2013 Palestinian International Conference on Information and Communication Technology最新文献

筛选
英文 中文
Building a SOA-Based Model for Purchase Order Management in E-Commerce Systems 基于soa的电子商务系统采购订单管理模型的构建
R. Baraka, Y. AL-Ashqar
{"title":"Building a SOA-Based Model for Purchase Order Management in E-Commerce Systems","authors":"R. Baraka, Y. AL-Ashqar","doi":"10.1109/PICICT.2013.27","DOIUrl":"https://doi.org/10.1109/PICICT.2013.27","url":null,"abstract":"Purchase Order Management (POM) is one of the most popular E-Commerce applications conducted between B2C and B2B systems. In many cases nowadays POM components use integration approaches that lack interoperability and manageability features. The purpose of this paper is to build a SOA based model for POM in E-Commerce system that achieves the goals of interoperability and manageability. In this paper a technical model of POM E-Commerce system is presented and analyzed. A new POM model based on SOA solution is proposed that overcomes the shortcoming of currently used model. The main contribution of this paper is to align a SOA-based model to the B2C and B2B E-Commerce domain.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115313592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Pixel-Based Framework for Blind Image Quality Assessment 一种基于像素的盲图像质量评估框架
S. Paris
{"title":"A Pixel-Based Framework for Blind Image Quality Assessment","authors":"S. Paris","doi":"10.1109/PICICT.2013.16","DOIUrl":"https://doi.org/10.1109/PICICT.2013.16","url":null,"abstract":"Image quality assessment delivers an objective (algorithmic) score. This score must be correlated as much as possible to the human visual perception when seeing images distorted by some compression and/or transmission tools, e.g. JPEG compression, white noise, fast fading. The process can be a full-reference or a null-reference image quality assessment depending on if it has the knowledge of the original undistorted image. This paper presents a prospective for building a null-reference image quality assessment, for a given distorted image, its aim is to deliver both the global objective score and the distortion map where each pixel has a distortion measurement.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126950423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Call System Based on Pedagogically Indexed Text 基于教学索引文本的呼叫系统
A. Boudhief, M. Maraoui, M. Zrigui
{"title":"Call System Based on Pedagogically Indexed Text","authors":"A. Boudhief, M. Maraoui, M. Zrigui","doi":"10.1109/PICICT.2013.13","DOIUrl":"https://doi.org/10.1109/PICICT.2013.13","url":null,"abstract":"In this article we focus firstly on the principle of pedagogical indexing and characteristics of Arabic language and secondly on the possibility of adapting the standard for describing learning resources used (the LOM and its Application Profiles) with learning conditions such as the educational levels of students and their levels of understanding, the educational context with taking into account the representative elements of text, text length, in particular, we put in relief the specificity of the Arabic language which is a complex language, characterized by its flexion, its voyellation and agglutination.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115783943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Survey of Student Perceptions of a Modified Team Based Learning Approach on an Information Technology Course 信息技术课程中学生对改进的团队学习方法的看法调查
Ashraf Elnagar, M. Ali
{"title":"Survey of Student Perceptions of a Modified Team Based Learning Approach on an Information Technology Course","authors":"Ashraf Elnagar, M. Ali","doi":"10.1109/PICICT.2013.14","DOIUrl":"https://doi.org/10.1109/PICICT.2013.14","url":null,"abstract":"Active learning methodologies have evolved over the years in order to increase student input in the learning process. One example is Team-Based Learning (TBL), which fosters active learning and has become increasingly popular in modern curricula. However, in developing nations, the well-established lecture-based teaching paradigm is the prominent medium of teaching and learning. This paper describes an empirical study to use a pedagogy integrating Team-Based Learning (TBL) for effective learning and hands-on experience in an information technology introductory course. We have adopted a modified version of TBL to study its effect on students learning and to investigate how active interactions influence students' learning and grades. We refer to this method as LTBL, Lectures and Team-Based Learning, since we added to it a short but an essential teaching component. To explore the effectiveness of this learning pedagogy, we used a survey to evaluate students' engagement in class and their attitude towards the value of using teams for learning, compared with experiences of students in the traditional lecture format. Our findings confirmed that LTBL has a positive effect on the success rate and the achievement of learning outcomes.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133482307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Novel Cryptography Method Based on Image for Key Generation 一种新的基于图像的密钥生成方法
T. Barhoom, Z. M. Abusilmiyeh
{"title":"A Novel Cryptography Method Based on Image for Key Generation","authors":"T. Barhoom, Z. M. Abusilmiyeh","doi":"10.1109/PICICT.2013.22","DOIUrl":"https://doi.org/10.1109/PICICT.2013.22","url":null,"abstract":"This study proposes a method for encrypting the sender's messages using new algorithm with a secret key which is generated from using color image and the difference in the LSB of the image pixels. This key will be used for encrypting and decrypting the messages which are transmitted between two sides. The length of the key varies according to the size of the message as it varies in every session according to the session type. It is a reliable and flexible way to generate the key to secure the information which is transferred through the networks and it is easy to implement. This method ensures the prevention of guesses or breaking the key and provides a more secure way for information encryption.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133489055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Leveraging Semantic Web Technologies to Enhance Individual and Collaborative Learning 利用语义网技术加强个人和协作学习
I. Alagha
{"title":"Leveraging Semantic Web Technologies to Enhance Individual and Collaborative Learning","authors":"I. Alagha","doi":"10.1109/PICICT.2013.11","DOIUrl":"https://doi.org/10.1109/PICICT.2013.11","url":null,"abstract":"Despite the popularity of the World Wide Web as a resource of hypertext-based learning materials, web-based learning is often associated with many challenges. One of these challenge is the ability to find learning material that can best match the user interests with minimal effort. This paper presents SWLinker, a distributed system that leverages ontological engineering to enable users to access complementary and in-depth knowledge resources through a standard Web browser. The proposed approach supports real-time interpretation of any web pages existing on the Internet by attaching semantic layers of knowledge chunks. It also enables learners to discover domain terms in a wider context by embedding portals that offer a grand vision of all instructionally-related concepts and sub topics. Learners are still able to query knowledge bases and associate knowledge with what they are currently browsing but, crucially, without leaving the original site and without interrupting the ongoing learning process. Furthermore, SWLinker is capable of intelligently linking learners engaged in shared browsing activities. The user-matching in the system utilizes an ontology-based approach to measure the semantic relatedness between the pages being browsed in order to discover users with semantically related interests.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133464166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
M-Vote: A Reliable and Highly Secure Mobile Voting System M-Vote:可靠且高度安全的移动投票系统
Adel Khelifi, Yasmin Grisi, Dima Soufi, Dalya Mohanad, P. Shastry
{"title":"M-Vote: A Reliable and Highly Secure Mobile Voting System","authors":"Adel Khelifi, Yasmin Grisi, Dima Soufi, Dalya Mohanad, P. Shastry","doi":"10.1109/PICICT.2013.25","DOIUrl":"https://doi.org/10.1109/PICICT.2013.25","url":null,"abstract":"The critical issue in elections is choosing a leader who will represent his nation and preserve its citizens' rights with the threat of a criminal element attempting to influence the outcome of the election. Unfortunately, such disruptions have occurred at many paper-based voting stations, and also in some electronic voting systems. Manual, or paper-based voting is the most widely used voting system, but its integrity can be questioned, since the votes are gathered and counted by hand, which decreases the likelihood of every vote being counted, either accidentally or intentionally. Electronic voting systems have emerged to solve most of the problems that occur in manual voting. However, the criminal element, with their knowledge of how to exploit technical loopholes, attempts to take advantage of these problems, thwarting any efforts to hold fair elections. To avoid the mistakes made by both manual and electronic voting systems, we have developed the M-Vote system to try to achieve the desired goal, which is to preserve the integrity of elections. M-Vote is a mobile phone application that uses three level of security, which are username and password, national ID and fingerprint, and a strong dedicated security algorithm. These techniques prevent votes from being deleted or changed, enhance integrity and put an end to criminal acts. The results showed that M-Vote is a highly secured mobile application that facilitates the vote process for most of people, since they only need a mobile phone and an Internet connection to participate in the election process.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127066233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Assessing and Improving SLAs for IT Service Providers, Linking Theory with Business 评估和改进IT服务提供商的sla,将理论与业务联系起来
Rafat M. Abushaban
{"title":"Assessing and Improving SLAs for IT Service Providers, Linking Theory with Business","authors":"Rafat M. Abushaban","doi":"10.1109/PICICT.2013.18","DOIUrl":"https://doi.org/10.1109/PICICT.2013.18","url":null,"abstract":"IT within organizations has changed from being a support area into playing a strategic and functional role that non-IT organizations could not maintain on their own, thus IT functions were outsourced to specialized service providers to help deliver a reliable service and reduce costs. Services as such include a wide variety of information transmission, communication and many other technology services, from which, networking and internet provision are essential. In order to govern the relation between organizations and their respective service providers, Service Level Agreements are used as a method of contracting so that the service is delivered as expected. Although these agreements are widely used, they have been criticized due to the lack of standards in various areas. This paper presents the literature and theory behind IT service management and answers the questions of how services can be measured and sustained, combining the academic research and frameworks with a case-study of business Service Level Agreements for companies that provide networking and Internet services, analyzing indicators and metrics and suggesting a best-practices method that can be used as a template for preparing clear Service Agreements and Indicators.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127634266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tutorials [2 abstracts] 教程[2个摘要]
A. Khelifi
{"title":"Tutorials [2 abstracts]","authors":"A. Khelifi","doi":"10.1109/wiw.2016.012","DOIUrl":"https://doi.org/10.1109/wiw.2016.012","url":null,"abstract":"These tutorials/keynote speeches discuss the following: mobile applications; and RFID technology.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125364004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信