Proceedings. 2004 International Conference on Information and Communication Technologies: From Theory to Applications, 2004.

19-23 April 2004

Filter Results

Displaying Results 1 - 25 of 397
  • A position paper about information system shifting: new cooperation era between academic and industry

    Publication Year: 2004, Page(s):95 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    This paper is focused on the management of research and development cooperation project in ICT in France with a slight overview about the European context. Our contribution will be less technical, however theoretical and technical issues in ICT are the focal points of our discussions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A profile approach for Internet service pricing

    Publication Year: 2004, Page(s):87 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    Nowadays the proposed pricing strategies in the Internet are not efficient because they don't take affect the end-users behavior and thus network resources are efficiently allocated. In order to build a competitive market pricing strategy, we propose a new approach that takes into account users and services profiles. This paper shows how to introduce these profiles in the Internet pricing strategy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation and business process reengineering of e-registration services at University of Bahrain

    Publication Year: 2004, Page(s):85 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB)

    Recently in the past, in almost every semester, thousands of students have been accepted by the University of Bahrain (UOB). All these years the registration procedures have been carried out through computerized systems, in a way that the students are required to spend un told hours shifting the schedule book to decide which courses to register. The university authority decided to use Internet fac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GenoMEDIA: a middleware platform for distributed genomic information

    Publication Year: 2004, Page(s):505 - 506
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    This work presents the problem of integrating heterogeneous software tools and databases in a generic distributed platform focused on genomic applications. A new system concept, named GenoMEDIA is presented. This platform allows users to access in a uniform and transparent manner these heterogeneous data and tools. The user submits both data and goal to a generic query point of GenoMEDIA, which de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards interoperable frameworks for e-business

    Publication Year: 2004, Page(s):79 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    E-business is not just about e-commerce or exchanging information about goods and services between companies and customers and between companies and suppliers. It is about using the Internet for the transfer of information between employees using the company's in-house systems, between branch offices, between remote users, and between business partners, customers, suppliers and the public. E-busin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personalizing semantic information networks

    Publication Year: 2004, Page(s):645 - 646
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    This article has the intention to present a general context situating the problem of Web semantic documents, to make them comprehensible both for computers and for humans. This has become possible thanks to the development of XML as standard language to structure and exchange data. XML allows us not only to separate structure and content in documents, but also to define more precise and pertinent ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specifying and implementing interoperable & reusable learning objects: one step beyond

    Publication Year: 2004, Page(s):111 - 112
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    The aim of this paper is to introduce a coherent specification of learning objects that can be used for academic education purposes within E-learning environment. The structure of our learning object proposed in this paper has been driven largely by modifying packaging. Our principal goal is to propose a conceptual definition of learning object that should clearly lay out the two main principles o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Employing mobile agents to secure local networks

    Publication Year: 2004, Page(s):501 - 502
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    We present a hybrid scheme based on mobile agents, which automates the task of network monitoring and applies security policies. The scheme consists of a policy manager agent, responsible for managing security policies and responding to network attacks. This task is assisted by a variety of mobile agents running on a mobile agent platform, which help applying configurations locally. The agents dev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Passive cached clustering routing for MANETs

    Publication Year: 2004, Page(s):233 - 234
    Cited by:  Papers (48)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    This paper presents a passive caching mechanism used on clustering routing protocols for mobile ad hoc networks (MANETs). It utilizes the backbone U. Kozat et al., (2001) of the network to gather and reuse the discovered routing information more efficiently and effectively. In this paper we propose a caching mechanism based on existing clustering algorithms, we build databases of routing informati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data reduction in machine vision and remote sensing applications

    Publication Year: 2004, Page(s):LXIII - LLXIV
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    This work presents a survey on some artificial neural networks designed to extract relevant features from input images in 3 specific areas: 1) remote sensing, 2) 3D anthropometry, and 3) machine vision. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of WDM transimission network

    Publication Year: 2004, Page(s):185 - 186
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    The growth in demand for multimedia services necessitate the development of a high capacity information network in Saudi Arabia. Such network should provide high quality multiservices to schools, hospitals, and government agencies. We assess the performance of three different WDM systems. Two network configurations of 32 and 64 channels each transmitting at 10 G bit/s and one network configuration... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A secure GSM-based electronic Murabaha transaction

    Publication Year: 2004, Page(s):77 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    The Islamic economic system prohibits payment and receipt of interest on deposits and loans. As a result, Islamic banks offer financial instruments consistent with Islamic beliefs, e.g. Murabaha. A customer wishing to purchase goods requests the Islamic bank to purchase these items on his behalf and then sell them to him, with a certain amount of profit agreed upon added to the initial cost. The b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Human resource management and semantic Web technologies

    Publication Year: 2004, Page(s):641 - 642
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    CommOnCV is a project which aims at dealing with the problems of e-recruitment by considering a new approach based on competency management. The idea consists in allowing a job seeker (respectively a recruiter) to identify and formally represent the competencies underlying its resume or Curriculum Vitae (respectively its job offer). These competencies, which allow knowledge, skills, abilities, tra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Telecommunications network management laboratory

    Publication Year: 2004, Page(s):105 - 106
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    This work discusses network management laboratory design and implementation at the University of Wollongong in the School of Electrical, Computer and Telecommunications Engineering in years of 2002 and 2003 for a final year specialisation subject called telecommunication network management for telecommunications engineering students. The design and implementation included that of a network managem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protecting the electric power infrastructure with a mobile agent monitoring and analysis system

    Publication Year: 2004, Page(s):497 - 498
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    This work presents the electric power mobile agent system (EPMAS) to support secure communications interface, update security policy, collect and audit IDS related data and provide status reports across domains in the electric power grid. The agents could support the EPRI's automated critical incident event reporter (ACIER). The concept of a critical network infrastructure analysis center to provi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An SVM based churn detector in prepaid mobile telephony

    Publication Year: 2004, Page(s):459 - 460
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    The context of prepaid mobile telephony is specific in the way that customers are not contractually linked to their operator and thus can cease their activity without notice. In order to estimate the retention efforts which can be engaged towards each individual customer, the operator must distinguish the customers presenting a strong churn risk from the other. This work presents a data mining app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance comparison of frequency domain equalizers for the IEEE 802.16a WMAN standard

    Publication Year: 2004, Page(s):231 - 232
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    In this paper, due to the low computational complexity, the iterative block FD equalizer is considered. The performance of two new methods for the filter design with the objective of minimizing the MSE at the detector input is described and evaluated. In the first design method denoted Correlation-based design of IBDFE (C-IBDFE), the reliability of the detected data is measured. The second method ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service discovery and composition in ubiquitous computing

    Publication Year: 2004, Page(s):489 - 490
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    An autonomous decentralized system based on mobile agents and inspired by the immune system as an approach to adaptive service discovery and composition. The immune system has a set of organizing principles such as scalability, adaptability and availability that are useful for developing a networking model in highly dynamic and unstable setting. Each user request is considered as an attack launche... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the latency of BFS based interval cooperative Web caching

    Publication Year: 2004, Page(s):637 - 638
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    The steady growth in Web applications is attracting an increasing the number of Web clients. This results in an increase in Internet traffic with the obvious consequence of growing delay in obtaining a Web document, as everybody experiences frequently. Caching is one of the solutions proposed to reduce this latency: a proxy (also called Web cache) is situated in the path between the client and the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The development of a quality e-learning environment based on human, social, and cultural factors

    Publication Year: 2004, Page(s):103 - 104
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    We have experienced a huge increase in the development and usage of e-learning, particularly by academic institutions. Among the greatest advantages offered by distance learning to both academics and students is accessibility, mobility and collaboration. These advantages address only one aspect of the learning process. Other factors, such as the adoption of classical pedagogical methods to the new... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast negotiation algorithm for multiple methods agents

    Publication Year: 2004, Page(s):495 - 496
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    A multiagents negotiation under time constraints is presented. The multiagents system (MAS) is dealt with the task and it is based on two reasoning techniques, which are progressive reasoning and multiple methods. The motivation of progressive reasoning is to adapt the quality of the solution to the available time. Multiple methods is an approach that assumes with a set of methods that trade-off c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trade-mark registration : the multilanguage aspect

    Publication Year: 2004, Page(s):439 - 440
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    This paper suggests a system dedicated to problem solving based on some machine learning concepts. Trade-Marks have important economical issues and represent many registrations per year. Registering a trade-mark, in a set of countries, represents a complex work due to the increasing amount of registered trade-marks, distributed over huge databases. Moreover, the legal advisor needs to have skills ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image analysis using line segments extraction by chain code differentiation

    Publication Year: 2004, Page(s):347 - 348
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    This paper proposes a new fast method for line segment extraction from edge maps. It has a parallel nature and can be used on parallel machines easily. The method uses the chain codes in the edge map, namely macrochains, for line segment detection. In the first phase, it breaks the macrochains into several microchains by employing the extreme points of the first derivative of shifted-smoothed chai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiaccess architecture to the 3G mobile services

    Publication Year: 2004, Page(s):213 - 214
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    The 3GPP selected the session initiation protocol (SIP) for the IP core network multimedia subsystem (IMS), enabling multimedia session control in 3GPP wireless networks. However, the IMS is restricted to the supported users as defined by 3GPP. We propose in this paper to extend the supported accesses (3GPP and WLAN) to other types of accesses (xDSL, CATV). The possibility to offer evolved SIP ser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-government from theory to application

    Publication Year: 2004, Page(s):17 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    Almost all developed countries as well some of the developing ones - are in a big race to apply e-government, which is the outcome of the latest achievements of ICT. This paper gives the meaning of e-government and the main concepts included in this term. We present the importance of applying e-government and the most important suggestions necessary for launching e-government in Syria. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.