2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)最新文献

筛选
英文 中文
A casestudy of data models in data warehousing 数据仓库中数据模型的案例研究
D. Mishra, A. Yazici, B. Başaran
{"title":"A casestudy of data models in data warehousing","authors":"D. Mishra, A. Yazici, B. Başaran","doi":"10.1109/ICADIWT.2008.4664365","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664365","url":null,"abstract":"Data warehousing (DW) provides an excellent approach in transforming operational data into useful and reliable information to support the decision making process in any organization. In this paper, a case study is performed to implement a DW. This case-study is used to describe and compare various conceptual and logical design models for data warehousing. This comparison is done to find which of the conceptual and logical data models are more appropriate for implementing data warehouse for sales and shipping system.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123325670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A scalable method to protect from IP spoofing 一种可扩展的方法来防止IP欺骗
H. Farhat
{"title":"A scalable method to protect from IP spoofing","authors":"H. Farhat","doi":"10.1109/ICADIWT.2008.4664411","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664411","url":null,"abstract":"Denial of Service (DoS) attacks present a serious problem for Internet communications. The problem is aggravated when the attacker(s) spoof their IP addresses. The Implicit Token Scheme (ITS), presented in , is an efficient method to defend against IP spoofing. ITS, however, requires perimeter routers to maintain state information for thousands of simultaneous connections. In this paper we add a component to ITS to improve its scalability using Bloom filters. It is found that implementing ITS using Bloom filters is simple, saves a substantial amount of router memory, and does not impose large strain on routers. The efficiency of the method is demonstrated through simulations by using real-world Internet data.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117244659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The performance of integrated wired networks with wireless networks 有线网络与无线网络的综合性能
A. Al-Amawi, K. Khanfar, E. El-Qawasmeh
{"title":"The performance of integrated wired networks with wireless networks","authors":"A. Al-Amawi, K. Khanfar, E. El-Qawasmeh","doi":"10.1109/ICADIWT.2008.4664389","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664389","url":null,"abstract":"Computer networks can be built using either wired or wireless technology. Although wired network has been the traditional choice, wireless technologies are becoming more popular. The primary purpose of this paper is to analyze the impact of a wired access method Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol and Token Ring protocol on the performance of an integrated wired with wireless LAN. Packet Reservation Multiple Access (PRMA) is used for wireless networks. The performance parameters, such as delay and throughput, of an integrated model have been analyzed in both PRMA-CSMA/CD and PRMA- Token Ring. A numerical analysis based on the performance analysis presented in this paper may help in studying the affect of wired access method CSMA/CD and Token Ring on system performance and stability of integrated wired with wireless networks.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134361886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A low-memory streaming algorithm for XSLT processing implemented in Xord framework 在Xord框架中实现的用于XSLT处理的低内存流算法
J. Dvořáková, F. Zavoral
{"title":"A low-memory streaming algorithm for XSLT processing implemented in Xord framework","authors":"J. Dvořáková, F. Zavoral","doi":"10.1109/ICADIWT.2008.4664381","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664381","url":null,"abstract":"We present an implementation of the Xord framework for streaming processing of XSLT transformations based on .Net technologies. Within the framework, we implement an efficient streaming algorithm capable to process a significant subset of top-down XSLT transformations. We exactly characterize this class of transformations. The algorithm uses a stack of the size proportional to the depth of the input XML document. Such memory usage is highly efficient in practice, since real-world XML documents are shallow. The evaluation of the algorithm supports our expectations and shows that a transformation of large but shallow XML documents is processed using a constant size of memory.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"569 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116531252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Jini versus CORBA for distributed systems 用于分布式系统的Jini与CORBA
F.M. El-Shehri, S. El-Beltagy, R. Bahgat
{"title":"Jini versus CORBA for distributed systems","authors":"F.M. El-Shehri, S. El-Beltagy, R. Bahgat","doi":"10.1109/ICADIWT.2008.4664397","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664397","url":null,"abstract":"This paper presents performance comparisons between the CORBA and Jini middleware. The goal of this work is to investigate the behavior of each middleware and discover classes of applications that may perform better under each one of them.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122070424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Financial informatics enterprise and audit risk in developing economy 经济发展中的财务信息企业与审计风险
E. Ariwa, K. Eseimokumoh
{"title":"Financial informatics enterprise and audit risk in developing economy","authors":"E. Ariwa, K. Eseimokumoh","doi":"10.1109/ICADIWT.2008.4664367","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664367","url":null,"abstract":"Introduction Technology (IT) has had a radical impact on business processes in both developed and developing countries. It facilitates the streamlining of the administrative process and enables the decentralisation of the scope and scale of the business. An accounting information system (AIS) is the system of records a business keeps to maintain its accounting system. This includes the purchase, sales, and other financial processes of the business. The purpose of AIS is to accumulate data and provide decision makers (investors, creditors, and managers) with information to make decisions. While this was previously a paper-based process, most modern businesses now use computerised accounting software such as Sage, Peachtree, Pegasus, Oracle Financial, Iris etc. These are referred to as computerised accounting information system (CAIS). It should be noted that computerised accounting information systems (CAIS) and IT- based accounting systems mean one and the same thing. Both of these will be used interchangeably in this dissertation.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122752288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Vector space model for Arabic information retrieval — application to “Hadith” indexing 阿拉伯语信息检索的向量空间模型——在“圣训”索引中的应用
F. Harrag, A. Hamdi-Cherif, E. El-Qawasmeh
{"title":"Vector space model for Arabic information retrieval — application to “Hadith” indexing","authors":"F. Harrag, A. Hamdi-Cherif, E. El-Qawasmeh","doi":"10.1109/ICADIWT.2008.4664328","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664328","url":null,"abstract":"The Arabic language is one of the most important languages because it is the sacred and liturgical language of Islam, one of the influential monotheistic religions of our times. In the post-9/11 aftermath, Islam suddenly dominated western actuality for the remaining years of the present decade. Al-Qurpsilaan - The Reading par Excellence - and ldquoHadithrdquo - Saying - represent the two fundamental scriptural sources of Islamic Legislation. Specifically, ldquoHadithrdquo, or Prophetic Traditions, are sayings and doings of the Prophet of Islam (Peace and Blessings be upon Him). Researchers need automatic search tools within large ldquoHadithrdquo databasesto access one of the original sources of Islam. For this purpose, we describe the development of AuthenTique, an updated automatic text mining search tool, based on the vector space model (VSM). The aim is to allow the provision of a list of ldquoHadithsrdquo classified according to their degrees of similarity based on a given userpsilas query.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116213347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
The role of cultural factors in software projects development 文化因素在软件项目开发中的作用
M. Tarawneh, H. Al-Tarawneh, A. Elsheikh
{"title":"The role of cultural factors in software projects development","authors":"M. Tarawneh, H. Al-Tarawneh, A. Elsheikh","doi":"10.1109/ICADIWT.2008.4664351","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664351","url":null,"abstract":"This paper examines the role of cultural factors in software development, such as the project communication management, information distribution and behaviors and attitudes, The population of the study consists of all Jordanian institutions (n=96) work in software development. From the previous studies that was reviewed and the applied study that done by researchers in Jordanian firms it is clear for us the importance of cultural factors. So it is important for project team to deal with these factors in serious and careful manner. Project manager and team must have good knowledge in how to deal with these factors. Project manager and his team should make equivalence and comparison between the benefits of proposed system and the actual gaining that present in old system for both groups and individuals in organization, and persuade the gaining from proposed system better and more benefits for the individuals and groups in organization than old present system.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115490074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SOA compliant FIPA agent communication language SOA兼容的FIPA代理通信语言
M.A. Nazir Raja, H. Farooq Ahmad, H. Suguri, P. Bloodsworth, N. Khalid
{"title":"SOA compliant FIPA agent communication language","authors":"M.A. Nazir Raja, H. Farooq Ahmad, H. Suguri, P. Bloodsworth, N. Khalid","doi":"10.1109/ICADIWT.2008.4664395","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664395","url":null,"abstract":"Agents and grid computing are distinct standards each defined by its own specifications. Semantic grid aims at providing semantic annotations for grid entities, WSMO is a language for semantic markup of grid services and provide semantic layer over grid resources. On the other hand, agents are intelligent software entities that can act semantically for interoperation with other agents in MAS. FIPA provides standard for MAS where agents speak FIPA ACL as the communication language while FIPA SL is the semantic language. Both FIPA SL and WSMO differ in terms of syntax, semantics and implementation constraints, which prevents interoperability between agents and grid services. This research addresses the issue of interoperability between FIPA agents and grid services by proposing a communication framework for interoperation; SOA compliant FIPA ACL ontology is developed; that provides the necessary vocabulary that not only adheres to the FIPA specifications but is also used by grid services.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116984747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A telecardiology system design with real-time diagnosis and teleconsultation 具有实时诊断和远程会诊功能的心电系统设计
N. Ozen, B. Karlik
{"title":"A telecardiology system design with real-time diagnosis and teleconsultation","authors":"N. Ozen, B. Karlik","doi":"10.1109/ICADIWT.2008.4664400","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664400","url":null,"abstract":"Tele-cardiology is the practice of cardiology which utilizes telecommunications, and as such is a new alternate and cost-effective means of providing cardiac care. During the last few years there has been a constant increase in the incidence of cardiovascular chronic pathologies, mainly due to the aging of population. Tele-cardiology services enable patients suffering from these pathologies to communicate their clinical parameters (i.e. ECG) to specialists in order to receive a constant monitoring and quick support in case of an emergency. Tele-cardiology improves patients' assistance and can reduce the number and duration of hospitalizations. Tele-cardiology has two common goals in this work - first one is to reduce the healthcare costs of chronically ill patients while providing them access to healthcare providers and maintaining their quality of life. Second goal is to support with network software which satisfies share of necessary data and information for diagnosis of cardiology and to support communication between doctors who locate different locations.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126795278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信