Pub Date : 2018-05-03DOI: 10.1109/CATA.2018.8398656
A. Jamshidi, Arzhang Shahbazi
Molecular Communication (MC) is a subject in medicine, biology and communication engineering. This new paradigm is introduced to carry messages between nano-machines. Because of their size, one of the primary limitation of these devices is their computation capability. For this reason, the proposed ideas regarding MC should be as low complex as possible. Due to the random propagation of molecules, intersymbol interference becomes a major restriction in MC. The majority of ISI combating techniques in literature are implemented at receiver side. In this contribution, a new pre-coding algorithm is introduced at transmitter side to mitigate the intersymbol interference for adaptive threshold detectors. This algorithm will ensure us that we can utilise these detectors in different situations. Our analytical and numerical results indicate that the proposed scheme will provide a significant performance boost regarding these detectors.
{"title":"Pre-coding technique for adaptive threshold detectors in diffusion-based molecular communications","authors":"A. Jamshidi, Arzhang Shahbazi","doi":"10.1109/CATA.2018.8398656","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398656","url":null,"abstract":"Molecular Communication (MC) is a subject in medicine, biology and communication engineering. This new paradigm is introduced to carry messages between nano-machines. Because of their size, one of the primary limitation of these devices is their computation capability. For this reason, the proposed ideas regarding MC should be as low complex as possible. Due to the random propagation of molecules, intersymbol interference becomes a major restriction in MC. The majority of ISI combating techniques in literature are implemented at receiver side. In this contribution, a new pre-coding algorithm is introduced at transmitter side to mitigate the intersymbol interference for adaptive threshold detectors. This algorithm will ensure us that we can utilise these detectors in different situations. Our analytical and numerical results indicate that the proposed scheme will provide a significant performance boost regarding these detectors.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130088319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/CATA.2018.8398664
Kanyakit Keerati-angkoon, R. Pichyangkura
The main purpose of this study is to develop innovative tool for supporting The Triple Helix Model: University-Industry-Governments Linkage. Web-based application recommendation system had been developed for creating the motivation for academic researcher to conduct commercial-based Research. Information Retrieval and Documentation Indexing technique were used in the web-based systems. In order to ensure system reliability and users intending to use, information retrieval model validation are tested. As the result, the systems enhance the efficiency and effectiveness of the linkage-process among the players of innovation network which are researchers, industry, public or private institutes, or technology transferred office. This process will aid researcher to emerge the commercial-based research and lead to research commercialization process in the next step.
{"title":"The Triple Helix Model: University-industry-governments linkage web-based application recommendation systems for emerging commercial-base research","authors":"Kanyakit Keerati-angkoon, R. Pichyangkura","doi":"10.1109/CATA.2018.8398664","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398664","url":null,"abstract":"The main purpose of this study is to develop innovative tool for supporting The Triple Helix Model: University-Industry-Governments Linkage. Web-based application recommendation system had been developed for creating the motivation for academic researcher to conduct commercial-based Research. Information Retrieval and Documentation Indexing technique were used in the web-based systems. In order to ensure system reliability and users intending to use, information retrieval model validation are tested. As the result, the systems enhance the efficiency and effectiveness of the linkage-process among the players of innovation network which are researchers, industry, public or private institutes, or technology transferred office. This process will aid researcher to emerge the commercial-based research and lead to research commercialization process in the next step.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115646798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/CATA.2018.8398662
Linfang Qin, F. Ouyang, Guixi Xiong
In order to improve the performance of tasks with dependencies in distributed environment and to overcome the shortcomings of existing table scheduling algorithms, the idea of table scheduling and task replication is combined to propose a heuristic task based on critical path and task replication Scheduling Algorithm (HCPTD). The algorithm improves the calculation method of task weight, and obtains the scheduling sequence according to whether it is the mission-critical or descending order of weight. The processor chooses the earliest task completion time and the shortest task-to-exit node distance. Experimental results show that HCPTD effectively improves the scheduling performance of distributed systems.
{"title":"Dependent task scheduling algorithm in distributed system","authors":"Linfang Qin, F. Ouyang, Guixi Xiong","doi":"10.1109/CATA.2018.8398662","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398662","url":null,"abstract":"In order to improve the performance of tasks with dependencies in distributed environment and to overcome the shortcomings of existing table scheduling algorithms, the idea of table scheduling and task replication is combined to propose a heuristic task based on critical path and task replication Scheduling Algorithm (HCPTD). The algorithm improves the calculation method of task weight, and obtains the scheduling sequence according to whether it is the mission-critical or descending order of weight. The processor chooses the earliest task completion time and the shortest task-to-exit node distance. Experimental results show that HCPTD effectively improves the scheduling performance of distributed systems.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124026631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/CATA.2018.8398646
A. Abugabah, Amira Abubaker
This study is an attempt to measure the level of green computing knowledge and awareness of university students. A quantitative research approach was used in this study, and data were collected through a survey designed to this purpose. Different statistical methods were utilized including factor analysis and t-test regression to analyze the data and to test the study hypotheses. The results indicated that the level of knowledge of green computing among students is high. However, even with having that amount of knowledge, their daily practices of green computing are not adequate. The results also showed that there is a need to provide workshops and training programs to students for increasing their awareness about green computing.
{"title":"Green computing: Awareness and practices","authors":"A. Abugabah, Amira Abubaker","doi":"10.1109/CATA.2018.8398646","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398646","url":null,"abstract":"This study is an attempt to measure the level of green computing knowledge and awareness of university students. A quantitative research approach was used in this study, and data were collected through a survey designed to this purpose. Different statistical methods were utilized including factor analysis and t-test regression to analyze the data and to test the study hypotheses. The results indicated that the level of knowledge of green computing among students is high. However, even with having that amount of knowledge, their daily practices of green computing are not adequate. The results also showed that there is a need to provide workshops and training programs to students for increasing their awareness about green computing.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129536243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/CATA.2018.8398649
Arturo M. Garcia, Luis Calle, C. Raymundo, F. Dominguez, Javier M. Moguerza
The micro financial sector is a strategic element in the economy of developing countries since it facilitates the integration and development of all social classes and let the economic growth. In this point is the growth of data is high every day in sector like the micro financial, resulting from transactions and operations carried out with these companies on a daily basis. Appropriate management of the personal data privacy policies is therefore necessary because, otherwise, it will comply with personal data protection laws and regulations and let take quality information for decision-making and process improvement. The present study proposes a personal data protection maturity model based on international standards of privacy and information security, which also reveals personal data protection capabilities in organizations. Finally, the study proposes a diagnostic and tracing assessment tool that was carried out for five companies in the micro financial sector and the obtained results were analyzed to validate the model and to help in success of data protection initiatives.
{"title":"Personal data protection maturity model for the micro financial sector in Peru","authors":"Arturo M. Garcia, Luis Calle, C. Raymundo, F. Dominguez, Javier M. Moguerza","doi":"10.1109/CATA.2018.8398649","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398649","url":null,"abstract":"The micro financial sector is a strategic element in the economy of developing countries since it facilitates the integration and development of all social classes and let the economic growth. In this point is the growth of data is high every day in sector like the micro financial, resulting from transactions and operations carried out with these companies on a daily basis. Appropriate management of the personal data privacy policies is therefore necessary because, otherwise, it will comply with personal data protection laws and regulations and let take quality information for decision-making and process improvement. The present study proposes a personal data protection maturity model based on international standards of privacy and information security, which also reveals personal data protection capabilities in organizations. Finally, the study proposes a diagnostic and tracing assessment tool that was carried out for five companies in the micro financial sector and the obtained results were analyzed to validate the model and to help in success of data protection initiatives.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"366 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125624992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/CATA.2018.8398677
Ayman A. Wazwaz, Amir O. Herbawi, Mohammad J. Teeti, Sajed Y. Hmeed
This paper aims to deploy a network that consists a group of computers connected with a microcomputer with a camera. The system takes images of people, analyze, detect and recognize human faces using image processing algorithms. The system can serve as a security system in public places like Malls, Universities, and airports. It can detect and recognize a human face in different situations and scenarios. This system implements “Boosted Cascade of Simple Features algorithm” to detect human faces. “Local Binary Pattern algorithm” to recognize these faces. Raspberry Pi is the main component connected to a camera for image capturing. All needed programs were written in python. Tests and performance analysis were done to verify the efficiency of this system.
{"title":"Raspberry Pi and computers-based face detection and recognition system","authors":"Ayman A. Wazwaz, Amir O. Herbawi, Mohammad J. Teeti, Sajed Y. Hmeed","doi":"10.1109/CATA.2018.8398677","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398677","url":null,"abstract":"This paper aims to deploy a network that consists a group of computers connected with a microcomputer with a camera. The system takes images of people, analyze, detect and recognize human faces using image processing algorithms. The system can serve as a security system in public places like Malls, Universities, and airports. It can detect and recognize a human face in different situations and scenarios. This system implements “Boosted Cascade of Simple Features algorithm” to detect human faces. “Local Binary Pattern algorithm” to recognize these faces. Raspberry Pi is the main component connected to a camera for image capturing. All needed programs were written in python. Tests and performance analysis were done to verify the efficiency of this system.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129087444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/CATA.2018.8398671
William Germain Dimbisoa, Thomas Mahatody, Josvah Paul Razafimandimby
The diversity of interaction mode and the constant growth of user requirements bring new challenges to the Human Computer Interaction (HCI). It turns out that the user is interested in interacting with an interactive system according to his level of knowledge. Thus, in this article we have automatically generated the multiplatform HCI that is most adapted to the needs of the users from an interface skeleton. For example, the SEF (Schéma d'Enchaînement de Fenêtre) Windows, which is an interface model allowing to create an interface mockup. It offers more widgets and graphical elements to design an interface. The aim of this paper is automatically generating a new specific HCI from the already existing SEF model. The transformation is based on metamodel and we use the Model Driven Engineering (MDE) approach. Thus, a transformation rules are created to automatically generate a specific interface.
交互方式的多样性和用户需求的不断增长给人机交互(HCI)带来了新的挑战。事实证明,用户根据自己的知识水平对与交互式系统进行交互感兴趣。因此,在本文中,我们从界面框架中自动生成了最适合用户需求的多平台HCI。例如,SEF (schacimadencha nement de Fenêtre) Windows,它是一个允许创建接口模型的接口模型。它提供了更多的小部件和图形元素来设计界面。本文的目的是从已经存在的SEF模型中自动生成一个新的特定的HCI。该转换是基于元模型的,我们使用模型驱动工程(MDE)方法。因此,将创建转换规则来自动生成特定的接口。
{"title":"Automatically generate a specific human computer interaction from an interface diagram model","authors":"William Germain Dimbisoa, Thomas Mahatody, Josvah Paul Razafimandimby","doi":"10.1109/CATA.2018.8398671","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398671","url":null,"abstract":"The diversity of interaction mode and the constant growth of user requirements bring new challenges to the Human Computer Interaction (HCI). It turns out that the user is interested in interacting with an interactive system according to his level of knowledge. Thus, in this article we have automatically generated the multiplatform HCI that is most adapted to the needs of the users from an interface skeleton. For example, the SEF (Schéma d'Enchaînement de Fenêtre) Windows, which is an interface model allowing to create an interface mockup. It offers more widgets and graphical elements to design an interface. The aim of this paper is automatically generating a new specific HCI from the already existing SEF model. The transformation is based on metamodel and we use the Model Driven Engineering (MDE) approach. Thus, a transformation rules are created to automatically generate a specific interface.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115013938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/CATA.2018.8398651
Riah F. Elcullada-Encarnacion
With the high drop-out rates of college students across the Sultanate of Oman, the government urges HEIs to undertake ongoing analysis of its student population profile and evaluate the effectiveness of their academic advisory services. It is for this reason that this study intends to introduce an Online Student Academic Advising System for higher education, particularly to the Oman Tourism College (OTC). The developed system facilitates academic advising activities and keeps track of student's academic performance. By utilizing data mining method, the system is also capable of generating the required data set that can be used for data analysis and data modeling to discover useful knowledge regarding students' profile, students' registration, and students' module marks. The results of data mining in graphs and tables are very essential for OTC to make timely decisions and implement appropriate actions. The study was carried out using several stages of Developmental Research Method. By utilizing Quantitative Methodology from close-ended statements of the feedback survey, student participants were asked to evaluate the compliance of the developed system in accordance to the Industry Standard Organization 9126-1 (SQUARE ISO/IEC 9126-1:2001) software quality standards. The results showed that the system is a significant improvement for OTC and had a high level of compliance with the established software quality standards.
{"title":"Academic advising system using data mining method for decision making support","authors":"Riah F. Elcullada-Encarnacion","doi":"10.1109/CATA.2018.8398651","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398651","url":null,"abstract":"With the high drop-out rates of college students across the Sultanate of Oman, the government urges HEIs to undertake ongoing analysis of its student population profile and evaluate the effectiveness of their academic advisory services. It is for this reason that this study intends to introduce an Online Student Academic Advising System for higher education, particularly to the Oman Tourism College (OTC). The developed system facilitates academic advising activities and keeps track of student's academic performance. By utilizing data mining method, the system is also capable of generating the required data set that can be used for data analysis and data modeling to discover useful knowledge regarding students' profile, students' registration, and students' module marks. The results of data mining in graphs and tables are very essential for OTC to make timely decisions and implement appropriate actions. The study was carried out using several stages of Developmental Research Method. By utilizing Quantitative Methodology from close-ended statements of the feedback survey, student participants were asked to evaluate the compliance of the developed system in accordance to the Industry Standard Organization 9126-1 (SQUARE ISO/IEC 9126-1:2001) software quality standards. The results showed that the system is a significant improvement for OTC and had a high level of compliance with the established software quality standards.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128843849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/CATA.2018.8398650
Ahmed El-Yahyaoui, Mohamed Dafir Ech-Chrif El Kettani
Data privacy in cloud computing is a fundamental issue today. Fully homomorphic encryption schemes are highly recommended for data security in cloud computing. In fact, confidentiality of sensible data can be preserved even if a non-trusted cloud server processes it; the mystery behind this is that fully homomorphic encryption schemes allow processing encrypted data without the need of a prior decryption. In this paper we present a new fully homomorphic encryption scheme from integers. Our encryption scheme can be used essentially to secure sensible data in cloud computing. The proposed scheme uses a large integer ring as cleartext space and one key for encryption and decryption, i.e. it is a symmetric encryption scheme.
{"title":"Data privacy in cloud computing","authors":"Ahmed El-Yahyaoui, Mohamed Dafir Ech-Chrif El Kettani","doi":"10.1109/CATA.2018.8398650","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398650","url":null,"abstract":"Data privacy in cloud computing is a fundamental issue today. Fully homomorphic encryption schemes are highly recommended for data security in cloud computing. In fact, confidentiality of sensible data can be preserved even if a non-trusted cloud server processes it; the mystery behind this is that fully homomorphic encryption schemes allow processing encrypted data without the need of a prior decryption. In this paper we present a new fully homomorphic encryption scheme from integers. Our encryption scheme can be used essentially to secure sensible data in cloud computing. The proposed scheme uses a large integer ring as cleartext space and one key for encryption and decryption, i.e. it is a symmetric encryption scheme.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133821303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-03DOI: 10.1109/CATA.2018.8398665
F. Aburub
Achieving organizational effectiveness is considered high priority in many organizations around the world. Using technologies can be used to do that. This article aims to examine the influence of ERP Usage on Organizational Effectiveness in commercial banks in Jordan. A new research model has been proposed. The results show that there is a positive influence of using ERP on organizational effectiveness. Final, future research has been suggested to validate the proposed research model using different domains.
{"title":"Impact of ERP usage on organizational effectiveness: An empirical investigation","authors":"F. Aburub","doi":"10.1109/CATA.2018.8398665","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398665","url":null,"abstract":"Achieving organizational effectiveness is considered high priority in many organizations around the world. Using technologies can be used to do that. This article aims to examine the influence of ERP Usage on Organizational Effectiveness in commercial banks in Jordan. A new research model has been proposed. The results show that there is a positive influence of using ERP on organizational effectiveness. Final, future research has been suggested to validate the proposed research model using different domains.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126315253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}