首页 > 最新文献

2018 4th International Conference on Computer and Technology Applications (ICCTA)最新文献

英文 中文
Pre-coding technique for adaptive threshold detectors in diffusion-based molecular communications 扩散分子通信中自适应阈值检测器的预编码技术
Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398656
A. Jamshidi, Arzhang Shahbazi
Molecular Communication (MC) is a subject in medicine, biology and communication engineering. This new paradigm is introduced to carry messages between nano-machines. Because of their size, one of the primary limitation of these devices is their computation capability. For this reason, the proposed ideas regarding MC should be as low complex as possible. Due to the random propagation of molecules, intersymbol interference becomes a major restriction in MC. The majority of ISI combating techniques in literature are implemented at receiver side. In this contribution, a new pre-coding algorithm is introduced at transmitter side to mitigate the intersymbol interference for adaptive threshold detectors. This algorithm will ensure us that we can utilise these detectors in different situations. Our analytical and numerical results indicate that the proposed scheme will provide a significant performance boost regarding these detectors.
分子通信(MC)是一门集医学、生物学和通信工程于一体的学科。这种新的范例被引入到纳米机器之间传递信息。由于它们的尺寸,这些设备的主要限制之一是它们的计算能力。因此,关于MC的建议应该尽可能的简单。由于分子的随机传播,码间干扰成为码间传输的主要制约因素,文献中大多数码间干扰的抑制技术都是在接收端实现的。本文提出了一种新的预编码算法,用于自适应阈值检测器的码间干扰。该算法将确保我们可以在不同的情况下使用这些检测器。我们的分析和数值结果表明,所提出的方案将为这些检测器提供显着的性能提升。
{"title":"Pre-coding technique for adaptive threshold detectors in diffusion-based molecular communications","authors":"A. Jamshidi, Arzhang Shahbazi","doi":"10.1109/CATA.2018.8398656","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398656","url":null,"abstract":"Molecular Communication (MC) is a subject in medicine, biology and communication engineering. This new paradigm is introduced to carry messages between nano-machines. Because of their size, one of the primary limitation of these devices is their computation capability. For this reason, the proposed ideas regarding MC should be as low complex as possible. Due to the random propagation of molecules, intersymbol interference becomes a major restriction in MC. The majority of ISI combating techniques in literature are implemented at receiver side. In this contribution, a new pre-coding algorithm is introduced at transmitter side to mitigate the intersymbol interference for adaptive threshold detectors. This algorithm will ensure us that we can utilise these detectors in different situations. Our analytical and numerical results indicate that the proposed scheme will provide a significant performance boost regarding these detectors.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130088319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Triple Helix Model: University-industry-governments linkage web-based application recommendation systems for emerging commercial-base research 三螺旋模型:大学-工业-政府联动的基于网络的应用推荐系统,用于新兴的商业基础研究
Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398664
Kanyakit Keerati-angkoon, R. Pichyangkura
The main purpose of this study is to develop innovative tool for supporting The Triple Helix Model: University-Industry-Governments Linkage. Web-based application recommendation system had been developed for creating the motivation for academic researcher to conduct commercial-based Research. Information Retrieval and Documentation Indexing technique were used in the web-based systems. In order to ensure system reliability and users intending to use, information retrieval model validation are tested. As the result, the systems enhance the efficiency and effectiveness of the linkage-process among the players of innovation network which are researchers, industry, public or private institutes, or technology transferred office. This process will aid researcher to emerge the commercial-based research and lead to research commercialization process in the next step.
本研究的主要目的是开发支持三螺旋模型的创新工具:大学-工业-政府联动。基于web的应用推荐系统的开发是为了激励学术研究者进行基于商业的研究。在基于web的系统中使用了信息检索和文献标引技术。为了保证系统的可靠性和用户的使用意愿,对信息检索模型进行了验证。因此,该系统提高了创新网络参与者之间的联系过程的效率和有效性,这些参与者包括研究人员、工业、公共或私人机构或技术转让办公室。这一过程将有助于研究人员产生基于商业的研究,并导致下一步的研究商业化进程。
{"title":"The Triple Helix Model: University-industry-governments linkage web-based application recommendation systems for emerging commercial-base research","authors":"Kanyakit Keerati-angkoon, R. Pichyangkura","doi":"10.1109/CATA.2018.8398664","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398664","url":null,"abstract":"The main purpose of this study is to develop innovative tool for supporting The Triple Helix Model: University-Industry-Governments Linkage. Web-based application recommendation system had been developed for creating the motivation for academic researcher to conduct commercial-based Research. Information Retrieval and Documentation Indexing technique were used in the web-based systems. In order to ensure system reliability and users intending to use, information retrieval model validation are tested. As the result, the systems enhance the efficiency and effectiveness of the linkage-process among the players of innovation network which are researchers, industry, public or private institutes, or technology transferred office. This process will aid researcher to emerge the commercial-based research and lead to research commercialization process in the next step.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115646798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dependent task scheduling algorithm in distributed system 分布式系统中的依赖任务调度算法
Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398662
Linfang Qin, F. Ouyang, Guixi Xiong
In order to improve the performance of tasks with dependencies in distributed environment and to overcome the shortcomings of existing table scheduling algorithms, the idea of table scheduling and task replication is combined to propose a heuristic task based on critical path and task replication Scheduling Algorithm (HCPTD). The algorithm improves the calculation method of task weight, and obtains the scheduling sequence according to whether it is the mission-critical or descending order of weight. The processor chooses the earliest task completion time and the shortest task-to-exit node distance. Experimental results show that HCPTD effectively improves the scheduling performance of distributed systems.
为了提高分布式环境下具有依赖关系的任务的性能,克服现有表调度算法的不足,将表调度和任务复制的思想结合起来,提出了一种基于关键路径和任务复制的启发式任务调度算法(HCPTD)。该算法改进了任务权值的计算方法,根据任务权值是任务关键级还是任务权值降序得到调度顺序。处理器选择最早的任务完成时间和最短的任务到出口节点距离。实验结果表明,HCPTD有效地提高了分布式系统的调度性能。
{"title":"Dependent task scheduling algorithm in distributed system","authors":"Linfang Qin, F. Ouyang, Guixi Xiong","doi":"10.1109/CATA.2018.8398662","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398662","url":null,"abstract":"In order to improve the performance of tasks with dependencies in distributed environment and to overcome the shortcomings of existing table scheduling algorithms, the idea of table scheduling and task replication is combined to propose a heuristic task based on critical path and task replication Scheduling Algorithm (HCPTD). The algorithm improves the calculation method of task weight, and obtains the scheduling sequence according to whether it is the mission-critical or descending order of weight. The processor chooses the earliest task completion time and the shortest task-to-exit node distance. Experimental results show that HCPTD effectively improves the scheduling performance of distributed systems.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124026631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Green computing: Awareness and practices 绿色计算:意识和实践
Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398646
A. Abugabah, Amira Abubaker
This study is an attempt to measure the level of green computing knowledge and awareness of university students. A quantitative research approach was used in this study, and data were collected through a survey designed to this purpose. Different statistical methods were utilized including factor analysis and t-test regression to analyze the data and to test the study hypotheses. The results indicated that the level of knowledge of green computing among students is high. However, even with having that amount of knowledge, their daily practices of green computing are not adequate. The results also showed that there is a need to provide workshops and training programs to students for increasing their awareness about green computing.
本研究试图对大学生的绿色计算机知识和意识水平进行测量。本研究采用定量研究方法,并通过为此目的设计的调查收集数据。采用因子分析、t检验回归等不同的统计方法对数据进行分析,对研究假设进行检验。结果表明,学生对绿色计算机的认知水平较高。然而,即使有了这些知识,他们的日常绿色计算实践是不够的。调查结果还显示,有必要为学生提供讲习班和培训计划,以提高他们对绿色计算的认识。
{"title":"Green computing: Awareness and practices","authors":"A. Abugabah, Amira Abubaker","doi":"10.1109/CATA.2018.8398646","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398646","url":null,"abstract":"This study is an attempt to measure the level of green computing knowledge and awareness of university students. A quantitative research approach was used in this study, and data were collected through a survey designed to this purpose. Different statistical methods were utilized including factor analysis and t-test regression to analyze the data and to test the study hypotheses. The results indicated that the level of knowledge of green computing among students is high. However, even with having that amount of knowledge, their daily practices of green computing are not adequate. The results also showed that there is a need to provide workshops and training programs to students for increasing their awareness about green computing.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129536243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Personal data protection maturity model for the micro financial sector in Peru 秘鲁小额金融部门个人数据保护期限模型
Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398649
Arturo M. Garcia, Luis Calle, C. Raymundo, F. Dominguez, Javier M. Moguerza
The micro financial sector is a strategic element in the economy of developing countries since it facilitates the integration and development of all social classes and let the economic growth. In this point is the growth of data is high every day in sector like the micro financial, resulting from transactions and operations carried out with these companies on a daily basis. Appropriate management of the personal data privacy policies is therefore necessary because, otherwise, it will comply with personal data protection laws and regulations and let take quality information for decision-making and process improvement. The present study proposes a personal data protection maturity model based on international standards of privacy and information security, which also reveals personal data protection capabilities in organizations. Finally, the study proposes a diagnostic and tracing assessment tool that was carried out for five companies in the micro financial sector and the obtained results were analyzed to validate the model and to help in success of data protection initiatives.
微观金融部门是发展中国家经济的战略要素,它促进了社会各阶层的融合和发展,促进了经济的增长。在这一点上,像微金融这样的行业每天的数据增长都很高,这是由于每天与这些公司进行的交易和运营造成的。因此,对个人数据隐私政策进行适当的管理是必要的,否则将符合个人数据保护的法律法规,并将有质量的信息用于决策和流程改进。本研究提出了一个基于国际隐私和信息安全标准的个人数据保护成熟度模型,该模型也揭示了组织的个人数据保护能力。最后,本文提出了一种诊断和跟踪评估工具,并对微观金融领域的五家公司进行了分析,以验证模型并帮助数据保护举措的成功实施。
{"title":"Personal data protection maturity model for the micro financial sector in Peru","authors":"Arturo M. Garcia, Luis Calle, C. Raymundo, F. Dominguez, Javier M. Moguerza","doi":"10.1109/CATA.2018.8398649","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398649","url":null,"abstract":"The micro financial sector is a strategic element in the economy of developing countries since it facilitates the integration and development of all social classes and let the economic growth. In this point is the growth of data is high every day in sector like the micro financial, resulting from transactions and operations carried out with these companies on a daily basis. Appropriate management of the personal data privacy policies is therefore necessary because, otherwise, it will comply with personal data protection laws and regulations and let take quality information for decision-making and process improvement. The present study proposes a personal data protection maturity model based on international standards of privacy and information security, which also reveals personal data protection capabilities in organizations. Finally, the study proposes a diagnostic and tracing assessment tool that was carried out for five companies in the micro financial sector and the obtained results were analyzed to validate the model and to help in success of data protection initiatives.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"366 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125624992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Raspberry Pi and computers-based face detection and recognition system 树莓派和基于计算机的人脸检测和识别系统
Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398677
Ayman A. Wazwaz, Amir O. Herbawi, Mohammad J. Teeti, Sajed Y. Hmeed
This paper aims to deploy a network that consists a group of computers connected with a microcomputer with a camera. The system takes images of people, analyze, detect and recognize human faces using image processing algorithms. The system can serve as a security system in public places like Malls, Universities, and airports. It can detect and recognize a human face in different situations and scenarios. This system implements “Boosted Cascade of Simple Features algorithm” to detect human faces. “Local Binary Pattern algorithm” to recognize these faces. Raspberry Pi is the main component connected to a camera for image capturing. All needed programs were written in python. Tests and performance analysis were done to verify the efficiency of this system.
本文旨在部署一个网络,该网络由一组计算机与带有摄像头的微型计算机相连。该系统采集人的图像,利用图像处理算法对人脸进行分析、检测和识别。该系统可作为商场、大学、机场等公共场所的安保系统。它可以在不同的情况和场景中检测和识别人脸。该系统实现了“简单特征增强级联算法”来检测人脸。“局部二值模式算法”来识别这些人脸。树莓派是连接相机进行图像捕捉的主要组件。所有需要的程序都是用python编写的。通过测试和性能分析验证了该系统的有效性。
{"title":"Raspberry Pi and computers-based face detection and recognition system","authors":"Ayman A. Wazwaz, Amir O. Herbawi, Mohammad J. Teeti, Sajed Y. Hmeed","doi":"10.1109/CATA.2018.8398677","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398677","url":null,"abstract":"This paper aims to deploy a network that consists a group of computers connected with a microcomputer with a camera. The system takes images of people, analyze, detect and recognize human faces using image processing algorithms. The system can serve as a security system in public places like Malls, Universities, and airports. It can detect and recognize a human face in different situations and scenarios. This system implements “Boosted Cascade of Simple Features algorithm” to detect human faces. “Local Binary Pattern algorithm” to recognize these faces. Raspberry Pi is the main component connected to a camera for image capturing. All needed programs were written in python. Tests and performance analysis were done to verify the efficiency of this system.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129087444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Automatically generate a specific human computer interaction from an interface diagram model 从接口图模型自动生成特定的人机交互
Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398671
William Germain Dimbisoa, Thomas Mahatody, Josvah Paul Razafimandimby
The diversity of interaction mode and the constant growth of user requirements bring new challenges to the Human Computer Interaction (HCI). It turns out that the user is interested in interacting with an interactive system according to his level of knowledge. Thus, in this article we have automatically generated the multiplatform HCI that is most adapted to the needs of the users from an interface skeleton. For example, the SEF (Schéma d'Enchaînement de Fenêtre) Windows, which is an interface model allowing to create an interface mockup. It offers more widgets and graphical elements to design an interface. The aim of this paper is automatically generating a new specific HCI from the already existing SEF model. The transformation is based on metamodel and we use the Model Driven Engineering (MDE) approach. Thus, a transformation rules are created to automatically generate a specific interface.
交互方式的多样性和用户需求的不断增长给人机交互(HCI)带来了新的挑战。事实证明,用户根据自己的知识水平对与交互式系统进行交互感兴趣。因此,在本文中,我们从界面框架中自动生成了最适合用户需求的多平台HCI。例如,SEF (schacimadencha nement de Fenêtre) Windows,它是一个允许创建接口模型的接口模型。它提供了更多的小部件和图形元素来设计界面。本文的目的是从已经存在的SEF模型中自动生成一个新的特定的HCI。该转换是基于元模型的,我们使用模型驱动工程(MDE)方法。因此,将创建转换规则来自动生成特定的接口。
{"title":"Automatically generate a specific human computer interaction from an interface diagram model","authors":"William Germain Dimbisoa, Thomas Mahatody, Josvah Paul Razafimandimby","doi":"10.1109/CATA.2018.8398671","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398671","url":null,"abstract":"The diversity of interaction mode and the constant growth of user requirements bring new challenges to the Human Computer Interaction (HCI). It turns out that the user is interested in interacting with an interactive system according to his level of knowledge. Thus, in this article we have automatically generated the multiplatform HCI that is most adapted to the needs of the users from an interface skeleton. For example, the SEF (Schéma d'Enchaînement de Fenêtre) Windows, which is an interface model allowing to create an interface mockup. It offers more widgets and graphical elements to design an interface. The aim of this paper is automatically generating a new specific HCI from the already existing SEF model. The transformation is based on metamodel and we use the Model Driven Engineering (MDE) approach. Thus, a transformation rules are created to automatically generate a specific interface.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115013938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Academic advising system using data mining method for decision making support 学术咨询系统采用数据挖掘方法进行决策支持
Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398651
Riah F. Elcullada-Encarnacion
With the high drop-out rates of college students across the Sultanate of Oman, the government urges HEIs to undertake ongoing analysis of its student population profile and evaluate the effectiveness of their academic advisory services. It is for this reason that this study intends to introduce an Online Student Academic Advising System for higher education, particularly to the Oman Tourism College (OTC). The developed system facilitates academic advising activities and keeps track of student's academic performance. By utilizing data mining method, the system is also capable of generating the required data set that can be used for data analysis and data modeling to discover useful knowledge regarding students' profile, students' registration, and students' module marks. The results of data mining in graphs and tables are very essential for OTC to make timely decisions and implement appropriate actions. The study was carried out using several stages of Developmental Research Method. By utilizing Quantitative Methodology from close-ended statements of the feedback survey, student participants were asked to evaluate the compliance of the developed system in accordance to the Industry Standard Organization 9126-1 (SQUARE ISO/IEC 9126-1:2001) software quality standards. The results showed that the system is a significant improvement for OTC and had a high level of compliance with the established software quality standards.
由于阿曼苏丹国大学生的高辍学率,政府敦促高等教育机构对其学生人口概况进行持续分析,并评估其学术咨询服务的有效性。正是出于这个原因,本研究打算为高等教育,特别是阿曼旅游学院(OTC)引入一个在线学生学术咨询系统。开发的系统便于学术咨询活动,并跟踪学生的学习成绩。通过数据挖掘方法,系统还能够生成所需的数据集,用于数据分析和数据建模,以发现学生的个人资料、学生的注册情况、学生的模块分数等有用的知识。以图表形式呈现的数据挖掘结果对于OTC及时做出决策和实施适当的行动至关重要。本研究采用发展研究方法的几个阶段进行。通过利用反馈调查封闭式陈述的定量方法,要求学生参与者根据行业标准组织9126-1 (SQUARE ISO/IEC 9126-1:2001)软件质量标准评估开发系统的合规性。结果表明,该系统对OTC有了显著的改进,并且高度符合已建立的软件质量标准。
{"title":"Academic advising system using data mining method for decision making support","authors":"Riah F. Elcullada-Encarnacion","doi":"10.1109/CATA.2018.8398651","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398651","url":null,"abstract":"With the high drop-out rates of college students across the Sultanate of Oman, the government urges HEIs to undertake ongoing analysis of its student population profile and evaluate the effectiveness of their academic advisory services. It is for this reason that this study intends to introduce an Online Student Academic Advising System for higher education, particularly to the Oman Tourism College (OTC). The developed system facilitates academic advising activities and keeps track of student's academic performance. By utilizing data mining method, the system is also capable of generating the required data set that can be used for data analysis and data modeling to discover useful knowledge regarding students' profile, students' registration, and students' module marks. The results of data mining in graphs and tables are very essential for OTC to make timely decisions and implement appropriate actions. The study was carried out using several stages of Developmental Research Method. By utilizing Quantitative Methodology from close-ended statements of the feedback survey, student participants were asked to evaluate the compliance of the developed system in accordance to the Industry Standard Organization 9126-1 (SQUARE ISO/IEC 9126-1:2001) software quality standards. The results showed that the system is a significant improvement for OTC and had a high level of compliance with the established software quality standards.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128843849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data privacy in cloud computing 云计算中的数据隐私
Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398650
Ahmed El-Yahyaoui, Mohamed Dafir Ech-Chrif El Kettani
Data privacy in cloud computing is a fundamental issue today. Fully homomorphic encryption schemes are highly recommended for data security in cloud computing. In fact, confidentiality of sensible data can be preserved even if a non-trusted cloud server processes it; the mystery behind this is that fully homomorphic encryption schemes allow processing encrypted data without the need of a prior decryption. In this paper we present a new fully homomorphic encryption scheme from integers. Our encryption scheme can be used essentially to secure sensible data in cloud computing. The proposed scheme uses a large integer ring as cleartext space and one key for encryption and decryption, i.e. it is a symmetric encryption scheme.
云计算中的数据隐私是当今的一个基本问题。为了云计算中的数据安全,强烈推荐使用完全同态加密方案。事实上,即使不受信任的云服务器处理数据,也可以保留敏感数据的机密性;这背后的奥秘在于,完全同态加密方案允许在不需要事先解密的情况下处理加密数据。本文提出了一种新的基于整数的全同态加密方案。我们的加密方案基本上可以用来保护云计算中的敏感数据。该方案使用一个大整数环作为明文空间,使用一个密钥进行加密和解密,即是一种对称加密方案。
{"title":"Data privacy in cloud computing","authors":"Ahmed El-Yahyaoui, Mohamed Dafir Ech-Chrif El Kettani","doi":"10.1109/CATA.2018.8398650","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398650","url":null,"abstract":"Data privacy in cloud computing is a fundamental issue today. Fully homomorphic encryption schemes are highly recommended for data security in cloud computing. In fact, confidentiality of sensible data can be preserved even if a non-trusted cloud server processes it; the mystery behind this is that fully homomorphic encryption schemes allow processing encrypted data without the need of a prior decryption. In this paper we present a new fully homomorphic encryption scheme from integers. Our encryption scheme can be used essentially to secure sensible data in cloud computing. The proposed scheme uses a large integer ring as cleartext space and one key for encryption and decryption, i.e. it is a symmetric encryption scheme.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133821303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Impact of ERP usage on organizational effectiveness: An empirical investigation 使用企业资源规划系统对组织效率的影响:实证调查
Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398665
F. Aburub
Achieving organizational effectiveness is considered high priority in many organizations around the world. Using technologies can be used to do that. This article aims to examine the influence of ERP Usage on Organizational Effectiveness in commercial banks in Jordan. A new research model has been proposed. The results show that there is a positive influence of using ERP on organizational effectiveness. Final, future research has been suggested to validate the proposed research model using different domains.
世界各地的许多组织都将提高组织效率视为重中之重。利用技术可以实现这一目标。本文旨在研究ERP的使用对约旦商业银行组织效能的影响。本文提出了一个新的研究模型。研究结果表明,使用企业资源规划系统对组织效能有积极影响。最后,建议未来的研究使用不同的领域来验证所提出的研究模型。
{"title":"Impact of ERP usage on organizational effectiveness: An empirical investigation","authors":"F. Aburub","doi":"10.1109/CATA.2018.8398665","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398665","url":null,"abstract":"Achieving organizational effectiveness is considered high priority in many organizations around the world. Using technologies can be used to do that. This article aims to examine the influence of ERP Usage on Organizational Effectiveness in commercial banks in Jordan. A new research model has been proposed. The results show that there is a positive influence of using ERP on organizational effectiveness. Final, future research has been suggested to validate the proposed research model using different domains.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126315253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 4th International Conference on Computer and Technology Applications (ICCTA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1