{"title":"Feedback-driven clustering for automated linking of web pages","authors":"Adam Oest, M. Rege","doi":"10.1109/ICITST.2013.6750219","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750219","url":null,"abstract":"In this paper we propose and test a system that indexes a large collection of HTML documents (i.e. an entire web site) and automatically generates context-relevant inline text links between pairs of related documents (i.e. web pages). The goal of the system is threefold: to increase user interaction with the site being browsed, to discover relevant keywords for each document, and to effectively cluster the documents into semantically-significant groupings. The quality of the links is improved over time through passive user feedback collection. Our system can be deployed as a web service and has been tested on offline datasets as well as a live web site. A distinctive feature of our system is that it supports datasets that grow or change over time.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117161270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, A. M. Salem
{"title":"A comparative study between modern encryption algorithms based on cloud computing environment","authors":"O. Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, A. M. Salem","doi":"10.1109/ICITST.2013.6750258","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750258","url":null,"abstract":"The concept of “cloud computing” is not new, it is undisputable that they have proven a major commercial success over recent times. Cloud computing is the delivery of computing services by shared resources, software and information over the internet (public) or intranet (private). The improvement of cloud technology is reinforced by the improvement of the security concerns, accordingly various encryption algorithms have been developed. This paper provides a comparative study that represents the differences between modern encryption algorithms in cloud computing. The study encompasses the key size, the performance and the size of the output encrypted file based two different categorizes of algorithms (symmetric and asymmetric).","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117258844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A machine learning based method for optimal journal classification","authors":"S. Iqbal, Muhammad Shaheen, Fazl-e-Basit","doi":"10.1109/ICITST.2013.6750202","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750202","url":null,"abstract":"We present a hypothetical and realistic examination and exploration of a number of bibliometric indicators of journal performance. In this paper, the indicators we have focused upon are Eigenfactor indicator, Impact factor, audience factor and Article influence weight indicator. Our focus is to find the missing parameters and some limitations that have not been conducted in previous algorithms. To find the influential parameters and to propose a new journal performance factor, that ranked a journal in best accepted manner. For classification and verification purpose we use a machine learning classification technique (Bayesian classification). It is one of the most common learning algorithms in machine learning classification. Using bayesain classification, we classify several journals according to our proposed methods and compare results with the previous methods.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"589 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115104312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security risks in the short-range communication of ubiquitous application","authors":"Antti Evesti, Jani Suomalainen, R. Savola","doi":"10.1109/ICITST.2013.6750275","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750275","url":null,"abstract":"Recently, various applications applying ubiquitous computing have appeared. For instance, health applications have benefited from information and services, which are available from various sensors and medical devices in the surrounding environment. These applications utilize different wireless communication technologies in order to achieve a good connectivity, which is essential in ubiquitous computing. Weak security in wireless networks may ruin the security of the whole application. Hence, it is vital to realize threats, possible vulnerabilities and security assumptions made in these technologies. In this paper, we study Bluetooth, ZigBee and NFC from the security point of view in ubiquitous health applications. In the study, we emphasize security aspects starting from the physical communication layer.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123127349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation and evaluation of classroom simulation for trainee teacher using second life environments","authors":"F. Alotaibi, J. Dimitrov","doi":"10.1109/ICITST.2013.6750280","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750280","url":null,"abstract":"The paper addresses the issues of classroom simulation by making use of the experimental setup of Second Life(SL) which is used as a virtual student having a trainee teacher. It aims to evaluate the SL in terms of interaction, behaviour, and the way and style through which teaching is made. Simulating the actual classroom environment, the trainee teacher is enabled for getting skills and qualities that are considered essential for maintaining a teaching-helpful environment in the classroom and also the teacher in enhancing his/her confidence while teaching to the students. Six trainee teachers used to survey the various behaviours of the SL such as interaction, behaviour simulated, and safety. Another set of six persons was used to observe the six trainee teachers and represents the study of smarbots, trainee teacher, and observer avatars inside the simulated class.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130096971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An analytical study of Arabic sentiments: Maktoob case study","authors":"M. Al-Kabi, Nawaf A. Abdulla, M. Al-Ayyoub","doi":"10.1109/ICITST.2013.6750168","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750168","url":null,"abstract":"The problem of automatically extracting opinions and emotions from textual data have gained a lot of interest recently. Unfortunately, most studies on Sentiment Analysis (SA) focus mainly on the English language, whereas studies considering other important and wide-spread languages such as Arabic are few. Moreover, publicly-available Arabic datasets are seldom found on the Web. In this work, a labeled dataset of Arabic reviews/comments is collected from a social networking website (Yahoo!-Maktoob). A detailed analysis of different aspects of the collected dataset such as the reviews' length, the numbers of likes/dislikes, the polarity distribution and the languages used is presented. Finally, the dataset is used to test popular classifiers commonly used for SA.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115966505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet Unite-and-Conquer architecture","authors":"Kamyab Karimi, C. Hauser","doi":"10.1109/ICITST.2013.6750195","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750195","url":null,"abstract":"This paper presents UnC (Unite and Conquer), a network architecture for the Internet that provides a self-certifying mechanism to reliably distribute, retrieve, and authenticate the public keys across the Internet. UnC may be used in parallel with the existing Public Key Infrastructure (PKI) ecosystem to provide an additional validation step for certificates offered by the PKI model. Leveraging the properties of the Internet infrastructure combined with cooperation from other hosts that act as notaries, UnC attests to the stability of certificates in time and space. By uniting notaries, UnC overwhelms and outnumbers attackers, and it uses this unity to conquer attack plots. Unlike existing proposals aimed to incorporate accountability into the Internet, UnC does not require external certificate hierarchies or certificate authorities to manage digital certificates. UnC can also be integrated in the Secure DNS (DNSSEC) protocols as well as the Secure BGP (S-BGP) protocol to eliminate the need for external key structures while protecting bindings between the entities and their IP addresses, and the integrity of the routing tables between Autonomous Systems. This paper describes the UnC architecture in detail, including the actions of each different kind of participant. It describes how UnC deals with well-known attack models, which are readily available on the Internet.The major contribution of this work is to open up a new door for the research community to exploit the predominance of good nodes over malicious ones in order to enhance the security of the PKI ecosystem and the Internet.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117009631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pedagogical hypermédias systems","authors":"Brika Ammar, N. Fahima","doi":"10.1109/ICITST.2013.6750217","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750217","url":null,"abstract":"As practice and profession, education has always been a discipline in the heart of the development of systems and hypermedia applications. With through work which was completed, we note that the great majority of the studies was interested in the aspects of access to information and the challenges posed by exploration. Thus, most of work explored, for example, the cognitive overload or confusion during navigation. However, and without leaving side these problems common, we wish to examine here other also essential aspects concerning a constructive use of the hypertextes. This study is targeted on the hypermédias teaching, included/understood as a subcategory of the informative named hypertextes which are defined in opposition to hypertextes literary, artistic or walking.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131853464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assisted Learning Virtual Support (ALVS) for postgraduate students, through the Graduate Virtual Research Environment (GVRE)","authors":"R. Costello, Nigel Shaw","doi":"10.1109/ICITST.2013.6750232","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750232","url":null,"abstract":"In this paper, we propose a new virtual support to assist postgraduates through the Graduate Virtual Research Environment (GVRE). The virtual support will provide a 24 hour answering servicing for postgraduate students relating to their PhD journeys, for example, advice needed regarding “what is needed for your first 6 month Upgrade report”. The assisted learning mechanism found within the GVRE will use a rule base to retrieve not just text based answers but it will also search through a repository of videos (280) and relate them to the frequently asked question. This approach of blending videos to the student questions should enhance and accelerate the process of skill acquisition through critical thinking through guidance, hints and feedback.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133070970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Framework for handling personal data proposed system of the self-control on buying information","authors":"Yuri Nakagawa, Yuuki Matsuda, Tetsuroh Ogi","doi":"10.1109/ICITST.2013.6750172","DOIUrl":"https://doi.org/10.1109/ICITST.2013.6750172","url":null,"abstract":"Recently android phone and iPhone have become a regular part of our lives in Japan. With the development of these telecommunication technologies and the pervading applications, personal information that we call big data recently has exploded and been dispersed throughout the society. While companies make use of these data for marketing purposes and also government discuss about social systems, individuals have not only difficulties to access, but also do not have any means to benefit from their own data, even though they are generated by themselves. In this paper, we propose a framework that enables individuals to use it and receive a proper reward from companies. We aimed to give the power of personal data back to individuals. Especially we focus on buying information, and discuss how to handle it and propose a self-control method of own personal data to receive various personalized services.","PeriodicalId":246884,"journal":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131808794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}