ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Proceeding

The International Conference on Computing Technology and Information Management (ICCTIM)

Publisher: The Society of Digital Information and Wireless Communications (SDIWC)

Editors: Dr. Mohammad V. Malakooti

ISBN: 978-0-9891305-5-4

Date: 2014-04-09 - 2014-04-11

Conference Venue: Dubai, UAE - United Arab Emirates UAE - United Arab Emirates

Proceeding URL: http://sdiwc.net/conferences/2014/icctim2014external

  1. MUSYOP: Towards a Query Optimization for Heterogeneous Distributed Database System in Energy Data Management

    Authors: Zhan Liu; Fabian Cretton; Anne Le Calvé; Nicole Glassey; Alexandre Cotting;Fabrice Chapuis

  2. Automatic Bank Fraud Detection Using Support Vector Machines

    Authors: Djeffal Abdelhamid; Soltani Khaoula;Ouassaf Atika

  3. Data Processing System Improvement in New Student Admission Selection of State Islamic Higher Education in Indonesia Using Information Technology Approach

    Authors: Linda Salma Angreani

  4. The Impact of KMS Success on Corporate Productivity: A Case Study at an IT Services Company

    Authors: Annas Vijaya

  5. Jordan's New Oil Sector: The Cyber Age of Hydrocarbon Security

    Authors: Nicolai Due-Gundersen

  6. On the Memory Artifacts of the Tor Browser Bundle

    Authors: Atta Al-Khaleel;Duaa Bani-Salameh;Mohammed I. Al-Saleh

  7. E-learning Multi-Learning Style One Size Can Fit All

    Authors: Hanan Ettaher Dagez

  8. Learning Analytics as a Method to Examine Students' Learning Patterns in an Online Module

    Authors: Santally Mohammad Issack;Rajkomar Reena

  9. Implementing Computer Games in Class - Issues and Recommendations for Improvement: Experimental Study in Malaysia

    Authors: Rubijesmin Abdul Latif

  10. The Influence of Perceived Characteristics of eGovernment Transactions

    Authors: Ibrahim Abu Nadi; Steve Drew

  11. From E-Government to M-Government - Challenges Faced by Sub-Saharan Africa

    Authors: Willard Munyoka; Mungofa Francis Manzira

  12. Comparative Study of Internet Usage in Educational Institutes: The Jordanian Hashemite University as a Case Study

    Authors: Awni Itradat; Majdi Maabreh; Amar Rayyan; Abed Aljawabreh; Muaffaq Imam

  13. Classification of Object Oriented Metrics by Aivosto Tool

    Authors: Younes Abubakir Abedl ssamad

  14. Development of Staff Management System Using UML-Based Object-Oriented Approach

    Authors: Rosziati Ibrahim; Abdulrahman Ahmed; Ida Aryanie Bahrudin; Abubaker Ali Moftah;Elhadi Elfitory Algarai

  15. On Applying Design Pattern Approach to Reengineering COBOL Programs

    Authors: Krassimir Manev;Neli Maneva

  16. A Collaborative Approach to Software Engineering Education

    Authors: Neli Maneva; Krassimir Manev

  17. A Methodology for Software Test-Case Selection in Constrained Environments Using Desirability Functions

    Authors: Abrar Qureshi;Ira Weissberger

  18. Risk-Based Code Smells Detection Tool

    Authors: Walid Abdelmoez; Essam Kosba;Ali Falah Iesa

  19. Performance Comparison of Scheduling Algorithms for Real-Time Applications over WiMAX Networks

    Authors: Nada M. El-Shennawy;Mahmoud M. Fahmy;Mohamed N. El-Derini; Moustafa A. Yousef

  20. Coloured Petri Net Model for Vector-Based Forwarding Routing Protocol

    Authors: Dina M. Ibrahim;Elsayed A. Sallam;Tarek E. Eltobely;Mahmoud M. Fahmy

  21. High Security Number Plate Recognition System with Different Filtering Techniques for Image Enhancement

    Authors: Manju Mandot;Reena Gupta;Shiv Singh Sarangdevot

  22. Image Mosaicing Using Binary Edge Detection

    Authors: Inad Aljarrah;Abdullah Al-Amareen;Abdelrahman Idries;Osama Al-Khaleel

  23. Enhanced Techniques 3D Integral Images Video Computer Generated

    Authors: Mahmoud Geat. Eljdid;Amar Aggoun;Osama Youssef

  24. A Method for Efficiently Previewing Domain-Bound DICOM Images in Teleradiology

    Authors: Simon Gangl;Domen Mongus;Borut Zalik

  25. New Approaches to Data Classification in DLP Systems

    Authors: Ekaterina Pshehotskaya;Tamara Sokolova;Sergey Ryabov

  26. The Rotating Calipers: An Efficient, Multipurpose, Computational Tool

    Authors: Godfried T. Toussaint

  27. Machine Learning Techniques: A Tool for Learning and Planning

    Authors: Babatunde Akinbode

  28. Word Sense Identification Improves the Measurement of Short-Text Similarity

    Authors: Khaled Abdalgader

  29. Charecterization of the Radiation Pattern of a GPS Antenna Mounted on a Small T-Tail Aircraft in Landing Position

    Authors: Abualkair Alkhateeb;Daniel Aloi

  30. Knee Kinematic Signals Clustering for the Identifcation of Sagittal and Transverse Gait Patterns

    Authors: N. Mezghani;M. Toumi;A. Fuentes;A. Mitiche;N. Hagemeister;J.A. de Guise

  31. Enhanced Liver Tumor Diagnosis Using Data Mining and Computed Tomography (CT)

    Authors: Ayman E. Khedr;Awad Khalil;Mohammed A. Osman

  32. Big Bang-Like Phenomenon in Multidimensional Data

    Authors: Marcel Jirina

  33. Investigating the Suitability of Wireless Web Services to Support Business Processes

    Authors: Roopesh Kevin Sungkur

  34. Simulating the Effect of the Sampling Time in Different Discrete Transformations for the First Order System Using MATLAB Software

    Authors: Ahmed S. Elgarewi;Mahmoud M. El-Fandi;Muftah E. Almoher

  35. Survey of Cloud Computing Web Services for Healthcare Information Retrieval Systems

    Authors: Ismail Hmeidi;Maryan Yatim;Ala Ibrahim;Mai Abujazouh

  36. Determining the Secrecy of Software Encryption System based on pGSSG Generator using Shannon Entropy

    Authors: Antoniya Tasheva;Ognyan Nakov;Boyan Petrov

  37. Compact Miniature Hidden Antennas for Multi Frequency Bands Applications

    Authors: Abualkair Alkhateeb;Basim Alkhateeb

  38. The Influence of Peer-to-Peer Social Networks and Computer Supported Collaborative Learning (CSCL) in Mathematics

    Authors: Mohini Mohamed;Wasugi a/p Guandasami

  39. Usability Challenges to Arabic Mobile Phones Interface in Bilingual Environment

    Authors: Baha A. Khasawneh

  40. Supervised Competition Using Joined Growing Neural Gas

    Authors: Dusan Fedorcak;Michal Podhoranyi

  41. Building a Semantic Index from HTML Pages or XML Documents

    Authors: Abdeslem Dennai;Sdi Mohammed Benslimane

  42. Biogeography-based Optimization Algorithm for Independent Component Analysis

    Authors: Jehad Ababneh;Jorge Igual

  43. Collaborative Problem Solving Using Social Network Media: How to Effectively Evaluate Student Performance in Online Study Group?

    Authors: Abdalla Radwan;Mohamed El-Darieby

  44. A Light Review of Data Security and Privacy Approaches Applicable to E-Health Systems

    Authors: Ninad Desai;Hamid Shahnasser

  45. Lung Segmentation of X-Ray Thorax Image Using Geometric Active Contour and Enhancement Spatial Domain Filtering

    Authors: Mokhamad Amin Hariyadi

  46. Detecting Attacks in Wireless Sensor Network Using Genetic Algorithms

    Authors: Novin Makvandi; Seyyed Mohsen Hashemi;Peiman Haghighat

  47. Simulation of an RF MEMS Double-Pole Double-Throw Switch Using Novel Seesaw Design

    Authors: Mohammed Al-Amin; Sufian Yousef;Barry Morris

  48. Microblogging Opinion Mining Approach for Kuwaiti Dialect

    Authors: Janan Ben Salamah;Aymen Elkhlifi

  49. Comparative Study on Service-Oriented Architecture and Event-Driven Architecture

    Authors: Chatri Pienwittayasakul;Yan Liu

  50. A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

    Authors: Mohammad V. Malakooti;Mehrzad Khederzadeh

  51. A Robust Information Security Model for Cloud Computing Based on the Scrambling Algorithm and Multi-Level Encryption

    Authors: Mohammad V. Malakooti;Nilofar Mansourzadeh

  52. An Efficient Data Aggregation Method in Wireless Sensor Network based on the SVD

    Authors: Mohammad V. Malakooti;Mona Noorian

  53. An Effective Solution for the Service Support of Virtual Banking Using the Key Performance Indices Based on Cobit-5 Architecture

    Authors: Mohammad V. Malakooti;Seyyed Mohsen Hashemi;Narges Tavakoli

  54. A Secure SMS Model in E-Commerce Payment using Combined AES and ECC Encryption Algorithms

    Authors: Abdolghader Pourali

  55. Designing a New Fuzzy Genetic Gravity Algorithm for Data Mining

    Authors: Mostafa Moradi

  56. The Search for the Criminals using PCA Algorithm

    Authors: Ahmed Mohamed Abushaala;Elham Ali Abobaker

  57. Cloud Data Management based on Hadoop Framework

    Authors: Tahani Mahmoud Allam;Hatem M. Abdullkader;Alsayed Abdelhameed Sallam