{"title":"Green learning in computer science education system","authors":"Selvakumar Samuel, Kesava Pillai Rajadorai","doi":"10.1109/CTIT.2011.6107938","DOIUrl":"https://doi.org/10.1109/CTIT.2011.6107938","url":null,"abstract":"This document is a short paper which evaluates the common issues in the current educational systems by focusing on Computer Science Education System and wastages of enormous energies, time, money and valuable resources such as electricity, stationeries, etc. due to learning of needless modules by the students in Computer Science in view of current learning scenario. Based on the empirical understanding and research of the authors a suitable course structure has been proposed as a counter measure in view of saving the resources due to needless learning of modules. Computing course in Computer Science Education System is selected as a sample for discussion; likewise for any specialism in computing or any course in computer science, analogous course structure can be adapted in order to reduce wastages. Although this paper considers the computer science curricula, issues and proposed solutions are similar irrespective of courses or degrees.","PeriodicalId":233698,"journal":{"name":"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125143949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Migration of legacy applications and services to Service-Oriented Architecture (SOA)","authors":"M. Sheikh, Hatim Aboalsamh, A. Albarrak","doi":"10.1109/CTIT.2011.6107949","DOIUrl":"https://doi.org/10.1109/CTIT.2011.6107949","url":null,"abstract":"Service Oriented Architecture (SOA) is becoming a mainstream approach for designing and integrating enterprise applications. This paper presents a methodology for migration of legacy applications and services to Service-Oriented Architecture. In order to upgrade existing applications and services to SOA, the methodology should be used in a consistent functional and technological manner. In addition, we have proposed a specific SOA migration approach based on multi-tier architecture. This architecture brings clear differentiation of logical and technical components, allowing business process to be defined in a flexible and agile manner. The architecture highlights position and role of legacy application, fine and coarse grained services with the respect to their role in the business process. As a critical component in the overall architecture, Enterprise Service Bus acts as mediation and virtualization layer helping to separate business and logical view of the process from its technological implementation and reduce dependencies. Our approach is based on analysis of the legacy software in order to identify the business and presentation logic components. The next step is to redesign the legacy code by isolating the business logic and performing code stripping. Finally coarse-grained and loosely coupled SOA services in the medium and upper layer are created in order to achieve the benefits of SOA architecture.","PeriodicalId":233698,"journal":{"name":"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127378770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Issues in multi-agent systems for e-government applications","authors":"Sehl Mellouli, F. Bouslama","doi":"10.1109/CTIT.2011.6107933","DOIUrl":"https://doi.org/10.1109/CTIT.2011.6107933","url":null,"abstract":"In an earlier paper, we introduced an e-government framework based on multi-agent software components as a solution to achieve better access to online services to citizens. In this paper, we define what the “Citizen Agent” in a multi-agent based framework is and how this software entity can be distributed in a government computing cloud. We look at the many challenges of adopting this concept of citizen agent in e-government organizations. We also provide details on how this software entity adapt online and in real-time to environment changes, how it learns from and improve through interaction with other intelligent agents in the information and communication technology infrastructure, and how it can respond in a secured way to requests from government agencies and units.","PeriodicalId":233698,"journal":{"name":"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133181129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactive speech based games for autistic children with Asperger Syndrome","authors":"Amal AlQahtani, Nouf Jaafar, Nourah Alfadda","doi":"10.1109/CTIT.2011.6107947","DOIUrl":"https://doi.org/10.1109/CTIT.2011.6107947","url":null,"abstract":"There are many computer users have varying physical or mental abilities like autistic person. Therefore, there are different approaches to deal with the technical applications, especially for people with special needs who are suffering from using several applications. The problem that occurs with children with autism is mainly when the child with autism tries to contact and communicate with others. This is mainly because children find it difficult to articulate their thoughts don't have any suitable way to make the others around them understand what they need. One of the issues to cope with the problem is how to get benefit from technology to help this user population. In this paper, we will describe the objectives of Interactive Speech Based Games (ISBG) project and the overview of the system, then we will review the techniques that were used in the project, and how it is integrated with each other.","PeriodicalId":233698,"journal":{"name":"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128745541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal specification of an intelligent message notification service in an infostation-based mLearning system using CCA","authors":"Mohammed Al-sammarraie, F. Siewe, H. Zedan","doi":"10.1109/CTIT.2011.6107936","DOIUrl":"https://doi.org/10.1109/CTIT.2011.6107936","url":null,"abstract":"The Calculus of Context-aware Ambients (CCA in short) has been proposed as a notation that is suitable to model mobile applications that are context-aware. This paper considers a real-world case study of an infostation-based mLearning system in which mobile devices such as hand-set phones, PDA's and laptops can access a number of services and communicate to each other within a university campus. Such a dynamic system must enforce complex policies to cope with mobility and context-awareness. We show how policies can be formalised using CCA, and validated using the execution environment of CCA. We illustrate how properties can be validated using our approach.","PeriodicalId":233698,"journal":{"name":"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130483205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of neural network based model predictive controller to power switching converters","authors":"G. Abbas, U. Farooq, M. Asad","doi":"10.1109/CTIT.2011.6107948","DOIUrl":"https://doi.org/10.1109/CTIT.2011.6107948","url":null,"abstract":"Neural network based Model Predictive Controller (MPC) for a dc-dc buck converter working in Continuous Conduction Mode (CCM) is presented. The converter operates at a switching frequency of 500 KHz. Although neural networks (NN) have been used in problems involving knotty, non-linearity and uncertainties but here they are applied to a buck converter to control its characteristics. The neural network is trained using ‘trainlm’ method using Neural Network Toolbox. The simulation results show that the neural network model predictive controller depicts better static and dynamic characteristics. The controller is then compared with the classical lead controller. Matlab/Simulink based simulated results validate the design.","PeriodicalId":233698,"journal":{"name":"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134380759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Budoor Al Housani, Iman Al Marzouqi, Shayma Al Redha, Amala V. Rajan
{"title":"“BuziWomen” — UAE women entrepreneurs","authors":"Budoor Al Housani, Iman Al Marzouqi, Shayma Al Redha, Amala V. Rajan","doi":"10.1109/CTIT.2011.6107940","DOIUrl":"https://doi.org/10.1109/CTIT.2011.6107940","url":null,"abstract":"This research was done based on facts collected about UAE business women. The report sheds the light on one of the issues that local women businesses are currently facing and it includes different sections that cover the background and motivation of this issue, the existing approach, the problem and why it is worth to be resolved, and a detailed illustration of the proposed solution and its stakeholders. Different fact finding techniques were used in order to ensure information integrity including interviews and surveys over UAE, observations, and previous documentations and reports.","PeriodicalId":233698,"journal":{"name":"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124871793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Raesi, Muna Al Meharabi, Shamsa Al Hilli, Amala V. Rajan
{"title":"The UAE graduates are not placed in their right job titles","authors":"A. Raesi, Muna Al Meharabi, Shamsa Al Hilli, Amala V. Rajan","doi":"10.1109/CTIT.2011.6107959","DOIUrl":"https://doi.org/10.1109/CTIT.2011.6107959","url":null,"abstract":"The purpose of this study is to investigate why most of the United Arab Emirates graduates are not placed in their right job tittles which match with their education specialization. In order to begin the study, the survey data were distrusted and collected from 84 UAE graduates from both private and public sectors in different Dubai education institutions. 34.1% of these graduates were married; however, 58.5% were single.","PeriodicalId":233698,"journal":{"name":"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131816400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of web based application for relational data maintenance in an university environment","authors":"S. Jeyalatha, B. Vijayakumar, Gurpreet Singh","doi":"10.1109/CTIT.2011.6107944","DOIUrl":"https://doi.org/10.1109/CTIT.2011.6107944","url":null,"abstract":"The present work deals with designing and creating a Academic Search Web Application that provides the user with a range of options. It also discusses the ways in which the files are accessed from the MySQL database. The implementation has been carried out in PHP and MySQL and the test scenario has been presented. The present work will assist in organized search and downloading academic related web pages for various users in an University environment.","PeriodicalId":233698,"journal":{"name":"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127935147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spatially aware professionals","authors":"Manal Alshamlan","doi":"10.1109/CTIT.2011.6107952","DOIUrl":"https://doi.org/10.1109/CTIT.2011.6107952","url":null,"abstract":"Imagine being able to visualize shared space of all data in any decision support system, and being able to do different kind of data like tabular information, images, videos, maps etc. also being able to conduct simple complex analysis and the amount of information out of this. The location of the different kinds of information is the only unique key that would enable putting information together and building knowledge to it. The location is a key factor in conducting route cause analysis of many challenges, as well as most power tool to visualize and manage development of investments made. Imagine you can monitor total government investment made by all government enteritis — on infrastructure projects, construction/maintenance and operation of public facilities and services — in a specific area, as well as monitoring trends of that over the last couple of decades. Another example is to compare the spending made of the later among several areas within the same city. Currently to do so and in spite of the technological advancement, complex set-up and huge effort is required to build, structure and host the specialized geospatial information, as well as specialized tools to utilized that, considering all the overhead financial investment and manpower resources to operate and put in use. Geospatial technologies enable geometry information flow. Geospatial Information System (GIS) employs the latest technology to facilitate the use of spatial principle. In order to combine business needs to reality implementation geometry and space wise. The market doesn't simplify the tools to provide the later in reasonable operational requirements. This paper is summarized a research to look for solutions to enable the above.","PeriodicalId":233698,"journal":{"name":"The 2011 International Conference and Workshop on Current Trends in Information Technology (CTIT 11)","volume":"1983 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125455900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}