{"title":"Enhancing IT security in organizations through knowledge management","authors":"A. Alhogail, J. Berri","doi":"10.1109/ICITES.2012.6216677","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216677","url":null,"abstract":"Security of Information Systems (IS) is a major concern for organizations nowadays as security related risks may affect the organization's information assets badly. Security systems in organizations can benefit a great deal from knowledge and experiences of security experts, practitioners and professionals if this knowledge is acquired, encoded into a knowledge management system and distilled appropriately to help decision making in IS security management. This paper proposes to enhance security of information systems through the development of an architecture sustaining knowledge of IT security within an organization. The architecture uses a tailored set of security processes, policies and solutions to protect the organization's business. The proposed architecture is used to capture the security related knowledge in order to share it and transfer it across the organization. The goal is to increase the efficiency of handling security incidents and to minimize the dependency on security expert personal.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114341628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VR-Stamp with DSP-TMS320C6711 for hand-free voice-driven monitoring robots navigation","authors":"M. Fezari, S. Lemboub, M. S. Boumaza","doi":"10.1109/ICITES.2012.6216653","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216653","url":null,"abstract":"The multiprocessor system is composed of pipelining a DSP processor for speech enhancement, a new voice recognition module for isolated word recognition and a microcontroller for transforming the voice order into coded byte to be transmitted to the robots via wireless transmission module. The resulting design is used to control via master-slave protocol a set of small mobile robots with sensors. The speech processor recognises the Arabic words then generates a code. A microcontroller produces a coded byte and transmit in to via a RF module the to robots. Since the system is an embedded device developed in order to be portable, it should be easy to carry and use, with low power consumption, thus the choice of power less consumption processors.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129509850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"e-Services using any phone & user's voice: Bridging Digital Divide & help global development","authors":"E. Khan, E. Aleisa","doi":"10.1109/ICITES.2012.6216609","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216609","url":null,"abstract":"With the rapid growth of e-Services (e-Learning, e-Health, e-Gov, e-Farming and the like), it is important that everyone can access such valuable services and get associated benefits. While such services are accessible and widely used by most educated people having access to the Internet via computers or high end phones, such services are not accessible by many people on the other side of the Digital Divide, namely, illiterate people, people having no access to a computer or high end phone, elderly people and people with disabilities. In this paper, we propose Voice Internet based e-Services that uses a state of the art “rendering” technology to convert existing e-Service application content into Short, Precise, easily Navigable, Meaningful and pleasant to listen to content in real time. Such “rendering” technology also supports voice based easy natural interaction with the e-Service applications by allowing to fill various on-line forms.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132582574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A model driven approach to compose and develop Grid service workflow applications","authors":"Y. Hlaoui, Leila Jemni Ben Ayed, Imen Ben Fradj","doi":"10.1109/ICITES.2012.6216638","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216638","url":null,"abstract":"We use a Domain Specific Language (DSL) based on UML activity diagrams (UML-AD) to specify and compose systematically workflow models from Grid services. To be executed, workflow activity diagram models should be translated into BPEL4WS models which will be executed by the BPEL4WS engine. To reach this objective, we propose a meta-model based transformation from UML activity diagrams to BPEL4WS language. To ensure the correctness and the completion of the transformation, we propose a graph homomorphic mapping between the activity diagram and BPEL4WS language elements. To execute the BPEL4WS provided model, we propose in this paper an execution infrastructure based on The Globus Tool Kit.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127986774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of encryption algorithm for wireless sensor networks","authors":"Soufiene Ben Othman, A. Trad, H. Youssef","doi":"10.1109/ICITES.2012.6216690","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216690","url":null,"abstract":"With the widespread growth in applications for resource limited Wireless Sensor Networks (WSN), the need for reliable and efficient security mechanisms for them has increased manifold but its implementation is a non-trivial task. Limitations in processing speed, battery power, bandwidth and memory constrain the applicability of existing cryptography Algorithms for WSNs. Several security mechanisms, such as TinySec, have been introduced to address the need for security in WSNs. The cost of security, however, still mostly remains an unknown variable. To provide a better understanding of this cost we have studied three encryption algorithms, AES, RC5 and RC6. We have measured and compared their memory and energy consumption on Mica2 sensor motes. The results of our experiments provide insight into the suitability of different security algorithms for use in WSN environments and could be used by WSN designers to construct the security architecture of their systems in a way that both satisfies the requirements of the application and reasonably uses the constrained sensor resources.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116505615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. A. Zemzami, B. Aksasse, M. Ouanan, A. Benkuider
{"title":"BEMD for three-dimensional medical images decomposition","authors":"O. A. Zemzami, B. Aksasse, M. Ouanan, A. Benkuider","doi":"10.1109/ICITES.2012.6216607","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216607","url":null,"abstract":"This paper presents an approach to three-dimensional medical images decomposition with Bidimensional Empirical Mode Decomposition (BEMD) technique. This decomposition, obtained by a process known as sifting process, allows extracting the structures at different scales and spatial frequencies with modulation in amplitudes and frequency.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122705612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelisation of bio inspired systems using MDA","authors":"S. Mili, D. Meslati","doi":"10.1109/ICITES.2012.6216606","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216606","url":null,"abstract":"As the abstractions presented by biologically inspired systems, systems architects will be required to include the abstractions in their architecture in order to communicate the design to system implementers. The paper describes a new formalism based on biology and Model Driven Architecture (MDA) in order to find a new and easy way to design and understand (reverse engineering) a complex bio inspired system. The paper also describes then a set of bio inspired views which are used when describing bio inspired system. Finally we use the proposed approach to model Xor artificial neural network.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124053231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey on the literature of ontology mapping, alignment and merging","authors":"S. Amrouch, S. Mostefai","doi":"10.1109/ICITES.2012.6216651","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216651","url":null,"abstract":"Ontology Mapping, Alignment and Merging are a prominent field of research for the AI community. Indeed, an ontology is designed and developed to be shared among multiple applications and working communities. In other words, several ontologies need to be accessed by different information systems. The Mapping, Alignment or Merging of ontologies build a meta-layer that allows different applications to access the resulting ontology and then to share their informations, of course, whith preserving the semantics they contain. This later is done after solving the different forms of heterogeneity presented by the input ontologies. A key challenge is then raised by the researchers in AI community to exploit the potential of these ontological operations in several applications domain such as semantic query processing, data integration, data warehousing, E-Buziness and E-Commerce, etc. The aim of this paper is to provide the reader, who is not very familiar with the ontology domain, an introduction to the three main operations performed on ontologies. These operations provide a prominent basis for several other operations such as translation, reconciliation, coordination and negotiation between ontologies. This prominent basis is supported by the mapping discovery results between input ontologies. Design and develop such operations on ontologies, was the focus of several research communities for several years. In this paper, we have surveyed the literature of the different methods and tools for ontology mapping, alignment and merging and described the different approaches adopted by their designers after detailing the most important module (mappings discovery) and discussed the different heterogeneity forms resolved by their algorithms.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126534135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aggregated search in XML documents: What to retrieve?","authors":"N. Naffakhi, R. Faiz","doi":"10.1109/ICITES.2012.6216614","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216614","url":null,"abstract":"In this paper, we are interested in aggregated search in XML documents. Our goal is to retrieve the best set of XML elements to be returned. We present a structured information retrieval model based on the Bayesian networks theory. The networks structure provides a natural representation of links between a document, its elements, and its contents. In this model, the user's query starts a propagation process to recover the XML elements. Thus, instead of retrieving a whole document or a list of disjoint elements that are likely to answer partially the query, we attempt to build a virtual document that aggregates a set of elements that are relevant and complementary. We evaluated our approach using the INEX 2009 collection and presented some empirical results for evaluating the impact of the aggregation approach.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134449111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent framework for resource discovery in peer to peer systems","authors":"I. Lekhal, R. Mekki","doi":"10.1109/ICITES.2012.6216634","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216634","url":null,"abstract":"A Peer-To-Peer (P2P) is a new technological system. It contains a number of devolved distributed Network nodes that are capable of sharing resources without central supervision. The IP-phone as one distinguished application as well as divided computing and others have taken up the P2P into their base communication systems. One of the most noticeable roles of the P2P is the location of resources. This later however, is not easy to attain due to the P2P intrinsic nature, i.e. dynamic reconfiguration of the network. With a particular focus on the importance of the concept of the resource discovery, this article will attempt to describe and highlight our proposal which is about a smart based architecture that is concerned with the linkage of paradigm mobile agent and semantic web while ensuring the resource location in a context of pure P2P system.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134639659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}