2012 International Conference on Information Technology and e-Services最新文献

筛选
英文 中文
Enhancing IT security in organizations through knowledge management 透过知识管理加强机构的资讯科技保安
2012 International Conference on Information Technology and e-Services Pub Date : 2012-03-24 DOI: 10.1109/ICITES.2012.6216677
A. Alhogail, J. Berri
{"title":"Enhancing IT security in organizations through knowledge management","authors":"A. Alhogail, J. Berri","doi":"10.1109/ICITES.2012.6216677","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216677","url":null,"abstract":"Security of Information Systems (IS) is a major concern for organizations nowadays as security related risks may affect the organization's information assets badly. Security systems in organizations can benefit a great deal from knowledge and experiences of security experts, practitioners and professionals if this knowledge is acquired, encoded into a knowledge management system and distilled appropriately to help decision making in IS security management. This paper proposes to enhance security of information systems through the development of an architecture sustaining knowledge of IT security within an organization. The architecture uses a tailored set of security processes, policies and solutions to protect the organization's business. The proposed architecture is used to capture the security related knowledge in order to share it and transfer it across the organization. The goal is to increase the efficiency of handling security incidents and to minimize the dependency on security expert personal.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114341628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
VR-Stamp with DSP-TMS320C6711 for hand-free voice-driven monitoring robots navigation VR-Stamp带有DSP-TMS320C6711,用于免提语音驱动的监控机器人导航
2012 International Conference on Information Technology and e-Services Pub Date : 2012-03-24 DOI: 10.1109/ICITES.2012.6216653
M. Fezari, S. Lemboub, M. S. Boumaza
{"title":"VR-Stamp with DSP-TMS320C6711 for hand-free voice-driven monitoring robots navigation","authors":"M. Fezari, S. Lemboub, M. S. Boumaza","doi":"10.1109/ICITES.2012.6216653","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216653","url":null,"abstract":"The multiprocessor system is composed of pipelining a DSP processor for speech enhancement, a new voice recognition module for isolated word recognition and a microcontroller for transforming the voice order into coded byte to be transmitted to the robots via wireless transmission module. The resulting design is used to control via master-slave protocol a set of small mobile robots with sensors. The speech processor recognises the Arabic words then generates a code. A microcontroller produces a coded byte and transmit in to via a RF module the to robots. Since the system is an embedded device developed in order to be portable, it should be easy to carry and use, with low power consumption, thus the choice of power less consumption processors.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129509850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
e-Services using any phone & user's voice: Bridging Digital Divide & help global development 使用任何电话和用户声音的电子服务:弥合数字鸿沟,帮助全球发展
2012 International Conference on Information Technology and e-Services Pub Date : 2012-03-24 DOI: 10.1109/ICITES.2012.6216609
E. Khan, E. Aleisa
{"title":"e-Services using any phone & user's voice: Bridging Digital Divide & help global development","authors":"E. Khan, E. Aleisa","doi":"10.1109/ICITES.2012.6216609","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216609","url":null,"abstract":"With the rapid growth of e-Services (e-Learning, e-Health, e-Gov, e-Farming and the like), it is important that everyone can access such valuable services and get associated benefits. While such services are accessible and widely used by most educated people having access to the Internet via computers or high end phones, such services are not accessible by many people on the other side of the Digital Divide, namely, illiterate people, people having no access to a computer or high end phone, elderly people and people with disabilities. In this paper, we propose Voice Internet based e-Services that uses a state of the art “rendering” technology to convert existing e-Service application content into Short, Precise, easily Navigable, Meaningful and pleasant to listen to content in real time. Such “rendering” technology also supports voice based easy natural interaction with the e-Service applications by allowing to fill various on-line forms.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132582574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A model driven approach to compose and develop Grid service workflow applications 一个模型驱动的方法来组合和开发网格服务工作流应用程序
2012 International Conference on Information Technology and e-Services Pub Date : 2012-03-24 DOI: 10.1109/ICITES.2012.6216638
Y. Hlaoui, Leila Jemni Ben Ayed, Imen Ben Fradj
{"title":"A model driven approach to compose and develop Grid service workflow applications","authors":"Y. Hlaoui, Leila Jemni Ben Ayed, Imen Ben Fradj","doi":"10.1109/ICITES.2012.6216638","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216638","url":null,"abstract":"We use a Domain Specific Language (DSL) based on UML activity diagrams (UML-AD) to specify and compose systematically workflow models from Grid services. To be executed, workflow activity diagram models should be translated into BPEL4WS models which will be executed by the BPEL4WS engine. To reach this objective, we propose a meta-model based transformation from UML activity diagrams to BPEL4WS language. To ensure the correctness and the completion of the transformation, we propose a graph homomorphic mapping between the activity diagram and BPEL4WS language elements. To execute the BPEL4WS provided model, we propose in this paper an execution infrastructure based on The Globus Tool Kit.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127986774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of encryption algorithm for wireless sensor networks 无线传感器网络加密算法的性能评价
2012 International Conference on Information Technology and e-Services Pub Date : 2012-03-24 DOI: 10.1109/ICITES.2012.6216690
Soufiene Ben Othman, A. Trad, H. Youssef
{"title":"Performance evaluation of encryption algorithm for wireless sensor networks","authors":"Soufiene Ben Othman, A. Trad, H. Youssef","doi":"10.1109/ICITES.2012.6216690","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216690","url":null,"abstract":"With the widespread growth in applications for resource limited Wireless Sensor Networks (WSN), the need for reliable and efficient security mechanisms for them has increased manifold but its implementation is a non-trivial task. Limitations in processing speed, battery power, bandwidth and memory constrain the applicability of existing cryptography Algorithms for WSNs. Several security mechanisms, such as TinySec, have been introduced to address the need for security in WSNs. The cost of security, however, still mostly remains an unknown variable. To provide a better understanding of this cost we have studied three encryption algorithms, AES, RC5 and RC6. We have measured and compared their memory and energy consumption on Mica2 sensor motes. The results of our experiments provide insight into the suitability of different security algorithms for use in WSN environments and could be used by WSN designers to construct the security architecture of their systems in a way that both satisfies the requirements of the application and reasonably uses the constrained sensor resources.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116505615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
BEMD for three-dimensional medical images decomposition BEMD用于三维医学图像的分解
2012 International Conference on Information Technology and e-Services Pub Date : 2012-03-24 DOI: 10.1109/ICITES.2012.6216607
O. A. Zemzami, B. Aksasse, M. Ouanan, A. Benkuider
{"title":"BEMD for three-dimensional medical images decomposition","authors":"O. A. Zemzami, B. Aksasse, M. Ouanan, A. Benkuider","doi":"10.1109/ICITES.2012.6216607","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216607","url":null,"abstract":"This paper presents an approach to three-dimensional medical images decomposition with Bidimensional Empirical Mode Decomposition (BEMD) technique. This decomposition, obtained by a process known as sifting process, allows extracting the structures at different scales and spatial frequencies with modulation in amplitudes and frequency.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122705612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelisation of bio inspired systems using MDA 使用MDA的生物启发系统建模
2012 International Conference on Information Technology and e-Services Pub Date : 2012-03-24 DOI: 10.1109/ICITES.2012.6216606
S. Mili, D. Meslati
{"title":"Modelisation of bio inspired systems using MDA","authors":"S. Mili, D. Meslati","doi":"10.1109/ICITES.2012.6216606","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216606","url":null,"abstract":"As the abstractions presented by biologically inspired systems, systems architects will be required to include the abstractions in their architecture in order to communicate the design to system implementers. The paper describes a new formalism based on biology and Model Driven Architecture (MDA) in order to find a new and easy way to design and understand (reverse engineering) a complex bio inspired system. The paper also describes then a set of bio inspired views which are used when describing bio inspired system. Finally we use the proposed approach to model Xor artificial neural network.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124053231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on the literature of ontology mapping, alignment and merging 本体映射、对齐与合并的文献综述
2012 International Conference on Information Technology and e-Services Pub Date : 2012-03-24 DOI: 10.1109/ICITES.2012.6216651
S. Amrouch, S. Mostefai
{"title":"Survey on the literature of ontology mapping, alignment and merging","authors":"S. Amrouch, S. Mostefai","doi":"10.1109/ICITES.2012.6216651","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216651","url":null,"abstract":"Ontology Mapping, Alignment and Merging are a prominent field of research for the AI community. Indeed, an ontology is designed and developed to be shared among multiple applications and working communities. In other words, several ontologies need to be accessed by different information systems. The Mapping, Alignment or Merging of ontologies build a meta-layer that allows different applications to access the resulting ontology and then to share their informations, of course, whith preserving the semantics they contain. This later is done after solving the different forms of heterogeneity presented by the input ontologies. A key challenge is then raised by the researchers in AI community to exploit the potential of these ontological operations in several applications domain such as semantic query processing, data integration, data warehousing, E-Buziness and E-Commerce, etc. The aim of this paper is to provide the reader, who is not very familiar with the ontology domain, an introduction to the three main operations performed on ontologies. These operations provide a prominent basis for several other operations such as translation, reconciliation, coordination and negotiation between ontologies. This prominent basis is supported by the mapping discovery results between input ontologies. Design and develop such operations on ontologies, was the focus of several research communities for several years. In this paper, we have surveyed the literature of the different methods and tools for ontology mapping, alignment and merging and described the different approaches adopted by their designers after detailing the most important module (mappings discovery) and discussed the different heterogeneity forms resolved by their algorithms.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126534135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Aggregated search in XML documents: What to retrieve? XML文档中的聚合搜索:检索什么?
2012 International Conference on Information Technology and e-Services Pub Date : 2012-03-24 DOI: 10.1109/ICITES.2012.6216614
N. Naffakhi, R. Faiz
{"title":"Aggregated search in XML documents: What to retrieve?","authors":"N. Naffakhi, R. Faiz","doi":"10.1109/ICITES.2012.6216614","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216614","url":null,"abstract":"In this paper, we are interested in aggregated search in XML documents. Our goal is to retrieve the best set of XML elements to be returned. We present a structured information retrieval model based on the Bayesian networks theory. The networks structure provides a natural representation of links between a document, its elements, and its contents. In this model, the user's query starts a propagation process to recover the XML elements. Thus, instead of retrieving a whole document or a list of disjoint elements that are likely to answer partially the query, we attempt to build a virtual document that aggregates a set of elements that are relevant and complementary. We evaluated our approach using the INEX 2009 collection and presented some empirical results for evaluating the impact of the aggregation approach.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134449111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intelligent framework for resource discovery in peer to peer systems 对等系统中资源发现的智能框架
2012 International Conference on Information Technology and e-Services Pub Date : 2012-03-24 DOI: 10.1109/ICITES.2012.6216634
I. Lekhal, R. Mekki
{"title":"Intelligent framework for resource discovery in peer to peer systems","authors":"I. Lekhal, R. Mekki","doi":"10.1109/ICITES.2012.6216634","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216634","url":null,"abstract":"A Peer-To-Peer (P2P) is a new technological system. It contains a number of devolved distributed Network nodes that are capable of sharing resources without central supervision. The IP-phone as one distinguished application as well as divided computing and others have taken up the P2P into their base communication systems. One of the most noticeable roles of the P2P is the location of resources. This later however, is not easy to attain due to the P2P intrinsic nature, i.e. dynamic reconfiguration of the network. With a particular focus on the importance of the concept of the resource discovery, this article will attempt to describe and highlight our proposal which is about a smart based architecture that is concerned with the linkage of paradigm mobile agent and semantic web while ensuring the resource location in a context of pure P2P system.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134639659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信