{"title":"Framework Architecture of e-Loan Negotiation System","authors":"I. Serguievskaia, H. Al-Sakran","doi":"10.1109/ICTTA.2008.4529991","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4529991","url":null,"abstract":"To stay ahead of competition banks are creating new, and personalizing and refining existing customer oriented services. Loan negotiation is a time consuming process, requiring considerable time delays and efforts from both a lender and a borrower, and can considerably benefit from automation. Such system will provide help to bank clients in selecting bank and negotiating loan on conditions that satisfy them. In this work we use CBR and software agent approaches in design of the framework for electronic bank loan system as an alternative to existing paper-based version.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"89 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128003464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Organization of Contextual Enterprise-Service Bus","authors":"A. Esper, Y. Badr, F. Biennier","doi":"10.1109/ICTTA.2008.4530321","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530321","url":null,"abstract":"In the place of mass production which no longer seems suitable for today's market, the mass customization trend provides companies with new possibilities for creating loyalty bonds. Structural changes and increasing demand for products and their associated services are expected to raise an exponential growth of pervasive service ecosystems in the next few years. This leads to instant collaborative organizations which involve both final consumers and business partners. As a consequence, information systems need to be interoperable. Unfortunately, existing enterprise engineering approaches and information systems technologies lack the intrinsic agility and adaptability features required by these service-based collaborative organizations. To solve this problem, we consider services as dynamic objects generated according to a particular context. We further introduce a multi-level service model by which multilevel class diagrams describe various facets of a particular service in terms of security and data interchange.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133238556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Assertion Capabilities of an OWL-Based Ontology for Query Formulation","authors":"K. Munir, M. Odeh, P. Bloodsworth, R. McClatchey","doi":"10.1109/ICTTA.2008.4530296","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530296","url":null,"abstract":"This paper reports on the development of a framework to assist users in formulating relational queries without requiring a complete knowledge of the information structure and access mechanisms to underlying data sources. The emphasis here is on exploiting the semantic relationships and assertion capabilities of OWL ontologies to assist clinicians in writing complex queries. This has been achieved using both a bottom-up and top-down approaches to build an ontology model to be the repository for complex end user queries. Relational database schemas are mapped into the newly generated ontology schema to reinforce the current domain ontology being developed. One of the key merits of this approach is that it does not require storing data interpretation, with the added advantage of even not storing database instances as part of the domain ontology, especially for systems with huge volume of data.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134510877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Seven-Segment Input 7SI: New Stylus-Based Text Entry Method","authors":"Khaldoun Al Faraj, Nadine Vigouroux, M. Mojahid","doi":"10.1109/ICTTA.2008.4530011","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530011","url":null,"abstract":"This paper presents seven-segment input (7SI) as a new text entry method for handheld devices, designed to provide high accuracy through goal-crossing that enables writing even in an unstable environment \"on the move\". A traditional seven- segment layout is used as a unistroke character input. The 7SI users enter character by crossing subset of seven segments that configures desired character. Thus, gesture recognition does not depend on pattern recognition, but only on the subset of seven segments that is crossed. For assuring high efficiency of entering, a circle in centre of each square of seven-segment layout is added as a shortcut for the characters composed in part by a circle. In order to compute 7SI speed, we have conducted a theoretical evaluation based on Fitts' Law. This study has shown that 7SI entry speed will be 27.49 words per minute.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134512065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Channel Estimation Technique for Hierarchical DVB-T System to Extract High-Priority Stream","authors":"Hamid Reza Tanhaei, M. Sharifi","doi":"10.1109/ICTTA.2008.4530248","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530248","url":null,"abstract":"In this paper a low-cost channel estimation technique for DVB-T systems with hierarchical modulation to extract only high-priority (HP) stream, is proposed. The proposed approach is based on the estimation and correction of the phase component of channel frequency response. In this way, this phase is considered while the magnitude is neglected. As will be shown, ignoring low- priority (LP) stream, we can perform demapping of HP stream, just by compensation of the phase of demodulated complex symbols. Compared with conventional channel estimation techniques, the major advantage of this technique is its simplicity and low computational complexity, but at the cost of losing LP stream. In fact, the aim is decoding and demodulation of just HP stream when hierarchical scheme is employed in the DVB-T transmitter. Simulation is performed to evaluate BER of HP stream versus channel SNR to validate the estimation method.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134610176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Fadlallah, A. Serhrouchni, Y. Begriche, F. Nait-Abdesselam
{"title":"A Hybrid Messaging-Based Scheme for IP Traceback","authors":"A. Fadlallah, A. Serhrouchni, Y. Begriche, F. Nait-Abdesselam","doi":"10.1109/ICTTA.2008.4530275","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530275","url":null,"abstract":"IP traceback is one of the main challenges that face the security of today's Internet. Many techniques were proposed, including in-band messaging and out-of-band messaging; each of them has pros and cons. In this paper, we propose a new traceback scheme that mixes these two techniques in order to achieve the best of the two worlds. Our hybrid messaging scheme uses packet marking (an in-band messaging scheme) to include signaling information in forwarded IP packets, while out-of-band messaging is used as a complementary signaling part in the case of randomly spoofed IP packets. The evaluation of the proposed scheme against various performance metrics and through extensive simulation studies showed that the scheme is able to trace a single packet across several and even non-cooperative domains, with a reasonable amount of storage, processing and bandwidth overhead.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133808478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Roaming for Nomadic Computing","authors":"Jun Zhang, C. Phillips","doi":"10.1109/ICTTA.2008.4530179","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530179","url":null,"abstract":"This paper provides details of a new system architecture enabling users / applications to roam seamlessly while they are actively processing executable code and / or communicating with remote entities. This architecture effectively decouples the running of applications from the underlying environment, facilitating both security and opportunistic processing on transitory resources. This decoupling also promotes the ability to create multiple clones of an application for performance gains. To improve the performance of the system, fuzzy logic [E. Cox, 1955][L. Biacino and G. Gerla, 2002][C. Vasudevau et al., 1994][S. Dick, 2005] and case based reasoning (CBR) [Aamodt et al., 1994][D. Leake, 1996] have been applied to the system to better regulate activities such as job migration between resources or client connection handover from one proxy to another. The paper provides a full description of the system and some simulation results to illustrate its functioning.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114660612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CRLS-GSC Noise Reduction Algorithm Robust to DOA Mismatch Problem in Microphone Arrays","authors":"P. Mahale","doi":"10.1109/ICTTA.2008.4530050","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530050","url":null,"abstract":"In this paper, using a group of derivative constraints in the generalized sidelobe canceller (GSC) structure, the constraint recursive least squares-generalized side-lobe canceller (CRLS-GSC) algorithm is introduced for noise reduction application. Through computer simulations, it is observed that the proposed CRLSGSC algorithm is less sensitive to direction of arrival (DOA) mismatch problem, which often degrades the noise reduction performance in the commonly-used GSC algorithm. It also presents a better performance with respect to the previous algorithms including multi-channel Wiener filtering (MWF), GSC, and GSC with noise sensitivity constraint (GSC-NSC) in terms of robustness to different noise scenarios.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114108088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analytical Study of the Rotation Spreading Matrix of Block Spread OFDM with MMSE Equalization","authors":"I. Raad, Xiaojing Huang","doi":"10.1109/ICTTA.2008.4530237","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530237","url":null,"abstract":"This paper presents an analytical study on the new spreading matrix for block spread OFDM known as the rotation spreading matrix and simulates the BER performance in the MMSE equation. In (I. Raad et al., 2006) a new spreading matrix was presented for block spread OFDM (BSOFDM) known as the rotation spreading matrix. It was shown to greatly improve on the existing spreading matrices such as the Hadamard and the rotated Hadamard matrices in frequency selective channels such as the ultra wide band and slow fading channels. This paper studies the effect of increasing the block size in BSOFDM using this new matrix.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114527010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of RSA Encryption Using Identical Modulus Algorithm","authors":"H. A. Osseily, A. Haidar, A. Kassem","doi":"10.1109/ICTTA.2008.4530285","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530285","url":null,"abstract":"The purpose of this paper is to present new algorithms and circuits to convert from MVL (multiple valued logic) to MVL coded decimal (MVL-CD) and vice versa. We will introduce two conversion techniques: the first one is called \"addition-subtraction technique\" (AST) while the other method is called \"division-multiplication technique\" (DMT). Based on AST, we will develop the algorithm and circuit of converters for quaternary and quinary systems. The Addition technique will be applied for converting from MVL to MVL-CD while Subtraction is used for reverse operation. In addition, we will develop the algorithm and circuit of DMT converter for quinary system by using delta gate elements. The division technique will be used to convert MVL to MVL-CD while multiplication will be used for the inverse conversion. At the end of this paper, a brief comparison will show the advantages and disadvantages of these methods in terms of cost and performance. Moreover, we will compare our techniques with other authors' methods and algorithms.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"306 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116753888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}