SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The International Conference on Computing Technology and Information Management (ICCTIM2014)
-
MUSYOP: Towards a Query Optimization for Heterogeneous Distributed Database System in Energy Data Management
The integration of data from multiple distributed and heterogeneous sources has long been an important issue in information system research. In this study, we considered the query access and its ...Authors: Zhan Liu, Fabian Cretton, Anne Le Calvé, Nicole Glassey, Alexandre Cotting and Fabrice Chapuis
Year Published: Apr. 2014 | 1-9 | ICCTIM2014 -
Automatic Bank Fraud Detection Using Support Vector Machines
With the significant development of communications and computing, bank fraud is growing in its forms and amounts. We try in this paper to analyze the various forms of fraud to which are exposed banks ...Authors: Djeffal Abdelhamid, Soltani Khaoula and Ouassaf Atika
Year Published: Apr. 2014 | 10-17 | ICCTIM2014 -
Data Processing System Improvement in New Student Admission Selection of State Islamic Higher Education in Indonesia Using Information Technology Approach
Continuous self-improvement should have been a part of every Muslim in order to always be better than before. Similarly, the implementation of the national new college admissions of state Islamic ...Authors: Linda Salma Angreani
Year Published: Apr. 2014 | 18-25 | ICCTIM2014 -
The Impact of KMS Success on Corporate Productivity: A Case Study at an IT Services Company
As a class in IS that manage organizational knowledge, the positive contribution of KMS success to business performance has been published by many researcher. However, there are reports that casted a ...Authors: Annas Vijaya
Year Published: Apr. 2014 | 26-31 | ICCTIM2014 -
Jordan’s New Oil Sector: The Cyber Age of Hydrocarbon Security
The MENA region has traditionally struggled with political precariousness. In the Gulf, oil wealth has provided a symbol of socio-economic disparity and a target for political attacks. Since 9/11, ...Authors: Nicolai Due-Gundersen
Year Published: Apr. 2014 | 32-40 | ICCTIM2014 -
On the Memory Artifacts of the Tor Browser Bundle
Tor is one of the most famous privacy-preserving tools. It creates virtual encrypted tunnels to convey users’ data. Tor users improve their privacy against people watching their activities or doing ...Authors: Atta Al-Khaleel, Duaa Bani-Salameh and Mohammed I. Al-Saleh
Year Published: Apr. 2014 | 41-46 | ICCTIM2014 -
E-learning Multi-Learning Style One Size Can Fit All
In recent years we have witnessed an increasingly heightened awareness of the potential benefits of adaptively in e-learning. This has been mainly driven by the realization that the ideal of ...Authors: Hanan Ettaher Dagez
Year Published: Apr. 2014 | 47-51 | ICCTIM2014 -
Learning Analytics as a Method to Examine Students’ Learning Patterns in an Online Module
This research relates to the investigation of the written discussions in an asynchronous online activity, namely a blog activity that forms part of a fully online module for first year undergraduate ...Authors: Santally Mohammad Issack, Rajkomar Reena
Year Published: Apr. 2014 | 52-63 | ICCTIM2014 -
Implementing Computer Games in Class – Issues and Recommendations for Improvement: Experimental Study in Malaysia
Computer and video games are very popular among children, teenager as well as adults. These games could be easily accessed anytime and anywhere with the widespread availability of computers and games ...Authors: Rubijesmin Abdul Latif
Year Published: Apr. 2014 | 64-71 | ICCTIM2014 -
The Influence of Perceived Characteristics of eGovernment Transactions
The main purpose of this research is to determine the influence of perceived characteristic of eGovernment (electronic government) on acceptance in a developing nation namely the Kingdom of Saudi ...Authors: Ibrahim Abu Nadi, Steve Drew
Year Published: Apr. 2014 | 72-85 | ICCTIM2014 -
From E-Government to M-Government – Challenges Faced by Sub-Saharan Africa
The rapid proliferation of mobile technology and the subsequent overwhelming penetration of mobile phones in developing countries have created a new platform, opportunity and challenge for the ...Authors: Willard Munyoka, Mungofa Francis Manzira
Year Published: Apr. 2014 | 86-99 | ICCTIM2014 -
Comparative Study of Internet Usage in Educational Institutes: The Jordanian Hashemite University as a Case Study
Internet usage is considered one of many indications of advancement in the educational institutes. Nowadays, the Internet provides billions of webpages and becomes the information superhighway. The ...Authors: Awni Itradat, Majdi Maabreh, Amar Rayyan, Abed Aljawabreh and Muaffaq Imam
Year Published: Apr. 2014 | 100-107 | ICCTIM2014 -
Classification of Object Oriented Metrics by Aivosto Tool
Object oriented design is becoming more popular in software development environment and object oriented design metrics is an essential part of software environment. This paper focus on a set of ...Authors: Younes Abubakir Abedl ssamad
Year Published: Apr. 2014 | 108-118 | ICCTIM2014 -
Development of Staff Management System Using UML-Based Object-Oriented Approach
Management Information System (MIS) of an organization includes software systems as well as business processes and resources. The entire system of MIS is designed so that the organization will meet ...Authors: Rosziati Ibrahim, Abdulrahman Ahmed, Ida Aryanie Bahrudin, Abubaker Ali Moftah and Elhadi Elfitory Algarai
Year Published: Apr. 2014 | 119-124 | ICCTIM2014 -
On Applying Design Pattern Approach to Reengineering COBOL Programs
The Design Patterns (DP) approach is one of the mod-ern techniques in the area of Software Engineering. It has been introduced to facilitate and make more effec-tive the process of design and ...Authors: Krassimir Manev, Neli Maneva
Year Published: Apr. 2014 | 125-134 | ICCTIM2014 -
A Collaborative Approach to Software Engineering Education
The paper presents an approach to quality improvement of Software engineering education. The main idea is to state a goal, recognized as significant by the partners from three different areas – ...Authors: Neli Maneva, Krassimir Manev
Year Published: Apr. 2014 | 135-143 | ICCTIM2014 -
A Methodology for Software Test-Case Selection in Constrained Environments Using Desirability Functions
The completion of quality software products within the expected time frame represents a major problem for companies that develop software applications. As the field grows, the software industry ...Authors: Abrar Qureshi and, Ira Weissberger
Year Published: Apr. 2014 | 144-147 | ICCTIM2014 -
Risk-Based Code Smells Detection Tool
In order to maintain quality of software products, we need to perform refactoring regularly. Code smells detection is an important step to be able to successfully conduct software refactoring. In ...Authors: Walid Abdelmoez, Essam Kosba and Ali Falah Iesa
Year Published: Apr. 2014 | 148-159 | ICCTIM2014 -
Performance Comparison of Scheduling Algorithms for Real-Time Applications over WiMAX Networks
WiMAX (Worldwide Interoperability for Microwave Access) is an emerging broadband wireless network for providing Last-mile problem solutions for supporting higher bandwidth and many service classes ...Authors: Nada M. El-Shennawy, Mahmoud M. Fahmy, Mohamed N. El-Derini and Moustafa A. Yousef
Year Published: Apr. 2014 | 160-168 | ICCTIM2014 -
Coloured Petri Net Model for Vector-Based Forwarding Routing Protocol
Modelling and simulation has an important role in understanding the performance of systems like Underwater Wireless Sensor Networks (UWSNs) before its implementation, where development and testing of ...Authors: Dina M. Ibrahim, Elsayed A. Sallam, Tarek E. Eltobely and Mahmoud M. Fahmy
Year Published: Apr. 2014 | 169-176 | ICCTIM2014 -
High Security Number Plate Recognition System with Different Filtering Techniques for Image Enhancement
High Security Number Plate Recognition could be used to automatically open a gate or barrier into a secured area for authorised members. This could replace or assist security guard at the gate or ...Authors: Manju Mandot, Reena Gupta and Shiv Singh Sarangdevot
Year Published: Apr. 2014 | 177-185 | ICCTIM2014 -
Image Mosaicing Using Binary Edge Detection
Image mosaicing (panoramic imaging) is a key concept in image processing field. Essentially, it works by combining two or more images by stitching them together so that they look as one image. The ...Authors: Inad Aljarrah, Abdullah Al-Amareen, Abdelrahman Idries and Osama Al-Khaleel
Year Published: Apr. 2014 | 186-190 | ICCTIM2014 -
Enhanced Techniques 3D Integral Images Video Computer Generated
The main purpose of this paper is to introduce some techniques to overcome 3D missing information visual artefacts problem, holes and blank regions between 3D integral images (holoscopic images) ...Authors: Mahmoud Geat. Eljdid, Amar Aggoun and Osama Youssef
Year Published: Apr. 2014 | 191-198 | ICCTIM2014 -
A Method for Efficiently Previewing Domain-Bound DICOM Images in Teleradiology
Efficient data transmission is of special importance where real-time remote navigation through image archives is desirable. Previews of images can be employed for such purposes, specifically in the ...Authors: Simon Gangl, Domen Mongus and Borut Zalik
Year Published: Apr. 2014 | 199-208 | ICCTIM2014 -
New Approaches to Data Classification in DLP Systems
In this paper, we present possible ways of DLP system development in the future; we also make an introduction to current algorithms and methods widely used in DLP systems and demonstrate our ...Authors: Ekaterina Pshehotskaya, Tamara Sokolova and Sergey Ryabov
Year Published: Apr. 2014 | 209-214 | ICCTIM2014 -
The Rotating Calipers: An Efficient, Multipurpose, Computational Tool
A paper published in 1983 established that the rotating calipers paradigm provides an elegant, simple, and yet powerful computational tool for solving several geometric problems. In the present paper ...Authors: Godfried T. Toussaint
Year Published: Apr. 2014 | 215-225 | ICCTIM2014 -
Machine Learning Techniques: A Tool for Learning and Planning
To invest in natural environments, an investor must decide the best action to take according to its current situation and goal, a problem that can be represented as a Markov Decision Process (MDP). ...Authors: Babatunde Akinbode
Year Published: Apr. 2014 | 226-232 | ICCTIM2014 -
Word Sense Identification Improves the Measurement of Short-Text Similarity
While a number of short-text similarity measures have recently been proposed, these methods have rarely focused on word sense identification. This paper present a variation, computationally efficient ...Authors: Khaled Abdalgader
Year Published: Apr. 2014 | 233-243 | ICCTIM2014 -
Charecterization of the Radiation Pattern of a GPS Antenna Mounted on a Small T-Tail Aircraft in Landing Position
This paper aims to characterize the radiation pattern of a Global Positioning System (GPS) antenna mounted on an aircraft at landing position. The antenna was mounted on the fuselage of the aircraft. ...Authors: Abualkair Alkhateeb, Daniel Aloi
Year Published: Apr. 2014 | 244-248 | ICCTIM2014 -
Knee Kinematic Signals Clustering for the Identi?cation of Sagittal and Transverse Gait Patterns
The purpose of this study is to investigate knee kinematic signals clustering by principal component analysis. The aim is to identify meaningful patterns in normal gait knee flexion/extension and ...Authors: N. Mezghani, M. Toumi, A. Fuentes, A. Mitiche, N. Hagemeister and J.A. de Guise
Year Published: Apr. 2014 | 249-253 | ICCTIM2014 -
Enhanced Liver Tumor Diagnosis Using Data Mining and Computed Tomography (CT)
The main objective of this study is to provide a Computer-Aided Diagnosis (CAD) system for the diagnosis process of benign and malignant liver tumors from computed tomography (CT). Also it aimed to ...Authors: Ayman E. Khedr, Awad Khalil and Mohammed A. Osman
Year Published: Apr. 2014 | 254-261 | ICCTIM2014 -
Big Bang–Like Phenomenon in Multidimensional Data
Notion of the Big Bang in Data was introduced, when it was observed that the quantity of data grows very fast and the speed of this growth rises with time. This is parallel to the Big Bang of the ...Authors: Marcel Jirina
Year Published: Apr. 2014 | 262-269 | ICCTIM2014 -
Investigating the Suitability of Wireless Web Services to Support Business Processes
Nowadays we need to access information anytime from anywhere. This greatly increases our productivity and our quality of life. Previously web services were physically tied up to servers but wireless ...Authors: Roopesh Kevin Sungkur
Year Published: Apr. 2014 | 270-279 | ICCTIM2014 -
Simulating the Effect of the Sampling Time in Different Discrete Transformations for the First Order System Using MATLAB Software
The basic model type of continuous-time dynamic systems is the differential equation. Analogously, the basis model type of discrete-time dynamic systems is the difference equation. Numerical analysis ...Authors: Ahmed S. Elgarewi, Mahmoud M. El-Fandi and Muftah E. Almoher
Year Published: Apr. 2014 | 280-290 | ICCTIM2014 -
Survey of Cloud Computing Web Services for Healthcare Information Retrieval Systems
Cloud computing is a term used to describe a network with huge number of devices connected via the internet and can share a variety of data and information remotely. However, cloud computing has very ...Authors: Ismail Hmeidi, Maryan Yatim, Ala’ Ibrahim and Mai Abujazouh
Year Published: Apr. 2014 | 291-301 | ICCTIM2014 -
Determining the Secrecy of Software Encryption System based on pGSSG Generator using Shannon Entropy
This paper focuses on the application of previously proposed p-ary Generalized Self-Shrinking Generator (pGSSG). Software encryption system using keystream produced by the pGSSG is developed and ...Authors: Antoniya Tasheva, Ognyan Nakov and Boyan Petrov
Year Published: Apr. 2014 | 302-308 | ICCTIM2014 -
Compact Miniature Hidden Antennas for Multi Frequency Bands Applications
Advances in integrated RF circuitry and the growing need for multi-frequency processes have caused wireless communications technology to grow exponentially in the last decade. In this approach, ...Authors: Abualkair Alkhateeb, Basim Alkhateeb
Year Published: Apr. 2014 | 309-313 | ICCTIM2014 -
The Influence of Peer-to-Peer Social Networks and Computer Supported Collaborative Learning (CSCL) in Mathematics
This research was designed to investigate students’ interest towards computer supported learning process for mathematics lesson, students’ interest on the use of Geogebra in mathematics lesson ...Authors: Mohini Mohamed, Wasugi a/p Guandasami
Year Published: Apr. 2014 | 314-323 | ICCTIM2014 -
Usability Challenges to Arabic Mobile Phones Interface in Bilingual Environment
Mobile data services and communication exchange is becoming more popular in developing countries due to the rapid advancements in mobile phone services and reduced cost. Cultural differences in user ...Authors: Baha A. Khasawneh
Year Published: Apr. 2014 | 324-330 | ICCTIM2014 -
Supervised Competition Using Joined Growing Neural Gas
Competitive learning is well-known method to process data. Various goals may be achieved using competi- tive learning such as classifcation or vector quantiza- tion. In this paper, we present a ...Authors: Dusan Fedorcak, Michal Podhoranyi
Year Published: Apr. 2014 | 331-337 | ICCTIM2014 -
Building a Semantic Index from HTML Pages or XML Documents
Among the phases of reverse engineering of web-oriented applications is the extraction of concepts hidden in HTML pages or marked in XML documents. In this article, we propose an approach to index ...Authors: Abdeslem Dennai, Sdi Mohammed Benslimane
Year Published: Apr. 2014 | 338-347 | ICCTIM2014 -
Biogeography-based Optimization Algorithm for Independent Component Analysis
Independent component analysis (ICA) is a signal processing technique that can be used to extract meaningful components from a dataset. Biogeography based optimization (BBO) algorithm is a recently ...Authors: Jehad Ababneh, Jorge Igual
Year Published: Apr. 2014 | 348-355 | ICCTIM2014 -
Collaborative Problem Solving Using Social Network Media: How to Effectively Evaluate Student Performance in Online Study Group?
The tremendous educational benefits of online collaborative problem solving have been confirmed in numerous research studies. Many researches cited advantages that include the development of skills ...Authors: Abdalla Radwan, Mohamed El-Darieby
Year Published: Apr. 2014 | 356-361 | ICCTIM2014 -
A Light Review of Data Security and Privacy Approaches Applicable to E-Health Systems
While e-health sounds as a promising future for healthcare and medicine, it still is far from being integrated into our day-to-day lives. While interoperability and data link reliability are ...Authors: Ninad Desai, Hamid Shahnasser
Year Published: Apr. 2014 | 362-367 | ICCTIM2014 -
Lung Segmentation of X-Ray Thorax Image Using Geometric Active Contour and Enhancement Spatial Domain Filtering
Chest cavity is an important part of the body structure because there are vital organs in it, namely the lungs. The lungs are the organs that come into contact with the outside of the body, where the ...Authors: Mokhamad Amin Hariyadi
Year Published: Apr. 2014 | 368-373 | ICCTIM2014 -
Detecting Attacks in Wireless Sensor Network Using Genetic Algorithms
Wireless Sensor Network (WSN) technology has attracted much attention in recent years and enables new applications but it requires nonconventional paradigms for the protocol design due to limited ...Authors: Novin Makvandi, Seyyed Mohsen Hashemi and Peiman Haghighat
Year Published: Apr. 2014 | 374-380 | ICCTIM2014 -
Simulation of an RF MEMS Double-Pole Double-Throw Switch Using Novel Seesaw Design
The paper explores the modelling and simulation of a Radio Frequency Micro Electro-Mechanical Systems (RF MEMS) switch with the use of a novel seesaw design providing Double-Pole Double-Throw (DPDT) ...Authors: Mohammed Al-Amin, Sufian Yousef and Barry Morris
Year Published: Apr. 2014 | 381-387 | ICCTIM2014 -
Microblogging Opinion Mining Approach for Kuwaiti Dialect
In this paper, we present an approach to extract and classify opinion in microblogging. It is based mainly on linguistic resources produced for the Kuwaiti dialect used by an SVM classifier. The ...Authors: Janan Ben Salamah, Aymen Elkhlifi
Year Published: Apr. 2014 | 388-396 | ICCTIM2014 -
Comparative Study on Service-Oriented Architecture and Event-Driven Architecture
Over the years many different architecture styles and concepts have evolved. Two of them are Service-Oriented architecture (SOA) and Event-Driven architecture (EDA). Both styles are revolutionary in ...Authors: Chatri Pienwittayasakul, Yan Liu
Year Published: Apr. 2014 | 397-405 | ICCTIM2014 -
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
We have presented a new secure, lossless information embedding based on the DCT and scrambling algorithms to be use for the data embedding. Our algorithm can be used to embed the vital information ...Authors: Mohammad V. Malakooti, Mehrzad Khederzadeh
Year Published: Apr. 2014 | 406-410 | ICCTIM2014 -
A Robust Information Security Model for Cloud Computing Based on the Scrambling Algorithm and Multi-Level Encryption
Many companies use cloud computing for their storage purposes to get benefit of using cloud environment to decrease the cost and accessibility of the data. When we store our data over the cloud ...Authors: Mohammad V. Malakooti, Nilofar Mansourzadeh
Year Published: Apr. 2014 | 411-416 | ICCTIM2014 -
An Efficient Data Aggregation Method in Wireless Sensor Network based on the SVD
The Wireless Sensor Networks (WSN), consists of thousand small and inexpensive sensing devices (Sensors) with a limited energy resources, memory, computational capability, and communication. In WSN, ...Authors: Mohammad V. Malakooti, Mona Noorian
Year Published: Apr. 2014 | 417-423 | ICCTIM2014 -
An Effective Solution for the Service Support of Virtual Banking Using the Key Performance Indices Based on Cobit-5 Architecture
Virtual banking is a type of online banking in which their products and services can be performed through the electronic distribution channels without having a physical walk-in premises or branches. ...Authors: Mohammad V. Malakooti, Seyyed Mohsen Hashemi and Narges Tavakoli
Year Published: Apr. 2014 | 424-430 | ICCTIM2014 -
A Secure SMS Model in E-Commerce Payment using Combined AES and ECC Encryption Algorithms
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile ...Authors: Abdolghader Pourali
Year Published: Apr. 2014 | 431-442 | ICCTIM2014 -
Designing a New Fuzzy Genetic Gravity Algorithm for Data Mining
Nowadays, due to the high volume of data and their complexity and the human needs to the hidden knowledge in them, using an efficient method is necessary. In this study, our purpose is to present an ...Authors: Mostafa Moradi
Year Published: Apr. 2014 | 443-450 | ICCTIM2014 -
The Search for the Criminals using PCA Algorithm
In this work, we are offering a system that would help a lot in facilitating a search for persons who have criminal records. Our search starts by entering the data or the pictures. In this system, we ...Authors: Ahmed Mohamed Abushaala, Elham Ali Abobaker
Year Published: Apr. 2014 | 451-454 | ICCTIM2014 -
The Impact of Providing Adaptive Courses for Students based on their Preferred Learning Styles
Our the past 3 decades a large number and variety of learning styles have been identified and used to discover what is considered as a preferred learning style. The detection of learning style of the ...Authors: Mohammad Salih Al-Ali, Masita Abdul Jalil and Mohd Hafiz Yusoff
Year Published: Apr. 2014 | 461-467 | ICCTIM2014