This study makes use of Google Analytics data from four social network sites under web 2.0 setting to analyze their users' behavior. Several statistical techniques are used to analyze the data based on the measures across the four companies with seven cases. Some interesting findings indicate that certain patterns emerge according to the characteristics of the web services. Managerial implications are discussed along with suggestions for future research.
{"title":"An Exploratory Study of the Users' Behavior on Social Network Sites","authors":"Shwu-Min Horng","doi":"10.1109/ITNG.2012.69","DOIUrl":"https://doi.org/10.1109/ITNG.2012.69","url":null,"abstract":"This study makes use of Google Analytics data from four social network sites under web 2.0 setting to analyze their users' behavior. Several statistical techniques are used to analyze the data based on the measures across the four companies with seven cases. Some interesting findings indicate that certain patterns emerge according to the characteristics of the web services. Managerial implications are discussed along with suggestions for future research.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130165065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents the design and simulation of Multiple-Input Single-Output (MISO) dc-dc converter. The main purpose of the converter is to allow connection of multiple power sources to a single dc bus system. Design and modeling of the MISO converter will first be discussed. Results of the computer simulation will be presented which demonstrate the ability of the converter to accept multiple dc sources while outputting only one dc voltage.
{"title":"Design and Simulation of Multiple-Input Single-Output DC-DC Converter","authors":"T. Taufik, T. Wong, Owen Jong, D. Dolan","doi":"10.1109/ITNG.2012.109","DOIUrl":"https://doi.org/10.1109/ITNG.2012.109","url":null,"abstract":"This paper presents the design and simulation of Multiple-Input Single-Output (MISO) dc-dc converter. The main purpose of the converter is to allow connection of multiple power sources to a single dc bus system. Design and modeling of the MISO converter will first be discussed. Results of the computer simulation will be presented which demonstrate the ability of the converter to accept multiple dc sources while outputting only one dc voltage.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132153238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Effective intrusion detection requires the analysis of enormous volumes of data collected from distributed sensor objects. Traditionally, this analysis has been performed on central servers. The alternative has been to limit data collection to network flow data, with the side effect of reducing intrusion detection effectiveness. This research examined an alternative, namely the incorporation of more intelligent sensor objects. We discuss the infrastructure required to support such a metaphor, the potential tradeoffs, and a novel algorithm for such an intelligent distributed sensor object.
{"title":"Distributed Sensor Objects for Intrusion Detection Systems","authors":"R. Erbacher, Steve E. Hutchinson","doi":"10.1109/ITNG.2012.100","DOIUrl":"https://doi.org/10.1109/ITNG.2012.100","url":null,"abstract":"Effective intrusion detection requires the analysis of enormous volumes of data collected from distributed sensor objects. Traditionally, this analysis has been performed on central servers. The alternative has been to limit data collection to network flow data, with the side effect of reducing intrusion detection effectiveness. This research examined an alternative, namely the incorporation of more intelligent sensor objects. We discuss the infrastructure required to support such a metaphor, the potential tradeoffs, and a novel algorithm for such an intelligent distributed sensor object.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128839041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Students tend to think optimistically about the software they construct. They believe the software will be defect free, and underestimate apparent risks to the development process. In the Software Enterprise, a 4-course upper division project sequence, student team failures to predict and prevent these risks lead to various problems like schedule delays, frustration, and dissatisfaction from external customer sponsors. The Enterprise uses the IBM Rational Jazz platform, but it does not have a native risk management capability. Instead, project teams were recording risks associated with their projects on paper reports. To facilitate maintaining and managing the risks associated with their projects, we developed a risk management component in the Jazz environment. This component complements Jazz by providing features of the risk management process like risk control and monitoring. The risk management component was used and evaluated by student capstone project teams.
{"title":"A Tool for Teaching Risk","authors":"S. Rajendran, K. Gary, H. Koehnemann","doi":"10.1109/ITNG.2012.172","DOIUrl":"https://doi.org/10.1109/ITNG.2012.172","url":null,"abstract":"Students tend to think optimistically about the software they construct. They believe the software will be defect free, and underestimate apparent risks to the development process. In the Software Enterprise, a 4-course upper division project sequence, student team failures to predict and prevent these risks lead to various problems like schedule delays, frustration, and dissatisfaction from external customer sponsors. The Enterprise uses the IBM Rational Jazz platform, but it does not have a native risk management capability. Instead, project teams were recording risks associated with their projects on paper reports. To facilitate maintaining and managing the risks associated with their projects, we developed a risk management component in the Jazz environment. This component complements Jazz by providing features of the risk management process like risk control and monitoring. The risk management component was used and evaluated by student capstone project teams.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125538959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There has been an increasing demand for organizations to foster real-time interaction with customers, through the development of multimedia and Knowledge-enabled Customer Relationship Management (KCRM) systems. KCRM implementations encounter several challenges, such as information overload and lack of trust. Few empirical studies were devoted to assess the role of multimedia to tackle these issues. Therefore, this paper describes an empirical investigation into the implication of incorporating multimedia elements into KCRM interfaces. To achieve this, an experimental KCRM platform was implemented with three different modes of interaction: Visual-only KCRM (V-CRM) with text and graphics, Multimodal KCRM (M-CRM) with speech, earcons and auditory icons and Avatar-enhanced multimodal KCRM (A-CRM). The three platforms were evaluated by a group of forty-eight participants (n=48) of age group varies from 18 to 55 year old, by performing six common tasks and filling a questionnaire devised to measure the aspects of user acceptance. The results therein revealed that A-CRM was more acceptable than both M-CRM and V-CRM, whereas M-CRM was less acceptable than V-CRM.
{"title":"Fostering the User Interface Acceptance in Customer Relationship Management: A Multimedia-aided Approach","authors":"Mutlaq B. Al-Otaibi, D. Rigas","doi":"10.1109/ITNG.2012.158","DOIUrl":"https://doi.org/10.1109/ITNG.2012.158","url":null,"abstract":"There has been an increasing demand for organizations to foster real-time interaction with customers, through the development of multimedia and Knowledge-enabled Customer Relationship Management (KCRM) systems. KCRM implementations encounter several challenges, such as information overload and lack of trust. Few empirical studies were devoted to assess the role of multimedia to tackle these issues. Therefore, this paper describes an empirical investigation into the implication of incorporating multimedia elements into KCRM interfaces. To achieve this, an experimental KCRM platform was implemented with three different modes of interaction: Visual-only KCRM (V-CRM) with text and graphics, Multimodal KCRM (M-CRM) with speech, earcons and auditory icons and Avatar-enhanced multimodal KCRM (A-CRM). The three platforms were evaluated by a group of forty-eight participants (n=48) of age group varies from 18 to 55 year old, by performing six common tasks and filling a questionnaire devised to measure the aspects of user acceptance. The results therein revealed that A-CRM was more acceptable than both M-CRM and V-CRM, whereas M-CRM was less acceptable than V-CRM.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122186465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A major part of Component-Based Software Engineering (CBSE) focuses on composing systems of independent components and the re-use of components. Descriptions of the quality of components allow assuring the quality of the composed system. Certification addresses trust issues regarding the trustworthiness of the descriptions, e.g. in components of the shelf (COTS) scenarios. Selecting components based on quality descriptions allows protecting intellectual property (IP) of the component supplier during selection but the development process must support certification and compositional evaluations. Different certification levels are available which affect the distribution of certification effort across participating roles depending on the need for IP protection and described quality characteristic. Existing CBSE approaches neglect a clear integration of description-based selection in the development process and provide no guidelines on selecting the appropriate certification level for a component. In this paper, we show how certification of quality descriptions can be integrated into a CBSE development process. Additionally, we provide a guideline supporting the selection of a certification level and point out the implications on the effort distribution on the different participating roles. The application of the guideline is demonstrated in three different scenarios and the most suitable certification level is identified, which allows tailoring a CBSE-aware certification process.
{"title":"Protecting Intellectual Property by Certified Component Quality Descriptions","authors":"Henning Groenda","doi":"10.1109/ITNG.2012.49","DOIUrl":"https://doi.org/10.1109/ITNG.2012.49","url":null,"abstract":"A major part of Component-Based Software Engineering (CBSE) focuses on composing systems of independent components and the re-use of components. Descriptions of the quality of components allow assuring the quality of the composed system. Certification addresses trust issues regarding the trustworthiness of the descriptions, e.g. in components of the shelf (COTS) scenarios. Selecting components based on quality descriptions allows protecting intellectual property (IP) of the component supplier during selection but the development process must support certification and compositional evaluations. Different certification levels are available which affect the distribution of certification effort across participating roles depending on the need for IP protection and described quality characteristic. Existing CBSE approaches neglect a clear integration of description-based selection in the development process and provide no guidelines on selecting the appropriate certification level for a component. In this paper, we show how certification of quality descriptions can be integrated into a CBSE development process. Additionally, we provide a guideline supporting the selection of a certification level and point out the implications on the effort distribution on the different participating roles. The application of the guideline is demonstrated in three different scenarios and the most suitable certification level is identified, which allows tailoring a CBSE-aware certification process.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121226850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Fardoun, Daniyal Algazzawi, S. R. López, Jose Antonio Gallud Lazarro
In the last years, online social networks (ONSs, online social networks) have grown to become one of the major medias for human beings on the Internet by having a wide distribution and acceptance by users. One of the critical aspects of developing this type of systems is the user interface. For this reason, a model-based approach is used to allow us collect interaction and collaboration aspects of social networks. Moreover, this paper based on ONSs and model-driven development provides a first approximation of social and collaborative model of a new online social network, which we have called PRSN (Positive Reinforcement Online Social Network).
在过去的几年里,在线社交网络(online social networks, ONSs, online social networks)已经发展成为人类在互联网上的主要媒体之一,具有广泛的分布和被用户接受。开发这类系统的一个关键方面是用户界面。出于这个原因,我们使用基于模型的方法来收集社交网络的交互和协作方面。此外,本文基于ONSs和模型驱动开发提供了一种新的在线社交网络的社会和协作模型的第一个近似,我们称之为PRSN (Positive Reinforcement online social network)。
{"title":"Proposed Model for Social and Collaborative Social Network of Positive Reinforcement: Positive Reinforcement Online Social Network: PRSN","authors":"H. Fardoun, Daniyal Algazzawi, S. R. López, Jose Antonio Gallud Lazarro","doi":"10.1109/ITNG.2012.75","DOIUrl":"https://doi.org/10.1109/ITNG.2012.75","url":null,"abstract":"In the last years, online social networks (ONSs, online social networks) have grown to become one of the major medias for human beings on the Internet by having a wide distribution and acceptance by users. One of the critical aspects of developing this type of systems is the user interface. For this reason, a model-based approach is used to allow us collect interaction and collaboration aspects of social networks. Moreover, this paper based on ONSs and model-driven development provides a first approximation of social and collaborative model of a new online social network, which we have called PRSN (Positive Reinforcement Online Social Network).","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121651394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Selin Benli, A. Habash, A. Herrmann, Tyler Loftis, Devon M. Simmonds
Software testing is generally an expensive, ad hoc and unpredictable process. Therefore, a better understanding of and an improvement of unit testing methods may improve the overall software testing process leading to more efficient test method selection and increased fault detection accuracy. The aim of this study is evaluate Black Box and White Box unit testing methods for the Android operating system. While several investigations have looked at unit testing using Black Box and White Box techniques, our research focuses explicitly on unit testing for Android applications. Test cases were created using JUnit and the program under test was seeded with errors by an outside party. We evaluated the performance of these two test methods on the difficulty of developing test cases for each method and the effectiveness of finding software errors in a controlled environment. Our results showed benefits and challenges for both testing techniques. Inferences and implications are also presented.
{"title":"A Comparative Evaluation of Unit Testing Techniques on a Mobile Platform","authors":"Selin Benli, A. Habash, A. Herrmann, Tyler Loftis, Devon M. Simmonds","doi":"10.1109/ITNG.2012.45","DOIUrl":"https://doi.org/10.1109/ITNG.2012.45","url":null,"abstract":"Software testing is generally an expensive, ad hoc and unpredictable process. Therefore, a better understanding of and an improvement of unit testing methods may improve the overall software testing process leading to more efficient test method selection and increased fault detection accuracy. The aim of this study is evaluate Black Box and White Box unit testing methods for the Android operating system. While several investigations have looked at unit testing using Black Box and White Box techniques, our research focuses explicitly on unit testing for Android applications. Test cases were created using JUnit and the program under test was seeded with errors by an outside party. We evaluated the performance of these two test methods on the difficulty of developing test cases for each method and the effectiveness of finding software errors in a controlled environment. Our results showed benefits and challenges for both testing techniques. Inferences and implications are also presented.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121815496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed Bourimi, M. Heupel, Benedikt Westermann, D. Kesdogan, Marc Planagumà, Rafael Giménez, Fatih Karatas, Philipp Schwarte
The increasing tendency of using user-controlled servers for supporting different scenarios from leisure and professional life raises new security challenges. Especially when those servers are used to support collaborative scenarios (e.g., communication and sharing with others), the requirement for anonymity at the network level should be supported in an efficient way. In this paper we present a specific communication scenario that could lead to link ability even though anonymous networks are used. The requirements gathering is based on realistic requirements from the EU FP7 di.me project requiring to empower lay end-users to collaborate with their contacts. Thereby anonymity at the network level also needs to be considered in order to disguise the physical location of the users and also of their server(s). We present an approach satisfying these anonymity requirements by means of a Tor based software component in order to overcome such privacy problems. First results are presented and the portability of the suggested solution for similar settings as well as future work directions are discussed.
{"title":"Towards Transparent Anonymity for User-controlled Servers Supporting Collaborative Scenarios","authors":"Mohamed Bourimi, M. Heupel, Benedikt Westermann, D. Kesdogan, Marc Planagumà, Rafael Giménez, Fatih Karatas, Philipp Schwarte","doi":"10.1109/ITNG.2012.23","DOIUrl":"https://doi.org/10.1109/ITNG.2012.23","url":null,"abstract":"The increasing tendency of using user-controlled servers for supporting different scenarios from leisure and professional life raises new security challenges. Especially when those servers are used to support collaborative scenarios (e.g., communication and sharing with others), the requirement for anonymity at the network level should be supported in an efficient way. In this paper we present a specific communication scenario that could lead to link ability even though anonymous networks are used. The requirements gathering is based on realistic requirements from the EU FP7 di.me project requiring to empower lay end-users to collaborate with their contacts. Thereby anonymity at the network level also needs to be considered in order to disguise the physical location of the users and also of their server(s). We present an approach satisfying these anonymity requirements by means of a Tor based software component in order to overcome such privacy problems. First results are presented and the portability of the suggested solution for similar settings as well as future work directions are discussed.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"25 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125217565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fuzzy clustering has been widely used for analysis of gene expression micro array data. However, most fuzzy clustering algorithms require complete datasets and, because of technical limitations, most micro array datasets have missing values. To address this problem, we present a new algorithm where genes are clustered using the Fuzzy C-Means algorithm, followed by approximating the fuzzy partition by a probabilistic data distribution model which is then used to estimate the missing values in the dataset. Using distribution-based approach, our method is most appropriate for datasets where the data are nonuniform. We show that our method outperforms six popular imputation algorithms on uniform and nonuniform artificial datasets as well as real datasets with unknown data distribution model.
{"title":"Probability-based Imputation Method for Fuzzy Cluster Analysis of Gene Expression Microarray Data","authors":"Thanh Le, T. Altman, K. Gardiner","doi":"10.1109/ITNG.2012.159","DOIUrl":"https://doi.org/10.1109/ITNG.2012.159","url":null,"abstract":"Fuzzy clustering has been widely used for analysis of gene expression micro array data. However, most fuzzy clustering algorithms require complete datasets and, because of technical limitations, most micro array datasets have missing values. To address this problem, we present a new algorithm where genes are clustered using the Fuzzy C-Means algorithm, followed by approximating the fuzzy partition by a probabilistic data distribution model which is then used to estimate the missing values in the dataset. Using distribution-based approach, our method is most appropriate for datasets where the data are nonuniform. We show that our method outperforms six popular imputation algorithms on uniform and nonuniform artificial datasets as well as real datasets with unknown data distribution model.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"75 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115174648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}