{"title":"How Web Applications Complement Search Engines?","authors":"Taroub Issa","doi":"10.1109/PICICT.2013.26","DOIUrl":"https://doi.org/10.1109/PICICT.2013.26","url":null,"abstract":"Search engines use content and link cues when searching for relevant pages that meet with the user query. They depend on clustering hypothesis and clustering link hypothesis as a strategy for search. There is a serious need for designing models that could reorganize the content of the web dynamically to meet users' needs. As search engines don't satisfy the user's need for complete and recently updated information, the researchers must design models depending on new concepts and paradigms to improve the coverage and recency of search engines. This work will focus on models used new concepts and paradigms for search, like the emergence concept as a stigmergy mechanism, the multi-agents system and Web Ants. Using the synthetic pheromone in Web Ants, the documents in Content Usage Ants model are labeled using the keywords not only in the content of documents in the content space and usage space, but also in the header and links of the web pages. The documents will have more weight if the words are found in the title and the link of the pages. This weight will be used to calculate the content similarity measurements in both spaces and compare the results to complement search engines. We will also make an overview of existing literature regarding intelligent semantic search engines. An overview of how the whole system of a search engine works is provided. and an overview of some models that been used to improve the way in which search engines work like: Content Usage Ants , Web comb models and other semantic web models.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132614398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Alijla, A. T. Khader, Lim Chee Peng, M. Al-Betar, W. L. Pei
{"title":"Fuzzy Rough Set Approach for Selecting the Most Significant Texture Features in Mammogram Images","authors":"B. Alijla, A. T. Khader, Lim Chee Peng, M. Al-Betar, W. L. Pei","doi":"10.1109/PICICT.2013.19","DOIUrl":"https://doi.org/10.1109/PICICT.2013.19","url":null,"abstract":"Breast cancer is one of the most deadly related diseases in women across the world. The survival rate among the patients with the breast cancer will increase, if the disease is detected earlier. Mammogram analysis is one of the most promising methods that are being used in the early detection and abnormality classification of the breast cancer. Irrelevant and noisy features extracted from mammogram image often mislead the learning processes and also have negative impact on the quality of classification process. Therefore, this paper proposed the use of Fuzzy Rough Set Method to select the most significant texture features from mammogram images. Selected features are employed to build a more easy and understandable learning model in order to improve the classification quality of mammogram analysis systems. The results show that the proposed method selects the appropriate subset of features that are mostly representing the original data and increase the quality of classification.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117296018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Worm Detection Model Based on Multi Classifiers","authors":"Tawfeeq S. Barhoom, Hanaa Qeshta","doi":"10.1109/PICICT.2013.20","DOIUrl":"https://doi.org/10.1109/PICICT.2013.20","url":null,"abstract":"Security has become ubiquitous in every area of malware newly emerging today pose a growing threat from ever perilous systems. As a result to that, Worms are in the upper part of the malware threats attacking the computer system despite the evolution of the worm detection techniques. Early detection of unknown worms is still a problem. In this paper, we proposed a \"WDMAC\" model for worm's detection using data mining techniques by combination of classifiers (Naïve Bayes, Decision Tree, and Artificial Neural Network) in multi classifiers to be adaptive for detecting known/ unknown worms depending on behavior-anomaly detection approach, to achieve higher accuracies and detection rate, and lower classification error rate. Our results show that the proposed model has achieved higher accuracies and detection rates of classification, where detection known worms are at least 98.30%, with classification error rate 1.70%, while the unknown worm detection rate is about 97.99%, with classification error rate 2.01%.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122391069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental Study of Pure Flooding Method for Localizing an Anycast Server in Wireless Ad Hoc Networks","authors":"A. Abed, G. Oz","doi":"10.1109/PICICT.2013.24","DOIUrl":"https://doi.org/10.1109/PICICT.2013.24","url":null,"abstract":"This paper presents performance of a flooding based any cast mechanism for locating the nearest server from a group of contents-equivalent servers in real-world wireless ad hoc networks. Any casting can be considered as an advantageous communication paradigm for ad hoc networks where resource efficiency and robustness is of the first importance. A series of experiments are conducted in an outdoor land and carried out by laptop computers running Windows Vista operating system. An application layer any cast based multithreaded program is developed and used for investigations. In experiments, the behavior of some fundamental performance metrics: response ratio, relative network traffic, average response time and duplicate ratio, was investigated with varying number of hops between source and a group of server nodes in the network.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133678737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Wiener Index of the Composition of Two Planar Graphs","authors":"Mohamed Essalih","doi":"10.1109/PICICT.2013.15","DOIUrl":"https://doi.org/10.1109/PICICT.2013.15","url":null,"abstract":"The Wiener index, is the first, and also one of the most important topological indices of chemical graphs. Furthermore, there are many situations in communication, facility location, cryptology, architecture etc, where the Wiener index of the corresponding graph or the average distance is of great interest. One of the problems, for example, is to find a spanning tree with minimum average distance. In this paper we present the notion of the composition of two planar graphs, through some examples and, we will focus to calculate the Wiener index for the composition of two cycle planar graphs W(Cn1 °Cn2 ) and the Wiener index for the composition of cycle planar graph and path planar graph W(Cn1°Pn2 ), using oar's theorem.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"1995 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130346792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synchronizing Moodle and University Enrollment Databases, A Case Study: Islamic University of Gaza","authors":"M. Mikki","doi":"10.1109/PICICT.2013.12","DOIUrl":"https://doi.org/10.1109/PICICT.2013.12","url":null,"abstract":"Moodle is a learning management system that is used in universities to support the educational process. Moodle provides many collaborative tools and interfaces that allow instructors to communicate with their students and manage their courses. Moodle maintains its own database in which courses and students accounts are created. In addition, the admission deaneries in universities maintain databases to manage the traditional educational process. In this paper, an application-oriented research has been conducted to synchronize the university admission database and the Moodle database. The synchronization process eliminates the overhead of creating the courses and students accounts in the Moodle database by transferring them automatically from the admission database. Experimental results show the validity and correctness of the proposed methodology.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131869611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Water Consumption Financial Fraud Detection: A Model Based on Rule Induction","authors":"E. H. Humaid, T. Barhoum","doi":"10.1109/PICICT.2013.28","DOIUrl":"https://doi.org/10.1109/PICICT.2013.28","url":null,"abstract":"Financial losses due to financial frauds are mounting, recognizing the problem of losses and the area of suspicion behavior is the challenge of the fraud detection. Several data mining algorithms have been developed to allow one to extract relevant knowledge from a large amount of data, like fraudulent financial statements and statistical information, help in detecting frauds and narrow the circle of doubt. Thus, the purpose of this paper is to know what are the famous mining methods that used in this field, what kind of techniques can be used effectively, applying them in a real-world dataset to extract respectable knowledge and discover new patterns from a large database, to support fraud detection in the water delivering service and improve business performance, focusing on a financial billing system for Gaza customer's water consumptions, using a model based on rule induction.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124868692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Does a Privacy Risk Impose a Real Threat in Collaborative Environments?","authors":"H. Qusa","doi":"10.1109/PICICT.2013.21","DOIUrl":"https://doi.org/10.1109/PICICT.2013.21","url":null,"abstract":"The designing and building of collaborative environments through inter-organizational information systems are faced by many challenges. One of these challenges is the privacy risk that might occur because of the lack of the protection while sharing sensitive data. In this paper, we present case study of building a collaborative environment among financial organizations who intend to improve their security capabilities by building collaborative intrusion detection system. However, the case study doesn't take into account the privacy problem and consequently, the damages that can be occurred because of the lack of the privacy protection. Our concentration is to show that the privacy risk should be considered as a real threat for the collaboration because, in some cases, a privacy breach might go beyond just being an annoying issue to cause more other serious damages and losses such as money or reputation for the collaborating organizations. In other words, we are going to provide the motivations for the need of the privacy protection for the collaborative environment which consequently ensures that the contributions from the organizations are useful and the expected results from the collaboration can be gained.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116556004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Issues with Various Security Threats on Mobile Phones","authors":"S. Nseir, N. Hirzallah, M. Aqel","doi":"10.1109/PICICT.2013.17","DOIUrl":"https://doi.org/10.1109/PICICT.2013.17","url":null,"abstract":"The number of Mobile phones, mainly smart phones, being sold has increased dramatically in recent years. They are becoming more preferred companions to users than desktops or notebooks. This has led to more and more sensitive data being stored on these mobile devices. Unfortunately, applications and data stored on mobile phones are less protected from unauthorized access than on most desktop and mobile computers. In this paper, we will discuss the various security threats that are specific to mobile phones. These threats mainly come from the ports that open the phone to the external world, such as Bluetooth, WiFi and MicroSD memory slots. The paper then concludes that more investigations and innovative techniques are needed to secure the data stored on the removable memory cards, yet creates no further burdensome or bothersome to the users.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121048132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ghandi F. Manasra, Osama Najajri, Hashem Abu Arram, Samer Rabah
{"title":"Multicarrier QAM Modulation Based on Discrete Wavelet Transform Using Wireless MIMO System","authors":"Ghandi F. Manasra, Osama Najajri, Hashem Abu Arram, Samer Rabah","doi":"10.1109/PICICT.2013.23","DOIUrl":"https://doi.org/10.1109/PICICT.2013.23","url":null,"abstract":"Current researches tends to cope with challenges of increasing demand for higher data rate, better quality of service, and higher transmission capacity through wireless channel. Multicarrier Modulation (MCM) and multiple antenna system are proposed to overcome these challenges. In this paper, the performance of the Discrete Wavelet Transform (DWT) as MCM instead of using the conventional orthogonal frequency division multiplexing (OFDM) is studied in terms of bit error rate (BER) under the scenario of having multiple antenna system. The analysis is done for Haar mother wavelet, QAM as modulation scheme, and simulated over AWGN channel.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123230613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}