SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The International Conference on Digital Information Processing, E-Business and Cloud Computing (DIPECC2013)
-
Comparative Analogy of Neural Network Modeling Versus Ant Colony System (Algorithmic and Mathematical Approach)
This piece of research addresses an interdisciplinary, challenging and interesting learning issue. More specifically, it deals with analytical and quantitative study comparing two suggested naturally ...Authors: Hassan M. H. Mustafa, Ayoub Al-Hamadi, Nada M. Al-Shenawy, Saeed A. Al-Ghamdi, AbdelAziz M. Al-Bassiouni
Year Published: 2013 | 1-7 | DIPECC2013 -
Visualization of Team Skills in Project-Based Learning
In order to improve the effects of project-based learning (PBL), the author developed a visual tool that supports team organization by visually representing the personal skills data of team members. ...Authors: Kazuo Misue
Year Published: 2013 | 8-15 | DIPECC2013 -
The Failure and Success of Unstructured Data Reuse a Pragmatic Analysis
Structured data is easy to parse and process using simple software tools with effective results. However, most valuable information is typically found in unstructured data. The problem is that ...Authors: Ashraf Gaffar, Abdessamad Tridane, Eman Monir Darwish
Year Published: 2013 | 16-25 | DIPECC2013 -
A New Conceptual Model for Promoting Municipality's Integrated Database: An Open Window to Public
Information on the properties in a certain district of Municipality and in the whole town in general is very important for the citizens, private, and public organizations in managing and expanding ...Authors: Navid Hashemi Taba, Ahdieh Sadat Khatavakhotan
Year Published: 2013 | 26-29 | DIPECC2013 -
An Algorithm to Detect Square Object in the Image
The aim of this work is to identify geometrical shape object in an image. In this paper the object is considered to be as a square shape. The identification requires find three characteristics, which ...Authors: Fathi M. O. Hamed, Doua W. I. Ahmed
Year Published: 2013 | 30-37 | DIPECC2013 -
Energy Enhancement in Wireless Sensor Networks Based on SVD and DWT Algorithms
The Energy Enhancement and increasing the network lifetime in Wireless Sensor Networks (WSN) are the most important issues for the protocol design. In these networks, sensors have small dimensions, ...Authors: Mohammad V. Malakooti, Mona Noorian
Year Published: 2013 | 38-43 | DIPECC2013 -
Enhancement of eTOM Assurance Domain by Integration with COBIT5 Framework
Today’s Telecom operators are enforced by the market to provide various services; also they need a strong management framework to manage those in a right way. Considering the importance of QoS ...Authors: Faride Latifi, Ramin Nasiri
Year Published: 2013 | 44-49 | DIPECC2013 -
A Review of Smart TV Forensics: Present State & Future Challenges
Advance technology has given a new dimension to the field of entertainment and has expanded beyond one’s imagination. Smart TV is one of these advance technology that has emerged before us with ...Authors: Mousa Al Falayleh
Year Published: 2013 | 50-55 | DIPECC2013 -
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach
We combined ISO 27005 framework for IT Security Risk Management with NIST Multitier framework and we claim that IT Security Risk Management framework exist at each organizational levels. In this ...Authors: Gunnar Wahlgren, Stewart Kowalski
Year Published: 2013 | 56-68 | DIPECC2013 -
A New Cloud Computing Architecture by Integrating Recent Best Reference Frameworks
Cloud computing concept and technology and its abundant advancement in addition to its inherent advantages has created a new ecosystem in the world of computing and is driving IT industry one step ...Authors: Niloofar Khanghahi, Ramin Nasiri
Year Published: 2013 | 69-76 | DIPECC2013 -
Improving IT Service Management Architecture in Cloud Environment on Top of Current Frameworks
The key characteristic of cloud computing is provision of IT infrastructure and its applications as a scalable service. Since this environment is conceived service-oriented, service management and ...Authors: Fatemeh Arabalidousti, Ramin Nasiri
Year Published: 2013 | 77-86 | DIPECC2013 -
LMS-based Equalization in Filter Bank Multicarrier Wireless Communication Systems
Multicarrier systems give many attractive characteristics for high data rates wireless communications. Filter bank multicarrier systems (FBMC) provide some advantages more than the traditional ...Authors: Mashhoor Al Tarayrah, Qasem Abu Al-Haija
Year Published: 2013 | 87-93 | DIPECC2013 -
WCAG 1.0 versus WCAG 2.0 Web Accessibility Compliance: A Case Study
Most e-governments have been using the WCAG 1.0 guidelines as reference to probe their compliance to web accessibility principles. This was reflected in their local accessibility policies, website ...Authors: Faouzi Kamoun, Basel M. Al Mourad, Emad Bataineh
Year Published: 2013 | 94-101 | DIPECC2013 -
Applying Web Based GPS/GPRS Ticketing and Tracking Mechanism to Reduce Traffic Violation in Developing Countries
Nowadays, the rapid evolution in transportation technologies makes the necessity for avoiding and reducing traffic accidents to increase road safety and save lives. A smart onboard GPS/GPRS based ...Authors: Saed Tarapiah, Rajaa AbuHania, Islam Hindi, Diana Jamal
Year Published: 2013 | 102-106 | DIPECC2013 -
Web Application Regression Testing: A Session Based Test Case Prioritization Approach
In a software testing domain, different techniques and approaches are used to support the process of regression testing in an effective way. The main approaches are test suite minimization, test case ...Authors: Mojtaba Raeisi Nejad Dobuneh, Dayang Norhayati Abang Jawawi, Mohammad V. Malakooti
Year Published: 2013 | 107-112 | DIPECC2013 -
Toward a Context-Aware Service and Quality Multimedia Adaptation for Healthcare Application
In the healthcare domain, the quality management of urgent situations is very important. Currently, these situations are accessible on a wide variety of embedded sensors. The heterogeneity of such ...Authors: Alti Adel, Sébastien Laborie, Philippe Roose
Year Published: 2013 | 113-122 | DIPECC2013 -
Building Mobile Dictionary
This paper describes designing and implementing Mobile Dictionary, taken into consideration language characteristics. The proposed system represents bilingual dictionary based on WordNet lexical ...Authors: Hassanin Al-Barhamtoshy, Fatimah Mujallid
Year Published: 2013 | 123-132 | DIPECC2013 -
Survey on Traffic Control using Closed Circuit Television (CCTV)
As the problem of overpopulation worsens, traffic control becomes a grand challenge. Among the main technologies used to implement solutions for this challenge is the Closed Circuit Television ...Authors: Heba A. Kurdi
Year Published: 2013 | 133-138 | DIPECC2013 -
Fuzzy Speed Controller for Mobile Robots Navigation in Unknown Static Environments
Mobile robots that navigate in unknown environments should be provided with a module that is responsible for controlling its speed. In this paper, a new fuzzy speed controller is offered to control ...Authors: Yahya v, Israa Haj-Mahmoud
Year Published: 2013 | 139-145 | DIPECC2013 -
Handwritten Numeral Recognition Using Wavelet Transform and Neural Networks
Character recognition is one of the most popular practical applications of pattern recognition. The first step is to acquire a digital image. The next step is acquiring to improve it for the other ...Authors: Bubakir Almuttardi, Abdulsalam Ambarek, Khadija Alshari
Year Published: 2013 | 146-158 | DIPECC2013 -
Investigating Open Source ERPs
In this paper, we will examine various parameters of the system selection of ERP (enterprise resource management) and organizational needs based on cycle, which are in open source systems. The ...Authors: Saiedeh Ghatrei
Year Published: 2013 | 159-167 | DIPECC2013 -
The Egyptian Ministry of Transport's Technology Department: The Organic Organization Structure
This paper sets out to explore one of the IT-based management approaches—the object-oriented (organic) approach—and to explain how this approach can be adopted to structure and manage the ...Authors: Amr Badr-El-Din
Year Published: 2013 | 168-182 | DIPECC2013 -
Change Management and Communication Strategy
People, Processes and Tools have been undergoing a period of rapid change and transition due to the dynamic and widespread use of information technology, thus freeing business units from their manual ...Authors: Saleh S. Al-Saleh
Year Published: 2013 | 183-187 | DIPECC2013 -
Static Analysis and Clustering of Malware Applying Text Based Search
Malware is computer software with the harmful intension to both computers and networks. Anti-virus companies receive extensive amount of malware variants daily, therefore there is an essential need ...Authors: Mudhi Aljamea, Vida Ghanaei, Costas S. Iliopoulos, Richard E Overill
Year Published: 2013 | 188-193 | DIPECC2013 -
Deploying ISTQB test Framework for DO-278A as an Aviation Safety System testing Standard
DO-278A is a Well-known FAA CNS/ATM software development standard and ISTQB is a worldwide software testing standard framework. DO-278A verification is mostly done via a variety of methods including ...Authors: Raha Ashrafi, Ramin Nassiri, Sam Jabbedari
Year Published: 2013 | 194-197 | DIPECC2013 -
Graphical Passwords
In this paper we review the graphical passwords. First, we compare text-based and graphical passwords, and assess their level of safety somehow. . Entering a text-based password is somewhat difficult ...Authors: Saiedeh Ghatrei
Year Published: 2013 | 198-203 | DIPECC2013 -
Academic Monitoring in Classrooms using RFID Technology
This paper introduces to students’ monitoring system taken into consideration easy access and time saving. The proposed system will be used in faculty of computing and information system at King ...Authors: Hassanin M. Al-Barhamtoshy, Abdulrahman H. Altalhi, Abdulfattah S. Mashat
Year Published: 2013 | 204-209 | DIPECC2013 -
Implementation of a Novel Peer-to-Peer Reputation-Based Trust Management Model in a Cloud Service Provisioning Environment
In recent times, coupled with the emergence of the new cloud paradigm, a number of security related issues have emerged. Therefore, trust and reputation management has become unavoidable challenge in ...Authors: Nosipho Dladlu, Obeten O. Ekabua
Year Published: 2013 | 210-217 | DIPECC2013 -
Towards Customizing Credibility in Different Contexts: Languages, Topics and Locations - A Twitter Case Study
Even though online social networks (ONS) have been increasingly used as a source of news and information, the credibility of that easily-available information may be questionable. In this paper, we ...Authors: Amal Abdullah AlMansour
Year Published: 2013 | 218-224 | DIPECC2013 -
Fuzzy Speed Control of Separately Excited DC Motor Using Armature Voltage Control Method
This paper presents a simulation of the speed control of a separately excited direct current motor (SEDM) using fuzzy logic control (FLC) in Matlab/Simulink environment. A fuzzy logic controller was ...Authors: Abubakar Sadiq Abdulkadir, Hassan Buhari Mamman, Musa Idi
Year Published: 2013 | 225-230 | DIPECC2013