The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)最新文献

筛选
英文 中文
Towards optimized systems requirements specifications (SRS): Multiple regressional statistics as catalyst — Work in progress 迈向优化系统需求规范(SRS):作为催化剂的多元回归统计-工作正在进行中
Jean Claude Niyokwizerwa, Zaid A. Sabeeh
{"title":"Towards optimized systems requirements specifications (SRS): Multiple regressional statistics as catalyst — Work in progress","authors":"Jean Claude Niyokwizerwa, Zaid A. Sabeeh","doi":"10.1109/CTIT.2011.6107955","DOIUrl":"https://doi.org/10.1109/CTIT.2011.6107955","url":null,"abstract":"The proposed approach was based on predictive analytics technique that would be applied by Joint Application Development (JAD) session's planners to expedite and build an accurate systems requirement specification document. Relevant literature of analytical prediction as well as JAD best practices were synthesized and employed to build a use scenario which guided decisions in this paper. Applying predictive analytics driven by multiple regressional statistics in the requirements gathering process will hasten and augment probabilities of producing a more qualitative systems requirement specification rich with historical planning experience of JAD sessions. This approach is recommended to JAD session planners in order to mitigate the information overload from the early stages of systems development.","PeriodicalId":233698,"journal":{"name":"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128284401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
3D face matching: An alignment approach using ordered facial surface patterns 三维面部匹配:一种使用有序面部表面图案的对齐方法
N. Werghi, M. Naqbi
{"title":"3D face matching: An alignment approach using ordered facial surface patterns","authors":"N. Werghi, M. Naqbi","doi":"10.1109/CTIT.2011.6107953","DOIUrl":"https://doi.org/10.1109/CTIT.2011.6107953","url":null,"abstract":"In this paper, a novel topological structured pattern, dubbed a spiral facet, is proposed and applied for the encoding and alignment of 3D facial triangular mesh surfaces. After describing the foundation of this representation, we present two direct face alignment methods, that exploit the ordered structure of the spiral facet in addressing the correspondence problem. We study the behavior and the performance of these two methods through experimentation conducted with a subset of a 3D face database. We also showcase the potential of our alignment framework for face recognition.","PeriodicalId":233698,"journal":{"name":"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121463171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Formulating a defensive technique to prevent the threat of prohibited reverse engineering 制定防御技术以防止被禁止的逆向工程的威胁
Asmaa M. Alhakimy, K. Rajadurai, M. Ravi
{"title":"Formulating a defensive technique to prevent the threat of prohibited reverse engineering","authors":"Asmaa M. Alhakimy, K. Rajadurai, M. Ravi","doi":"10.1109/CTIT.2011.6107939","DOIUrl":"https://doi.org/10.1109/CTIT.2011.6107939","url":null,"abstract":"Reverse engineering (RE) was invented primarily when the process of software engineering (SE) gained less interest because of difficulty. It was mainly used when software is developed, and the developer is no longer available. Therefore the only communication method was available is reverse engineering. However this amazing process has drifted to a different direction where reverse engineers or hackers have found their way to break into any closed source code, and been able to edit it and resell it again which cost the original author a big loss. Anti-reverse engineering techniques have appeared to stop this illegal process, some were successful and some are not. This research will discuss the level of success of these techniques. Present and customize the proposed technique base on a critical formularized and normalized analysis that is done on data collected globally involving software engineers and reverse. To support the analysis an experiment is conducted to see the ability to reverse engineer small and medium systems.","PeriodicalId":233698,"journal":{"name":"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129376887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Modern dental practice for the dentists in the UAE using social networking tools 现代牙科实践的牙医在阿联酋使用社交网络工具
Amala V. Rajan, Sanoop George, Y. Kirsal
{"title":"Modern dental practice for the dentists in the UAE using social networking tools","authors":"Amala V. Rajan, Sanoop George, Y. Kirsal","doi":"10.1109/CTIT.2011.6107951","DOIUrl":"https://doi.org/10.1109/CTIT.2011.6107951","url":null,"abstract":"Over 45% of the UAE population are using social networking tools such as Facebook, LinkedIn, Twitter, Blogs etc. and more and more people depending on digital media to search for information. Therefore it is crucial for the dentists to change their approach towards their patients in order to enhance their business. This paper has focused on the dentists in the UAE, analysed their social networking practices and proposed effective methods of using social networking tools to enhance their business aspects. The paper mainly emphasises two issues: increasing the online visibility and enhancing the business through social media marketing.","PeriodicalId":233698,"journal":{"name":"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131304283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IPhone forensics techniques and crime investigation IPhone取证技术和犯罪调查
Huwida E. Said, Alya Yousif, H. Humaid
{"title":"IPhone forensics techniques and crime investigation","authors":"Huwida E. Said, Alya Yousif, H. Humaid","doi":"10.1109/CTIT.2011.6107946","DOIUrl":"https://doi.org/10.1109/CTIT.2011.6107946","url":null,"abstract":"The smart phones are used worldwide due to their enhanced features, computing capabilities, increased storage capacity, attractive touch interface, and the ability to use the Wi-Fi signals. The smart phones have new uploaded features that make them more interesting. These include, sharing video and pictures via social network websites such as, Facebook and Twitter. Due to the large number of people using smart phones, there is a growing concern for electronic crimes. Therefore, the digital forensic of the smart phones has became an essential practice to forensic analyst and security specialists. Investigators found that smart phones are now a significant potential source of digital evidence in criminal investigations. The paper investigates different types of logical backup and encryption techniques used with the smart phones. Different smart phones were examined; examples of these are iPhone 3GS, BlackBerry Bold, and Samsung Omnia II I8000. The paper has also addressed the storage and location of social network data.","PeriodicalId":233698,"journal":{"name":"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129391562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Social networking by the youth in the UAE: A privacy paradox 阿联酋年轻人的社交网络:隐私悖论
Fatima Saleh, Hiba Jani, M. A. Marzouqi, Nouf Al Khajeh, Amala V. Rajan
{"title":"Social networking by the youth in the UAE: A privacy paradox","authors":"Fatima Saleh, Hiba Jani, M. A. Marzouqi, Nouf Al Khajeh, Amala V. Rajan","doi":"10.1109/CTIT.2011.6107957","DOIUrl":"https://doi.org/10.1109/CTIT.2011.6107957","url":null,"abstract":"This paper has been written to take a deeper look into the influences which affect the way people decide to use the social networking websites. The main focus of the paper is to find why identities are being hidden by the youth in the UAE while using the social networking websites. It is believed that UAE social networking users do not reveal their identities mainly because of the culture and privacy. A survey has been conducted to collect data about the most visited online social networking websites in the UAE, the gender who uses them to the most. Also, the survey questions were prepared to explore the reasons for hiding personal information by some users, analyze the results and define the advantages and disadvantages of this hiding personal information.","PeriodicalId":233698,"journal":{"name":"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128017140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Solar powered autonomous explorer architecture 太阳能自主探索者架构
J. Jeedella, M. Al-Qutayri, Mohammed Sahem
{"title":"Solar powered autonomous explorer architecture","authors":"J. Jeedella, M. Al-Qutayri, Mohammed Sahem","doi":"10.1109/CTIT.2011.6107937","DOIUrl":"https://doi.org/10.1109/CTIT.2011.6107937","url":null,"abstract":"This paper presents the architecture of a solar powered autonomous explorer. The autonomous explorer employs smart power management system to harvest its energy from the solar energy and monitors its usage in the system. Also it monitors its surrounding environment and communicates with a control base station. The explorer incorporates appropriate sensors to monitor various environmental conditions. The complete system was fully implemented as a prototype and its operation modes were verified. The system architecture is highly flexible and scalable one which enables expansion whenever the need arises.","PeriodicalId":233698,"journal":{"name":"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133270741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The availability of nationally accredited higher education in computer science and information technology in non-federal institutions in the United Arab Emirates 阿拉伯联合酋长国非联邦机构提供国家认可的计算机科学和信息技术高等教育的情况
Syed Kabir Nasir, Syeda Shahla Kabir
{"title":"The availability of nationally accredited higher education in computer science and information technology in non-federal institutions in the United Arab Emirates","authors":"Syed Kabir Nasir, Syeda Shahla Kabir","doi":"10.1109/CTIT.2011.6107934","DOIUrl":"https://doi.org/10.1109/CTIT.2011.6107934","url":null,"abstract":"News of the decline of enrollment and degrees awarded in Computer Science and related domains have been around for quite a while. Different regions and countries of the World have seen changes in the enrollment trends in various educational domains over the past decade. The rise of the dot-com bubble and it's demise had affected the world economy and it caused repercussions in the other fields related to technology as well. Education has also faced pressures due to the changes in enrollment trends and changes in study preferences over the last few years. Especially, educational options in Computer Science and Information Technology have been facing some issues across the globe. In this study we look at the Computer Science and Information technology (CS/IT) study options in the United Arab Emirates - UAE. In this country, based on current enrollments, CS/IT is the 5th most popular field for study. We examined the nationally accredited degrees in CS/IT available in this country for students of all nationalities and found that there more Bachelor degrees as compared to Master degrees. In some cases there are no Master program options for students that have already completed a Bachelor in that specialization. Currently, in December 2010, the accredited Computer Studies / Information Technology options in non-federal educational institutions in UAE are: 9 Associate degrees, 25 Bachelor degrees and 10 Master degrees. There is only 1 PhD study option in CS/IT available in UAE and that too is in a federal university. We believe that our study will prove to be very useful for organizations that want to conduct a feasibility study or needs assessment analysis of the United Arab Emirates for offering new educational programs in the country especially related to the field of computing. Our study can be used to offer specializations at the masters level in the UAE community.","PeriodicalId":233698,"journal":{"name":"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117010883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The role of computational science in academic insitutions 计算科学在学术机构中的作用
M. Abdel-Aal, H. Abdel-aal, Eman Abdel-Aal
{"title":"The role of computational science in academic insitutions","authors":"M. Abdel-Aal, H. Abdel-aal, Eman Abdel-Aal","doi":"10.1109/CTIT.2011.6107960","DOIUrl":"https://doi.org/10.1109/CTIT.2011.6107960","url":null,"abstract":"This paper examines and describes some of the applications of using computational science at King Abdulla University of Science and Technology. KAUST is a huge research center that relies greatly on computer science. Therefore, the need for a supercomputer is essential to be able to accommodate the need for collaboration of researchers in different institutes in the kingdom. Another application was administered at the graduate level of well-known institutions in the Gulf region like King Fahd University of Petroleum and Minerals in Saudi Arabia. Moreover, a mobile learning project was conducted at DWC for Foundations students.","PeriodicalId":233698,"journal":{"name":"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129528936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Usability practice and awareness in UAE 阿联酋的可用性实践和意识
Mahd Hindi, Ashraf Khalil
{"title":"Usability practice and awareness in UAE","authors":"Mahd Hindi, Ashraf Khalil","doi":"10.1109/CTIT.2011.6107954","DOIUrl":"https://doi.org/10.1109/CTIT.2011.6107954","url":null,"abstract":"Poor usability in interactive software systems is still a major problem for users and buyers. In this paper we report the results of a research of usability practice and awareness in UAE, conducted in 2011. The research identified, the background and experiences of IT managers, the software development process being used and some key success factors for usability work. The results indicate, among other things, that management support and education knowledge enhancement are essential for the usability worker in order to enhance the usability awareness. Moreover, they face problems such as, usability and user involvement having low priority in the software development lifecycle.","PeriodicalId":233698,"journal":{"name":"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133143834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信