{"title":"Building a SOA-Based Model for Purchase Order Management in E-Commerce Systems","authors":"R. Baraka, Y. AL-Ashqar","doi":"10.1109/PICICT.2013.27","DOIUrl":"https://doi.org/10.1109/PICICT.2013.27","url":null,"abstract":"Purchase Order Management (POM) is one of the most popular E-Commerce applications conducted between B2C and B2B systems. In many cases nowadays POM components use integration approaches that lack interoperability and manageability features. The purpose of this paper is to build a SOA based model for POM in E-Commerce system that achieves the goals of interoperability and manageability. In this paper a technical model of POM E-Commerce system is presented and analyzed. A new POM model based on SOA solution is proposed that overcomes the shortcoming of currently used model. The main contribution of this paper is to align a SOA-based model to the B2C and B2B E-Commerce domain.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115313592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Pixel-Based Framework for Blind Image Quality Assessment","authors":"S. Paris","doi":"10.1109/PICICT.2013.16","DOIUrl":"https://doi.org/10.1109/PICICT.2013.16","url":null,"abstract":"Image quality assessment delivers an objective (algorithmic) score. This score must be correlated as much as possible to the human visual perception when seeing images distorted by some compression and/or transmission tools, e.g. JPEG compression, white noise, fast fading. The process can be a full-reference or a null-reference image quality assessment depending on if it has the knowledge of the original undistorted image. This paper presents a prospective for building a null-reference image quality assessment, for a given distorted image, its aim is to deliver both the global objective score and the distortion map where each pixel has a distortion measurement.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126950423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Call System Based on Pedagogically Indexed Text","authors":"A. Boudhief, M. Maraoui, M. Zrigui","doi":"10.1109/PICICT.2013.13","DOIUrl":"https://doi.org/10.1109/PICICT.2013.13","url":null,"abstract":"In this article we focus firstly on the principle of pedagogical indexing and characteristics of Arabic language and secondly on the possibility of adapting the standard for describing learning resources used (the LOM and its Application Profiles) with learning conditions such as the educational levels of students and their levels of understanding, the educational context with taking into account the representative elements of text, text length, in particular, we put in relief the specificity of the Arabic language which is a complex language, characterized by its flexion, its voyellation and agglutination.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115783943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey of Student Perceptions of a Modified Team Based Learning Approach on an Information Technology Course","authors":"Ashraf Elnagar, M. Ali","doi":"10.1109/PICICT.2013.14","DOIUrl":"https://doi.org/10.1109/PICICT.2013.14","url":null,"abstract":"Active learning methodologies have evolved over the years in order to increase student input in the learning process. One example is Team-Based Learning (TBL), which fosters active learning and has become increasingly popular in modern curricula. However, in developing nations, the well-established lecture-based teaching paradigm is the prominent medium of teaching and learning. This paper describes an empirical study to use a pedagogy integrating Team-Based Learning (TBL) for effective learning and hands-on experience in an information technology introductory course. We have adopted a modified version of TBL to study its effect on students learning and to investigate how active interactions influence students' learning and grades. We refer to this method as LTBL, Lectures and Team-Based Learning, since we added to it a short but an essential teaching component. To explore the effectiveness of this learning pedagogy, we used a survey to evaluate students' engagement in class and their attitude towards the value of using teams for learning, compared with experiences of students in the traditional lecture format. Our findings confirmed that LTBL has a positive effect on the success rate and the achievement of learning outcomes.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133482307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Cryptography Method Based on Image for Key Generation","authors":"T. Barhoom, Z. M. Abusilmiyeh","doi":"10.1109/PICICT.2013.22","DOIUrl":"https://doi.org/10.1109/PICICT.2013.22","url":null,"abstract":"This study proposes a method for encrypting the sender's messages using new algorithm with a secret key which is generated from using color image and the difference in the LSB of the image pixels. This key will be used for encrypting and decrypting the messages which are transmitted between two sides. The length of the key varies according to the size of the message as it varies in every session according to the session type. It is a reliable and flexible way to generate the key to secure the information which is transferred through the networks and it is easy to implement. This method ensures the prevention of guesses or breaking the key and provides a more secure way for information encryption.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133489055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leveraging Semantic Web Technologies to Enhance Individual and Collaborative Learning","authors":"I. Alagha","doi":"10.1109/PICICT.2013.11","DOIUrl":"https://doi.org/10.1109/PICICT.2013.11","url":null,"abstract":"Despite the popularity of the World Wide Web as a resource of hypertext-based learning materials, web-based learning is often associated with many challenges. One of these challenge is the ability to find learning material that can best match the user interests with minimal effort. This paper presents SWLinker, a distributed system that leverages ontological engineering to enable users to access complementary and in-depth knowledge resources through a standard Web browser. The proposed approach supports real-time interpretation of any web pages existing on the Internet by attaching semantic layers of knowledge chunks. It also enables learners to discover domain terms in a wider context by embedding portals that offer a grand vision of all instructionally-related concepts and sub topics. Learners are still able to query knowledge bases and associate knowledge with what they are currently browsing but, crucially, without leaving the original site and without interrupting the ongoing learning process. Furthermore, SWLinker is capable of intelligently linking learners engaged in shared browsing activities. The user-matching in the system utilizes an ontology-based approach to measure the semantic relatedness between the pages being browsed in order to discover users with semantically related interests.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133464166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adel Khelifi, Yasmin Grisi, Dima Soufi, Dalya Mohanad, P. Shastry
{"title":"M-Vote: A Reliable and Highly Secure Mobile Voting System","authors":"Adel Khelifi, Yasmin Grisi, Dima Soufi, Dalya Mohanad, P. Shastry","doi":"10.1109/PICICT.2013.25","DOIUrl":"https://doi.org/10.1109/PICICT.2013.25","url":null,"abstract":"The critical issue in elections is choosing a leader who will represent his nation and preserve its citizens' rights with the threat of a criminal element attempting to influence the outcome of the election. Unfortunately, such disruptions have occurred at many paper-based voting stations, and also in some electronic voting systems. Manual, or paper-based voting is the most widely used voting system, but its integrity can be questioned, since the votes are gathered and counted by hand, which decreases the likelihood of every vote being counted, either accidentally or intentionally. Electronic voting systems have emerged to solve most of the problems that occur in manual voting. However, the criminal element, with their knowledge of how to exploit technical loopholes, attempts to take advantage of these problems, thwarting any efforts to hold fair elections. To avoid the mistakes made by both manual and electronic voting systems, we have developed the M-Vote system to try to achieve the desired goal, which is to preserve the integrity of elections. M-Vote is a mobile phone application that uses three level of security, which are username and password, national ID and fingerprint, and a strong dedicated security algorithm. These techniques prevent votes from being deleted or changed, enhance integrity and put an end to criminal acts. The results showed that M-Vote is a highly secured mobile application that facilitates the vote process for most of people, since they only need a mobile phone and an Internet connection to participate in the election process.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127066233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing and Improving SLAs for IT Service Providers, Linking Theory with Business","authors":"Rafat M. Abushaban","doi":"10.1109/PICICT.2013.18","DOIUrl":"https://doi.org/10.1109/PICICT.2013.18","url":null,"abstract":"IT within organizations has changed from being a support area into playing a strategic and functional role that non-IT organizations could not maintain on their own, thus IT functions were outsourced to specialized service providers to help deliver a reliable service and reduce costs. Services as such include a wide variety of information transmission, communication and many other technology services, from which, networking and internet provision are essential. In order to govern the relation between organizations and their respective service providers, Service Level Agreements are used as a method of contracting so that the service is delivered as expected. Although these agreements are widely used, they have been criticized due to the lack of standards in various areas. This paper presents the literature and theory behind IT service management and answers the questions of how services can be measured and sustained, combining the academic research and frameworks with a case-study of business Service Level Agreements for companies that provide networking and Internet services, analyzing indicators and metrics and suggesting a best-practices method that can be used as a template for preparing clear Service Agreements and Indicators.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127634266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tutorials [2 abstracts]","authors":"A. Khelifi","doi":"10.1109/wiw.2016.012","DOIUrl":"https://doi.org/10.1109/wiw.2016.012","url":null,"abstract":"These tutorials/keynote speeches discuss the following: mobile applications; and RFID technology.","PeriodicalId":320407,"journal":{"name":"2013 Palestinian International Conference on Information and Communication Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125364004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}