By Topic

Applications of Digital Information and Web Technologies, 2008. ICADIWT 2008. First International Conference on the

Date 4-6 Aug. 2008

Filter Results

Displaying Results 1 - 25 of 104
  • E-commerce privacy and trust: Overview and foundation

    Publication Year: 2008 , Page(s): 50 - 53
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (414 KB) |  | HTML iconHTML  

    The proliferation of the Internet has given rise to electronic commerce or e-commerce. Each year consumer privacy becomes more of an issue. There are a number of actions that online merchants can take to give a sense of security to their customers in addition to actions that consumers can take to ensure their own privacy. This review is an overview of the issues found in the e-commerce literature and is provided as a foundation for future research regarding the issues of privacy and trust in e-commerce. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of the image logging server for web forensics

    Publication Year: 2008 , Page(s): 54 - 57
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1058 KB) |  | HTML iconHTML  

    Development of the computer and the Internet got user convenience, however it brought new dysfunction of the computer crime. Finally, this occurred the criminal who has a specified purpose and it became a big obstacle that check development of information-oriented society. Hereupon, a corresponded information protection technology was situated by measure that judge individualpsilas private life protection and country competitive power. And in present, an information protection technology is very important.These information protection technology were connected to constant development of a fire wall and an intrusion detection system. However the technology of a computer forensic is not with activity about collecting of evidences of damage systems, a recovery and an analysis. In this paper, implement multi thread TCP server which stores the image files of the Web URL pages of the same time that is recorded and makes log files. As a evidence about the computer cyber crime, we suggest the image log file that is digital forensics. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • APA Labs: An experimental web-based platform for the retrieval and analysis of news articles

    Publication Year: 2008 , Page(s): 58 - 62
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1103 KB) |  | HTML iconHTML  

    In this paper, we present APA Labs, an experimental, Web-based platform supporting retrieval and analysis in the news archives of the Austrian Press Agency. APA Labs has been designed as a combination of a rich internet application with a modular system of interactive visualizations backed by server-side entity extraction and three-dimensional rendering capability. This paper outlines concepts and implementation details of APA Labs and presents several visualization modules based on research results from the field of Information and Knowledge visualization. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of AJAX vulnerability in Web 2.0 applications

    Publication Year: 2008 , Page(s): 63 - 67
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (430 KB) |  | HTML iconHTML  

    The current period is marked by the increased application of Web servers and the use of web 2.0 for many utilities. As the access to the Web 2.0 by the global users is on ever increase, the hijackers eye on the Web 2.0 for attacks. The principal technology behind the Web 2.0 is the AJAX which now becomes the target of many security attacks. In the current study we have introduced AJAX PRO, a prototype tool for AJAX vulnerability prevention has visualized an enhanced architecture to reflect the AJAX vulnerability and the architecture is applied in randomized trails and the results call for increased applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of an automated documentation system with a visual data flow programming language

    Publication Year: 2008 , Page(s): 68 - 73
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (534 KB) |  | HTML iconHTML  

    In this article, we present advantages and restrictions that visual data flow programming language (VDFL) brings to a measurement system implementation. These results have been collected together during the implementation of an automated documentation system. Because of the characteristic of VDFL, such as, absence of variables and concreteness of the program code representation the implementation suffers from lack of run-time program variability. In this article, we introduce a dynamic case structure that is a theoretical solution to improve the program variability during execution. The main advantages for using VDFL are prototyping with predefined program components and comprehensibility of the visual language. We also found that the rapid prototyping method combined together with a simple top-down design is a useful tool for a measurement system implementation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performing operations on graph through multimodal interface: An agent based architecture

    Publication Year: 2008 , Page(s): 74 - 77
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (538 KB) |  | HTML iconHTML  

    In this paper we discuss about agent based multimodal interface architecture. To illustrate this concept, we present an application to mine information from a graph data structure. This application can be used as a user friendly interface for mining information where graph can be used as data structure for information storage. The application recognizes the gestures, text based input, speech and combination of all of these. Here the various input modalities are implemented as software agents which are independent of each other. There exist MONITOR agents which will synchronize various inputs from the user and act according to it. Users response will be mapped to system vocabulary space with help of a semantic analyzer and results will be passed to MONITOR for further processing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Query Graph Visualizer: A visual collaborative querying system

    Publication Year: 2008 , Page(s): 78 - 83
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (533 KB) |  | HTML iconHTML  

    Collaborative querying harnesses the collective search experiences of users for query formulation. We present the Query Graph Visualizer (QGV), a visual collaborative querying system that recommends related queries to a userpsilas submitted query through a network visualization scheme. Users are able to explore the query network and select queries for execution on an information retrieval (IR) system. The design of the QGV is discussed, focusing on its architecture and the implementation of the user interface. An evaluation of the QGV was also conducted to assess the performance of the system against to a conventional search engine. Results indicate that the evaluators who used the QGV completed their tasks much faster compared to those using a search engine alone. A usability evaluation also showed that the system complied with standard user interface heuristics. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Arabic Retrieval System with Native Language rather than SQL Queries

    Publication Year: 2008 , Page(s): 84 - 89
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (801 KB)  

    The Arab users face several problems when they search information in the database. Writing SQL query in their natural language is a major problem. This problem leads to a strong need for an Arabic information retrieval system that would help the Arabic user in searching for the desired information without the need to write SQL queries. So, this paper presents an Arabic Retrieval System by Native Language rather than SQL Queries which is called Arabic Query Analyzer (AQA). In the other words, an AQA basically transforms Arabic query texts into SQL commands. The developed system has been fully implemented and tested and has shown tangible performance in retrieving database information using Arabic natural language. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison between document-based, term-based and hybrid partitioning

    Publication Year: 2008 , Page(s): 90 - 95
    Cited by:  Patents (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (428 KB) |  | HTML iconHTML  

    Information retrieval (IR) systems for largescale data collections must build an index in order to provide efficient retrieval that meets the userpsilas needs. In distributed IR systems, query response time is affected by the way in which the data collection is partitioned across nodes. There are three types of collection partitioning; document-based partitioning (called the local index), term-based partitioning (called the global index) and hybrid partitioning. In this paper, we compare the three types of partitioning in terms of average query response time for a system with one broker and six other nodes. Our results showed that within our distributed IR system, the document-based and hybrid partitioning outperformed the term-based partitioning. However, unlike Xi et al. , we did not find that hybrid partitioning was any better than document-based partitioning in terms of average query response time. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The search experience using condition formulas based on the cellular model

    Publication Year: 2008 , Page(s): 96 - 101
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (751 KB) |  | HTML iconHTML  

    Cyberworlds of intentional design, as well as those emerging spontaneously, are forming on the Web. A novel information model called the cellular model can model objects and their relations in Cyberworlds from general to specific based on the incrementally modular abstraction hierarchy. We have previously developed a processing system called the Cellular Data System (CDS) based on the model. This time we have designed and implemented the process for dividing spaces by creating condition formulas according to the set theoretical processing in the CDS. We currently take advantage of a useful search function called a condition formula search. Creating condition formulas essentially means that data operation requirements of users themselves can be included into a system as a space on the set theoretical level when employing CDS in business application development and also suggests the starting point of implementing the process graph theory, which makes linear business application system development possible, preventing combinatorial explosions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An algorithm for reusable uninteresting rules in association rule mining

    Publication Year: 2008 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (365 KB) |  | HTML iconHTML  

    In this paper, we present a new framework for reusable association rule mining based on chi2 and odds ratio. We start at mining the association rules using standard Apriori algorithm. The strong rules are defined as association rules, while the weak rules will be evaluated by our proposed method. Firstly, the weak rules must be converted to 2 times 2 contingency table. We then compute the relationship between variables using chi2 and odds ratio. If the weak rules are related to each other with positive or negative relationship, then the weak rules will also be determined as association rules. Our system is evaluated with experiments on the crime data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A music recommendation system based on personal preference analysis

    Publication Year: 2008 , Page(s): 102 - 106
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (532 KB) |  | HTML iconHTML  

    In this paper, we propose a music recommendation system based on user preference analysis. The system builds music models using hidden Markov models with mel frequency cepstral coefficients, which are features of sound wave. Each song is modeled with an HMM and the similarity measure between songs are defined based on the models. With the similarity measure, the songs the user listened to in the past are grouped and analyzed. The system recommends pieces of music to the user based on the result of the analysis. We evaluate our system with virtual users who have various preferences, and observe which recommendation lists the system generates. In most cases, the system recommends the pieces of music which are close to userpsilas preference. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vector space model for Arabic information retrieval — application to “Hadith” indexing

    Publication Year: 2008 , Page(s): 107 - 112
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (713 KB)  

    The Arabic language is one of the most important languages because it is the sacred and liturgical language of Islam, one of the influential monotheistic religions of our times. In the post-9/11 aftermath, Islam suddenly dominated western actuality for the remaining years of the present decade. Al-Qurpsilaan - The Reading par Excellence - and ldquoHadithrdquo - Saying - represent the two fundamental scriptural sources of Islamic Legislation. Specifically, ldquoHadithrdquo, or Prophetic Traditions, are sayings and doings of the Prophet of Islam (Peace and Blessings be upon Him). Researchers need automatic search tools within large ldquoHadithrdquo databasesto access one of the original sources of Islam. For this purpose, we describe the development of AuthenTique, an updated automatic text mining search tool, based on the vector space model (VSM). The aim is to allow the provision of a list of ldquoHadithsrdquo classified according to their degrees of similarity based on a given userpsilas query. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to a Cloud Computing network

    Publication Year: 2008 , Page(s): 113 - 118
    Cited by:  Papers (21)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (556 KB) |  | HTML iconHTML  

    ldquoCloud Computingrdquo is becoming increasingly relevant, as it will enable companies involved in spreading this technology to open the doors to Web 3.0. In this work the basic features of cloud computing are presented and compared with those of the original technology: Grid Computing. The new categories of services introduced will slowly replace many types of computational resources currently used. In this perspective, grid computing, the basic element for the large scale supply of cloud services, will play a fundamental role in defining how those services will be provided. The paper describes the concept of computational resources outsourcing, referred to computational grids and a real application. This work utilises the results by the Cybersar Project managed by the COSMOLAB Consortium (Italy). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual social networks online and mobile systems

    Publication Year: 2008 , Page(s): 119 - 126
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (673 KB) |  | HTML iconHTML  

    Most human communications take place directly between individuals. For example, the spread of news and rumors all take place by contact between individuals. Rumors or news can spread far faster over a network in which the average degree of separation is low, than it can over a network in which the average degree of separation is high. Location-based applications are one of the most anticipated new segments of the mobile industry. These new applications are enabled by GPS-equipped phones (e.g., emergency applications, buddy finders, games, location-based advertising ...etc.) These services are designed to give consumers instant access to personalized, local content of their immediate location. Some applications couple LBS with notification services, automatically alerting users when they are close to a pre-selected destination. With the advances in the Internet and communications/mobile technology, it became vital to analyze the effect of such technologies on human communications. This work studies how humans can construct social networks as a method for group communications using the available technologies. We built a PDA application that implements the concept of LBS using two system modules. In the first module, we have developed an application for entertainment purposes; an application program which enables end users to send their birth year and get their horoscope in return. The second part of the project was, to build an application which helps people to stay in touch with their friends and family members (Find Friend). It helps users to find which of their buddies are within the same area they are in. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Payload Content based Network Anomaly Detection

    Publication Year: 2008 , Page(s): 127 - 132
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (791 KB) |  | HTML iconHTML  

    We present payload content based network anomaly detection, we call as PCNAD. PCNAD is an improvement to PAYL system which is considered one of the complete systems for payload based anomaly detection. PAYL takes into consideration the entire payload for profile calculation and effectively for anomaly detection. Payload length is very high on port numbers like 21 and 80. Hence it is difficult to apply PAYL on high speed, high bandwidth networks. We use CPP (content based payload partitioning) technique which divides the payload into different partitions depending on content of payload. PCNAD does payload based anomaly detection using a few CPP partitions. We demonstrate usefulness of the PCNAD on the 1999 DARPA IDS data set. We observed 97.06% accuracy on port 80 using only 62.64% packet payload length with small false positive rate. This is a significant improvement over PAYL approach which uses 100% of the packet payload for anomaly detection. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MDSAP simulation using TinyOs and hospital application modeling

    Publication Year: 2008 , Page(s): 133 - 138
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (127 KB) |  | HTML iconHTML  

    This paper focuses on sensor networks and specifically the routing part. Some enhancements were introduced to the directional source aware routing protocol (DSAP). This new algorithm, called MDSAP (modified DSAP), is simulated using TinyOs and compared to the standard DSAP protocol. MDSAP is used for building one complete structure that handles both fixed and mobile users. Some of the resulting concepts can be applied to the model of the hospital. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Usage of MCA8 software for improving reliability of electrical networks

    Publication Year: 2008 , Page(s): 139 - 144
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (615 KB) |  | HTML iconHTML  

    The MCA8 software application is described and applied to model task in this paper. This software application was developed for the purpose of the support of multi-criteria decision-making in the field of electrical power engineering. The MCA8 runs on Windows with .NET framework 2.0 and it is user-friendly. The MCA8 offers six methods of multi-criteria analysis (MCA) for solving multi-criteria decision-making tasks. These methods are WSA, IPA, TOPSIS, AGREPREF, CDA and PROMETHEE. We can use them for example for selecting the most suitable old devices in electrical networks, which we need to replace by new devices (Reclosers in this paper). The application of these remote-controlled devices causes acceleration in handling and thus shortening of duration of a fault in the network. This results in rising of probability of faultless service and thus the reliability of electrical energy supply. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MAVIE: A mobile agents view synchronization system

    Publication Year: 2008 , Page(s): 145 - 150
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (410 KB) |  | HTML iconHTML  

    Data warehouse view definitions are constructed thanks to information sources schemas. When these latter evolve, view definitions may become undefined. In this paper, we propose a system based on mobile agents destined to achieve view definitions repairing or synchronization following schema changes happened at distributed, heterogeneous and autonomous information sources. The proposed solution decreases the synchronization time thanks to parallelism permitted by agents, avoids network saturation by enhancing local processing and increase local intelligence. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental performance evaluation of Wireless 802.11b networks

    Publication Year: 2008 , Page(s): 151 - 155
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (629 KB) |  | HTML iconHTML  

    According to the IEEE 802.11 b/g standard (WiFi) should have a range of 300-500 ft (about 152 m). The 2.4 GHz frequency band used by WiFi devices is divided into 11 (in FCC) (or 13 in ETSI) partially overlapping channels. It is claimed that by using frequency bands that are at least four channels apart (non-overlapping channels) interference between those channels is avoided. We carried out two types of experiments to measure the effect of the distance and the claimed non-overlapping channels on the bit rate. From the first study, we experimentally derived a model of distance versus throughput. The second study has confirmed that the interference between the channels cannot be avoided even when using non-overlapping channels. The experiments also showed that by increasing the distance between the networks that are using non-overlapping channels, the effect of the interference decreases. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An unstructured P2P network model for efficient resource discovery

    Publication Year: 2008 , Page(s): 156 - 161
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (510 KB) |  | HTML iconHTML  

    Efficient resource discovery is a challenge aspect in P2P applications. The topological properties of P2P overlay networks are one of the important factors that dominate the performance of resource discovery. In this paper, we present an efficient P2P network model for resource discovery. Firstly, location of the underlying physical network is taken into account during the constructions of P2P networks aiming to alleviate the topoloty mismatch problem between the P2P overlay nerwork and the phisical nerwork. Furthermore, the nodes with similar resource are clustered together which can increase the chances of finding matching resources quickly. Comparing the performance of this model with other overlay networks, the results show the model of our claims can significantly shorten the latency of the searching process and reduce the searching overhead. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UChooBoost: Ensemble-based algorithm using extended data expression

    Publication Year: 2008 , Page(s): 7 - 11
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (438 KB) |  | HTML iconHTML  

    Bootstrap technique has been successfully used in many signal processing systems for data classification. Some of such systems are based on ensemble-based algorithms. These algorithms use multiple classifiers, generally to improve classification performance: each classifier provides an alternative decision whose combination may provide a superior solution than the one provided by any single classifier. In this paper, UChooBoost, a new supervised learning ensemble-based algorithm for extended data, based on bootstrap technique, is proposed. UChoo classifier is used as weak learner. UChoo classifier gives extended results expression. These results are combined by using new weighted majority voting founded on extended result expression. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NEWER: A neuro fuzzy Web recommendation system

    Publication Year: 2008 , Page(s): 162 - 167
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3899 KB) |  | HTML iconHTML  

    In this paper we present NEWER, a neuro-fuzzy Web recommendation system that dynamically suggests interesting pages to the current user. NEWER employs a neuro-fuzzy approach in order to determine categories of users sharing similar interests and to extract a recommendation model in the form of fuzzy rules expressing associations between user categories and relevances of pages. The derived model is used by an online recommendation module to dynamically suggest interesting links. Comparative accuracy results show the effectiveness of NEWER. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical Intra-Context Handoff Awareness Approach to Personal Recommender Systems: A mobile DTV case study

    Publication Year: 2008 , Page(s): 168 - 173
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (623 KB) |  | HTML iconHTML  

    This paper proposes a hierarchical intra-context handoff awareness (HICHA) approach to personal mobile TV recommender systems. The HICHA approach involves a basic hierarchical approach that extends your features to context-aware and intra-context handoff awareness approach. The user model, prediction model and calculate of users interest methods are presented. Moreover, experiments and results using HICHA approach are completed, showing its effectiveness. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling recommendations for lifelong learning

    Publication Year: 2008 , Page(s): 174 - 179
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (570 KB) |  | HTML iconHTML  

    In order to support users in inclusive lifelong learning scenarios, we propose a model of recommendations that applies to the particularities of these scenarios and intends to improve the learning performance. The goal of our model is threefold: (i) allow the management of recommendations at design time, (ii) explain on the user interface why each recommendation has been offered, (iii) request explicit feedback from the user to improve the recommender. In the paper we present how the user interface benefits from this model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.