2016 7th International Conference on Computer Science and Information Technology (CSIT)最新文献

筛选
英文 中文
Using GPUs to speed-up FCM-based community detection in Social Networks 利用gpu加速社交网络中基于fcm的社区检测
Mohammed N. Alandoli, M. Shehab, M. Al-Ayyoub, Y. Jararweh, Mohammad Al-Smadi
{"title":"Using GPUs to speed-up FCM-based community detection in Social Networks","authors":"Mohammed N. Alandoli, M. Shehab, M. Al-Ayyoub, Y. Jararweh, Mohammad Al-Smadi","doi":"10.1109/CSIT.2016.7549467","DOIUrl":"https://doi.org/10.1109/CSIT.2016.7549467","url":null,"abstract":"One of the important features of Social Networks (SNs) is community structure detection. Several methods have been proposed to address this problem. One of the interesting methods is based on the famous Fuzzy C-Means (FCM) clustering algorithm. This method consists of three phases: spectral mapping, FCM clustering and modularity computation. Despite being very effective, this method is actually inefficient to deal with large-scale networks. A parallel implementation using GPUs is one of the feasible solutions to address this problem. Hence, this research presents a parallel implementation of FCM and modularity components of the algorithms. The implementation follows the hybrid CPU-GPU approach. We study the many factors affecting the performance speedups, such as the number of dimensions/features and the network size.","PeriodicalId":210905,"journal":{"name":"2016 7th International Conference on Computer Science and Information Technology (CSIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128802132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Application domain and programming language readability yardsticks 应用领域和编程语言的可读性标准
Mohammed Akour, B. Falah
{"title":"Application domain and programming language readability yardsticks","authors":"Mohammed Akour, B. Falah","doi":"10.1109/CSIT.2016.7549476","DOIUrl":"https://doi.org/10.1109/CSIT.2016.7549476","url":null,"abstract":"Software maintainability is one of the most factors that used to ensure software quality. It targets the structure of the software rather than its functionality. Hence, code readability is highlighted whenever maintainability is discussed. There is a huge difference between an organized code and a messy code, or between easy to read code and a difficult to read code. This difference can be very subjective but many efforts have been put together in order to formalize it. Therefore, the result was a set of readability factors that have a direct or indirect impact on software readability. These factors measure to which extent readers can understand the text of the software code. Many metrics were developed to generalize the readability score across a set of pieces of code. Unfortunately, not all proposed metrics take into account the possibility of having variable readability factors. This paper tries to investigate to which extent the readability factors considering different application domains. Since readability is very subjective, it will be interesting to see whether it is useful to have specialized readability models that measure this attribute. This also implies looking into the impact of these readability models on measuring software quality.","PeriodicalId":210905,"journal":{"name":"2016 7th International Conference on Computer Science and Information Technology (CSIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129021751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Managing sub-group interactions and communication in group collaboration activities 在小组协作活动中管理子小组的互动和沟通
Norzilah Musa, S. Z. Abidin, N. Omar
{"title":"Managing sub-group interactions and communication in group collaboration activities","authors":"Norzilah Musa, S. Z. Abidin, N. Omar","doi":"10.1109/CSIT.2016.7549483","DOIUrl":"https://doi.org/10.1109/CSIT.2016.7549483","url":null,"abstract":"In the collaborative working environment, users in a group activity are formally communicated to each other in the public workspace to collaboratively develop information artefact. However, complex tasks activities required dynamic and creative solutions that need additional spaces for private and informal interactions among group members. Hence, one group project may consist of various sub-group activities with different communication strategies based on the needs of the task. Currently, the existing systems do not provide the mechanism for users to define their own sub-group communication dimensions with preferable users. To this end, we propose an approach to enable the propagation communication dimension that associated with sub-group activity in the collaborative workspace. We formulate the multi-dimensional communication model based on user-to-user and user-to-group relationships that facilitate users in controlling the communication flow. In order to justify that our approach is applicable, we describe the possible user relations in several abstract scene scenario.","PeriodicalId":210905,"journal":{"name":"2016 7th International Conference on Computer Science and Information Technology (CSIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128495371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Minimum spanning tree-based multicast routing protocol for dynamic spectrum access networks: A multi-layer probabilistic approach 基于最小生成树的动态频谱接入网组播路由协议:一种多层概率方法
Mustafa Al-Rubaye, H. Salameh, Y. Jararweh
{"title":"Minimum spanning tree-based multicast routing protocol for dynamic spectrum access networks: A multi-layer probabilistic approach","authors":"Mustafa Al-Rubaye, H. Salameh, Y. Jararweh","doi":"10.1109/CSIT.2016.7549462","DOIUrl":"https://doi.org/10.1109/CSIT.2016.7549462","url":null,"abstract":"In this paper, we propose a multi-layer multicast routing protocol for multi-hop mobile ad hoc cognitive radio (CR) networks. The proposed protocol employs a probabilistic approach in performing the channel assignment and path selection process based on the concept of minimum spanning tree (MST). Our protocol accounts for the unique features of CR operating environment. Simulations experiments are conducted to investigate the effectiveness of the our protocol under various network conditions in terms of network throughput and packet delivery rate. Compared with reference CR multicast protocols, simulations results show that our multi-layer multicast protocol signif cantly improves network performance.","PeriodicalId":210905,"journal":{"name":"2016 7th International Conference on Computer Science and Information Technology (CSIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129652021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Phoenix: A MapReduce implementation with new enhancements Phoenix:一个带有新增强的MapReduce实现
A. Al-Badarneh, Hassan M. Najadat, Majd Al-Soud, Rasha Mosaid
{"title":"Phoenix: A MapReduce implementation with new enhancements","authors":"A. Al-Badarneh, Hassan M. Najadat, Majd Al-Soud, Rasha Mosaid","doi":"10.1109/CSIT.2016.7549451","DOIUrl":"https://doi.org/10.1109/CSIT.2016.7549451","url":null,"abstract":"Lately, the large increasing in data amount results in compound and large data-sets that caused the appearance of “Big Data” concept which gained the attention of industrial organizations as well as academic communities. Big data APIs that need large memory can benefit from Phoenix MapReduce implementation for shared-memory machines, instead of large, distributed clusters of computers. This paper evaluates the design and the prototype of Phoenix, Phoenix performance, as well as Phoenix limitations. This paper also suggests some new approaches to get over of some Phoenix limitation and enhance its performance on large-scale shared memory. The major contribution of this work is finding new approaches that get over the <;key, value> pairs limitation in phoenix framework using hash tables with B+Trees and get over the collisions problem of hash tables.","PeriodicalId":210905,"journal":{"name":"2016 7th International Conference on Computer Science and Information Technology (CSIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127603351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy preserving data mining on published data in healthcare: A survey 医疗保健中发布数据的隐私保护数据挖掘:一项调查
Lina A. Abuwardih, Wa'ed Shatnawi, Ahmed Aleroud
{"title":"Privacy preserving data mining on published data in healthcare: A survey","authors":"Lina A. Abuwardih, Wa'ed Shatnawi, Ahmed Aleroud","doi":"10.1109/CSIT.2016.7549444","DOIUrl":"https://doi.org/10.1109/CSIT.2016.7549444","url":null,"abstract":"Healthcare data is considered very significant to researchers in this field. Such information must be published with methods that keep the identity of patients hidden especially when dealing with sensitive information. Publishing such information makes it more vulnerable to attackers. As such, many techniques were proposed to preserve the privacy of healthcare data. In this paper, we illustrated a survey for the models and techniques that are used for publishing data about patients.","PeriodicalId":210905,"journal":{"name":"2016 7th International Conference on Computer Science and Information Technology (CSIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114516221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Software evolution visualization techniques and methods - a systematic review 软件进化可视化技术与方法系统综述
Hani Bani Salameh, Ayat Ahmad, A. Aljammal
{"title":"Software evolution visualization techniques and methods - a systematic review","authors":"Hani Bani Salameh, Ayat Ahmad, A. Aljammal","doi":"10.1109/CSIT.2016.7549475","DOIUrl":"https://doi.org/10.1109/CSIT.2016.7549475","url":null,"abstract":"Background: Software is an important asset for organizations and development teams. It must evolve over time in order to meet different changes in its environment, satisfy the developers' needs, and adapt to new requirements. Software developers and team members face difficulties tracking the changes others made to their software. Software visualization is one of the effective techniques that help stakeholders to better understand how software evolves, and which parts of the software are most affected by the change. Many visualization tools and techniques have been introduced by researchers and organizations to facilitate such understanding. Method: This article presents a systematic literature review (SLR) on software evolution visualization (SEV) tools. The SLR's main focus is to: (1) explore the main target of SEV, (2) analyze the classifications and taxonomies that are used to represent SEV tools, and (3) find out what are the main sources of information used to visualize software's evolution. Result: 29 papers were analyzed out of 55 papers. The result showed that SEV tools can be classified into five different groups: graph-based, notation-based, matrix-based, and metaphor-based and others. Graph-based are most popular while Notation-based are the least. SEVs focus can be either Artifact-centric visualization, Metric-centric visualization, Feature-centric visualization, or Architecture-centric visualization. The main source of information used to ex-tract information are the software repositories. Conclusion: This work can help developer, maintainer, researcher to get good knowledge about the state of software evolution and visualization as a whole.","PeriodicalId":210905,"journal":{"name":"2016 7th International Conference on Computer Science and Information Technology (CSIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123229632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Metric and rule based automated detection of antipatterns in object-oriented software systems 面向对象软件系统中基于度量和规则的反模式自动检测
Mehmed Taha Aras, Y. E. Selçuk
{"title":"Metric and rule based automated detection of antipatterns in object-oriented software systems","authors":"Mehmed Taha Aras, Y. E. Selçuk","doi":"10.1109/CSIT.2016.7549470","DOIUrl":"https://doi.org/10.1109/CSIT.2016.7549470","url":null,"abstract":"Patterns are techniques to improve design and enhance reusability. Design patterns are general solutions which are used for common problems in object oriented systems. Code and design smells are symptoms of weak design and development, problems that reside deep in code and reduce the quality of software. The antipattern concept is also introduced as poor solutions to solve recurring problems, even though developers think that they practice a design pattern. It is proven that antipatterns have negative effects on maintainability, flexibility and readability of object oriented software systems. In this research, we propose a metric and a rule based automated antipattern detection system for object oriented software. This system consists of three main mechanisms to detect an antipattern. These mechanisms are “Metric Analyzer”, “Static Code Analyzer” and “Filtering Mechanism”. We specified three antipatterns to analyze; namely Blob, Swiss Army Knife and Lava Flow. Thresholds that are used to detect antipatterns are determined considering six reference projects' results and averages of the analyzed project itself. Detection algorithms have been applied on a set of hand-crafted Java classes and accuracy percentages are measured according to the produced results.","PeriodicalId":210905,"journal":{"name":"2016 7th International Conference on Computer Science and Information Technology (CSIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115395477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Developing 3D model for mobile robot environment using mono-vision system 利用单视觉系统建立移动机器人环境的三维模型
M. Al-Jarrah
{"title":"Developing 3D model for mobile robot environment using mono-vision system","authors":"M. Al-Jarrah","doi":"10.1109/CSIT.2016.7549466","DOIUrl":"https://doi.org/10.1109/CSIT.2016.7549466","url":null,"abstract":"Mobile robot system will be an important asset in our future. Mobile robot not only has to execute predefined tasks programmed with, but also it must explore the unknown environment that might be pushed to work in. In this paper we propose, implement and test a new model for mobile robot environment using mono-vision system. This proposed system develops 3D environment model utilizing mono-vision system. The model is developed through capturing multiple shots from different locations. The 3D model describes the distance and the angle of objects with respect to the robot. Finally, the mobile robot will utilize this model to navigate its environment. This is achieved through projecting the 3D model into the motion floor and identifying the obstacles surrounding the robot. Then, the robot will avoid any object in its motion line. Most importantly, the model is updated continuously based on the changes in the environment and the location of the robot.","PeriodicalId":210905,"journal":{"name":"2016 7th International Conference on Computer Science and Information Technology (CSIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116736883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Simultaneous mapping of multi RDB to RDF 同时将多个RDB映射到RDF
Ahmed Abd el Moneim Kamal, Yasser Omar, A. Ghalwash
{"title":"Simultaneous mapping of multi RDB to RDF","authors":"Ahmed Abd el Moneim Kamal, Yasser Omar, A. Ghalwash","doi":"10.1109/CSIT.2016.7549455","DOIUrl":"https://doi.org/10.1109/CSIT.2016.7549455","url":null,"abstract":"Although the tendency towards a Semantic Web is increasing, the current Web is keen on more semantic data. There are several web application domains which need to present their data in the form of graphs to get information and knowledge to allow semantic web searching to deal with them. These domains can be for example geographic data, data in the area of bioinformatics, social networks or even corporate search engines. Most of these domains already store their data in relational database management systems which are not capable of being queried directly by semantic web applications. In this paper we will propose a semi-automated method to map the data from relational databases to RDF structures. This is true for both a single source database as well as different source databases. The results show a complexity of order n2 where n is the number of records processed, when it comes to the performance in creating the output from mapping the relational database to RDF files.","PeriodicalId":210905,"journal":{"name":"2016 7th International Conference on Computer Science and Information Technology (CSIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124205912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信