{"title":"A casestudy of data models in data warehousing","authors":"D. Mishra, A. Yazici, B. Başaran","doi":"10.1109/ICADIWT.2008.4664365","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664365","url":null,"abstract":"Data warehousing (DW) provides an excellent approach in transforming operational data into useful and reliable information to support the decision making process in any organization. In this paper, a case study is performed to implement a DW. This case-study is used to describe and compare various conceptual and logical design models for data warehousing. This comparison is done to find which of the conceptual and logical data models are more appropriate for implementing data warehouse for sales and shipping system.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123325670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A scalable method to protect from IP spoofing","authors":"H. Farhat","doi":"10.1109/ICADIWT.2008.4664411","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664411","url":null,"abstract":"Denial of Service (DoS) attacks present a serious problem for Internet communications. The problem is aggravated when the attacker(s) spoof their IP addresses. The Implicit Token Scheme (ITS), presented in , is an efficient method to defend against IP spoofing. ITS, however, requires perimeter routers to maintain state information for thousands of simultaneous connections. In this paper we add a component to ITS to improve its scalability using Bloom filters. It is found that implementing ITS using Bloom filters is simple, saves a substantial amount of router memory, and does not impose large strain on routers. The efficiency of the method is demonstrated through simulations by using real-world Internet data.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117244659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The performance of integrated wired networks with wireless networks","authors":"A. Al-Amawi, K. Khanfar, E. El-Qawasmeh","doi":"10.1109/ICADIWT.2008.4664389","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664389","url":null,"abstract":"Computer networks can be built using either wired or wireless technology. Although wired network has been the traditional choice, wireless technologies are becoming more popular. The primary purpose of this paper is to analyze the impact of a wired access method Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol and Token Ring protocol on the performance of an integrated wired with wireless LAN. Packet Reservation Multiple Access (PRMA) is used for wireless networks. The performance parameters, such as delay and throughput, of an integrated model have been analyzed in both PRMA-CSMA/CD and PRMA- Token Ring. A numerical analysis based on the performance analysis presented in this paper may help in studying the affect of wired access method CSMA/CD and Token Ring on system performance and stability of integrated wired with wireless networks.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134361886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A low-memory streaming algorithm for XSLT processing implemented in Xord framework","authors":"J. Dvořáková, F. Zavoral","doi":"10.1109/ICADIWT.2008.4664381","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664381","url":null,"abstract":"We present an implementation of the Xord framework for streaming processing of XSLT transformations based on .Net technologies. Within the framework, we implement an efficient streaming algorithm capable to process a significant subset of top-down XSLT transformations. We exactly characterize this class of transformations. The algorithm uses a stack of the size proportional to the depth of the input XML document. Such memory usage is highly efficient in practice, since real-world XML documents are shallow. The evaluation of the algorithm supports our expectations and shows that a transformation of large but shallow XML documents is processed using a constant size of memory.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"569 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116531252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Jini versus CORBA for distributed systems","authors":"F.M. El-Shehri, S. El-Beltagy, R. Bahgat","doi":"10.1109/ICADIWT.2008.4664397","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664397","url":null,"abstract":"This paper presents performance comparisons between the CORBA and Jini middleware. The goal of this work is to investigate the behavior of each middleware and discover classes of applications that may perform better under each one of them.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122070424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Financial informatics enterprise and audit risk in developing economy","authors":"E. Ariwa, K. Eseimokumoh","doi":"10.1109/ICADIWT.2008.4664367","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664367","url":null,"abstract":"Introduction Technology (IT) has had a radical impact on business processes in both developed and developing countries. It facilitates the streamlining of the administrative process and enables the decentralisation of the scope and scale of the business. An accounting information system (AIS) is the system of records a business keeps to maintain its accounting system. This includes the purchase, sales, and other financial processes of the business. The purpose of AIS is to accumulate data and provide decision makers (investors, creditors, and managers) with information to make decisions. While this was previously a paper-based process, most modern businesses now use computerised accounting software such as Sage, Peachtree, Pegasus, Oracle Financial, Iris etc. These are referred to as computerised accounting information system (CAIS). It should be noted that computerised accounting information systems (CAIS) and IT- based accounting systems mean one and the same thing. Both of these will be used interchangeably in this dissertation.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122752288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vector space model for Arabic information retrieval — application to “Hadith” indexing","authors":"F. Harrag, A. Hamdi-Cherif, E. El-Qawasmeh","doi":"10.1109/ICADIWT.2008.4664328","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664328","url":null,"abstract":"The Arabic language is one of the most important languages because it is the sacred and liturgical language of Islam, one of the influential monotheistic religions of our times. In the post-9/11 aftermath, Islam suddenly dominated western actuality for the remaining years of the present decade. Al-Qurpsilaan - The Reading par Excellence - and ldquoHadithrdquo - Saying - represent the two fundamental scriptural sources of Islamic Legislation. Specifically, ldquoHadithrdquo, or Prophetic Traditions, are sayings and doings of the Prophet of Islam (Peace and Blessings be upon Him). Researchers need automatic search tools within large ldquoHadithrdquo databasesto access one of the original sources of Islam. For this purpose, we describe the development of AuthenTique, an updated automatic text mining search tool, based on the vector space model (VSM). The aim is to allow the provision of a list of ldquoHadithsrdquo classified according to their degrees of similarity based on a given userpsilas query.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116213347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The role of cultural factors in software projects development","authors":"M. Tarawneh, H. Al-Tarawneh, A. Elsheikh","doi":"10.1109/ICADIWT.2008.4664351","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664351","url":null,"abstract":"This paper examines the role of cultural factors in software development, such as the project communication management, information distribution and behaviors and attitudes, The population of the study consists of all Jordanian institutions (n=96) work in software development. From the previous studies that was reviewed and the applied study that done by researchers in Jordanian firms it is clear for us the importance of cultural factors. So it is important for project team to deal with these factors in serious and careful manner. Project manager and team must have good knowledge in how to deal with these factors. Project manager and his team should make equivalence and comparison between the benefits of proposed system and the actual gaining that present in old system for both groups and individuals in organization, and persuade the gaining from proposed system better and more benefits for the individuals and groups in organization than old present system.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115490074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M.A. Nazir Raja, H. Farooq Ahmad, H. Suguri, P. Bloodsworth, N. Khalid
{"title":"SOA compliant FIPA agent communication language","authors":"M.A. Nazir Raja, H. Farooq Ahmad, H. Suguri, P. Bloodsworth, N. Khalid","doi":"10.1109/ICADIWT.2008.4664395","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664395","url":null,"abstract":"Agents and grid computing are distinct standards each defined by its own specifications. Semantic grid aims at providing semantic annotations for grid entities, WSMO is a language for semantic markup of grid services and provide semantic layer over grid resources. On the other hand, agents are intelligent software entities that can act semantically for interoperation with other agents in MAS. FIPA provides standard for MAS where agents speak FIPA ACL as the communication language while FIPA SL is the semantic language. Both FIPA SL and WSMO differ in terms of syntax, semantics and implementation constraints, which prevents interoperability between agents and grid services. This research addresses the issue of interoperability between FIPA agents and grid services by proposing a communication framework for interoperation; SOA compliant FIPA ACL ontology is developed; that provides the necessary vocabulary that not only adheres to the FIPA specifications but is also used by grid services.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116984747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A telecardiology system design with real-time diagnosis and teleconsultation","authors":"N. Ozen, B. Karlik","doi":"10.1109/ICADIWT.2008.4664400","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664400","url":null,"abstract":"Tele-cardiology is the practice of cardiology which utilizes telecommunications, and as such is a new alternate and cost-effective means of providing cardiac care. During the last few years there has been a constant increase in the incidence of cardiovascular chronic pathologies, mainly due to the aging of population. Tele-cardiology services enable patients suffering from these pathologies to communicate their clinical parameters (i.e. ECG) to specialists in order to receive a constant monitoring and quick support in case of an emergency. Tele-cardiology improves patients' assistance and can reduce the number and duration of hospitalizations. Tele-cardiology has two common goals in this work - first one is to reduce the healthcare costs of chronically ill patients while providing them access to healthcare providers and maintaining their quality of life. Second goal is to support with network software which satisfies share of necessary data and information for diagnosis of cardiology and to support communication between doctors who locate different locations.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126795278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}