SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The Second International Conference on e-Technologies and Networks for Development (ICeND2013)
-
HOW IS QUANTUM CRYPTOGRAPHY USED FOR SECURE FINANCIAL TRANSACTIONS?
In recent years quantum physicists have proposed a new type of cryptosystem known as quantum cryptography (QC) which has proven promising for online security in public key infrastructure (PKI). ...Authors: Sanwar Ali, Waleed Farag
Year Published: 2013 | 1-13 | ICeND2013 -
COMPARATIVE STUDY OF CLASSICAL AND QUANTUM CRYPTOGRAPHY APPROACHES: REVIEW AND CRITICAL ANALYSIS
Maths-based cryptography has prevailed for years in the world of information security. Although this approach has succeeded till now, but it still has its drawbacks such as loopholes and life ...Authors: Ruwayda Alharbi, Soha Zaghloul
Year Published: 2013 | 14-19 | ICeND2013 -
UNDERSTANDING TEACHER IDENTITY THROUGH THE USE OF EPORTFOLIOS WITH PRE-SERVICE TEACHERS
In this study, we shared findings from selected student teachers in National Institute of Education (a teacher education institution in Singapore) who have created eportfolios that presented their ...Authors: Mingming Zhou, Stefanie Chye, Caroline Koh, Liu Woon Chia
Year Published: 2013 | 20-27 | ICeND2013 -
A PROPOSED VIRTUAL LEARNING ENVIRONMENT (VLE) FOR ISABELA STATE UNIVERSITY (ISU)
The aim of this study is to propose a Virtual Learning Environment (VLE) for Isabela State University (ISU). The VLE was conceptualized based on the developed VLE approach model which originated from ...Authors: Irma Plata
Year Published: 2013 | 28-41 | ICeND2013 -
A REVIEW ON THE SUCCESS FACTORS OF E-LEARNING
E-learning as a network of sharing knowledge has changed dramatically the traditional concept of learning. Therefore, to implement and develop a successful e-learning system, it is an instant ...Authors: Nadia Parsazadeh, Norziha Megat Mohd Zainuddin, Rosmah Ali, Amirshahram Hematian
Year Published: 2013 | 42-49 | ICeND2013 -
EXPONENTIAL RANDOM GRAPH MODELING FOR MICRO-BLOG NETWORK ANALYSIS
Social network analysis is used to study complex networks by analyzing static structure and dynamic changes. Nowadays micro-blog as a new social media is becoming the most popular communication ...Authors: Dong-Hui Yang, Guang Yu
Year Published: 2013 | 50-62 | ICeND2013 -
PERSONALIZED MEDIA RECOMMENDATION ALGORITHM BASED ON SMART HOME
Consider the personalized recommendation problem of content-based recommendation technology (CB), a personalized media recommendation algorithm based on smart home (PMRSH) is proposed. Firstly, on ...Authors: Yuqing Feng, Ruichun Tang, Yili Zhai, Xiao Feng
Year Published: 2013 | 63-67 | ICeND2013 -
Short-Term Use Of Cell Phones Has No Significant Effect On The Salivary Oxidant/Antioxidant Profile
To investigate whether or not low intensity radio frequency electromagnetic field exposure (RF-EME) associated with cell phone use can affect human cells, the present study was carried out. Saliva ...Authors: Ahmad Khalil, Khalid Abu Khadra, Ahmad Aljaberi, Marwan Gagaa, Hamzah Issa
Year Published: 2013 | 68-77 | ICeND2013 -
PERFORMANCE EVALUATION OF ENHANCED ROUTING DISCOVERY UNDER DIFFERENT MOBILITY MODELS IN MANETS
Broadcasting is a basic data dissemination technique, which has a number of applications such as address resolution, route discovery, as well as many other network services. While data broadcasting ...Authors: Abdalla Hanashi, Irfan Awan
Year Published: 2013 | 78-85 | ICeND2013 -
FAULT TOLERANCE MODELS IN AD HOC WIRELESS SENSOR NETWORKS
Ad Hoc wireless sensor networks are widely used in different domains. These include domestic uses such as personal security and critical ones such as military and medical applications. Unfortunately, ...Authors: Maram Al-Shablan, Soha Zaghloul
Year Published: 2013 | 86-89 | ICeND2013 -
A HIERARCHICAL-CELLULAR FAULT MANAGEMENT SCHEME FOR AD HOC WIRELESS SENSOR NETWORKS
Ad Hoc Wireless sensor networks are used in many domestic and critical applications including military, medical, pervasive and ubiquitous computing. Maintenance of wireless sensor networks is of ...Authors: Soha Zaghloul
Year Published: 2013 | 90-93 | ICeND2013 -
A SURVEY ON SECURITY SOLUTIONS IN WIRELESS SENSOR NETWORKS
Wireless Sensor Networks are deployed in sensitive and unattended areas that cannot be reached by human beings. Therefore, it is difficult to maintain them. In addition, sensors are of limited ...Authors: Hind Annahidh, Soha S. Zaghloul
Year Published: 2013 | 94-98 | ICeND2013 -
ENVIRONMENTAL MONITORING AND DATA COLLECTION SYSTEM WITH MOBILE DEVICES
We have developed a monitoring system for facilities that house important cultural assets, which require environ- mental information management. In general, administra- tors patrol such facilities at ...Authors: Yukihiro Daidai, Masahito Shiba
Year Published: 2013 | 99-105 | ICeND2013 -
AN INTEGRATED INTELLIGENT FUZZY SYSTEM FOR DATA MINING
This paper presents an advanced model based on fuzzy inference system, namely Standard Additive Model (SAM) for forecasting the output of any record given the input variables only from the database, ...Authors: Do-Thanh Sang, Dong-Min Woo
Year Published: 2013 | 106-113 | ICeND2013 -
BEHAVIORAL SEGMENTATION FOR WEB SEARCHING USERS USING SELF-ORGANIZING KOHONEN MAPS
Knowing the behavior of Internet users is a main and a very important concern for Internet providers. Therefore, clustering Internet users according to their behavior would be very useful in order to ...Authors: Rawan Ghnemat, Ruba Zaghari, Jalal Atoum
Year Published: 2013 | 114-121 | ICeND2013 -
MMO FRONT-END AND BACK-END DATABASES FOR SMALL GAME DEVELOPERS
Among the most difficult issues in dealing with the online gaming and virtual world markets are the costs involved in capturing subscriber’s payment information and the methods used to circumvent ...Authors: John Matthews, Mudasser Wyne
Year Published: 2013 | 122-131 | ICeND2013 -
WORLD-ALTERING FEATURES OF SEMANTIC WEB SERVICE DESCRIPTION LANGUAGES
Semantic Web services are traditional Web services annotated with Semantics. The semantics is given using formal languages so that the machines can process the service descriptions. By enabling the ...Authors: Hadi Saboohi, Sameem Abdul Kareem, Gholamreza Ahakian
Year Published: 2013 | 132-136 | ICeND2013 -
GLOBALAD: ONLINE ON-DEMAND ADVERTISING TECHNIQUES
Advertising in tangible newspapers seems to be a dying method of advertisement, but it offers one of the most reliable ways to give consumers reliable and complete information about a product or ...Authors: Vitesh Shah, Satoshi Takahashi, Tokuro Matsuo, Roger Lee
Year Published: 2013 | 137-143 | ICeND2013 -
A SKYPE ML DATASETS VALIDATION AND DETECTION MECHANISM USING MACHINE LEARNING APPROACH
Internet traffic classification is an area of current research interest. Identification of real time applications such as Skype has gained more attention in the last few years. Skype traffic ...Authors: Hamza Awad Elkarim Hamza Ibrahim, Sulaiman Mohd Nor, Izzeldin Ibrahim Mohamed Abdelaziz
Year Published: 2013 | 144-148 | ICeND2013 -
BATTLE FOR ONLINE FREEDOM OF SPEECH-IDENTITY: AUTHENTICITY OR ANONYMITY
Facebook profiles and Google IDs are tied to a person's real connections and real name, and increasingly to their activities across cyberspace, forming a single public identity that's an aggregated ...Authors: Lasa Sun
Year Published: 2013 | 149-155 | ICeND2013 -
ENHANCED IDEA ALGORITHM FOR STRONG ENCRYPTION BASED ON EFFICIENT STRONG ROTOR BANKS
Information security becomes an important issue of the communication networks. In this paper we propose a new symmetric cryptosystem based on IDEA system. The plaintext block is divided into basic ...Authors: H. Elkamchouchi, Fatma Ahmed
Year Published: 2013 | 156-162 | ICeND2013 -
A NEW GAUSSIAN CIPHER WITH OPTIMAL KEYED PROCESS (KAM-FA)
Nowadays, cryptography plays a major role in protecting the information of technology applications. This paper gives a new symmetric cryptosystem having a key dependent operation, enhanced by a rotor ...Authors: H. Elkamchouchi, Fatma Ahmed
Year Published: 2013 | 163-172 | ICeND2013 -
END-TO-END ARCHITECTURE FOR E-COMMERCE SECURITY
Business-to-consumer electronic commerce (e-commerce), one form of which is Web-based shopping, is defined as electronic-based economic transactions conducted between individual consumers and ...Authors: Houssam El Ismaili, Hanane Houmani, Adil Lebbat
Year Published: 2013 | 173-179 | ICeND2013 -
GENERIC HEURISTICS ENCODING AND PHYLOGENIES
This paper tackles one of the most known problems in biology: search for an optimal sequences tree topology. Bio-informatics researchers and scientists have categorized this problem as Non-Polynomial ...Authors: Chadi Kallab
Year Published: 2013 | 180-190 | ICeND2013 -
DECISION MAKING PRINCIPLE FROM THE PERSPECTIVE OF POSSIBILISTIC THEORY
Mathematical programming plays a pivotal role in finding the solution for optimization problems in various practical, real-life applications. Conventionally, the modeling used in mathematical ...Authors: Nureize Arbaiy
Year Published: 2013 | 191-195 | ICeND2013 -
AN INJURY RECOGNITION MODEL USING SINGLE ROTATABLE INFRARED SENSOR
This paper proposed a model to perform injury recognition to assist people with multiple disabilities using single infrared sensor with rotatable capability. Our model will be installed in a room to ...Authors: Ong Chin Ann, Lau Bee Theng, Hamid Bagha
Year Published: 2013 | 196-201 | ICeND2013 -
IMPLEMENTING STOCHASTIC GRADIENT DESCENT BASED ON HISTORICAL NETWORK DISTANCE FOR AVAILABLE BANDWIDTH
Predicting network bandwidth of large systems based on a few pairs of network nodes is essential to overcome large measurement overhead over full- mesh active measurements. Recently, prediction using ...Authors: Lim Su Jin, Lim Boon Ping, Lee Sze Wei, Simon Lau, Ettikan Karuppiah, Shahirina Mohd Tahir
Year Published: 2013 | 202-207 | ICeND2013