2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)最新文献

筛选
英文 中文
Reliable web services approaches of Mobile Cloud Computing: A comparative study 移动云计算的可靠web服务方法:比较研究
Amr S. Abdelfattah, T. Abdelkader, El-Sayed M. El-Horbaty
{"title":"Reliable web services approaches of Mobile Cloud Computing: A comparative study","authors":"Amr S. Abdelfattah, T. Abdelkader, El-Sayed M. El-Horbaty","doi":"10.1109/IntelCIS.2015.7397224","DOIUrl":"https://doi.org/10.1109/IntelCIS.2015.7397224","url":null,"abstract":"The Mobile intermittent wireless connectivity limits the evolution of the mobile landscape, such that this progress coupled with the ubiquitous nature of the Internet and the web services. The web service Reliability achieves the low overhead communication and retrieves the appropriate state response from the web service consumption. This paper discusses and analyzes the most recent approaches that achieve the reliability of web services consumed by mobile devices. Achieving the reliable web service consumption is tended to two approaches: Middleware approach and Mobile Agent (MA) approach. Both of them focus on ensuring the request execution under the communication limitations and services temporary unavailability.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"52 1","pages":"217-223"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90821391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of the relationship between Saudi twitter posts and the Saudi stock market 分析沙特twitter帖子与沙特股市之间的关系
Hamed Al-Rubaiee, Renxi Qiu, Dayou Li
{"title":"Analysis of the relationship between Saudi twitter posts and the Saudi stock market","authors":"Hamed Al-Rubaiee, Renxi Qiu, Dayou Li","doi":"10.1109/INTELCIS.2015.7397193","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397193","url":null,"abstract":"Sentiment analysis has become the heart of social media research and many studies have been applied to obtain users' opinion in fields such as electronic commerce and trade, management and also regarding political figures. Social media has recently become a rich resource in mining user sentiments. Social opinion has been analysed using sentiment analysis and some studies show that sentiment analysis of news, documents, quarterly reports, and blogs can be used as part of trading strategies. In this paper, Twitter has been chosen as a platform for opinion mining in trading strategy with the Saudi stock market in order to carry out and illustrate the relationship between Saudi tweets (that is standard and Arabian Gulf dialects) and the Saudi market index. To the best of our knowledge, this is the first study performed on Saudi tweets and the Saudi stock market.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"42 1","pages":"660-665"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86612699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
New trends of resource provisioning in multi-tier Cloud computing 多层云计算中资源配置的新趋势
Marwah Hashim Eawna, Salma Hamdy, El-Sayed M. El-Horbaty
{"title":"New trends of resource provisioning in multi-tier Cloud computing","authors":"Marwah Hashim Eawna, Salma Hamdy, El-Sayed M. El-Horbaty","doi":"10.1109/INTELCIS.2015.7397226","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397226","url":null,"abstract":"Cloud Computing is an emerging trend in the outsourced information technology (OIT) and provides a lot of functions as services. However, it suffers from many challenges such as resource provisioning, integrity, federation, and security. This paper focuses on the major problem, resource provisioning, that explored by many companies and researchers as a critical problem. Such researches are attempted to find method that minimizes provisioning time and reduces the number of resources in the cloud environment. Consequently, this paper proposes a dynamic resources provisioning algorithm by using Artificial Bees Colony (ABC) and Ant Colony Optimization (ACO) and focus on time optimization in multi-tier clouds. Accordingly, the obtained results show that the ACO faster than other meta-heuristic algorithm such as ABC, Particle Swarm Optimization (PSO), Simulated Annealing (SA) and hybrid Particle Swarm Optimization-Simulated Annealing (PSO-SA).","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"21 1","pages":"224-230"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75995607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review on trajectory similarity measures 轨迹相似性测度综述
Nehal Magdy, M. Sakr, T. Mostafa, Khaled El-Bahnasy
{"title":"Review on trajectory similarity measures","authors":"Nehal Magdy, M. Sakr, T. Mostafa, Khaled El-Bahnasy","doi":"10.1109/INTELCIS.2015.7397286","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397286","url":null,"abstract":"The availability of devices that can be used to track moving objects has increased dramatically leading to a great growth in movement data from almost every application domain. Therefore, there has been an increasing interest in proposing new methodologies for indexing, classifying, clustering, querying and measuring similarity between moving objects' data. One of the main functions for a wide range of application domains is to measure the similarity between two moving objects' trajectories. In this paper, we present a comparative study between widely used trajectory similarity measures observing the advantages and disadvantages of these measures.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"32 1","pages":"613-619"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91522716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
A novel adaptive learning management system using ontology 一种基于本体的自适应学习管理系统
S. M. Nafea, L. Maglaras, F. Siewe, M. E. Shehab
{"title":"A novel adaptive learning management system using ontology","authors":"S. M. Nafea, L. Maglaras, F. Siewe, M. E. Shehab","doi":"10.1109/INTELCIS.2015.7397242","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397242","url":null,"abstract":"The success of web technologies has prompted a developing consideration on e-learning activities. Notwithstanding, most current e-Learning systems give static web-based learning with the goal that learners get to the same learning contents through the web, regardless of individual learners profiles. These learners may have altogether different learning foundations, information levels, learning styles, and capacities. The `one size fit all' in an e-Learning frameworks is unmistakably a commonplace issue. To defeat this impediment and build powerful learning, versatile and customized learning is as of now a dynamic examination range. This paper propose a novel approach for designing and implementing adaptive learning management system based on ontology and semantic web technologies by offering a tailored model which represents the different activities that should be completed by learner. It offers a framework that is based on both learning styles and ontology to address the impact of student behavior.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"11 1","pages":"328-335"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87062705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
XML summarization: A survey XML摘要:一项调查
H. ElMadany, Marco Alfonse, M. Aref
{"title":"XML summarization: A survey","authors":"H. ElMadany, Marco Alfonse, M. Aref","doi":"10.1109/INTELCIS.2015.7397273","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397273","url":null,"abstract":"eXtensible Markup Language (XML) is one of the standard data representation nowadays. It can be used in various applications as its flexibility and easy to use so the need to summarize XML document become increasingly an important topic to save time and cost. For these reasons, there are more interest for developing tools for summarizing XML Documents. This paper surveys different approaches for summarizing XML documents regarding to both its structure and content.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"10 1","pages":"537-541"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72978463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The semantic analysis method and algorithms of open tests answers on “cyber-2” pattern in the knowledge revival and evaluation systems 知识复兴与评价系统中“cyber-2”模式开放测试答案的语义分析方法与算法
Zurab Munjishvili, T. Munjishvili
{"title":"The semantic analysis method and algorithms of open tests answers on “cyber-2” pattern in the knowledge revival and evaluation systems","authors":"Zurab Munjishvili, T. Munjishvili","doi":"10.1109/INTELCIS.2015.7397195","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397195","url":null,"abstract":"Is given the identification and assessment of knowledge in the computer systems in scientific terms it is one of the interesting and in practical terms, the topical - The open type tests processing value. In the open-type tests the semantic analysis method and algorithms are written in natural language. Are introduces a semantic analyzer results. Semantic Analyzer represents by the author, designed to identify knowledge and one of the functional unit evaluation system of “cyber2”. The findings and recommendations are also given. In the programming package there are considered diagnosis, different kinds of help. Attention is paid on security problems. Program is written on VB.NET 2010, as a server is used SQL Server 2008 on the platform of Windows Server 2008.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"58 1","pages":"50-55"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80010650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
LTE Authentication Protocol (EPS-AKA) weaknesses solution LTE认证协议(EPS-AKA)弱点解决方案
Mohammed Abdrabou, A. Elbayoumy, Essam Abd El-Wanis
{"title":"LTE Authentication Protocol (EPS-AKA) weaknesses solution","authors":"Mohammed Abdrabou, A. Elbayoumy, Essam Abd El-Wanis","doi":"10.1109/IntelCIS.2015.7397256","DOIUrl":"https://doi.org/10.1109/IntelCIS.2015.7397256","url":null,"abstract":"Extensible Authentication Protocol (EAP) is an authentication framework in Long Term Evolution (LTE) networks. EAP-AKA is one of the methods of EAP which uses the Authentication and Key Agreement (AKA) mechanism based on challenge-response mechanisms, EAP-AKA is used in the 3rd generation mobile networks then modified and inherited to 4th generation mobile networks (LTE) as Evolved Packet System Authentication and Key Agreement (EPS-AKA) mechanism which is used when the user access the network through EUTRAN. EPS-AKA vulnerabilities are disclosure of the user identity, Man in the Middle attack and Denial of Services (DoS) attacks so a robust authentication mechanism must replace EPSAKA to avoid such attacks. In this paper, Modified Evolved Packet System Authentication and Key Agreement (MEPS-AKA) protocol based on Simple Password Exponential Key Exchange (SPEKE) and symmetric key cryptography is proposed to solve these problems by performing a pre-authentication procedure to generate a dynamic key every time user access to the network, also each message send or received is confidentially protected. Scyther tool is used to verify the efficiency of the proposed protocol. EPS-AKA and MEPS-AKA are simulated using C programming language to calculate the execution time for both algorithms. The proposed protocol is simulated using a client-server application program using C# programming language.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"434-441"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75719303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
A preprocessing method for printed Tamil documents: Skew correction and textual classification 泰米尔语打印文档的预处理方法:偏斜校正和文本分类
M. Ramanan, A. Ramanan, E. Charles
{"title":"A preprocessing method for printed Tamil documents: Skew correction and textual classification","authors":"M. Ramanan, A. Ramanan, E. Charles","doi":"10.1109/INTELCIS.2015.7397266","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397266","url":null,"abstract":"An Optical character recognition (OCR) consists of the phases: preprocessing and segmentation, feature extraction, classification and post-processing. This paper focuses on preprocessing and segmentation tasks which plays a major role in the subsequent processes of an OCR. The objective of preprocessing and segmentation is to improve the quality of the input image. In addition this phase removes unnecessary portions of the input image that would otherwise complicate the subsequent steps of OCR and reduce the overall recognition rate. Preprocessing and segmentation step consists many sub processes namely, image binarisation, noise removal, skew detection and correction, page segmentation, text or non-text classification, line segmentation, word segmentation and character segmentation. This paper proposes a new method to calculate the skew angle for skew correction. In addition this paper proposes a more accurate method to segment the input image as blocks and classify the blocks as text or non-text. The skew angle is calculated on the scanned document using Wiener filter, smearing technique and Radon transform. Document image is segmented into blocks using run length smearing algorithm and connected component analysis. Features such as basic, density and HOG are extracted from each block for text and non-text classification. The proposed methods are tested on 54 documents. The testing results show a recognition rate of 96.30% for skew detection and correction whereas the recognition rate is 99.18% for text or non-text classification with binary SVMs using RBF kernel.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"57 1","pages":"495-500"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83115959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Perspectives on M2M protocols M2M协议的观点
Mohamed H. Elgazzar
{"title":"Perspectives on M2M protocols","authors":"Mohamed H. Elgazzar","doi":"10.1109/INTELCIS.2015.7397267","DOIUrl":"https://doi.org/10.1109/INTELCIS.2015.7397267","url":null,"abstract":"In the last years, the Machine-to-Machine (M2M) communications evolved as one of the major trends shaping the development of services in the future Internet. The use of M2M technologies is rapidly increasing in different fields such as Health Care, Automotive, Energy, Consumer Electronics, manufacturing, security and Banking. With that rapid increase different protocols had been developed for M2M communications and device management such as CoAP, MQTT and LwM2M. The objective of the paper is to provide synopsis of the different M2M protocols. The paper discusses the pros and cons of each of the protocols and identify their open problems. Up to our knowledge, it is the first study to provide such comparison between the different M2M protocol. The comparison is based on supported functions, network overhead, network reliability and security beside highlighting the different protocol architectures. The paper works as a start point for producing efficient M2M protocols.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"501-505"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88942498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信