESSION AND SUPPRESSION METHOD BASED ON DCT AND OVERLAPPING FOR THE WIRELESS SENSOR NETWORKS (WSN)
This paper presents a robust and optimized data compression and suppression based on DCT and Image overlapping methods to transfer panorama images through the Wireless Sensor Networks (WSN). First, ...Authors: Mohammad Malakooti, Mehrzad Khederzadeh, Amir Tavakoli Golpaygani, Dr. Hamidreza Naji
Year Published: 2013 | 52-55 | ICDIPC2013 -
SECURE AUTHENTICATION MECHANISM IN MOBILE INTERNET PROTOCOL VERSION 6
This paper presents a secure authentication method for Mobile IPv6. As a default IPsec is used for secure signaling messages between the Mobile Node and other agents in Mobile IPv6 networks. Mobile ...Authors: Mojtaba Sadeghi, Mohammad Malakooti
Year Published: 2013 | 56-63 | ICDIPC2013 -
A STRUCTURED AGGREGATE SIGNATURE SCHEME WITH PAIRING-BASED CRYPTOGRAPHY
In this study, we propose a new aggregate signature scheme with pairing-based cryptography that can describe the mixed/parallel structure of signers. Existing structured signature schemes are based ...Authors: Masaki Inamura, Keiichi Iwamura
Year Published: 2013 | 64-73 | ICDIPC2013 -
SECURING A CLOUD-BASED COMMUNITY TRUST STORE FOR LOCAL P2P E-COMMERCE
Peer-to-peer(P2P) trading applications have much lower costs than conventional client-server systems because they avoid the use of third party service providers. However, a P2P trading application ...Authors: A.H. Fauzi, Hamish Taylor
Year Published: 2013 | 74-86 | ICDIPC2013 -
AN APPROACH BASED ON SEMANTIC MANAGEMENT OF USER PROFILE TO UBIQUITOUS APPLICATIONS ADAPTATION
Ubiquitous computing is an emerging paradigm for interactions between people and computers that makes the technology virtually invisible in our lives. Its aim is on the one hand, to add additional ...Authors: Salima Bourougaa Tria, Hassina Seridi, Farid Mokhati
Year Published: 2013 | 87-95 | ICDIPC2013 -
A BASIC SECURITY REQUIREMENTS TAXONOMY TO QUANTIFY SECURITY THREATS: AN E-LEARNING APPLICATION
In this paper, we go on to define and refine a basic security requirements taxonomy adapted to all context and systems, then our hierarchical model is used to enrich the first matrix (stake matrix) ...Authors: Neila Rjaibi, Latifa Ben Arfa Rabai, Anis Ben Aissa
Year Published: 2013 | 96-105 | ICDIPC2013 -
DIGITAL SIGNATURE SCHEME ENABLING PRE-CONTROL OF CONTENT EDITING FOR SECONDARY USE
In this study, we propose a digital signature scheme that enables the precontrol of content editing for secondary use. In the proposed scheme, the original content is divided into several parts, a ...Authors: Tatsuhiko Sano, Yoshio Kakizaki, Masaki Inamura, Keiichi Iwamura
Year Published: 2013 | 106-113 | ICDIPC2013 -
STEGANOGRAPHIC SCHEME USING THE Z4-LINEAR GOETHALS CODES
In this paper, we show that certain families of non-linear codes can achieve better performance for application in steganography than simple linear codes currently in use, and that the theory of ...Authors: Houda Jouhari, EL Mamoun Souidi
Year Published: 2013 | 114-121 | ICDIPC2013 -
A NEWWATERMARKING ATTACK USING BLIND SOURCES SEPARATION
In this paper, we show that the watermarking method based on sources separation can be easily detected and destroyed. Indeed, the previous method is based on a simple linear mixture between the ...Authors: Manal Taoufiki
Year Published: 2013 | 122-125 | ICDIPC2013 -
REGULATORS OF TIMELINESS DATA QUALITY DIMENSION FOR CHANGING DATA QUALITY IN INFORMATION MANUFACTURING SYSTEM (IMS)
The information manufacturing system (IMS) is the information system that manufactures information from raw data. This system works in both real time and nonreal time environment in the real world ...Authors: Mohammad Shamsul Islam
Year Published: 2013 | 126-133 | ICDIPC2013 -
INTER-LAYER SHARING OF BACKUP PATH CAPACITIES PROVIDING FAST SERVICE RECOVERY IN IP-MPLS/WDM NETWORKS
In this paper, we investigate the issue of providing the transmission continuity in IP-MPLS/WDM networks in the presence of failures of nodes/links. Special focus is put on assuring fast restoration ...Authors: Wojciech Molisz, Jacek Rak
Year Published: 2013 | 134-148 | ICDIPC2013 -
DEFENCE IN-DEPTH FOR CYBER SECURITY WITH CUSTOM ANTI-VIRUS SIGNATURE DEFINITION
Anti-virus software has been the main defence against malicious application and will remain so in the future. However the strength of an anti-virus product will depend on having an updated virus ...Authors: Markson Aigbodi, Karim Ouazzane, Daniel Mitchell, Vassil Vassilev
Year Published: 2013 | 149-156 | ICDIPC2013 -
RELIABILITY EVALUATION OF MULTI-SOURCE MULTISINK STOCHASTIC-FLOW NETWORKS UNDER QUICKEST PATH AND SYSTEM CAPACITY CONSTRAINTS
A multi-source multi-sink stochastic-flow network consists of a set of nodes, including sources nodes si that supply resources and sink nodes tj where demands are realized, and a set of directed arcs ...Authors: M. R. Hassan
Year Published: 2013 | 166-173 | ICDIPC2013 -
WEBSITES AND WEBPAGES CREDIBILITY AND TRUST EVALUATION
One of the serious problems and challenges in the Internet is the Web authoring and credibility. With the continuous expansion on Internet services especially when it is used to communication ...Authors: Aisha Zaidan, Yahya M. Tashtoush, Izzat M. Alsmadi
Year Published: 2013 | 174-179 | ICDIPC2013 -
SPATIAL SUBSPACE CLUSTERING FOR HYPERSPECTRAL DATA SEGMENTATION
We propose a novel method called spatial subspace clustering (SpatSC) for 1D hyperspectral data segmentation problem, e.g. hyperspectral data taken from a drill hole. Addressing this problem has ...Authors: Yi Guo, Junbin Gao, Feng Li
Year Published: 2013 | 180-190 | ICDIPC2013 -
VERIFICATION OF STATISTICAL PROPERTIES FOR HYPERSPECTRAL IMAGES: HETEROSCEDASTICITY AND NON-STATIONARITY
This paper investigates the heteroscedasticity and non-stationarity, two statistical properties, of hyperspectral remote sensing data. In the field of mathematical sciences, a collection of variables ...Authors: Jihao Yin, Chao Gao, Jianying Sun
Year Published: 2013 | 191-195 | ICDIPC2013 -
SOFL THREE-STEP APPROACH TO CONSTRUCT THE FORMAL SPECIFICATION OF A BRAIN TUMOR TREATMENT SYSTEM
The SOFL three-step approach to the construction of formal specifications has been proposed and applied in information systems, but its effectiveness and applicability have not yet been demonstrated ...Authors: A Rahman Mat, Cheah Wai Shiang, Shaoying Liu
Year Published: 2013 | 196-202 | ICDIPC2013 -
APPLYING INTELLIGENT AGENTS IN WIRELESS SENSOR NETWORKS AS BASE STATIONS
This research work presents a new model in Wireless Sensor Network in which data aggregation is done by Multi Agent Systems and causes to prolong the network lifetime. A Time Division Multiple Access ...Authors: Mohammad Malakooti, Mohammad Ali Kianifar, Vahid Saffari, Hamidreza Naji
Year Published: 2013 | 203-208 | ICDIPC2013 -
EFFECT OF SPACE IN AN ADHOC NETWORK
In this paper, we show the simulation of an Ad hoc Network under different simulation areas. Under each simulation area, we varied the node speed from 1m/sec to 10m/sec. We used perl script to ...Authors: Mozmin Ahmed, Anwar Hussain
Year Published: 2013 | 209-220 | ICDIPC2013 -
POOLED METHODOLOGY FOR COMBATING PRIMARY USER EMULATION ATTACK IN COGNITIVE RADIO NETWORKS
Cognitive Radio (CR) is gifted technique that has a potential to resolve the problem of spectrum scarcity. The investigation of available spectrum band by the secondary users is called spectrum ...Authors: Mufliha Kamran, Ghulam Shabbir, Muhammad Abid
Year Published: 2013 | 221-229 | ICDIPC2013 -
WHEN CHURN HAPPENS IN A MIDDLE EAST TELECOM OPERATOR
The purpose of this article is to study in detail the relationship between customer and supplier, using a data mining system to detect and define the concept of the churn customer in the ...Authors: Joao Oliveira, Orlando Belo
Year Published: 2013 | 230-240 | ICDIPC2013 -
BANDWIDTH OPTIMIZATION THROUGH REAL TIME AUDIO/VIDEO CODEC SWITCHING BY USING IMS
The diverse access technologies used IP Multimedia (IMS) as a solution for providing robust multimedia applications and bandwidth optimization. Information sharing by the audio / video call through ...Authors: Amir Rashid Chaudhary, Paul Coulton, Hassan Ahmed
Year Published: 2013 | 241-247 | ICDIPC2013 -
NEW CROSSING MINIMIZATION TECHNIQUE FOR CANCER DATASETS BICLUSTERING
Cancer is a fatal disease that causes large number of deaths all over the world; so many studies have been made on genes to study the behavior of this disease. Biclustering is one of the data mining ...Authors: Ahmed Sharaf Eldein, Samar Kassim, Tamer Mohamed
Year Published: 2013 | 248-253 | ICDIPC2013 -
A META DESCRIPTION LOGICS KNOWLEDGE BASE FOR ARABIC LANGUAGE PROCESSING
Description Logics (DLs) are successful knowledge representation formalisms, which can be used to represent the terminological knowledge of an application domain in a structured and formally well ...Authors: Yasser Yahiaoui, Ahmed Lehirech
Year Published: 2013 | 254-260 | ICDIPC2013 -
PREDICTING FUTURE RANKING OF ONLINE NOVELS BASED ON COLLECTIVE INTELLIGENCE
A large number of novels are being upload-ed as online novels. The present paper pro-poses a ranking algorithm based on the us-ers’ favorite lists (bookmarks). Empirical evaluation has been ...Authors: Kazunori Shimizu, Eisuke Ito, Sachio Hirokawa
Year Published: 2013 | 261-272 | ICDIPC2013 -
MONITORING SYSTEMS IN INTENSIVE CARE UNITS USING INCREMENTAL SUPPORT VECTOR MACHINES
In this paper, we adapt the incremental Support Vector Machines, denoted by I-SVM to the medical field in order to solve the issue of monitoring system in Intensive Care Unit (ICU). In fact, we have ...Authors: Fahmi Ben Rejab, KaoutherNouira, Abdelwahed Trabelsi
Year Published: 2013 | 273-280 | ICDIPC2013 -
JAVA APPLICATIONS COMPREHENSION BY DISCOVERING CLUSTERS OF RELATED CLASSES
Software maintenance is an important phase of software lifecycle consuming the majority of effort. Program comprehension is the most time consuming activity during software maintenance. Data mining ...Authors: Jauhar Ali
Year Published: 2013 | 281-286 | ICDIPC2013 -
FRACTAL BASED DATA SEPARATION IN DATA MINING
The separation of the searched data from the rest is an important task in data mining. Three separation/classification methods are presented. Considering data as points in a metric space, the methods ...Authors: Marcel Jirina, Marcel Jirina Jr.
Year Published: 2013 | 287-295 | ICDIPC2013 -
DATABASE OPTIMIZATION FOR LARGE-SCALE WEB ACCESS LOG MANAGEMENT
In this research, we investigate an optimal method of commercial DBMS for analyzing large-scale web access log. Also, we develop the pre-processor in memory structure to improve performance and the ...Authors: Minjae Lee, Jaehun Lee, Dohyung Kim, Taeil Kim, Sooyong Kang
Year Published: 2013 | 296-302 | ICDIPC2013 -
A NOVEL SEMANTIC SEARCH TECHNIQUE USING ONTOLOGY
At this method using mutual information for selecting the size of Word document vectors for each category has been created according to the word of choice. Documents obtained by using matrix measure ...Authors: Mahnaz Khani, Mohammad Malakooti, Mehran Mohsenzadeh
Year Published: 2013 | 303-307 | ICDIPC2013 -
REAL LIFE PILOT SOLUTION WITH ARTIFICIAL INTELLIGENCE FOR DISABLED COMPUTER USERS
A user’s typing stream contains all the information of user’s interaction with computer by using QWERTY keyboard, which may include user's vocabulary, typing habit and typing performance. This ...Authors: Karim Ouazzane, Markson Aigbodi
Year Published: 2013 | 308-312 | ICDIPC2013 -
COMPARATIVE STUDIES OF ARTIFICIAL INTELLIGENCE (AI) TECHNIQUES
Determining the accuracy and duration of AI techniques is important for the reason that the Application of such techniques in Data mining has become wider. There is a range of techniques used in AI ...Authors: Lubabatu Sada Sodangi, Suleiman Isah Sani
Year Published: 2013 | 313-319 | ICDIPC2013 -
PREDICTION OF ISTANBUL STOCK EXCHANGE (ISE) DIRECTION BASED ON NEWS ARTICLES
In this paper, we examined the effects of financial news on Istanbul Stock Exchange and we tried to predict the direction of ISE National 100 Index open price after the news articles were published. ...Authors: Hakan Gunduz, Zehra Cataltepe
Year Published: 2013 | 320-330 | ICDIPC2013 -
INERTIAL SYSTEM FOR MEASUREMENT OF THE DYNAMIC RESPONSE AND STATUS OF THE VEHICLE SUSPENSION ELEMENTS
The current paper describes the information and communication system, based on micromechanical inertial sensors (MEMS) to measure the dynamic response and status of the vehicle suspension elements. ...Authors: Emil Iontchev, Ilian Damyanov, Ivaylo Simeonov, Rossen Miletiev
Year Published: 2013 | 331-336 | ICDIPC2013 -
NFC Application Interface for Smart Phones and Appliances
Near Field Communication (NFC) is an emerging short-range wireless communication protocol based on Radio Frequency Identification (RFID) technology. This paper demonstrates a design of NFC ...Authors: Jingyu Lin, Hamid Shahnasser
Year Published: 2013 | 337-340 | ICDIPC2013 -
EFFICIENT TEMPERATURE AWARE DESIGN FOR PORTABLE PROCESSORS
Efficient temperature aware design in modern portable computers is becoming increasingly important. As technology moves into deep submicron feature sizes, the static or leakage power is expected to ...Authors: Diary Sulaiman
Year Published: 2013 | 341-345 | ICDIPC2013 -
ULTRA-LOW COMPLEXITY CONTROL FOR ADHOC MOBILE SENSOR NETWORKS
We introduce an ultra-low complexity decentralized control scheme for adhoc mobile sensor networks that can be used for a great variety of sensing tasks. Sensor networks using this control scheme ...Authors: Matthias Scheutz
Year Published: 2013 | 346-357 | ICDIPC2013 -
DESIGN NOISY DIGITAL COMMUNICATION CHANNEL EMULATOR BASED-ON WEIBULL DISTRIBUTION
This paper presents a new approach to model and simulate a Stochastic digital wireless channel with a controlled value of Bit-Error-Rate (BER) for Point-to-Point (P2P) and Point-to-Multipoint (P2M) ...Authors: Ibrahim Aref, Tarek El-Mihoub, Mohamed Aburkhiss
Year Published: 2013 | 358-365 | ICDIPC2013 -
TUNABLE CURRENT-MODE TOW-THOMAS BIQUAD BASED ON CDTAs
A new current-mode Tow-Thomas biquad filter based on employing current differencing transconductance amplifiers (CDTAs) is introduced. The filter circuit uses two grounded capacitors and realizes a ...Authors: Muhammed Abdulbaki Ibrahim
Year Published: 2013 | 366-370 | ICDIPC2013 -
LTE HANDSET RF POWER CONSUMPTION EMULATION
This paper presents a new methodology for the emulation of power consumption of the RF portion of a cell phone/ handset when transmitting a LTE signal. The inputs to the emulation are baseband-RF ...Authors: Deogratius Musiige, Laulagnet Vincent, Francois Anton, Darka Mioc
Year Published: 2013 | 371-378 | ICDIPC2013 -
PERFORMANCE EVALUATION OF MC-CDMA SYSTEM USING DELTA MODULATION IN ULTRA WIDE BAND CHANNEL
The multi carrier technique looks promising as a 4G standard. Need of next generation is low power and high data rate, to increase data rate it is required to increase the bandwidth, at ...Authors: Akhil Vitthalrao Gite, Athar Ravish Khan, Sanjay M. Gulhane
Year Published: 2013 | 379-385 | ICDIPC2013 -
A HYBRID METHOD WITH CONFUSION NETWORK FOR INDEXING SPOKEN DOCUMENTS IN E-LIBRARIES
The technological development of storage techniques and retrieval methods excite the managers of E-libraries to integrate this resources in their systems. In practice, the creation of these systems ...Authors: Bendib Issam, Laouar Mohamed Ridda
Year Published: 2013 | 386-390 | ICDIPC2013 -
LEGISTICAL EFFORTS BY E-GOVERNMENT
“Simple” rules and laws are necessary for the understanding of the meaning and of the content. This is a fundamental claim of all citizens. The instruments of legislation are deeply connected in ...Authors: Wolfgang Kahlig, Eleonora Kahlig
Year Published: 2013 | 391-403 | ICDIPC2013 -
ONTOCARER: AN ONTOLOGICAL FRAMEWORK FOR ASSISTIVE AGENTS FOR THE DISABLED
The OntoCarer Framework is a research programme of the Centre for Intelligent Systems Research of London Metropolitan University which aims at utilizing contemporary Web and Mobile Internet ...Authors: Vassil Vassilev, Michael Ulman, Karim Ouazzane, Hassan Kazemian, Markson Aigbodi, Richard Boyd
Year Published: 2013 | 404-416 | ICDIPC2013 -
GUARDING SIMPLE POLYGONS WITH SEMI-OPEN EDGE GUARDS
In this note we explore an upper bound on the number of semi-open guard edges in a non star-shaped polygon and provide a characterization to detect semi-open guard edges. Based on this ...Authors: Asish Mukhopadhyay, Chris Drouillard, Godfried Toussaint
Year Published: 2013 | 417-422 | ICDIPC2013 -
MEDICAL IMAGE SEGMENTATION USING HIDDEN MARKOV RANDOM FIELD A DISTRIBUTED APPROACH
Medical imaging applications produce large sets of similar images. The huge amount of data makes the manual analysis and interpretation a fastidious task. Medical image segmentation is thus an ...Authors: El-Hachemi Guerrout, Ramdane Mahiou, Samy Ait-Aoudia
Year Published: 2013 | 423-430 | ICDIPC2013 -
OBJECTS EXTRACTION FOR LICENSE PLATE DETECTION
In this paper we are presenting an intelligent system to extract objects in an image. We have to specify the shapes that need to be detected as well as its dimensions. Examples are given in the radar ...Authors: Charbel Fares
Year Published: 2013 | 431-438 | ICDIPC2013 -
SCHEDULING TECHNIQUES FOR PARALLEL IMPLEMENTATION OF WEAR PARTICLE RECOGNITION ALGORITHMS
Many schemes in the field of computer vision and image processing, present potential for parallel implementations through one of the three major paradigms: geometric parallelism, algorithmic ...Authors: Mohammad Shakeel Laghari, Gulzar Ali Khuwaja
Year Published: 2013 | 439-453 | ICDIPC2013 -
CLASSIFICATION OF PIPER NIGRUM SAMPLES USING MACHINE LEARNING TECHNIQUES: A COMPARISON
Pepper is a key export of the state of Sarawak (Malaysian Borneo). At present, processed pepper berries are graded manually. This process is time consuming and error prone as it is very much ...Authors: D.N.F Awang Iskandar, Nuraya Abdullah, Alvin W. Yeo, Shapiee Abdul Rahman, Ahmad Hadinata Fauzi, Rubiyah Baini
Year Published: 2013 | 454-462 | ICDIPC2013 -
ROBUST 2D AUGMENTED REALITY BASED ON HOMOGRAPHY REFINEMENT AND TEMPORAL COHERENCE
To augment real planes with virtual objects, the camera pose relative to the planes must be estimated, which can be done by plane-based camera tracking. In plane-based camera tracking, robustness and ...Authors: Karam Kim, Joongseok Song, Hanhoon Park, Jong-Il Park
Year Published: 2013 | 463-466 | ICDIPC2013 -
GLARE REGION DETECTION IN NIGHT SCENE USING MULTI-LAYERING
The color pixels and edges are very important information in computer vision. Meanwhile, unlike in day scenes, light source becomes a crucial factor in night scenes; high- brightness object can ...Authors: Chil-Suk Cho, Joongseok Song, Jong-Il Park
Year Published: 2013 | 467-469 | ICDIPC2013 -
ERROR MODELING OF DEPTH MEASUREMENT USING FIR STEREO CAMERA SYSTEMS
This paper deals with an error model and its evaluation in estimating the 3-D depth information using stereo camera system. This paper defines an error model caused by stereo matching, and evaluates ...Authors: Jun Ho Oh, Jungsik Park, Sang Hwa Lee, Boo Hwan Lee, Jong-Il Park
Year Published: 2013 | 470-475 | ICDIPC2013 -
ENHANCEMENT AND PERFORMANCE ANALYSIS ON DUTTA AND CHAUDHURI COLOR EDGE DETECTION ALGORITHM IN RGB COLOR SPACE
Edge detection process has a widespread usage in computer vision applications. The output detected edges of process changes when input image changes from color to grayscale. This changeability of ...Authors: Mohamed Almadhoun
Year Published: 2013 | 476-480 | ICDIPC2013 -
A STUDY ON PROVIDING NATURAL TWO-HANDED INTERACTION USING A HYBRID CAMERA
Hands play a key role in human-computer interactions. Thus, this paper proposes a hand shape recognition method for implementing hand-based interfaces. The proposed method works robustly in real-time ...Authors: Junyeong Choi, Seiheui Han, Hanhoon Park, Jong-Il Park
Year Published: 2013 | 481-484 | ICDIPC2013 -
FAST STEREO IMAGE RECTIFICATION USING MOBILE GPU
Stereo image is frequently used as preprocessing of stereo vision techniques. Although stereo image rectification is performed using look-up tables which are computed in advance, it takes a long time ...Authors: Jungsik Park, Junyeong Choi, Byung-Kuk Seo, Jong-Il Park
Year Published: 2013 | 485-488 | ICDIPC2013 -
FAST GENERATION OF DIGITAL VIDEO HOLOGRAMS USING A SPATIO-TEMPORAL SAMPLING SCHEME AND GPUS
High complexity of computer-generated holography (CGH) is already well known to researchers in the field of optical engineering. Therefore, in order to improve the practicability of CGH, it should be ...Authors: Joongseok Song, Jungsik Park, Hanhoon Park, Jong-Il Park
Year Published: 2013 | 489-492 | ICDIPC2013 -
CONVERGENCE OF CLOUD COMPUTING, SERVICE ORIENTED ARCHITECTURE AND ENTERPRISE ARCHITECTURE
This paper argues that there is a convergence of interoperability of Cloud Computing (CC), Service Oriented Architecture (SOA) and Enterprise Architecture (EA). Furthermore, the paper outlines the ...Authors: Susan Sutherland
Year Published: 2013 | 493-500 | ICDIPC2013 -
A SWOT ANALYSIS ON CISCO® HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN
Continuity of services availability is critical in some business types such as banks, hospitals, and military institutions. However, this may be interrupted by either a natural disaster such as an ...Authors: Eman Al-Harbi, Soha Zaghloul
Year Published: 2013 | 501-506 | ICDIPC2013 -
A NEW ARCHITECTURE OF AN AUTONOMOUS SYSTEM IN CLOUD COMPUTING
The continuous increase of network devices complicates the management task of appliances and services. The complexity and the dynamism of the current global network system require an interacting ...Authors: Shahad Alqefari, Soha Zaghloul
Year Published: 2013 | 507-513 | ICDIPC2013 -
HEALTHCARE APPLICATIONS ON MOBILE CLOUD COMPUTING
With the tremendous explosion in mobile devices in these recent years, mobile devices are able to be considered as a platform to deliver, access, and secure healthcare data information in mobile ...Authors: Jonathan Ng Zhen Yuan, Wong Wan Ping, Yu Hui Wen, Wahidah Husain
Year Published: 2013 | 514-522 | ICDIPC2013 -
ANALYSIS OF SaaS MULTI-TENANT DATABASE IN A CLOUD ENVIRONMENT
Recently, cloud computing became a dominant field in the information technology world. It prevails over both academia and industry. Cloud Service Providers (CSP) provide many services such as ...Authors: Maram Hassan AlAlwan, Soha Zaghloul
Year Published: 2013 | 523-528 | ICDIPC2013 -
CLOUD COMPUTING SERVICES IN MOBILE DEVICES USING ANDROID FACE DETECTOR API AND REST COMMUNICATION
The identity of a person in social networking becomes very important especially when we want to identify a person. Search for detailed-identity can easily be conducted through a search engines or ...Authors: Riri Fitri Sari, Prasetyawidi Indrawan
Year Published: 2013 | 529-537 | ICDIPC2013 -
DENSITY PROPAGATION BASED PARTICLE FILTER ALGORITHM FOR VIDEO OBJECT TRACKING
These Video object tracking is an important topic in multimedia technologies. Particle filtering has proven very successful for non-linear and non-Gaussian estimation problems. In this paper, we ...Authors: Zexin Lin
Year Published: 2013 | 538-546 | ICDIPC2013 -
A ROLES OF GUI (GRAPHICAL USER INTERFACE) OBSERVED IN HOLLYWOOD BLOCKBUSTER FILM
A film provides inexperienced spectacles for audiences, and they watch the film to gain new experience. Moviemakers have made an effort to survive in many forms of mass media. The effort has been ...Authors: Jooyeon Yook, Jinhwan Yu
Year Published: 2013 | 547-556 | ICDIPC2013 -
FOCUSED SEARCH USING COMMUNITY SEARCH LOGS
Search engines have become an increasingly important educational tool. Finding information has become an easy exercise by just typing a few keywords into a search engine text-box. However, some ...Authors: Brendan Flanagan, Takahiko Suzuki, Jun Zeng, Chengjiu Yin, Toshihiko Sakai, Kiyota Hashimoto, Sachio Hirokawa
Year Published: 2013 | 557-563 | ICDIPC2013 -
ANALYSIS OF ONLINE MATERIALS AND THEIR IMPACT ON LEARNING
Online courses are nowadays well established forms of learning and teaching all over the world. They are used as supporting courses of traditional classes, as complementary courses of hybrid or ...Authors: Blanka Frydrychova Klimova, Petra Poulova
Year Published: 2013 | 564-568 | ICDIPC2013 -
ICT AS AN EFFECTIVE TOOL FOR LEARNING ENGLISH
The article discusses the exploitation of ICT in tertiary education, particularly in the teaching of foreign language. The special focus is on eLearning courses which seem to be extremely beneficial ...Authors: Blanka Frydrychova Klimova, Petra Poulova
Year Published: 2013 | 569-573 | ICDIPC2013 -
IDENTIFYING STUDENTS‟ TRENDS TOWARDS PERSONALIZING LEARNING MANAGEMENT SYSTEM (LMS) AT ZARQA UNIVERSITY
The goal of personalization is to filter information to users according to their needs and preferences. Personalization is used successfully in e-commerce. The aim of this paper is to propose a ...Authors: Ahmad Qasim AlHamad, Majdi Salameh, Lafi Al Makhareez
Year Published: 2013 | 574-580 | ICDIPC2013 -
SOCIAL NETWORK MEDIA: ANALYZING STUDENT INTERACTION IN BLENDED E-LEARNING SYSTEM AND ITS IMPACT TO LEARNING OF NON-NATIVE ENGLISH STUDENTS
This paper examines the use of social network media at three aspects in Libyan context. Firstly, to use social network media as an open network learning environment that provide interaction necessary ...Authors: Melvin Ballera, Abdalla Radwan
Year Published: 2013 | 581-592 | ICDIPC2013 -
DEVELOPMENT OF SUSTAINABLE KEY PERFORMANCE INDICATOR (KPI) MONITORING AND CONTROL SYSTEM USING VIABLE SYSTEM MODEL
Key Performance Indicator (KPI) delivery process is needed in the measurement of staff improvement and productivity in all types of organization as a feedback process. If the KPI delivery process is ...Authors: Sani Suleiman Isah, Lubabatu Sada Sodangi
Year Published: 2013 | 593-599 | ICDIPC2013 -
SEMI-FLUID: IMPLEMENTING A HIGH SPEED CONTENT DISTRIBUTION MODEL FOR PEER-TO-PEER OVERLAY NETWORK
This paper proposes and implements a novel content distribution model for reducing or minimizing delay in data dissemination. Currently, content distribution is based on two models: the Fluid model ...Authors: Salah Noori, Mousa Al Falayleh, Manal Nasir
Year Published: 2013 | 600-610 | ICDIPC2013 -
OPTIMISING INSURANCE FRAUD DETECTION AND CLASSIFICATION OF VEHICLE ACCIDENT DAMANGE BY USING NEURAL NETWORKS TO IDENTIFY PATTERNS IN BEHAVIOUR, LINKED CASES AND VEHICLE RECOGNITION
This papers summarizes the use of neural networks as a business tool for analysis of insurance data in order to identify patterns. The primary focus of the paper examines the use of a neural network ...Authors: Emma-Jane Phillips, Peter Phillips, Mark Hurrell
Year Published: 2013 | 611-620 | ICDIPC2013 -
LOCATION-BASED MOBILE ADVERTISING: A STEP TOWARDS MOBILE COMMERCE IN DEVELOPING WORLD
Location based Advertising (LBA) has been emerged in recent years due to the extensive distribution of mobile phones. Industrial businesses are having high expectations in this regard with the ...Authors: Suleiman Almasri
Year Published: 2013 | 621-626 | ICDIPC2013 -
MYHEALTHYKIDS: INTELLIGENT OBESITY INTERVENTION SYSTEM FOR PRIMARY SCHOOL CHILDREN
Sedentary lifestyles and unhealthy diet are the main reasons of childhood obesity. This paper presents MyHealthyKids: Intelligent Web-mobile Children Obesity Intervention System for Primary School to ...Authors: Wahidah Husain, Muhammad Hariz Muhammad Adnan, Liew Kwei Ping, Jion Poh, Law Kok Meng
Year Published: 2013 | 627-633 | ICDIPC2013 -
PERFORMANCE ANALYSIS OF JAVA APIS FOR XML PROCESSING
Over time, XML markup language has acquired a considerable importance in applications development, standards definition and in the representation of large volumes of data, such as databases. Today, ...Authors: Bruno Oliveira, Vasco Santos, Orlando Belo
Year Published: 2013 | 634-643 | ICDIPC2013 -
DESIGN AND IMPLEMENTATION OF CACHE MANAGER FOR HYBRID STORAGE
The technology and cost barrier of the SSD motivated many research groups and companies to merge the SSD with low cost and large capacity storage device, Hard Disk Drive (HDD). As the NAND flash ...Authors: Seongjin Lee, Youjip Won
Year Published: 2013 | 644-652 | ICDIPC2013 -
THE USE OF THE ASPECT ORIENTED PROGRAMMING (AOP) PARADIGM IN DISCRETE EVENT SIMULATION DOMAIN: OVERVIEW AND PERSPECTIVES
The problem of realizing the Separation Of Concerns (SOC) principle is at the heart of the software crisis where crosscutting concerns tend to produce a messed simulation systems by decreasing their ...Authors: Meriem Chibani, Brahim Belattar, Abdelhabib Bourouis
Year Published: 2013 | 653-660 | ICDIPC2013 -
A NEW TEST PROCESS FOR SOA BY DEPLOYING ISTQB FRAMEWORK
Today, using SOA is developed as efficient architecture. Despite the existing strengths in service-oriented architecture (SOA), the test section was not considered as important process. Although, ...Authors: Reza Kianyzadeh, Ramin Nassiri, Mohammad Malakooti
Year Published: 2013 | 661-675 | ICDIPC2013 -
A NEW VIRTUALIZATION-BASED SECURITY ARCHITECTURE IN A CLOUD COMPUTING ENVIRONMENT
Cloud computing finally emerged on the stage of the information technology. Virtualization is the core of cloud computing. Virtualization minimizes capital, operational and maintenance costs. Also, ...Authors: Lena AlMutair, Soha Zaghloul
Year Published: 2013 | 676-686 | ICDIPC2013 -
OPTIMIZING AND IMPROVEMENT PERFORMANCE OF DUAL BAND CPW-FED MONOPOLE ANTENNA
In this paper, A compact dual-band CPW-fed monopole antenna is simulated to improve its performances. The simulation is done using ADS software. The improvement include return losses, bandwidth, and ...Authors: Mustafa Algilide, Nafaa Shebani
Year Published: 2013 | 687-691 | ICDIPC2013 -
SIMULATION AND ANALYSIS OF PATH LOSS MODELS FOR WIMAX COMMUNICATION SYSTEM
(WiMax) is a wireless broadband technology based on IEEE 802.16 standard. WiMax has two potential access conditions; Line-of-Sight condition, and Non-Line of Sight condition. In Non-Line of Sight ...Authors: Nafaa Shebani, Abdulati Mohammed, Mohammed Mosbah, Yousra Hassan
Year Published: 2013 | 692-703 | ICDIPC2013 -
CURRENT THREATS OF WIRELESS NETWORKS
This paper discusses current threats in wireless networks. Advancement and countermeasures for each threat such as sniffing, Man In the Middle Attack (MITM), Rogue Access Points (RAP), Denial Of ...Authors: Mardiana Mohamad Noor, Wan Haslina Hassan
Year Published: 2013 | 704-713 | ICDIPC2013 -
A MODIFIED METHOD OF INFORMATION HIDING BASED ON HYBRID CRYPTOGRAPHY AND STEGANOGRAPHY
“Combination of cryptography and Steganography for secure communication” is an application, which combines both Cryptography methods (i.e. Encryption, decryption) and Steganography techniques to ...Authors: Fadhil Salman Abed
Year Published: 2013 | 714-726 | ICDIPC2013 -
SERVICE LEVEL AGREEMENT CHECKING IN CLOUD COMPUTING IN TERMS OF VERIFICATION AND VALIDATION CONCEPTS
Nowadays, cloud computing is a very interesting environment for researcher to look deep. It is more on computing delivery whereby service rather than a product. It provides infrastructure as a ...Authors: Nor Shahida Mohd Jamail, Rodziah Atan
Year Published: 2013 | 727-737 | ICDIPC2013