By Topic

2014 6th International Conference on Computer Science and Information Technology (CSIT)

26-27 March 2014

Filter Results

Displaying Results 1 - 25 of 44
  • [Front cover]

    Publication Year: 2014, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1111 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • 2014 6th International Conference on Computer Science and Information Technology (CSIT) [Copyright notice]

    Publication Year: 2014, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):iii - vi
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • Welcome massages

    Publication Year: 2014, Page(s):VII - IX
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB)

    Welcome Message from the President of Applied Science University - Prof. Mahfuz Judeh View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote speakers [2 abstracts]

    Publication Year: 2014, Page(s):X - XI
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (134 KB)

    Provides an abstract for each of the two keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Organizing committee

    Publication Year: 2014, Page(s):XII - XVI
    Request permission for commercial reuse | PDF file iconPDF (581 KB)
    Freely Available from IEEE
  • A survey of Internet security risk over social networks

    Publication Year: 2014, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    The Communities vary from country to country. There are civil societies and rural communities, which also differ in terms of geography climate and economy. This shows that the use of social networks vary from region to region depending on the demographics of the communities. So, in this paper, we researched the most important problems of the Social Network, as well as the risk which is based on th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring the guessability of hand drawn images based on cultural characteristics

    Publication Year: 2014, Page(s):5 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1159 KB) | HTML iconHTML

    The aim of this research is to examine whether or not an attacker could guess hand drawn images chosen as graphical password by others, based on knowledge of some cultural information like where they are come from or their religion or even their hopes and aims. Also, the aim was therefore to ascertain at what level the cross-cultural influences might affect our choice and use of drawn images as pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptanalysis of password authentication system

    Publication Year: 2014, Page(s):14 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    The password authentication systems have been increasing in recent years. Therefore authors have been concentrated these days on introducing more password authentication systems. Thus, in 2011, Lee et al., presented an enhanced system to resolve the vulnerabilities of selected system. But, we notice that Lee et al., system is still weak to server attack and stolen smart card attack. Also, a passwo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust image watermarking based on Dual Intermediate Significant Bit (DISB)

    Publication Year: 2014, Page(s):18 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (403 KB) | HTML iconHTML

    The most important requirements should be available on any watermarking systems which are the robustness against possible attacks and the quality of the watermarked images. In most applications, the watermarking algorithm embeds the watermark have to be robust against possible attacks and keep the quality of the host media as possible. The relationship between the two requirements is completely co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Genetic Hash Algorithm

    Publication Year: 2014, Page(s):23 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (414 KB) | HTML iconHTML

    Security is becoming a major concern in computing. New techniques are evolving every day; one of these techniques is Hash Visualization. Hash Visualization uses complex random generated images for security, these images can be used to hide data (watermarking). This proposed new technique improves hash visualization by using genetic algorithms. Genetic algorithms are a search optimization technique... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Genetic vs. particle swarm optimization techniques for traffic light signals timing

    Publication Year: 2014, Page(s):27 - 35
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1174 KB) | HTML iconHTML

    A good controlling for the traffic lights on the network road may solve the traffic congestion in the cities. This paper deals with the optimization of traffic light signals timing. We used four different heuristic optimization techniques, three types of Genetic algorithm and particle of swarm algorithm. Techniques were applied on a case study of network road which contains 13 traffic lights. We u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of a haptic feedback subsystem

    Publication Year: 2014, Page(s):36 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    This paper describes the components and highlights some specifications of a device that allows several combinations of immersed or desktop vision feedback devices to be integrated with a three degree-of-freedom force-feedback device previously known as the `Reactabot™' and currently known as the `Visitact'. The Visitact is a haptic display robot that provides and receives kinaesthetic infor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracking power photovoltaic system with a fuzzy logic control strategy

    Publication Year: 2014, Page(s):42 - 49
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (737 KB) | HTML iconHTML

    Photovoltaic generation is the technique which uses photovoltaic cell to convert solar energy to electric energy. Nowadays, PV generation is developing increasingly fast as a renewable energy source. However, the disadvantage is that PV generation is intermittent for depending on weather conditions. This paper proposes an intelligent control method for the maximum power point tracking (MPPT) of a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Skeleton extraction: Comparison of five methods on the Arabic IFN/ENIT database

    Publication Year: 2014, Page(s):50 - 59
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (382 KB) | HTML iconHTML

    Thinning “Skeletonization” is a very crucial stage in the Arabic Character Recognition (ACR) system. It simplifies the text shape and reduces the amount of data that needs to be handled and it is usually used as a pre-processing stage for recognition and storage systems. The skeleton of Arabic text can be used for: baseline detection, character segmentation, and features extraction, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proposed approaches for intelligent classification of mobile apps for smart phones

    Publication Year: 2014, Page(s):60 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB) | HTML iconHTML

    This paper examines mobile applications classification models and the methods applied within the field of mobile human-computer interaction. Recent smartphone interfaces demonstrated the existence of usability problems with respect to the mobile apps in terms of accessing these apps after being downloaded by the user. This paper suggests three different approaches for intelligent classification of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey on security in Cognitive Radio networks

    Publication Year: 2014, Page(s):64 - 70
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    Cognitive radio (CR) has been introduced to accommodate the steady increment in the spectrum demand. In CR networks, unlicensed users, which are referred to as secondary users (SUs), are allowed to dynamically access the frequency bands when licensed users which are referred to as primary users (PUs) are inactive. One important technical area that has received little attention to date in the cogni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hybrid tracking system for ZigBee WSNs

    Publication Year: 2014, Page(s):71 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    Target localization and tracking problems in Wireless Sensor Networks (WSNs) have received considerable attention recently, driven by the need to achieve high localization accuracy, with the minimum cost possible. A wide range of proposed approaches regarding the localization area have emerged, however most of them suffer from either requiring an extra sensor, high power consumption, inaccessible ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless sensors network and acknowledgement technique based ZigBee system

    Publication Year: 2014, Page(s):75 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (747 KB) | HTML iconHTML

    The attractive features of wireless sensors based ZigBee and IEEE 802.15.4 standard such low cost, flexibility, scalability, and multiple usages contribute to spread it in many trends. The network of wireless sensors which is to be considered in this research deals with fixed and mobile wireless sensors and treated with mesh and tree topologies. This paper takes up the effect of Acknowledgement te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delayed rate monotonic with semi-partitioned technique adapted to multiprocessors

    Publication Year: 2014, Page(s):82 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (387 KB) | HTML iconHTML

    This paper presents a semi-partitioned scheduling algorithm for periodic tasks on multiprocessor platforms. The scheduling policy used within each processor is based on delayed rate monotonic algorithm. Delayed rate monotonic is a modified version of rate monotonic algorithm, which can achieve higher processor utilization than rate monotonic. First, it is formally proved that any task which is fea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Super nodes for wireless Sensor Networks

    Publication Year: 2014, Page(s):90 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    Wireless Sensor Network is one of the most advance technology in the field of Information Technology because of the various applications implemented in. Coverage issue is a fundamental research in the Wireless Sensor Networks. Many Researchers have implemented techniques in order to reduce the coverage area of the sensor node to conserve the nodes energy. In this paper, a model to use intelligent ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved form navigation on mobile devices

    Publication Year: 2014, Page(s):96 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (597 KB) | HTML iconHTML

    In this paper a study was done regarding improving form control and navigation on mobile devices. An observational study of census counters for the Egyptian Agricultural Survey was conducted. This country-wide survey is currently conducted by professional counters using large (100×35 cm double sided) complex paper forms that require manual transcription. Computerization would be beneficial ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Users-groups matching in an annotation system: Ontological and URL relevance measures

    Publication Year: 2014, Page(s):100 - 109
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (948 KB) | HTML iconHTML

    The MADCOWannotation system supports a notion of group, facilitating focused annotations with respect to a domain. We argue that the use of an ontology to represent knowledge about the domain allows posting more refined annotations to a group, while the use of ontology concepts as tags facilitates the formulation of semantically significant queries for retrieving annotations on specific topics. Se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Elaboration of a model for an indexed base for teaching Arabic language to disabled people

    Publication Year: 2014, Page(s):110 - 116
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (566 KB) | HTML iconHTML

    In this paper we carried out a bibliographic research concerning distance learning, pedagogical indexing and integration of accessibility in e-Learning platforms. Then, to achieve the goals we have chosen “IMS AccessForALL” as standard to realize our model. The model that we realized is consistent with the standard followed. We also taken into consideration the guidelines of the WAI ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.