Pub Date : 2016-07-13DOI: 10.1109/CSIT.2016.7549471
Yahya Khrishe, M. Alshayeb
Refactoring has been widely used to improve software design. Refactoring is applied when a bad smell is detected. Several bad smells might be present in the code. In this paper, we conduct an empirical study to find if the order of applying refactoring has any impact on the quality of the final code. We run six experiments by applying three refactoring methods in different orders and evaluate the quality of the code using software metrics at the end of each refactoring sequence. Our experiments results show that that applying refactoring in different order provides different impact on the final code.
{"title":"An empirical study on the effect of the order of applying software refactoring","authors":"Yahya Khrishe, M. Alshayeb","doi":"10.1109/CSIT.2016.7549471","DOIUrl":"https://doi.org/10.1109/CSIT.2016.7549471","url":null,"abstract":"Refactoring has been widely used to improve software design. Refactoring is applied when a bad smell is detected. Several bad smells might be present in the code. In this paper, we conduct an empirical study to find if the order of applying refactoring has any impact on the quality of the final code. We run six experiments by applying three refactoring methods in different orders and evaluate the quality of the code using software metrics at the end of each refactoring sequence. Our experiments results show that that applying refactoring in different order provides different impact on the final code.","PeriodicalId":210905,"journal":{"name":"2016 7th International Conference on Computer Science and Information Technology (CSIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124393259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-13DOI: 10.1109/CSIT.2016.7549482
M. B. Yassein, Yarub A. Wahsheh
Holy Quran is the religious book of Islam. It is very special type of data for more than 1.6 billion Muslims over the world. With the advancements of Information Technology it is now available in digital forms through the internet, websites and mobile applications. There is a remarkable need of having a standard rules to manage and monitor Holy Quran electronic versions. In this paper, an application layer protocol for Holy Quran is shown; it is a new version of Holy Quran Transfer Protocol (HQTP). The new version solves the reliability problems in previous version and enhances the protocol structure. It presents a standard rules with control information and additional features such as image and video transmission, search queries and elementary security features.
{"title":"HQTP v.2: Holy Quran Transfer Protocol version 2","authors":"M. B. Yassein, Yarub A. Wahsheh","doi":"10.1109/CSIT.2016.7549482","DOIUrl":"https://doi.org/10.1109/CSIT.2016.7549482","url":null,"abstract":"Holy Quran is the religious book of Islam. It is very special type of data for more than 1.6 billion Muslims over the world. With the advancements of Information Technology it is now available in digital forms through the internet, websites and mobile applications. There is a remarkable need of having a standard rules to manage and monitor Holy Quran electronic versions. In this paper, an application layer protocol for Holy Quran is shown; it is a new version of Holy Quran Transfer Protocol (HQTP). The new version solves the reliability problems in previous version and enhances the protocol structure. It presents a standard rules with control information and additional features such as image and video transmission, search queries and elementary security features.","PeriodicalId":210905,"journal":{"name":"2016 7th International Conference on Computer Science and Information Technology (CSIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128148490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-13DOI: 10.1109/CSIT.2016.7549447
Abeer F. Al-bataineh, S. Mustafa
Many Governments have realized the importance of information and communication technology (ICT) to improve the delivery of information and services to citizens and business. The fame of internet use, and the wide spread of mobile and portable means made the access to the governmental services easy and reachable at any time for a wide sector of citizens. People with disabilities have all the right to benefit from the e-services provided by the governmental websites equally with other citizens. To do so e-government websites must conform with the Web Content Accessibility Guidelines (WCAG). This paper was undertaken with three main purposes in mind, First: identifying the accessibility level of Jordanian e-Government websites in conformance with web content accessibility Guidelines (WCAG 1.0) at three level of priority, Second: assessing the efforts that have been devoted by the e-government websites to improve accessibility of Jordanian citizens with disability by comparing the recent results with our own study held in 2008. And finally, comparing Jordanian e-government accessibility results with another country (i.e. Dubai's e-government). The results indicate that the majority of Jordanian e-government websites fail to meet the minimum W3C accessibility conformance level. on the other hand many considerable improvements have taken place during the past 8 years. More than 65% of the errors had been eliminated. In comparison with Dubai's study, Jordanian e-Government websites score better in term of the average number of errors per page for priority1 and priority3 and approximate average number of errors per page for priority3.
{"title":"How Jordanian e-Government websites respond to the needs of people with disabilities","authors":"Abeer F. Al-bataineh, S. Mustafa","doi":"10.1109/CSIT.2016.7549447","DOIUrl":"https://doi.org/10.1109/CSIT.2016.7549447","url":null,"abstract":"Many Governments have realized the importance of information and communication technology (ICT) to improve the delivery of information and services to citizens and business. The fame of internet use, and the wide spread of mobile and portable means made the access to the governmental services easy and reachable at any time for a wide sector of citizens. People with disabilities have all the right to benefit from the e-services provided by the governmental websites equally with other citizens. To do so e-government websites must conform with the Web Content Accessibility Guidelines (WCAG). This paper was undertaken with three main purposes in mind, First: identifying the accessibility level of Jordanian e-Government websites in conformance with web content accessibility Guidelines (WCAG 1.0) at three level of priority, Second: assessing the efforts that have been devoted by the e-government websites to improve accessibility of Jordanian citizens with disability by comparing the recent results with our own study held in 2008. And finally, comparing Jordanian e-government accessibility results with another country (i.e. Dubai's e-government). The results indicate that the majority of Jordanian e-government websites fail to meet the minimum W3C accessibility conformance level. on the other hand many considerable improvements have taken place during the past 8 years. More than 65% of the errors had been eliminated. In comparison with Dubai's study, Jordanian e-Government websites score better in term of the average number of errors per page for priority1 and priority3 and approximate average number of errors per page for priority3.","PeriodicalId":210905,"journal":{"name":"2016 7th International Conference on Computer Science and Information Technology (CSIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116866130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-13DOI: 10.1109/CSIT.2016.7549454
B. Yousfi, A. Zeki
The act of reading Qur'an and pronouncing its sound dwells on the type of recitation. These are referring to the recitation of Warsh or the recitation of Hafss. It's very important to recognise the type of recitations, especially with the diversity and the spread of Qira'at in the world. This research presents a speech recognition system that distinguishes between the different types of the Qur'an recitation. The aim here is to design and developed a speech recognition for recitation of the Holy Qur'an for detecting the types of recitations and correction of fundamental and general errors. Although, there are several analysers that have been examined for error corrections, unfortunately, these analysers were not suitable for the act of recitation of the Holy Qur'an. Thus, the proposed system will be capable to recognize, identify and point out any mismatch. An experiment among student recitation with the recitation made by the expert teachers stored in a database has been done. Mel-Frequency Cepstral Coefficient (MFCC) for feature extraction and Hidden Markov Models (HMM) for feature classification are used.
{"title":"Holy Qur'an speech recognition system distinguishing the type of recitation","authors":"B. Yousfi, A. Zeki","doi":"10.1109/CSIT.2016.7549454","DOIUrl":"https://doi.org/10.1109/CSIT.2016.7549454","url":null,"abstract":"The act of reading Qur'an and pronouncing its sound dwells on the type of recitation. These are referring to the recitation of Warsh or the recitation of Hafss. It's very important to recognise the type of recitations, especially with the diversity and the spread of Qira'at in the world. This research presents a speech recognition system that distinguishes between the different types of the Qur'an recitation. The aim here is to design and developed a speech recognition for recitation of the Holy Qur'an for detecting the types of recitations and correction of fundamental and general errors. Although, there are several analysers that have been examined for error corrections, unfortunately, these analysers were not suitable for the act of recitation of the Holy Qur'an. Thus, the proposed system will be capable to recognize, identify and point out any mismatch. An experiment among student recitation with the recitation made by the expert teachers stored in a database has been done. Mel-Frequency Cepstral Coefficient (MFCC) for feature extraction and Hidden Markov Models (HMM) for feature classification are used.","PeriodicalId":210905,"journal":{"name":"2016 7th International Conference on Computer Science and Information Technology (CSIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122117688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-13DOI: 10.1109/CSIT.2016.7549446
Nurul Amin Badrul, Karsten Øster Lundqvist, Patrick Parslow, S. Williams
Open government aims to improve the relationship between the government and citizens. In a shift from e-Government 2.0, open government provides openness of information and openness of interactions with the public. However, these opportunities pose privacy challenges in the implementation of open government. In order to address these privacy challenges, it is important to explore public employees' understanding of personal information and privacy concepts in general. This paper reports the preliminary results of a qualitative approach to explore Malaysian public service employees' understanding of personal information and privacy. Findings of this study indicate that employees have difficulties in explaining personal information and privacy.
{"title":"Investigating employees' understanding of the concept of privacy for the open Government initiative","authors":"Nurul Amin Badrul, Karsten Øster Lundqvist, Patrick Parslow, S. Williams","doi":"10.1109/CSIT.2016.7549446","DOIUrl":"https://doi.org/10.1109/CSIT.2016.7549446","url":null,"abstract":"Open government aims to improve the relationship between the government and citizens. In a shift from e-Government 2.0, open government provides openness of information and openness of interactions with the public. However, these opportunities pose privacy challenges in the implementation of open government. In order to address these privacy challenges, it is important to explore public employees' understanding of personal information and privacy concepts in general. This paper reports the preliminary results of a qualitative approach to explore Malaysian public service employees' understanding of personal information and privacy. Findings of this study indicate that employees have difficulties in explaining personal information and privacy.","PeriodicalId":210905,"journal":{"name":"2016 7th International Conference on Computer Science and Information Technology (CSIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116776409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-13DOI: 10.1109/CSIT.2016.7549465
M. Shehab, Omar Badarneh, M. Al-Ayyoub, Y. Jararweh
Multi-label classification of textual data is an important problem with the growing size of available data and the increasing difficulties in assigning a single label to each piece of text. Examples range from news articles to emails. Most of the existing works consider English text. This work focuses on multi-label classification of Arabic articles. After dataset collection, three multi-label classifiers are considered (DT, RF and KNN). The results show a superiority of DT over the other two classifiers.
{"title":"A supervised approach for multi-label classification of Arabic news articles","authors":"M. Shehab, Omar Badarneh, M. Al-Ayyoub, Y. Jararweh","doi":"10.1109/CSIT.2016.7549465","DOIUrl":"https://doi.org/10.1109/CSIT.2016.7549465","url":null,"abstract":"Multi-label classification of textual data is an important problem with the growing size of available data and the increasing difficulties in assigning a single label to each piece of text. Examples range from news articles to emails. Most of the existing works consider English text. This work focuses on multi-label classification of Arabic articles. After dataset collection, three multi-label classifiers are considered (DT, RF and KNN). The results show a superiority of DT over the other two classifiers.","PeriodicalId":210905,"journal":{"name":"2016 7th International Conference on Computer Science and Information Technology (CSIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127450199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-13DOI: 10.1109/CSIT.2016.7549457
M. Alsolamy, A. Fattouh
Emotions play an important role in our thinking and behavior and hence contribute in shaping up of our personality. Many theoretical and experimental researches have been conducted to recognize the emotions from verbal or non-verbal behaviors. It is well known that the electroencephalogram (EEG) signals contain rich information about the activities of the brain and they can reliably enable us to estimate the emotions if they are properly interpreted. In this paper, we propose a model to discriminate the emotional state of a person by analyzing his brain signals recorded during listening to the Quran and using a machine learning approach. It is assumed that listening to the Quran brings reverence, and hence two types of emotions emerge which are distinguished as happy and unhappy. In our analysis, we used the Power Spectral Density (PSD) of different bands as features and the Support Vector Machine (SVM) as a classifier. Experiments were conducted by 14 participants and they gave a classification accuracy rate 85.86%.
{"title":"Emotion estimation from EEG signals during listening to Quran using PSD features","authors":"M. Alsolamy, A. Fattouh","doi":"10.1109/CSIT.2016.7549457","DOIUrl":"https://doi.org/10.1109/CSIT.2016.7549457","url":null,"abstract":"Emotions play an important role in our thinking and behavior and hence contribute in shaping up of our personality. Many theoretical and experimental researches have been conducted to recognize the emotions from verbal or non-verbal behaviors. It is well known that the electroencephalogram (EEG) signals contain rich information about the activities of the brain and they can reliably enable us to estimate the emotions if they are properly interpreted. In this paper, we propose a model to discriminate the emotional state of a person by analyzing his brain signals recorded during listening to the Quran and using a machine learning approach. It is assumed that listening to the Quran brings reverence, and hence two types of emotions emerge which are distinguished as happy and unhappy. In our analysis, we used the Power Spectral Density (PSD) of different bands as features and the Support Vector Machine (SVM) as a classifier. Experiments were conducted by 14 participants and they gave a classification accuracy rate 85.86%.","PeriodicalId":210905,"journal":{"name":"2016 7th International Conference on Computer Science and Information Technology (CSIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116109691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-13DOI: 10.1109/CSIT.2016.7549441
Jumana Bukhari, N. Akkari
Nowadays, the current trend is to integrate WiFi with Long Term Evolution (LTE) networks in order to meet the growing demand for huge amounts of data traffic and provide ubiquitous coverage. Seamless mobility between heterogeneous networks with the required Quality of Services (QoS) provisioning for Mobile Terminals (MTs) is one of the most challenging issues while considering LTE-WiFi integration. Several studies reported in the literature have addressed the vertical handover (VHO) challenges between the two access networks. However, none of these approaches provides the MTs with the required QoS without adding a new entity or increasing the signaling cost. Thus, this paper proposes a VHO decision algorithm between LTE-WiFi heterogeneous networks. A performance study is conducted which compares the proposed approach with the WiFi First (WF) approach. Results show that the proposed approach can support QoS and reduce Wi-Fi blocking probability without adding any new entities to the infrastructure or increasing signaling costs. Also, the proposed approach outperforms existing solutions in terms of delay and signaling costs, while providing the MTs with the required QoS.
目前的趋势是将WiFi与LTE (Long Term Evolution,长期演进)网络相结合,以满足日益增长的海量数据流量需求,并提供无处不在的覆盖。在考虑LTE-WiFi集成时,异构网络之间的无缝移动性以及为移动终端提供所需的服务质量(QoS)是最具挑战性的问题之一。文献报道的一些研究已经解决了两个接入网之间的垂直切换(VHO)挑战。然而,这些方法都不能在不添加新实体或增加信令成本的情况下为mt提供所需的QoS。为此,本文提出了一种LTE-WiFi异构网络间的VHO决策算法。进行了性能研究,将所提出的方法与WiFi优先(WF)方法进行了比较。结果表明,该方法在不增加任何新的实体或增加信令成本的情况下,能够支持QoS并降低Wi-Fi阻塞概率。此外,所提出的方法在延迟和信令成本方面优于现有的解决方案,同时为mt提供所需的QoS。
{"title":"QoS based approach for LTE-WiFi handover","authors":"Jumana Bukhari, N. Akkari","doi":"10.1109/CSIT.2016.7549441","DOIUrl":"https://doi.org/10.1109/CSIT.2016.7549441","url":null,"abstract":"Nowadays, the current trend is to integrate WiFi with Long Term Evolution (LTE) networks in order to meet the growing demand for huge amounts of data traffic and provide ubiquitous coverage. Seamless mobility between heterogeneous networks with the required Quality of Services (QoS) provisioning for Mobile Terminals (MTs) is one of the most challenging issues while considering LTE-WiFi integration. Several studies reported in the literature have addressed the vertical handover (VHO) challenges between the two access networks. However, none of these approaches provides the MTs with the required QoS without adding a new entity or increasing the signaling cost. Thus, this paper proposes a VHO decision algorithm between LTE-WiFi heterogeneous networks. A performance study is conducted which compares the proposed approach with the WiFi First (WF) approach. Results show that the proposed approach can support QoS and reduce Wi-Fi blocking probability without adding any new entities to the infrastructure or increasing signaling costs. Also, the proposed approach outperforms existing solutions in terms of delay and signaling costs, while providing the MTs with the required QoS.","PeriodicalId":210905,"journal":{"name":"2016 7th International Conference on Computer Science and Information Technology (CSIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129808910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-13DOI: 10.1109/CSIT.2016.7549473
Laila M. Qaisi, Ibrahim Aljarah
The rapid revolution of Social Network Sites (SNS) around the globe is presenting wide range of data that can be used in studies of sentiment analysis about certain products, brands, services... etc. In addition, cloud computing fields had been one of the most interesting fields in research studies. In this paper, we used the sentiment analysis of top leading cloud service providers namely; Amazon and Microsoft Azure to analyse their customers' opinions and reviews. To do that, two datasets are extracted which are consisting of tweets that had either organizations' names or cloud names. We study, and analyze the way customers think about them. In this regard, many organizations tend to find out what do customers think or tweet about their products in order to effectively plan marketing campaigns and try to gain the positive impact of Word-of-Mouth. Results are analyzed and explained in details in term of polarity and emotions classifications to show the impact of sentiment analysis to support organizations decisions. We can note from the emotions classification results that, “joy” category is better for Microsoft Azure comparing to Amazon, The “sadness” percentage is larger for Amazon comparing to Microsoft Azure. Furthermore, we can note from the polarity classification that Microsoft Azure has 65% positive tweets compared 45% for Amazon. In addition, the results show that Amazon has 50% negative polarity compared 25% for Microsoft Azure.
{"title":"A twitter sentiment analysis for cloud providers: A case study of Azure vs. AWS","authors":"Laila M. Qaisi, Ibrahim Aljarah","doi":"10.1109/CSIT.2016.7549473","DOIUrl":"https://doi.org/10.1109/CSIT.2016.7549473","url":null,"abstract":"The rapid revolution of Social Network Sites (SNS) around the globe is presenting wide range of data that can be used in studies of sentiment analysis about certain products, brands, services... etc. In addition, cloud computing fields had been one of the most interesting fields in research studies. In this paper, we used the sentiment analysis of top leading cloud service providers namely; Amazon and Microsoft Azure to analyse their customers' opinions and reviews. To do that, two datasets are extracted which are consisting of tweets that had either organizations' names or cloud names. We study, and analyze the way customers think about them. In this regard, many organizations tend to find out what do customers think or tweet about their products in order to effectively plan marketing campaigns and try to gain the positive impact of Word-of-Mouth. Results are analyzed and explained in details in term of polarity and emotions classifications to show the impact of sentiment analysis to support organizations decisions. We can note from the emotions classification results that, “joy” category is better for Microsoft Azure comparing to Amazon, The “sadness” percentage is larger for Amazon comparing to Microsoft Azure. Furthermore, we can note from the polarity classification that Microsoft Azure has 65% positive tweets compared 45% for Amazon. In addition, the results show that Amazon has 50% negative polarity compared 25% for Microsoft Azure.","PeriodicalId":210905,"journal":{"name":"2016 7th International Conference on Computer Science and Information Technology (CSIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125815810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-01DOI: 10.1109/CSIT.2016.7549445
Suzana Ahmad, S. Z. Abidin, N. Omar
Managing interest in collaborative data sharing involves determining interest of both owner and other parties. Interest management method is bound to information such as user request, location, history, preferences and data policies. Considering other researchers' works, managing data interest of sharing for its' constitutional adhered policy are rarely done in computerize manner. With attention that data shared are constituted with policy implicitly or explicitly, this paper proposes an automatic design of data policy via policy programming language in order to handle interest management. The study starts by analyzing secondary data through massive literature reviews. Two pertinent issues on interest management and data policy are explored, analyzed and summarized. Based on the research gap found in these analyses, an interest management for automated data policy is designed. As a case study, a new set of programming constructs are implemented and embedded into an existing collaborative language called JACIE (Java-based Authoring language for Collaborative Interactive Environments) that acts as a policy programming language. The results of this study conform that automated data policy is feasible and functioning well. Thus, this helps an interest manager to have flexible data policy in handling collaborative activities.
{"title":"Interest management through policy programming language","authors":"Suzana Ahmad, S. Z. Abidin, N. Omar","doi":"10.1109/CSIT.2016.7549445","DOIUrl":"https://doi.org/10.1109/CSIT.2016.7549445","url":null,"abstract":"Managing interest in collaborative data sharing involves determining interest of both owner and other parties. Interest management method is bound to information such as user request, location, history, preferences and data policies. Considering other researchers' works, managing data interest of sharing for its' constitutional adhered policy are rarely done in computerize manner. With attention that data shared are constituted with policy implicitly or explicitly, this paper proposes an automatic design of data policy via policy programming language in order to handle interest management. The study starts by analyzing secondary data through massive literature reviews. Two pertinent issues on interest management and data policy are explored, analyzed and summarized. Based on the research gap found in these analyses, an interest management for automated data policy is designed. As a case study, a new set of programming constructs are implemented and embedded into an existing collaborative language called JACIE (Java-based Authoring language for Collaborative Interactive Environments) that acts as a policy programming language. The results of this study conform that automated data policy is feasible and functioning well. Thus, this helps an interest manager to have flexible data policy in handling collaborative activities.","PeriodicalId":210905,"journal":{"name":"2016 7th International Conference on Computer Science and Information Technology (CSIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130333502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}