2012 International Conference on Information Technology and e-Services最新文献

筛选
英文 中文
Web service-based emergence control in cooperative information systems 协同信息系统中基于Web服务的应急控制
2012 International Conference on Information Technology and e-Services Pub Date : 2012-06-14 DOI: 10.1109/ICITES.2012.6216666
Bouanaka Mohamed Ali, Zarour Nacereddine
{"title":"Web service-based emergence control in cooperative information systems","authors":"Bouanaka Mohamed Ali, Zarour Nacereddine","doi":"10.1109/ICITES.2012.6216666","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216666","url":null,"abstract":"Service Oriented Architectures (SOA) with all technologies especially web services provide a successful model for structuring complex distributed software systems, as they reduce the cost of ownership and easiness of the creation of new applications by composing existing services. However, the developments of service-oriented applications require many external manual tasks and prevailing infrastructure is often based on centralized components that are central points of failure and bottlenecks. Moreover; the existing systems does not take automatically into account the change of the context, goal and the miss expression of the requirement. Future systems that come from the existing services are in need for some properties like autonomous, self-organizing, self-healing, controlled emergence, etc. In this paper, we adapt new architecture that is resulted from the new Organic Computing paradigm shift for the complex systems; which is Observer/Controller architecture. It is a new approach to overcome these limitations. The main important proprieties of the systems are self-organizing; the latter is linked to emergence. We intend to control emergence in composing web services using swarm controlled emergence.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125768495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using graph grammars and meta-modeling to process code mobility in LRN models 使用图语法和元建模来处理LRN模型中的代码移动性
2012 International Conference on Information Technology and e-Services Pub Date : 2012-03-24 DOI: 10.1109/ICITES.2012.6216654
N. Dehimi, A. Chaoui
{"title":"Using graph grammars and meta-modeling to process code mobility in LRN models","authors":"N. Dehimi, A. Chaoui","doi":"10.1109/ICITES.2012.6216654","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216654","url":null,"abstract":"Petri nets have been proposed initially to model concurrency and distributed systems. The ordinary formalism is so simple with a smart formal background, but it fails in modeling mobility aspects. In spite of this, searchers in mobility modeling domain are attracted by Petri nets, and many extensions have been proposed to treat mobility aspects. Among these, we find Labeled Reconfigurable Nets (LRN), This new formalism allows explicit modeling of computational environments and processes mobility between them. It allows, in a simple and an intuitive approach, modeling mobile code paradigms (mobile agent, code on demand, remote evaluation). In this paper, we propose an approach based on the combined use of Meta-modeling and Graph Grammars to automatically generate a visual modeling tool for LRN, for analysis and simulation purposes. This tool produces graphical models, highly-structured to reach this goal. In our approach, the UML Class diagram formalism is used to define a meta-model of LRN. The meta-modeling tool ATOM3 is used to generate a visual modeling tool according to the proposed LRN meta-model. To generate R-Maude specification of the graphically specified LRN models, we have proposed a graph grammar. Then the reconfigurable rewriting logic language R-Maude can be used to perform the simulation of the resulted R-Maude specification. Our approach is illustrated through examples.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115647157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cross layered routing protocol for ad hoc networks 一种用于自组织网络的跨层路由协议
2012 International Conference on Information Technology and e-Services Pub Date : 2012-03-24 DOI: 10.1109/ICITES.2012.6216684
Z. El-Bazzal, K. El-Ahmadieh, Z. Merhi, M. Nahas, A. Haj-Ali
{"title":"A cross layered routing protocol for ad hoc networks","authors":"Z. El-Bazzal, K. El-Ahmadieh, Z. Merhi, M. Nahas, A. Haj-Ali","doi":"10.1109/ICITES.2012.6216684","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216684","url":null,"abstract":"In this paper, we investigate a cross layer design for routing in mobile ad hoc networks. The goal is to improve the performance of the existing Ad-hoc On Demand Distance Vector (AODV) routing protocol. The design allows the physical layer sharing the received signal strength (RSS), and the medium access control (MAC) layer sharing the remaining energy, as well as the remaining queue length information with the network layer. Based on this information, the network layer computes a weight value that forms the routing metric used for route selection in the enhanced protocol. Finally, we implemented Turbo-AODV (TAODV) which is a modified version of the well-known AODV. Simulation results demonstrated superior Quality of Service (QoS) and better performance comparing to AODV in terms of packet delivery, normalized routing load, discarded packets on queues, and routing overhead.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117058051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A contextual personalized recommander system for mobile OLAP 移动OLAP的上下文个性化推荐系统
2012 International Conference on Information Technology and e-Services Pub Date : 2012-03-24 DOI: 10.1109/ICITES.2012.6216674
Rezoug Nachida, N. Fahima
{"title":"A contextual personalized recommander system for mobile OLAP","authors":"Rezoug Nachida, N. Fahima","doi":"10.1109/ICITES.2012.6216674","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216674","url":null,"abstract":"The main drawbacks and handled devices (small storage space, small size of the display screen, discontinuance of the connection to the WLAN etc) are often incompatible with the need of querying and browsing information extracted from enormous amounts of data which are accessible through the network. A key characteristic of emerging OLAP database systems will be to use them with mobile device. To overcome this we investigate in this paper to propose a contextual recommender system (CARS) for mobile OLAP based on multi-agent architecture called (MASCARS). This system extracts first the user profile from the log data file of OLAP server. For this we use a variant of prediction and explanation algorithms. These profiles then form a knowledge base. This knowledge base will be used to generate automatically a rule base (ACE), for assigning weights to the attributes of data cubes by type of query and user preferences. The best sequence of requests will be deduced for using in CARS.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117123926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of real-time object-oriented data models for real-time databases 实时数据库中实时面向对象数据模型的评估
2012 International Conference on Information Technology and e-Services Pub Date : 2012-03-24 DOI: 10.1109/ICITES.2012.6216608
Zied Ellouze, Nada Louati, R. Bouaziz
{"title":"Evaluation of real-time object-oriented data models for real-time databases","authors":"Zied Ellouze, Nada Louati, R. Bouaziz","doi":"10.1109/ICITES.2012.6216608","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216608","url":null,"abstract":"The design of real-time databases needs to incorporate methods specifically developed to represent the timing constraints of the system under consideration. Real-time databases have timing constraints on data and on transactions upon the data. During the last few years, several research approaches have been directed towards using the relational model as a data model for real-time databases. However, neither approach adds a temporal dimension to the data model. As realtime applications complexity grows, the real-time database community migrated towards object-oriented technology, both because one can use its rich data semantics in timing transactions processing and because complex real-time applications may benefit from its capabilities for modeling, storing and manipulating complex objects. In this paper we explore the realtime object-oriented data models for real-time databases, performing an overview of the existing models and presenting a set of features suitable to evaluate the quality of each model.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116575881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A mobile dictionary for pilgrims 朝圣者的移动字典
2012 International Conference on Information Technology and e-Services Pub Date : 2012-03-24 DOI: 10.1109/ICITES.2012.6216620
A. Zeki, H. Alsafi, R. Nassr, T. Mantoro
{"title":"A mobile dictionary for pilgrims","authors":"A. Zeki, H. Alsafi, R. Nassr, T. Mantoro","doi":"10.1109/ICITES.2012.6216620","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216620","url":null,"abstract":"The wide use of computers in all lives pushes software designers to implement a huge number of different applications in every field and the applied programs become immeasurable. Mobile dictionary application have moved to the world of multimedia and merged other services rather than classic translation. Even though millions guidelines booklets printed in different languages and distributed among pilgrims even before they depart their countries, however many pilgrims have lack of knowledge about valid procedures of pilgrimage practices. In this paper, mobile dictionary application for Hajj using three different languages is proposed to assist the pilgrim perform their Hajj easily.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116593436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Security solution for semantic SCADA optimized by ECC mixed coordinates 基于ECC混合坐标优化的语义SCADA安全解决方案
2012 International Conference on Information Technology and e-Services Pub Date : 2012-03-24 DOI: 10.1109/ICITES.2012.6216629
S. Nabil, B. Mohamed
{"title":"Security solution for semantic SCADA optimized by ECC mixed coordinates","authors":"S. Nabil, B. Mohamed","doi":"10.1109/ICITES.2012.6216629","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216629","url":null,"abstract":"Web services have become a significant part of embedded systems as SCADA and internet applications embedded in RTU, because (WS) was XML/SOAP support, independent to platform and very simple to use, these advantages make (WS) vulnerable to many new and old security attacks. Now, it becomes easier to attack (WS) because their semantic data is publicly accessible in UDDI registry and (WS) use http protocol and the 80 TCP port as an open tunneling as a very big vulnerability. In this article we proposes new security solution for SCADA system, a new implementation of security protocols (SSL/TLS, IPSEC, HTTPS) and the WS-Security framework. In our solution implemented WS-Security framework optimized for SCADA in ten (10) steps, we use mixed coordinates ECC cryptography, we propose in this article our (Mixed-Coordinates-ECC) algorithm for optimizing the semantic security solution based on WS-Security framework and to adapt it to embedded complex systems as SCADA RTU using semantic distributed bloc (I/F/AV) and security ontology's.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126686623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hands tracking for augmented reality applications 用于增强现实应用的手部跟踪
2012 International Conference on Information Technology and e-Services Pub Date : 2012-03-24 DOI: 10.1109/ICITES.2012.6216641
M. Sakkari, M. Zaied, C. Ben Amar
{"title":"Hands tracking for augmented reality applications","authors":"M. Sakkari, M. Zaied, C. Ben Amar","doi":"10.1109/ICITES.2012.6216641","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216641","url":null,"abstract":"Augmented Reality (AR) combines real world and virtual objects which can be 3D images previously saved or real time computer generated. It enhances a user's view of the real environment by adding virtual objects in a realistic manner. Virtual objects display information that the user cannot directly detect with his senses. So, to look realistic, the virtual objects must be properly aligned with real-world objects. The work completed in this paper consists on the realization of an augmented reality system without markers that is based on the user's hand.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115907464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Targeted adequacy criteria for search-based test data generation 基于搜索的测试数据生成的目标充分性标准
2012 International Conference on Information Technology and e-Services Pub Date : 2012-03-24 DOI: 10.1109/ICITES.2012.6216624
W. Zidoune, T. Benouhiba
{"title":"Targeted adequacy criteria for search-based test data generation","authors":"W. Zidoune, T. Benouhiba","doi":"10.1109/ICITES.2012.6216624","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216624","url":null,"abstract":"In test data generation approaches, structural coverage criteria are popular and considered cost effective mainly because they are relatively easy to implement. However, we cannot establish a direct link between achieving good structural coverage and test goals such as finding errors. On the other hand, specific criteria can explicitly target such goals but they may require a full formal specification of the program, which makes them expensive and hard to use. In this paper, we propose a new approach to describe targeted test criteria using few structural information of the system under test. The new criteria can easily describe specific situations such as errors and can be transformed into a fitness function. A search technique, in this case ACO (Ant Colony Optimization), can then be used to automatically generate adequate test data. A case study is presented to illustrate the applicably and the usefulness of the approach.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133645290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Voting multiple classifiers decisions for spam detection 为垃圾邮件检测投票多个分类器决策
2012 International Conference on Information Technology and e-Services Pub Date : 2012-03-24 DOI: 10.1109/ICITES.2012.6216599
N. Barigou, F. Barigou, B. Atmani
{"title":"Voting multiple classifiers decisions for spam detection","authors":"N. Barigou, F. Barigou, B. Atmani","doi":"10.1109/ICITES.2012.6216599","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216599","url":null,"abstract":"A considerable amount of research and technology development has been emerged to address the problem of spam detection. Based on a Boolean cellular approach and naïve Bayes technique built as individual classifiers, we evaluate a novel method that combines these two classifiers to determine whether we can more accurately detect Spam. Experimental results show that the proposed combination increases the classification performance as measured on LingSpam dataset.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115899142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信