By Topic

2014 3rd International Conference on Advanced Computer Science Applications and Technologies

29-30 Dec. 2014

Filter Results

Displaying Results 1 - 25 of 45
  • Cover Art

    Publication Year: 2014, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1510 KB)
    Freely Available from IEEE
  • Title Page i

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • Title Page iii

    Publication Year: 2014, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Copyright Page

    Publication Year: 2014, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2014, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Message from the Conference General Chair

    Publication Year: 2014, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (125 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committees

    Publication Year: 2014, Page(s):ix - xii
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2014, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • A Cognitive-Affective Measurement Model Based on the 12-Point Affective Circumplex

    Publication Year: 2014, Page(s):3 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (571 KB) | HTML iconHTML

    In the existing studies, the quantification of human affect from brain signals is not precise because it is merely rely on some approximations of the models from different affective modalities rather than the neurophysiology of emotions. Therefore, the objective of this study is to investigate the cognitive-affective model for quantifying emotions based on the brain activities through electroencep... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison between Cloud Sim and Green Cloud in Measuring Energy Consumption in a Cloud Environment

    Publication Year: 2014, Page(s):9 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (453 KB) | HTML iconHTML

    Cloud computing is a model that relies on sharing computing resources rather than having local servers or personal devices to handle applications. Numerous studies have shown that by replacing traditional computing with cloud infrastructure, the total power consumption can be decreased because cloud computing power consumption is influenced by four key cloud factors: dynamic provisioning, multi-te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OLBCA: A New Lightweight Block Cipher Algorithm

    Publication Year: 2014, Page(s):15 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB) | HTML iconHTML

    Light weight block cipher algorithms are vital for constrained environment. It is easy to propose an algorithm that optimize any two factors like (security and cost), (security and performance) and (cost and performance) but it is difficult to optimize three factors together at the same time. In this paper, we propose a new lightweight block cipher algorithm called OLBCA. PRESENT lightweight block... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Management Dimension for Assessing Organizations' Readiness toward Business Intelligence Systems

    Publication Year: 2014, Page(s):21 - 25
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB) | HTML iconHTML

    The improvements and capabilities of Business Intelligence (BI) systems are making them highly required by organizations in many of the fields. Day by day, the demand is increasing on these systems. Figures show that billions of US dollars are spent annually on BI systems. However, half of these BI projects are ending with unrealized benefit, according to some studies. As a participation to reduce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bioinformatics and Healthcare Computing Models and Services on Grid Initiatives for Data Analysis and Management

    Publication Year: 2014, Page(s):26 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    Grid platforms serve a wide range of activities in life sciences, bioinformatics, engineering, healthcare and other industries. This paper identifies the key bioinformatics and healthcare computing models and services on grid initiatives and classifies and describes their current use in the industry. Based on what has been reported by the literature, the paper identifies eight key areas of interes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Medical Image Annotation and Retrieval by Using Classification Techniques

    Publication Year: 2014, Page(s):32 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB) | HTML iconHTML

    Given the rapid increase in the number of medical images, the process of image retrieval is considered an effective solution that can be used in the automatic search and storage of images. Content-based image retrieval is considerably affected by image classification, also called image annotation. The performance of image annotation is significantly affected by two main issues, namely, automatic e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey of Intrusion Detection System Using Case Study Kuwait Governments Entities

    Publication Year: 2014, Page(s):37 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (545 KB) | HTML iconHTML

    The tremendous developments in information technology in our world requires a modern way of Intrusion Detection Systems to prevent damage or compromise the system. Computer Emergency Response Team handles the computer incidents in the computer systems. In the Kuwaiti government entities may find some weaknesses in Intrusion Detection Systems this research dwells for these points by distribute a qu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Risk Analysis Used by Kuwait Government Sectors

    Publication Year: 2014, Page(s):44 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB) | HTML iconHTML

    Permanent use of computer in our daily lives has to be protect our personal information from any external threat, if cyber security is the solution to build a safe space greeting mail in government agencies. Risk analysis is an essential process in risk management, There is two kinds of the risk qualitative and quantitative. Survey was distributed to government entities in Kuwait to prove the main... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cyber-Attacks Detection & Protection in Kuwait Government Sectors

    Publication Year: 2014, Page(s):50 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    The world nowadays has witnessed a lot of crimes of cyber-attacks where many people suffered from many hackers who tried to steal important information or damage the programs found in the computers of victims. There has become necessity for companies to have different systems for protection. Many companies have been specialized in having systems for protection of these risks of hackers. Process of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hot-Spot Traffic Pattern on Hierarchical 3D Mesh Network

    Publication Year: 2014, Page(s):56 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    A Hierarchical 3D-Mesh (H3DM) Network is a 2D-mesh network of multiple basic modules (BMs), in which the basic modules are 3D-torus networks that are hierarchically interconnected for higher-level networks. In this paper, we evaluate the dynamic communication performance of a H3DM network under hot-spot traffic pattern using a deadlock-free dimension order routing algorithm with minimum number of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Relationship between Mobile Marketing and Customer Relationship Management (CRM)

    Publication Year: 2014, Page(s):61 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    Mobile marketing refers to different kinds of marketing that contain operation of mobile phone technology to achieve the target spectators. Commonly, people associate mobile marketing with SMS and MMS marketing, pay per call mobile marketing, mobile banner ads, quick response code, location based marketing, Mobile applications and mobile website design. Among the variety of mobile services, consid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gentle-BLUE: A New Method for Active Queue Management

    Publication Year: 2014, Page(s):67 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    In this paper, early stage congestion control method at the router buffer is proposed. The proposed method, namely, Gentle BLUE (GB), extends the well-known BLUE method by providing a dynamic mechanism for calculating the dropping probability based on the status of the queue length. This dynamic-based overcomes the slow-to-congestion response shortage in the existing methods and provides better ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Career Guidance and Employment Management System

    Publication Year: 2014, Page(s):73 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB) | HTML iconHTML

    This paper presents a designing of a web based system for Career Guidance and Employment Management System (CGEMS). Basically, CGEMS is tries to help a user who is looking for career advice guidance, or looking for their opportune job. CGEMS tries to make one place where student, job seeker, career advisor or consultant, and various company or organization can meet and help. In order to help the u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for Identifying Skylines over Incomplete Data

    Publication Year: 2014, Page(s):79 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (165 KB) | HTML iconHTML

    Skyline queries provide a flexible query operator that returns data items (skylines) which are not being dominated by other data items in all dimensions (attributes) of the database. Most of the existing skyline techniques determine the skylines by assuming that the values of dimensions for every data item are available (complete). However, this assumption is not always true particularly for multi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frontend and Backend Web Technologies in Social Networking Sites: Facebook as an Example

    Publication Year: 2014, Page(s):85 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (233 KB) | HTML iconHTML

    Social Networking has been pointed out as an important evolution in the social and Internet history. The leader and the pioneer of this evolution was and still Face book despite the big and tough rivalry nowadays. Although Facebook is very well known and most of the people who surf the Internet use it and know how to use it and what the different pages are and the modules it has, a few number of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Graph Theory and Cyber Security

    Publication Year: 2014, Page(s):90 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (853 KB) | HTML iconHTML

    One of the most important fields in discrete mathematics is graph theory. Graph theory is discrete structures, consisting of vertices and edges that connect these vertices. Problems in almost every conceivable discipline can be solved using graph models. The field graph theory started its journey from the problem of Konigsberg Bridges in 1735. This paper is a guide for the applied mathematician wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cognitive Wireless Network with Cooperative and Selfish Nodes

    Publication Year: 2014, Page(s):97 - 101
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (581 KB) | HTML iconHTML

    In this paper we report on our fundamental results and new work on building cognitive wireless networks that complete resource sharing in a local environment. We emphasize two fundamentals issues. First, a cognitive network with full cooperative nodes. Second, the cooperative and not cooperative behavior of selfish users in our network. The cooperative behavior among the radios is regularly believ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.