Doreen Orishaba, R. Besiga, A. T. Asiimwe, S. S. Tickodri-Togboa, P. I. Musasizi, Cosmas Mwikirize
{"title":"Implementation of a Wavelength Division Multiplexing and Bidirectional Optic Fiber Link iLab","authors":"Doreen Orishaba, R. Besiga, A. T. Asiimwe, S. S. Tickodri-Togboa, P. I. Musasizi, Cosmas Mwikirize","doi":"10.1109/ITNG.2012.173","DOIUrl":"https://doi.org/10.1109/ITNG.2012.173","url":null,"abstract":"An online laboratory that handles two critical concepts in Fiber Optic Communications: Bi-Directional Optic Fiber Link and Wavelength Division Multiplexing phenomena was developed at Makerere University. Designed using the EMONA Fiber Optics Telecommunications Experimenter (FOTEx), an add-on board for the National Instruments Educational Laboratory Virtual Instrumentation Suite (NI ELVIS II™) platform, it was deployed on the Interactive iLabs Shared Architecture (ISA). The laboratory supports curricula of Bachelor of Science in Computer, Electrical and Telecommunication Engineering Programmes.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124289180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Software Architecture for Mobile Computing","authors":"H. Reza, Narayana Mazumder","doi":"10.1109/ITNG.2012.122","DOIUrl":"https://doi.org/10.1109/ITNG.2012.122","url":null,"abstract":"Mobile computing is considered as low-end computing systems. It currently dominates almost all aspects of our lives from mobile banking to mobile purchasing to mobile skypeing, etc. With the increasing demand of smart phones in today's world, making the system secure is very important. Software architecture plays an important role to achieve both functionalities and quality (e.g., security) of a system. This paper surveys the software architecture of five of the leading mobile operating systems such as Android (Linux), Blackberry, iPhone (Mac OS X), Symbian, and Windows Mobile. Our survey study indicates that Android is the most promising of al and identifies security issues with Android. The paper then proposes improved software architecture to resolve these issues. More specifically, our proposed software architecture attempts to enhance the security of Android without comprising it performance.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117003883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"When the Software Goes Beyond its Requirements -- A Software Security Perspective","authors":"Jing-Chiou Liou","doi":"10.1109/ITNG.2012.98","DOIUrl":"https://doi.org/10.1109/ITNG.2012.98","url":null,"abstract":"Evidences from current events have shown that, in addition to virus and hacker attacks, many software systems have been embedded with \"agents\" that pose security threats such as allowing someone to \"invade\" into computers with such software installed. This will eventually grow into a more serious problem when Cluster and Cloud Computing becomes popular. As this is an area that few have been exploring, we discuss in this paper the issue of software security breaches resulting from embedded sleeping agents. We also investigate some patterns of embedded sleeping agents utilized in software industry. In addition, we review these patterns and propose a security model that identifies different scenarios. This security model will provide a foundation for further study on how to detect and prevent such patterns from becoming security breaches.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122659199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Can Social Networks Help Us Measure Trust Online?","authors":"Wei-Lun Chang, Arleen N. Diaz","doi":"10.1109/ITNG.2012.76","DOIUrl":"https://doi.org/10.1109/ITNG.2012.76","url":null,"abstract":"Information overload is an increasing problem, and as information available continues to grow in volume, current filtering techniques are proving inefficient. Social network users, and people in general, tend to prioritize recommendations coming from people they are acquainted to. This research proposes a trust model that will estimate a trust value for content creators on an online rating system with social network capabilities. This research introduces the concept of social distance, which is drawn from clustering methods applied to the social network user base, and incorporates said distance in the estimation of trust, as well as user generated ratings. The trust value estimated will serve as a metric for filtering and sorting content of any kind based on the trustworthiness of the creator.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"35 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122453094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cultural Impact on e-service Use in Saudi Arabia: Results from Focus Groups","authors":"M. Aldraehim, Sylvia Lauretta Edwards, J. Watson","doi":"10.1109/ITNG.2012.146","DOIUrl":"https://doi.org/10.1109/ITNG.2012.146","url":null,"abstract":"This paper reports the results of focus groups obtained as part of a full study that uses a mixed method approach to answer the following question: what are the cultural values that impact on e-service use in Saudi Arabia? In order to answer this question we reviewed culture theories, dimensions, and models that have been identified in the literature. Four focus groups interviewing experts and general users (customers) of online services in Saudi Arabia have been completed aiming at the end to identify the uncovered elements of Saudi culture in the literature, which hopefully will result in developing a framework of cultural values that affect e-service use in Saudi context. This paper will firstly, introduce the importance of culture and define the aspects of Saudi culture. It will then describe the method used, and finally discussing the findings of the focus groups. Findings revealed four factors that have not been covered in the literature and need to be investigated namely: nepotism, the lack of human interaction, services oriented culture, and the career path.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115793979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Building of a Large Government Digital Library","authors":"K. Taghva","doi":"10.1109/ITNG.2012.176","DOIUrl":"https://doi.org/10.1109/ITNG.2012.176","url":null,"abstract":"This paper reports on the methodology of building an electronic digital library. In particular, it addresses the issues involving OCR errors and conversion. It also reports on data mining applications required for filtering sensitive information.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126298612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perceived Privacy","authors":"S. Al-Fedaghi","doi":"10.1109/ITNG.2012.90","DOIUrl":"https://doi.org/10.1109/ITNG.2012.90","url":null,"abstract":"To understand the notion of perceived privacy, this paper explores and proposes a model of the relationship between privacy and security. Security is measured in terms of the preparedness required to meet a certain level of threat. Privacy is measured in terms of level of exposure at a certain point of threat. With this understanding, perceived privacy is viewed as a proprietor (the person the information is about) perceiving the broker (handler of information) in his/her place with respect to valuing the sensitivity of the information, and taking care when handling this information. Transparency between proprietor and broker leads to trust.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127408467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Serious Video Games: Games for Education and Health","authors":"V. Janarthanan","doi":"10.1109/ITNG.2012.79","DOIUrl":"https://doi.org/10.1109/ITNG.2012.79","url":null,"abstract":"Every game in the market is made in an effort to play, produce, teach, motivate, socialize, communicate and educate different cultures. The gamer is exposed to different types of games that can be categorized into a casual game, serious game and advergame. Serious games include games for training, games for education, games for science and research, games for production and games for work. Serious games do not necessarily lead to the production of a game [1]. They are mainly used to ensure better health and educational environment. They also provide a tool for creating jobs and making life easier in arts, design, therapy, generic software engineering, healthcare and more. Serious games are made intentionally for learning. In this paper, I will be discussing in-depth the two most crucial categories of serious games namely games for education and games for health.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130626059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating Students Online Discussion Performance by Using Social Network Analysis","authors":"Peng He","doi":"10.1109/ITNG.2012.72","DOIUrl":"https://doi.org/10.1109/ITNG.2012.72","url":null,"abstract":"Online discussion forum is becoming an important part in college education nowadays. To evaluate student's online discussion performance is essential since more and more professors have included online participation as a part of their class grade. In this paper, we use social network analysis methods to help professors in evaluating individual student's online discussion performance. By applying degree centrality (out-Degree and in-Degree) and density metrics, we can identify students who have been actively involved in the discussion board and find out those who need to be encouraged to participate in. Also, SNA software tools are used to visualize students' online discussion participation networks and help to identify these active nodes. In addition, Page Rank algorithm has been applied to the same data to rank the prestige nodes in this social network and the results are compared with degree centrality metric one. The experimental data of students' online discussion threads are collected from one undergraduate course MIS at our University and results show that students who actively participate in online discussion have good academic performances.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131404214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MASID: Multi-Agent System for Intrusion Detection in MANET","authors":"Leila Mechtri, Fatiha Djemili Tolba, S. Ghanemi","doi":"10.1109/ITNG.2012.18","DOIUrl":"https://doi.org/10.1109/ITNG.2012.18","url":null,"abstract":"In this paper we focus on intrusion detection in the mobile ad hoc networks (MANETs). Starting by an overview of the existing work in this field, and ending up with the proposal of a new distributed and cooperative architecture for intrusion detection. In order to overcome the weaknesses and flaws of the existing MANET intrusion detection systems (IDSs), this architecture integrates an agent-based detection process. So, the main principle of the proposed architecture is based on: (a) the distribution which is achieved through the implementation of a local intrusion detection system on each network node, and (b) the cooperation that is guaranteed by mobile and stationary agents' collaboration. In that way we were able to have an IDS with so many interesting features such as: flexibility, distribution and cooperation, autonomy, lightweight, reactivity and fault tolerance which are extremely desired for any MANET intrusion detection system.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"112 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131811620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}