SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The Third International Conference on Informatics Engineering and Information Science (ICIEIS2014)
-
SPASS: A Scientific Paper Writing Support System
We present a system for the support of research and writing of scientific papers. People involved in the process of research need to perform at least two general kinds of tasks. Firstly, laboriously ...Authors: Michal Ptaszynski, Fumito Masui
Year Published: Sep. 2014 | 1-10 | ICIEIS2014 -
Succinct Role Based Access Control Policies for XML Documents
The popularity of role-based access control (RBAC) policies within industry has generated considerable interest in the research community. Since XML has become a de facto standard for data ...Authors: Tomasz Muldner, Scott Durno, Jan Krzysztof Miziolek, and Tyler Corbin
Year Published: Sep. 2014 | 11-27 | ICIEIS2014 -
Design of a Platform for the Integrated Project Application Process
It is thought efforts for enhancing R&D management are very important for improving the efficiency of national R&D. Specialized institutions in each ministry of Korea have built and operated their ...Authors: Heeseok Choi, Heejun Han, Yunjeong Kim and Jaesoo Kim
Year Published: Sep. 2014 | 28-33 | ICIEIS2014 -
Detection of User Interesting Fields and Personalization of Search Results using User Search History Information
When a user inputs a search query to find a document or information, the search service provides a list of search results. To get more information, the user explores the provided list and selects one ...Authors: Heejun Han, Heeseok Choi and Jaesoo Kim
Year Published: Sep. 2014 | 34-42 | ICIEIS2014 -
Lexicon-Based Sentiment Analysis Using SAP HANA
Sentiment analysis (SA) is one of the fields in which "big data" need to be processed. The term "sentiment" refers to the feelings, beliefs, emotions, and opinions that people express on certain ...Authors: Karl Kurbel, Dawid Nowak, Florian Jatzold and Pavlo Glushko
Year Published: Sep. 2014 | 43-54 | ICIEIS2014 -
Towards a Business Intelligence Cloud
The requirements for Business Intelligence (BI) and reporting instruments are increasing since many years. Reporting instruments must be proactive, integrated, flexible and always available. They ...Authors: Oliver Norkus, H.-Jurgen Appelrath
Year Published: Sep. 2014 | 55-66 | ICIEIS2014 -
Identifying Software Metrics Thresholds for Safety Critical System
The quality of software is very important for every kind of software system. Without quality software, there will be more accidents and system failures. As the responsibility of the software ...Authors: Stepan Cais, Petr Picha
Year Published: Sep. 2014 | 67-78 | ICIEIS2014 -
A Bicriteria Clustering Approach for Collaborative Filtering
Clustering is one of the essential methods of data reduction. It is possible to find homogenous sub-sets of huge amount of data by employing clustering. In collaborative filtering schemes, clustering ...Authors: T. Demirkiran Emin, Ahmet M. Turk and Cihan Kaleli
Year Published: Sep. 2014 | 79-90 | ICIEIS2014 -
Improving the Classifier CBA with an Additional Pruning Method
In data mining, classification based on association is a technique that employs association rule mining algorithms to construct a classifier by selecting a subset of the rules extracted from a ...Authors: Juan Dominguez, Jacinto Mata and Victoria Pachon
Year Published: Sep. 2014 | 91-95 | ICIEIS2014 -
Detecting Some Limits of Formal Ontologies
This case study tries to detect and exemplify some of the presumptions and limits that formal ontologies cannot cross. A comprehensible example is demonstrated. Usefulness of formal ontologies is not ...Authors: Ivan Ryant
Year Published: Sep. 2014 | 96-108 | ICIEIS2014 -
Indoor Positioning Using Ultrasound and Radio Combination
The paper introduces a method of indoor positioning using a combination of ultrasound and radio frequency. This method allows for a more effective usage of radio frequency as it is employed for both ...Authors: Gintautas Salcius, Evaldas Povilaitis and Algimantas Tacilauskas
Year Published: Sep. 2014 | 109-120 | ICIEIS2014 -
Rendezvous Based Routing in Opportunistic Networks
Opportunistic Networking is one of the most extreme evaluation of multi-hop wireless network. In opportunistic networks the node mobility can create contact opportunities among nodes, which enable ...Authors: Jiradett Kerdsri, Komwut Wipusitwarkun
Year Published: Sep. 2014 | 121-126 | ICIEIS2014 -
Intermediary Service for Electronic Material Retrieval from Libraries
This paper presents an intermediary service for communication between the application for the visually impaired people (Audio Library) and the library management systems. By implementing this ...Authors: Danijela Tesendic, Danijela Boberic Krsticev
Year Published: Sep. 2014 | 127-135 | ICIEIS2014 -
Integrating Animation into Informal Specification Writing for Requirements Analysis
Writing a specification has proved to be an effective way to aid requirements analysis, but how to effectively enhance communication between the user and the analyst during the writing to achieve ...Authors: Shaoying Liu, Fauziah binti Zainuddin and Mo Li
Year Published: Sep. 2014 | 136-143 | ICIEIS2014 -
Modeling Reactive Systems Using Cooperating Adaptive Devices
n the literature there are formalism that can be formulated by a set of rules mapping one configuration into a new one, in response of some stimulus or event. Some of those classical formalisms are ...Authors: Jose Maria Novaes dos Santos, Joao Jose Neto
Year Published: Sep. 2014 | 144-155 | ICIEIS2014 -
Framework for Evaluating the Usability of Mobile Educational Applications for Children
Mobile technology is becoming an integral learning tool for children. The Interface of mobile educational applications (apps) should be usable and compatible with the cognitive skills of children in ...Authors: Rabail Tahir, Fahim Arif
Year Published: Sep. 2014 | 156-170 | ICIEIS2014 -
Issues and Challenges of Secure Policy Specification Languages
Security policies which describe the behavior of a system through specific rules are becoming an increasingly popular approach for static and dynamic environment applications. The SANS top 20 ...Authors: Sailaja Arsi, Venkata Narasimha Inukollu and Joseph Urban
Year Published: Sep. 2014 | 171-180 | ICIEIS2014 -
An Agent Based Formal Specification Language Processor
In the software development life cycle, requirements elicitation and specification is the most important phase to be considered to avoid maintenance cost after the software development. ...Authors: Vinitha Hannah Subburaj, Joseph Urban
Year Published: Sep. 2014 | 181-190 | ICIEIS2014 -
The Use of the Semantic Approach to the Organization of Banking Information Systems on an Example of Lending
This article describes the idea of creating an ontology instead of classical relational databases in order to achieve a new level of applicant's creditworthiness assessment system. The ontology ...Authors: Anastasia Kaida, Anton Chernii
Year Published: Sep. 2014 | 191-197 | ICIEIS2014 -
Analysis of High Frequency Interferences at Wireless Communication Antennas
In this paper after reviewing the Electromagnetic Compatibility considerations like crosstalk between coupling microstrip lines at high frequency electronic circuit boards, the effect of the bends ...Authors: Mehdi Bahadorzadeh, Hossein Bolandpour
Year Published: Sep. 2014 | 198-203 | ICIEIS2014 -
Insider Threats for File Sharing: Characterising File Sharing and its Protection
This paper is about file sharing applied to the insider threat problem. We propose a new approach for classifying the insider threat problem and focus on one category that is related to file sharing. ...Authors: Rakan Alsowail, Ian Mackie
Year Published: Sep. 2014 | 204-218 | ICIEIS2014 -
Architecture of Context-Risk-Aware Authentication System for Web Environments
This paper reports our ongoing work to design a Context-Risk-Aware Authentication System for Web environments. In our approach of password-based authentication we use additional authentication data ...Authors: Adam Hurkala, Jaroslaw Hurkala
Year Published: Sep. 2014 | 219-228 | ICIEIS2014 -
Comparative User Experience Analysis of PC Gaming and Cloud Gaming
Cloud gaming is gaining in popularity, but it is still unknown whether the user-experience it provides is good enough to enable cloud gaming to replace the traditional PC gaming and what are the key ...Authors: Leszek Szmelich, Jacek Chmielewski
Year Published: Sep. 2014 | 229-238 | ICIEIS2014 -
The MEDiATE Approach for the collaboration of Heterogeneous Elderly Platforms: First Results
This paper presents an overview of the first outcomes of the European research project MEDiATE. The main objective of MEDiATE is to allow better interoperability of platforms dedicated to the elderly ...Authors: Wassila Aggoune-Mtalaa, Damien Nicolas, Younes Djaghloul, Djamel Khadraoui, Hedi Ayed, Stefan Søndergård and Serge Smidtas
Year Published: Sep. 2014 | 239-246 | ICIEIS2014 -
The MERIT Middleware: A Platform for Interoperable RFID-based Systems for Access Control and Monitoring in Marine Transportations
RFID-based access control and monitoring systems are already widely spread, with multiple applications of varying complexity, from asset monitoring gates to stores, to access control gates in ...Authors: Christos Koulamas
Year Published: Sep. 2014 | 247-257 | ICIEIS2014 -
Solution of the Mastermind with an Unlimited Number of Lies as a First Step to Detective Reasoning Modelling
When the author started his career in 1986 his main research interests were Artificial Intelligence(AI), Expert Systems and Decision Support Systems based on AI tools. The first experiment we did was ...Authors: Jose Barahona da Fonseca
Year Published: Sep. 2014 | 258-265 | ICIEIS2014 -
A Conceptual Model of E-Learning Readiness: The Case of The Ministry of Higher Education and Scientific Research in Jordan
The aim of this paper is assessing the Electronic Learning (E-learning) readiness in Jordan; using the official website of the ministry of higher education and scientific research (MOHESR) in Jordan ...Authors: Fadi Shahroury
Year Published: Sep. 2014 | 266-270 | ICIEIS2014 -
Integrating a Chatting Tool into a Learning Management System
The objective of this study was to integrate a chatting tool into a Learning Management System (LMS) at Mbarara University with the purpose of aiding interaction, communication and collaboration ...Authors: Emily Bagarukayo, Violah Mpangwire and Billy Mathias Kalema
Year Published: Sep. 2014 | 271-275 | ICIEIS2014 -
Leveraging E-learning to Optimize E-health Usage in Low- and Middle-income Countries
The objective of this study is to explicate the strategic utilization of E-learning to optimize E-health usage in low and middle income countries. Literature indicates that there is serious shortage ...Authors: Modiegi R. Phalane, Billy M. Kalema
Year Published: Sep. 2014 | 276-280 | ICIEIS2014 -
Application of Signal Processing and Pattern Recognition By Wavelet Transform
In this paper after reviewing the usage of the wavelet, transform to medical diagnosis, application of wavelet networks as a classifier of vital signals Has been discussed. The application of this ...Authors: Seyyed Ehsan Razavi, Mehdi Bahadorzadeh and Hossein Bolandpour
Year Published: Sep. 2014 | 281-293 | ICIEIS2014 -
On the Automatic Categorization of Arabic Articles Based on Their Political Orientation
The prevalence of the dynamic online web pages (such as the social networks, forums, personal Blogs, etc.) that are covering all fields (such as social events, economical events, political events, ...Authors: Raddad Abooraig, Ahmed Alwajeeh, Mahmoud Al-Ayyoub and Ismail Hmeidi
Year Published: Sep. 2014 | 302-309 | ICIEIS2014 -
Localization of Coronary Artery Thrombosis Using Coronary Angiography
Computer-aided diagnosis (CAD) systems have gained a lot of popularity in the past few decades due to their effectiveness and usefulness. A large number of such systems are proposed for a wide ...Authors: Ala'a Oqaily, Mohammad I. Jarrah, Huda Karajeh, Mahmoud Al-Ayyoub and Ismail Hmeidi
Year Published: Sep. 2014 | 310-316 | ICIEIS2014 -
A Review of Organisational Benefits Through the Use of Enterprise Content Management (ECM) System in Public Sector Organisations
This paper reviews the achievement of benefits through Enterprise Content Management (ECM) systems in public sector organisations. From the literature there are few benefits which deal with ECM ...Authors: Lumka Thami P Salamntu, Lisa F Seymour
Year Published: Sep. 2014 | 294-301 | ICIEIS2014