By Topic

2009 Second International Conference on the Applications of Digital Information and Web Technologies

4-6 Aug. 2009

Filter Results

Displaying Results 1 - 25 of 156
  • Author index

    Publication Year: 2009, Page(s):i - xxxvi
    Request permission for commercial reuse | PDF file iconPDF (3122 KB)
    Freely Available from IEEE
  • Message from the Chairs

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (1222 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Editors

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (142 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program committees

    Publication Year: 2009, Page(s):i - iv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1578 KB)

    Provides a listing of current committee members. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conference contents

    Publication Year: 2009, Page(s):i - xii
    Request permission for commercial reuse | PDF file iconPDF (2115 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (1178 KB)
    Freely Available from IEEE
  • Condensing the semantic (ontological concepts) of modeling diagrams: Is it possible?

    Publication Year: 2009, Page(s):429 - 432
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB) | HTML iconHTML

    Ontology can make modeling diagrams more efficient, adaptive, and smarter by explicitly specifying their concepts. This paper is an effort to extract concepts for modeling diagrams and condense them into small numbers. This paper claims that many modeling diagrams (56 diagrams) shared a small number of concepts. An experiment has been conducted to extract concepts for 56 diagrams. The result shows... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison the efficiency of some search engines on Arabic keywords and roots

    Publication Year: 2009, Page(s):163 - 168
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    This paper presents an attempt to show the efficiency of some search engines in dealing with Arabic keywords. This can be achieved by comparing the number of retrieved pages, retrieving time, and stability (in both the number of retrieved pages and the order for each retrieved page) for each one of the selected 20 Arabic keywords (with its roots) that were entered to the selected four search engin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Genetic algorithm and heuristic search for solving timetable problem case study: Universitas Pelita Harapan timetable

    Publication Year: 2009, Page(s):629 - 633
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB) | HTML iconHTML

    Scheduling problem is a model of complicated problem. Too many things have to be considered in order to arrange a schedule, such as lecturer availabilities, a great number of classes and courses. To overcome this problem, genetic algorithm combined with heuristic search is proposed in this paper. This proposed method was tested several times, and the results show that despite small population, the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Buck regulators with magnetically coupled filters

    Publication Year: 2009, Page(s):688 - 692
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    This paper is intended to help controllers and designers of high power industrial application such as specialists of traction motor control as well as controllers and designers of very low power industrial applications such as designers of computer motherboards and other circuits using Infinity's LX166x family of buck regulator controllers. It deals with the effect of replacing the smoothing filte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of A Concurrent Caml Light: ACCL

    Publication Year: 2009, Page(s):262 - 267
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB) | HTML iconHTML

    In this paper we propose an extension of the functional programming language Caml Light called ACCL for A Concurrent Caml Light which aims to encompass functional, imperative and concurrent programming paradigms in a single programming language. For the concurrent extension of Caml Light, we offer a few primitives with very simple semantics by using the model of ERLANG functional programming langu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online game protocol for P2P using Byzantine agreement

    Publication Year: 2009, Page(s):753 - 758
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (413 KB) | HTML iconHTML

    Peer to peer (P2P) online game systems have garnered attention recently. This paper presents an online game protocol based on the lockstep protocol and the Byzantine agreement algorithm. The former prevents dishonest actions called time-cheats in a peer to peer (P2P) network. The latter disables Byzantine cheats, with actions resembling the Byzantine fault. Using this protocol, a game can be conti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clustering data using a Nonnegative Matrix Factorization (NMF)

    Publication Year: 2009, Page(s):749 - 752
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    There are many search engines in the Web and when asked, they return a long list of search results, ranked by their relevancies to the given query. Web users have to go through the list and examine the titles and (short) snippets sequentially to identify their required results. In this paper we present how usage of nonnegative matrix factorization (NMF) can be good solution for the search results ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient method for attack RSA scheme

    Publication Year: 2009, Page(s):587 - 591
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (426 KB) | HTML iconHTML

    The security on many public key encryption schemes relied on the intractability of finding the integer factoring problem such as RSA scheme. However, there are great deals of researches concerning the RSA factoring modulus compared with the other type of attack the RSA scheme. So the need for more methods of attacks other than RSA factoring modulus to obtain an efficient and faster algorithm to so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolving email clustering method for email grouping: A machine learning approach

    Publication Year: 2009, Page(s):357 - 362
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (462 KB) | HTML iconHTML

    This paper presents the design and implementation of a new system to manage email messages using email evolving clustering method with unsupervised learning approach to group emails base on activities found in the email messages, namely email grouping. Users spend a lot of time reading, replying and organizing their emails. To help users organize their email messages, we propose a new framework to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart Evaluation for Job Vacancy Application System

    Publication Year: 2009, Page(s):452 - 455
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    Nowadays, many companies no long accept paper resumes. Job application is more preferred online for several reasons. The Smart Evaluation on Job Vacancy Application System (SEJVAS) applies Rule-based expert system techniques was proposed. The SEJVAS applies the Rule-based technique in order to generate a shortlist for the job applications file that fulfills the company requirement. A criterion of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agile Development Methodologies: Are they suitable for developing Decision Support Systems

    Publication Year: 2009, Page(s):84 - 89
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    Recently, agile software development methodologies have received considerable attention from practitioners. One of the reasons seems to be that agile methods, to some degree, can be adaptable to different situations. However, as of yet there are no studies examining the suitability of agile methodologies for some kinds of information systems such as DSS. As DSS has a more specific nature (its core... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using semantic web to reduce the cold-start problems in recommendation systems

    Publication Year: 2009, Page(s):525 - 530
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (415 KB) | HTML iconHTML

    Collaborative filtering systems suffer from the cold-start problems (evaluation matrix, new user/new resource problem...). In this paper, we show that using semantic information describing users and resources can reduce the problems and lead to a better precision, coverage and quality for the recommendation engine. Semantic web is the infrastructure used for managing such semantic descriptions. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive mutation operator cycling

    Publication Year: 2009, Page(s):634 - 639
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1248 KB) | HTML iconHTML

    Parameter tuning can be a lengthy and exhaustive process. Furthermore, optimal parameter sets are usually not only problem specific, but also problem instance specific. Adaptive genetic algorithms perform parameter control during the run, thus increasing algorithm performance. These mechanisms may also enable the algorithm to escape local optima more efficiently. In this paper, we describe the fit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A robust hardwired interwoven fault-masking technique

    Publication Year: 2009, Page(s):584 - 586
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    The process technology scales below 100 nanometers at present. Such miniaturizations of components has created reliability-threats to the designers, specially in the case of critical or semi-critical systems, whose failures can bring catastrophes in terms of human or great financial losses. Reliable working of such be ensured. In this paper, first the causes of such reliability-threats have been d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A guided dynamic programming approach for searching a set of similar DNA sequences

    Publication Year: 2009, Page(s):512 - 517
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    Optimal estimation of similarity distance between DNA sequences is performed through alignment process. This optimal alignment process is done by using dynamic programming method which running in quadratic O(ntimesm) time complexity. Filtering process is a common technique introduced to improve this optimal alignment process. A filtering process applied in heuristic tools such as BLAST and FASTA c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the performance of ITU-T G.723.1 and AMR-NB codecs for large vocabulary distributed speech recognition in Brazilian Portuguese

    Publication Year: 2009, Page(s):693 - 697
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    In this paper, we present the accuracy for large vocabulary distributed continuous speech recognition systems over ITU-T G.723.1 and AMRNB speech codecs. Experiments were conducted using LPC and LSF-derived speech recognition features, CDHMM acoustic models, triphone units and trigram language models for the Brazilian Portuguese. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A business process modelling driven approach for legacy systems evolution

    Publication Year: 2009, Page(s):43 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    Precise identification of current system requirements is crucial for successful legacy system maintenance and re-engineering. Failure to understand the requirements of legacy system indicates that rational choices about how to adapt the software cannot be made. Therefore, a new approach to utilize business process models in evolving legacy systems is proposed in this paper. The proposed approach a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IPOMS: an Internet Public Opinion Monitoring System

    Publication Year: 2009, Page(s):433 - 437
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (443 KB) | HTML iconHTML

    In this paper, an IPOMS (Internet Public Opinion Monitoring System) is proposed. This system can collect web pages with some certain key words from Internet news, topics on forum and BBS, and then cluster these web pages according to different dasiaeventpsila groups. Furthermore, this system provides the function of automatically tracking the progress of one event. With this system, supervisors ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The development of Software Certifier System (SoCfeS): The architecture and design

    Publication Year: 2009, Page(s):56 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    In this information age, most businesses are highly dependent on the availability of ICT services, especially on software application components. The interest on the acquisition of high quality software has increased among various stakeholders. However, some pertaining problems are still being debated such as: (i) defining mechanism for assessing software product quality; (ii) ensuring and offerin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.