By Topic

Digital Information Management (ICDIM), 2012 Seventh International Conference on

Date 22-24 Aug. 2012

Filter Results

Displaying Results 1 - 25 of 70
  • On a chain of transformations for generating alloy from NL constraints

    Publication Year: 2012 , Page(s): 93 - 98
    Request Permissions | Click to expandAbstract | PDF file iconPDF (408 KB) |  | HTML iconHTML  

    Multi-Paradigm Modelling uses models from multiple domains to leverage the tools, techniques and expertise provided by each of the individual domains. Recent advances in model transformation technology allow automated production of one model from another to improve the application of multi-paradigm techniques. Systems development starts with the requirements gathering phase, which usually comprise... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach for defining rules as functions in rule-based software development

    Publication Year: 2012 , Page(s): 30 - 34
    Request Permissions | Click to expandAbstract | PDF file iconPDF (354 KB) |  | HTML iconHTML  

    In order to quickly response to changes in requirements or business rules, rule-based software development has been introduced to separate the business rules from the application code. Rule engine is adopted to achieve this aim and makes the business rules as an independent part. Business rules can be modified without affecting to the application, thus cost, time and effort in requirement analysis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating recommender systems

    Publication Year: 2012 , Page(s): 56 - 61
    Request Permissions | Click to expandAbstract | PDF file iconPDF (259 KB) |  | HTML iconHTML  

    Recommender systems now tend to gain popularity and significance. The proliferation of many recommender systems leads to the difficulty of locating a good recommender system. The algorithms contained in the recommender system determine the efficiency of the recommender systems. The question now is to find the most appropriate algorithms to meet users' needs. So far, the research carried out has fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design considerations for the localization of arabic e-commerce websites

    Publication Year: 2012 , Page(s): 331 - 335
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (484 KB) |  | HTML iconHTML  

    Localizing e-commerce websites is the gate for successful online business to target customers with a variety of languages. This study presents a systematic analysis of the main cultural aspects on designing e-commerce websites targeted to Arabic speaking countries especially in Saudi Arabia. The impact of these aspects is measured by evaluating existing Saudi Arabia e-commerce websites. The study ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Opinion mining over twitterspace: Classifying tweets programmatically using the R approach

    Publication Year: 2012 , Page(s): 313 - 319
    Request Permissions | Click to expandAbstract | PDF file iconPDF (350 KB) |  | HTML iconHTML  

    Today the channels for expressing opinions seem to increase daily. When these opinions are relevant to a company, they are important sources of business insight, whether they represent critical intelligence about a customer's defection risk, the impact of an influential reviewer on other people's purchase decisions, or early feedback on product releases, company news or competitors. Capturing and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Changes that modularization makes in antenna design

    Publication Year: 2012 , Page(s): 371 - 374
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (471 KB) |  | HTML iconHTML  

    In the earliest days of the cell phone industry, one of the most awkward process of a cell phone project was integration. Modules that worked individually were put together and the whole usually failed in ways that were very difficult to find. Yet in the last decade, it seems electronic integration has largely vanished as a source of pain for projects. One of the reason is that Computer Aided Engi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A first approach to the evaluation of arabic diacritization systems

    Publication Year: 2012 , Page(s): 155 - 158
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (449 KB) |  | HTML iconHTML  

    Modern Standard Arabic (MSA) is widely used nowadays in Newspapers, books and the World Wide Web with rare use of diacritics. Diacritics, which are symbols placed above or below a letter, change the sound of letters and are used in aiding readers to understand and disambiguate written text. In order to permit automatic processing of Arabic text, many diacritization systems were introduced. In this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ranking documents with query and topic sensitivity

    Publication Year: 2012 , Page(s): 124 - 129
    Request Permissions | Click to expandAbstract | PDF file iconPDF (119 KB) |  | HTML iconHTML  

    In this work, we discuss both Query-Sensitive and Topic-Sentive Ranking algorithm, called Topic-Driven PageRank (TDPR), to inquire general documents based on a notion of importance. The main idea is that we extract knowledge from training data for multiple classification and build characteristic feature for each topic. By this approach, we get documents reflecting queries and topics within so that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient alert dissemination protocol in a vehicular ad hoc network

    Publication Year: 2012 , Page(s): 68 - 72
    Request Permissions | Click to expandAbstract | PDF file iconPDF (408 KB) |  | HTML iconHTML  

    Dissemination of alerts is one of the most important applications which aims to avoid the road traffic risks. Classical solutions are based on the well known flooding strategy which uses multi-hop broadcast to reach a large number of vehicles. The principle problem faced with these solutions is how to decrease the number of relay nodes because this is the key to reduce broadcast storm effects. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WebCap: Inferring the user's interests based on a real-time implicit feedback

    Publication Year: 2012 , Page(s): 62 - 67
    Request Permissions | Click to expandAbstract | PDF file iconPDF (743 KB) |  | HTML iconHTML  

    In the context of the personalized information retrieval, this paper presents WebCap, a smart web browser for inferring the user's interests based on a real time implicit feedback. WebCap aims to collect implicitly the relevant documents, during the user's search session by inference of the degree of interest based on a combination of some relevant implicit indicators. The main advantage of our ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trend following with float-encoding genetic algorithm

    Publication Year: 2012 , Page(s): 173 - 176
    Request Permissions | Click to expandAbstract | PDF file iconPDF (260 KB) |  | HTML iconHTML  

    Trend following plays an important role in technical analysis for trading financial instruments. In this paper, we propose a model based on Float-encoding Genetic Algorithm (FGA) to determine the best thresholds for trend following in financial time series. Trend following is based on the thresholds called P&Q which is calculated from the amount of an uptrend and downtrend to determine when to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A layered approach to link analysis and visualization of event data

    Publication Year: 2012 , Page(s): 181 - 185
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (5445 KB) |  | HTML iconHTML  

    This paper presents a layered approach to analysis and visualization of associations from events. The proposed approach provides different levels of abstraction for aggregating and analyzing events from heterogeneous data sources by using lists and customizable functions. Interfaces for creating lists and functions are also implemented for different levels of users. The effectiveness of the propos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The impact of spatial correlation on performance of SFBC and VBLAST schemes on MIMO-OFDM-LTE

    Publication Year: 2012 , Page(s): 84 - 87
    Request Permissions | Click to expandAbstract | PDF file iconPDF (294 KB) |  | HTML iconHTML  

    The 3G systems such as LTE as well as 4G systems will employ Multiple Input, Multiple Output (MIMO) transmission scheme based on OFDM (Orthogonal Frequency Division Multiple access) techniques. The LTE (Long Term Evolution) standard widely uses the MIMO-OFDM structure to improve downlink peak rate, cell coverage, as well as average cell throughput. In this paper, first, the performance of the SFBC... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The snippet system - Reusing and connecting documents

    Publication Year: 2012 , Page(s): 138 - 144
    Request Permissions | Click to expandAbstract | PDF file iconPDF (521 KB) |  | HTML iconHTML  

    This paper presents the Snippet System, a new operating system environment that aims at providing enhanced document management facilities. For this, the proposed system utilizes a novel document model based on finer-grained entities, so-called Snippets. These support Relations, which capture the context of individual document excerpts. Snippets furthermore enable a flexible reuse of documents, i.e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-device e-book: Designing for new reading experience

    Publication Year: 2012 , Page(s): 201 - 204
    Request Permissions | Click to expandAbstract | PDF file iconPDF (814 KB) |  | HTML iconHTML  

    The key question of this paper is what will come as the next e-book after the present e-book, which is merely a digitalized version of the paper book? This paper suggests a new e-book model that can be realized with the advance of media technology, from the viewpoint of three elements of books. In particular, the Multi-Device e-Book prototype was made and simulated. This simulation sbggests novel ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Muithu: Smaller footprint, potentially larger imprint

    Publication Year: 2012 , Page(s): 205 - 214
    Cited by:  Papers (5)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (689 KB) |  | HTML iconHTML  

    We describe our experience with the Muithu sports notational analysis system, a novel digital information system in the popular sports domain. The system integrates real-time coach notations with related video sequences, and is configured with small, off-the-shelf and cheap components. Muithu requires little or no human post-processing, which is in strong contrast to state of the art resource-inte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-government evaluation: The use of design science approach to build and evaluate customer satisfaction theoretical framework

    Publication Year: 2012 , Page(s): 266 - 273
    Request Permissions | Click to expandAbstract | PDF file iconPDF (335 KB) |  | HTML iconHTML  

    To date, the literature on E-Government evaluation tends to stress on benchmarking and performance measurements of customer satisfactions with the use of quantitative rather than qualitative measurements. This paper seeks to address this problem by introducing a design science approach to build a new theoretical framework, namely, return on investment (ROI) vs return on relationship (ROR), as a qu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward a new classification model for analysing financial datasets

    Publication Year: 2012 , Page(s): 1 - 6
    Request Permissions | Click to expandAbstract | PDF file iconPDF (358 KB) |  | HTML iconHTML  

    Nowadays, financial data analysis is becoming increasingly urgent in the business market. As companies collect more and more data from daily operations, they expect to extract useful knowledge from existing collected data to help make suitable decisions for new customer requests, e.g. user credit category, confidence of expected return, etc. Banking and financial institutions have applied various ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding of ERP systems in Chinese SOEs: A case study

    Publication Year: 2012 , Page(s): 280 - 285
    Request Permissions | Click to expandAbstract | PDF file iconPDF (267 KB) |  | HTML iconHTML  

    Enterprises resource planning (ERP) systems are becoming more commonly applied by modern companies to manage and support the enterprise-wide business processes. This paper aimed to investigate the understanding of managers and staff on ERP systems in Chinese SOEs. The study took a case study approach and used chi-square tests to analyze the data derived from questionnaires. The analysis results sh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A semantic web service composition dynamic detecting method

    Publication Year: 2012 , Page(s): 326 - 330
    Request Permissions | Click to expandAbstract | PDF file iconPDF (516 KB) |  | HTML iconHTML  

    It is important to verify web service composition to enhance the service security and to guarantee the system quality. In order to ensure the exact running of the web service composition, we put forward a verification method associating formalization and run-time monitor. On the base of real time data in dynamic monitoring, though the mapping to Petri net and reachable graph analysis, we realize t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Retina recognition for biometrics

    Publication Year: 2012 , Page(s): 177 - 180
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (399 KB) |  | HTML iconHTML  

    Retina images processing is an important task in biometrics system based on retina images. We presents a general framework for image processing of retina images with a particular view on feature extraction. The method uses the set of geometrical and texture features and based on the information of the complex vessel structure of the retina. The feature extraction contains the image preprocessing, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hybrid approach to constraint reasoning in bio-ontologies

    Publication Year: 2012 , Page(s): 320 - 325
    Request Permissions | Click to expandAbstract | PDF file iconPDF (249 KB) |  | HTML iconHTML  

    The term Semantic Web refers to the web of linked data whose semantics can be understood by machines for further automatic process. As an expressive knowledge representation language for Semantic Web, Web Ontology Language (OWL) is intensively used for model construction and data exchange in biomedical field. However, the problem of maintaining integrity constraints arises because OWL employs the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perceptions of Mobile Human Computation Games: A study of engagement and information quality

    Publication Year: 2012 , Page(s): 346 - 351
    Request Permissions | Click to expandAbstract | PDF file iconPDF (511 KB) |  | HTML iconHTML  

    Mobile Human Computer Games (HCGs) are applications that aim to generate useful computations as a byproduct of gameplay. As user participation in HCGs is critical for success, the game mechanics should engage users so that they remain motivated to contribute their time and effort. In this paper, we investigate user perceptions of engagement and information quality of a mobile HCG by comparing thes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An investigation of non-use and abandonment of microblogging

    Publication Year: 2012 , Page(s): 297 - 302
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (265 KB) |  | HTML iconHTML  

    We examine the non-usage and abandonment of microblogging, identifying why people do not use, or why they abandon their microblogging accounts. Studying non-usage is important for microblogging service providers to develop strategies to address users' concerns, and for businesses to explore new marketing and information dissemination channels. Focus group interviews were conducted to uncover non-u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • X-STROWL: A generalized extension of XACML for context-aware spatio-temporal RBAC model with OWL

    Publication Year: 2012 , Page(s): 253 - 258
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2090 KB) |  | HTML iconHTML  

    The rapid growth of location-based applications, geographic or large scale information systems has resulted in the demand of strictly controlling data access that requires specifying and enforcing fine grained policies with the variety of context-aware spatial and temporal restrictions. Besides, the interoperable use of distributed and heterogeneous data such as data sharing, data integration or d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.