scispace - formally typeset
Search or ask a question

Showing papers presented at "International Conference on Innovations in Information Technology in 2006"


Proceedings Article•DOI•
01 Nov 2006
TL;DR: This paper draws on the extant literature on e-government policy formulation, implementation and execution to advance understanding of the factors leading to success and failure and to elaborate on the underlying enabling and inhibiting conditions.
Abstract: This paper draws on the extant literature on e-government policy formulation, implementation and execution The purpose of the synthesis of this literature is to advance our understanding of the factors leading to success and failure and to elaborate on the underlying enabling and inhibiting conditions This exercise is significant with respect to research and practice to avoid the pitfalls of imposing universal approaches to research and policy practices Rather, it will draw a distinction between generic (general) and specific (context-contingent) factors With this fundamental understanding, we can suggest the kind of factors that have strategic importance and which are irrelevant in terms of e-government policy formulations The paper, further, provides a model for successful e-government implementation

111 citations


Proceedings Article•DOI•
01 Nov 2006
TL;DR: This model extends protection motivation theory (PMT) by introducing preceding factors (e.g., visibility and normative beliefs) of the protection motivation process and suggests that the preceding factors have significant effect on threat appraisal, self-efficacy and response efficacy.
Abstract: The key threat to IS security is constituted by careless employees who do not comply with IS security policies. To ensure that employees comply with organizations' IS security procedures, a number of IS security policy compliance means have been proposed in the past. Prior research has criticized these means as lacking theoretically and empirically grounded principles to ensure that employees comply with IS security policies. This paper advances a new model that explain employees' IS security compliance. In this model, we extend protection motivation theory (PMT) by introducing preceding factors (e.g., visibility and normative beliefs) of the protection motivation process. To test this model, we collected data (N=919) from five companies. The results suggest that the preceding factors have significant effect on threat appraisal, self-efficacy and response efficacy. Threat appraisal have significant effect on intention to comply with IS security policies. Intention to comply has significant effect on actual compliance towards IS security policies.

51 citations


Proceedings Article•DOI•
01 Nov 2006
TL;DR: A number of success factors were determined to be critical and affect knowledge management in all organisations and contribute to better identification and establishment of CSFs affecting knowledge management adoption.
Abstract: Knowledge management and CSFs are important issues in today's organisational world. Knowledge is understood as one of the crucial driving forces for business success and competitiveness. This study points out a number of success factors that were determined to be critical and affect knowledge management in all organisations. This paper is particularly helpful for further research on knowledge management-related issues, since it contributes to better identification and establishment of CSFs affecting knowledge management adoption.

44 citations


Proceedings Article•DOI•
01 Nov 2006
TL;DR: This paper reports on an experiment that was carried out to validate the assumption that folksonomies carry more semantic value than keywords extracted by machines, and demonstrates that guysonomies used in the delicious bookmarking service can beused in the process of generating semantic metadata to annotate Web resources.
Abstract: Semantic Metadata, which describes the meaning of documents, can be produced either manually or else semi-automatically using information extraction techniques. Manual techniques are expensive if they rely on skilled cataloguers, but a possible alternative is to make use of community produced annotations such as those collected in folksonomies. This paper reports on an experiment that we carried out to validate the assumption that folksonomies carry more semantic value than keywords extracted by machines. The experiment has been carried-out in two ways: automatically, by measuring the percentage of overlap between the folksonomy set and machine generated keywords set; and subjectively, by asking a human indexer to evaluate the quality of the generated keywords from both systems. The result of the experiment can be considered as evidence for the rich semantics of folksonomies, demonstrating that folksonomies used in the del.icio.us bookmarking service can be used in the process of generating semantic metadata to annotate web resources.

33 citations


Journal Article•DOI•
01 Nov 2006
TL;DR: A general framework for fault-tolerance in WSN is proposed and the learning and refinement module, which enables a FT solution to be adaptive and self-configurable based on changes in the network conditions, is proposed.
Abstract: Wireless Sensor Networks (WSN) have the potential of significantly enhancing our ability to monitor and interact with our physical environment. Realizing a fault-tolerant operation is critical to the success of WSN. The main challenge is providing fault-tolerance (FT) while conserving the limited resources of the network. Our main contribution in this paper is to propose a general framework for fault-tolerance in WSN. The proposed framework can be used to guide the design and development of FT solutions and to evaluate existing ones. We present a comparative study of the existing schemes and identify potential enhancements. A primary module of the framework is the learning and refinement module which enables a FT solution to be adaptive and self-configurable based on changes in the network conditions. We view this as vital to the resource-constrained and highly dynamic WSN. Up to our knowledge, we are the first to propose the implementation of such module in FT solutions for WSN.

33 citations


Proceedings Article•DOI•
01 Nov 2006
TL;DR: Results obtained verify the improved performance of the smart antenna system when the practical measurements of the signal environment surrounding the sensor array are used.
Abstract: This paper presents practical design of a smart antenna system based on direction-of-arrival estimation and adaptive beamforming. Direction-of-arrival estimation is based on the MUSIC algorithm for identifying the directions of the source signals incident on the sensor array comprising the smart antenna system. Adaptive beamforming is achieved using the LMS algorithm for directing the main beam towards the desired source signals and generating deep nulls in the directions of interfering signals. The smart antenna system designed involves a hardware part which provides real data measurements of the incident signals received by the sensor array. Results obtained verify the improved performance of the smart antenna system when the practical measurements of the signal environment surrounding the sensor array are used. This takes the form of sharper peaks in the MUSIC angular spectrum and deep nulls in the LMS array beampattern

30 citations


Proceedings Article•DOI•
01 Nov 2006
TL;DR: The results show how the relationship between the signal bit error rate (BER) and signal to noise ratio (SNR) is affected when varying the data rate and the input signal power to the noise channel.
Abstract: IEEE 802.15.4 (Zigbee) is the new standard that has been developed for low cost, low data rate and low power consumption wireless network. This paper provides a brief description of this standard including the Physical (PHY) and medium access control (MAC) layer. It focuses on developing MatLab/Simulink models for the Zigbee protocol and the performance evaluation of these models. Simulation has been run using MatLab and the results have been analyzed. The results show how the relationship between the signal Bit Error Rate (BER) and Signal to Noise Ratio (SNR) is affected when varying the data rate and the input signal power to the noise channel.

29 citations


Proceedings Article•DOI•
01 Nov 2006
TL;DR: A novel tool called `FolksAnnotation' is described that creates annotations with educational semantics from the del.icio.us bookmarking service, guided by appropriate domain ontologies.
Abstract: There are many resources on the Web which are suitable for educational purposes. Unfortunately the task of identifying suitable resources for a particular educational purpose is difficult as they have not typically been annotated with educational metadata. However, many resources have now been annotated in an unstructured manner within contemporary social bookmaking services. This paper describes a novel tool called `FolksAnnotation' that creates annotations with educational semantics from the del.icio.us bookmarking service, guided by appropriate domain ontologies.

27 citations


Proceedings Article•DOI•
01 Nov 2006
TL;DR: The analytical models proposed consider the benefits of RFID implementations including automatic checkout at retail stores and reduced inventory costs due to efficient shelf replenishment and the cost of implementations including cost of tag readers, the communication network cost and other infrastructure costs.
Abstract: We present models for cost-benefit analyses of RFID implementations for retail stores. We discuss implementations of the data networks connecting the tag readers. Our models consider the cost of implementations including the cost of tag readers, the communication network cost and other infrastructure cost. In addition, we also present analytical models to consider the benefits of these implementations including automatic check-out and reduced inventory costs due to efficient shelf replenishment.

27 citations


Proceedings Article•DOI•
01 Nov 2006
TL;DR: How to use reference models for business engineering is described, based on a well-known framework for research on reference modeling that consists of four elements: reference modeling languages, reference modeling methods, reference models, and reference modeling context.
Abstract: Conceptual models play an increasingly important role in all phases of the information systems life cycle. For instance, they are used for business process engineering, information systems development, and customizing of Enterprise Resource Planning (ERP) systems. Despite conceptual modeling being a vital instrument for developing information systems, the modeling process often is resource-consuming and faulty. As a way to overcome these failures and to improve the development of enterprise-specific models, the concept of reference modeling has been introduced. A reference model is a conceptual framework and may be used as a blueprint for information systems development. In this paper, we describe how to use reference models for business engineering. Our discussion is based on a well-known framework for research on reference modeling that consists of four elements: reference modeling languages, reference modeling methods, reference models, and reference modeling context. Each element of the framework is discussed with respect to prior research and future research opportunities.

25 citations


Proceedings Article•DOI•
01 Nov 2006
TL;DR: This paper proposes a novel approach for fault tolerance in MPLS networks that can easily handle single or multiple path failures and uses the (k, n) threshold sharing algorithm with multi-path routing with reasonable network resource utilization.
Abstract: There has been current demand on Internet Service Providers (ISPs) to provide Quality of Service (QoS) guarantees. Fault Tolerance is an important factor that needs to be considered to maintain the network survivability. It is the property of a system that continues to operate the network properly in the event of failure of some of its parts. There is no solution until now that can provide a recovery with no packet loss and delay at the same time. In addition, network resources such as bandwidth have to be significantly utilized. In this paper, we propose a novel approach for fault tolerance in MPLS networks that can easily handle single or multiple path failures. Our approach uses the (k, n) Threshold Sharing Algorithm with multi-path routing. Our approach guarantees to continue the network operation with no packet loss and recovery delay, and with reasonable network resource utilization.

Proceedings Article•DOI•
01 Nov 2006
TL;DR: Simulation results showed that dynamic ridge polynomial neural networks generate higher profit returns with fast convergence when used to predict noisy financial time series.
Abstract: This paper presents a novel type of higher-order polynomial recurrent neural network called the Dynamic Ridge Polynomial Neural Network. The aim of the proposed network is to improve the performance of the ridge polynomial neural network by accommodating recurrent links structure. The network is tested for the prediction of non-linear and non-stationary financial signals. Two exchange rates time-series, which are the exchange rate time series between the British Pound and the Euro as well as the US dollar and the Euro, are used in the simulation process. Simulation results showed that Dynamic Ridge Polynomial Neural Networks generate higher profit returns with fast convergence when used to predict noisy financial time series.

Proceedings Article•DOI•
01 Nov 2006
TL;DR: Research leading to the development of Easy with Eve, an affective tutoring systems (ATS) for mathematics, which detects student emotion, adapts to students and displays emotion via a lifelike agent called Eve is presented.
Abstract: Many software systems would significantly improve performance if they could adapt to the emotional state of the user, for example if Intelligent Tutoring Systems, ATM's and ticketing machines could recognise when users were confused, frustrated or angry they could provide remedial help so improving the service. This paper presents research leading to the development of Easy with Eve, an Affective Tutoring Systems (ATS) for mathematics. The system detects student emotion, adapts to students and displays emotion via a lifelike agent called Eve. Eve's is guided by a case-based system which uses data that was generated by an observational study. This paper presents the observational study, the case-based method, and the ATS.

Proceedings Article•DOI•
01 Nov 2006
TL;DR: The main result is that the security adds moderate degradation the throughput that may affect applications over access points in ad-hoc networks.
Abstract: This paper investigates the impact of security on the performance of WLAN. More specifically, it analyzes the impact of applying encryption used by the well-known security protocol Wired Equivalent Privacy (WEP) on the data rate over an ad hoc WLAN, IEEE 802.11g. This paper also addresses the different issues related to the security protocols currently used in WLAN IEEE 802.11g and demonstrates how these issues affect the final results of the experiments conducted. The main result is that the security adds moderate degradation the throughput that may affect applications over access points in Ad-Hoc networks.

Proceedings Article•DOI•
Samhaa R. El-Beltagy1•
01 Nov 2006
TL;DR: A simple, yet effective algorithm (KP-Miner) for achieving automatic key phrase extraction is presented and the results are compared to two existing sophisticated machine learning based automatic keyphrase extraction systems.
Abstract: Automatic key phrase extraction has many important applications including but not limited to summarization, cataloging/indexing, feature extraction for clustering and classification, and data mining. This paper presents a simple, yet effective algorithm (KP-Miner) for achieving this task. The result of an experiment carried out to investigate the effectiveness of this algorithm is also presented. In this experiment the devised algorithm is applied to six different datasets consisting of 481 documents. The results are then compared to two existing sophisticated machine learning based automatic keyphrase extraction systems. The results of this experiment show that the devised algorithm is comparable to both systems.

Proceedings Article•DOI•
01 Nov 2006
TL;DR: A closer examination of tacit knowledge - particularly through the seminal works of Polanyi and Nonaka - would suggest otherwise a misuse of the concept of tacit/explicit knowledge in the form of an assumption that one can easily be converted into the other.
Abstract: Many recent IT project failures relate to the implementation of a wide variety of knowledge-focused systems. High levels of failure are reported and reasons cited in the literature tend to associate these failures with poor project definition and an over focus on the technology. However, there may be another reason for these failures -- a misuse of the concept of tacit/explicit knowledge in the form of an assumption that one can easily be converted into the other. A closer examination of tacit knowledge --particularly through the seminal works of Polanyi and Nonaka -- would suggest otherwise.

Proceedings Article•DOI•
01 Nov 2006
TL;DR: It is indicated that the Awase-E has potential to become a reasonable candidate as an alternative to PIN authentication regarding both security and usability.
Abstract: In this paper, we propose a recognition-based image authentication system, named "Awase-E". There are two unique features in the system. One is to use users' personal photographs as their secret information. The other is that the system introduces a "no answer" case in a verification of an authentication trial. We developed an web-base prototype system and conducted exploratory experiments to determine the memorability of this secret information. As a result of the experiments, we determined that the memorability of the secret information in Awase-E is almost the same as the memorability of a PIN number, even over a long period of time with infrequent use. Moreover, even after users are forced to update their secret information, they can pass the authentication without forgetting the secret information or confusing the old and new secret information. We also present a comparison between Awase-E and PIN authentication regarding both security and usability, and we indicate that the Awase-E has potential to become a reasonable candidate as an alternative to PIN authentication.

Proceedings Article•DOI•
01 Nov 2006
TL;DR: An efficient scheme for remote user authentication is proposed which does not maintain verifier table and allows the user to freely choose and change their passwords, which achieves mutual authentication which is essential for many applications.
Abstract: The password based authentication schemes are commonly used for authenticating remote users. Many password based schemes both with and without smart card have been proposed; each scheme has its merits and demerits. In this paper we propose an efficient scheme for remote user authentication which does not maintain verifier table and allows the user to freely choose and change their passwords. Also the proposed scheme achieves mutual authentication which is essential for many applications. The scheme is secure against id theft, guessing attack, insider attack, stolen verifier attack, replay attack, impersonation attack, and reflection attack.

Proceedings Article•DOI•
Selma Limam Mansar1•
01 Nov 2006
TL;DR: The application of a decision-making tool for the choice of appropriate best practices in the context of e-government implementation to guarantee better internal processes 'performances in the e- government context' is discussed.
Abstract: E-government projects can easily be put at risk if projects lack government support, if a solid information infrastructure is not developed so that customers can use this technology, if the user involvement is not significant at the implementation stage AND if poor attention is given to business process integration. This paper discusses the application of a decision-making tool for the choice of appropriate best practices in the context of e-government implementation. The addressed question is `which practices would guarantee better internal processes' performances in the e-government context?'

Proceedings Article•DOI•
Hye Won Lee1, Chi Lee1, Gun Lee1, Yi-hyun Kim1, Bong Gyou Lee1 •
01 Nov 2006
TL;DR: Analysis of trends of recent mobile advertising in Korea by examining users' response rates of mobile advertisements, and the effectiveness of new advertising strategies designed to attract more customers implies that customers differently respond to mobile advertising messages by content type, time, and age.
Abstract: This study analyzed trends of recent mobile advertising in Korea by examining users' response rates of mobile advertisements, and the effectiveness of new advertising strategies designed to attract more customers. Mobile advertising is rapidly developing, and various formats of mobile advertisements are emerging into what is known as interactive media. Unlike passive advertising methods, mobile advertising can target specific audience groups, and provide instant feedback on whether it attracts a user or not. However, despite its advantages, mobile advertising has many obstacles that prevent it from performing to its potential. The methods used to conduct this study include the analysis of customers' response rates, interviews and case studies. The analysis implies that customers differently respond to mobile advertising messages by content type, time, and age, and that new techniques in mobile advertising continue to promote mobile handsets to become useful advertising tool.

Proceedings Article•DOI•
01 Nov 2006
TL;DR: Development of a software effort estimation ontology system (SEEOS) for use in estimating software project cost in a group of organizations that establishes a set of common project parameters between different projects and provides a common understanding of project parameters and their semantics.
Abstract: Software project cost and effort estimation has become an increasingly important field in the past years due to the overwhelming role of software in today's global market Several studies have been dedicated to create models in order to estimate the effort of software development Most of the studies focused on expert judgment, analogy, parametric and algorithmic methods, bottom-up methods, and top-down methods Nearly all estimating methods need information about how projects have been implemented in the past However, this information may be of limited use to estimators, as there are uncertainties in the way that various terms, variables and factors are being interpreted Two projects that may seem similar may indeed be different in a critical way Moreover, the uncertainty in assessing similarities and differences means that two different analysts could develop significantly different views and effort estimates The major contributions this paper makes are: 1) identification of an ontology-based cost estimation process framework for defining the semantics of project development data; 2) introduce the culture factor as it affects the software effort estimation; and 3) development of a software effort estimation ontology system (SEEOS) for use in estimating software project cost in a group of organizations The system establishes a set of common project parameters between different projects and provides a common understanding of project parameters and their semantics This system enables project managers to elicit software project features that are semantically compatible with new project requirements The system has been implemented using Java and a relational database management system and data which have been collected from within UAE companies using an online system

Proceedings Article•DOI•
01 Nov 2006
TL;DR: The proposed architecture is based on the commonly used notion of QoS brokerage service to mediate between service requesters and service providers, and its responsibilities include performance monitoring of Web services, implementation of Web service selection policies, and negotiation ofQoS.
Abstract: QoS management has been extensively studied in network-based multimedia applications However, its application to Web services is very recent In this paper, we present WS-QoSM, a Web services QoS management architecture capable of supporting at runtime the QoS management operations, QoS provisioning and assurance in delivering Web services Our proposed architecture is based on the commonly used notion of QoS brokerage service to mediate between service requesters and service providers Its responsibilities include performance monitoring of Web services, implementation of Web service selection policies, and negotiation of QoS Besides, we present a server-oriented scheme for load distribution based on the sender-initiated and receiver-initiated strategies previously used in general distributed systems

Proceedings Article•DOI•
01 Nov 2006
TL;DR: This work analyzes the user interfaces and user profile for a proactive recommendation of a blog recommendation system using the value, semantic, and social model of the blogger.
Abstract: A blog has the potential to change the way we perceive information and make friends. Using the value, semantic, and social model of the blogger, this work analyzes the user interfaces and user profile for a proactive recommendation. Retrieving the personal value inclination, article topic semantic, and interactive social network of the bloggers, this study has tried to step toward a blog recommendation system. Related works, analysis model, system architecture, application UI and discussion are presented.

Proceedings Article•DOI•
Mohammed AbuJayyab1, Salim Ahdab1, M. Taji1, Zahraa Hamdani1, Fadi Aloul1 •
01 Nov 2006
TL;DR: Initial results show the effectiveness of the proposed PolluMap system, which monitors the air quality of urban cities and displays the information using a Web service and provides continuous update of pollution information in addition to maximum coverage.
Abstract: PolluMap is a new automated system that monitors the air quality of urban cities and displays the information using a web service. The system collects pollution data using mobile hardware modules, transmits the data regularly using GPRS to a back-end server, and integrates the data to generate a pollution map of the city using its geographical information system. The pollution map is available at anytime from an easy-to-view website. Unlike previous pollution mappers, the new system provides continuous update of pollution information in addition to maximum coverage. It can be easily expanded to new areas and is cheap to employ. The system has been implemented and tested in Dubai. Initial results show the effectiveness of the proposed system.

Proceedings Article•DOI•
01 Nov 2006
TL;DR: This paper proposes event calculus and BPEL based business process modeling and composition and semantic based service-oriented grid architecture for implementation of event-driven business processes.
Abstract: Web Services and Service-oriented architecture are emerging distributed computing paradigms to publish and access software components as services. Various enterprises now publish their business as Web services. Business processes of these enterprises involved in B2B and B2C transactions require composition of distributed heterogeneous services to accomplish a task. Business processes are complex, dynamic and event-driven. To capture the dynamic nature of business process we need to choreograph and orchestrated the business partners and the task involve in the process. With the development of standard like Web services Resource Framework and Web services Notification, Web services now become stateful and now supporting event and notification. To model the Web services based event-driven composition and business process both event and state should be considered. In this paper we propose event calculus and BPEL based business process modeling and composition. We propose Semantic based Service-oriented grid architecture for implementation of event-driven business processes.

Proceedings Article•DOI•
01 Nov 2006
TL;DR: It is revealed that the RIDC-ANNE approach can be used to successfully extract the regions in the data space that have high impact on the system performance and enhance the overall utility of current neural network models.
Abstract: Predicting the outcome of a medical procedure or event with high level of accuracy can be a challenging task. To answer the challenge, data mining can play a significant role. The main objective of this study is to examine the performances of an Artificially Intelligent (AI)-based data mining technique namely Artificial Neural Network Ensemble (ANNE) in prediction of medical outcomes. It also describes a novel approach, namely "RIDC-ANNE". This approach tries to improve data quality by configuring an ensemble of bagged networks as a filter and identifying the regions in the data space that have high impact on the system performance. Furthermore, it can also be used to extract explanations and knowledge from several combined neural network classifiers. The methodology employed utilizes a series of clinical datasets. The datasets embody a number of important properties, which make them a good starting point for the purpose of this research. This study reveals that the RIDC-ANNE approach can be used to successfully extract the regions in the data space that have high impact on the system performance and enhance the overall utility of current neural network models.

Proceedings Article•DOI•
01 Nov 2006
TL;DR: A phoneme segmentation algorithm that uses fast Fourier transform (FFT) spectrogram that has been implemented and tested for utterances of continuous Arabic speech of 10 male speakers that contain almost 2346 phonemes in total.
Abstract: This paper describes a phoneme segmentation algorithm that uses Fast Fourier Transform (FFT) spectrogram. The algorithm has been implemented and tested for utterances of continuous Arabic speech of 10 male speakers that contain almost 2346 phonemes in total. The recognition system determines the phoneme boundaries and identifies them as pauses, vowels and consonants. The system uses intensity and phoneme duration for separating pauses from consonants. Intensity in particular is used to detect two specific consonants (/r/, /h/) when they are not detected through the spectrographic information. Segmentation accuracy of 95.39% for the overall system has been achieved.

Proceedings Article•DOI•
01 Jan 2006
TL;DR: Experiments indicate that the new marker identified as an illuminated contour-based marker support active marker extraction and robust tracking across time steps.
Abstract: Motion capture has been developed with the aim to track and/or reproduce complex movements. This paper will mainly focus on the optical marker based approach to tracking and will present a new type of marker identified as an Illuminated Contour-Based Marker. This new marker has been developed in order to solve the problems identified with current standard sphere-type markers, such as the need to wait through a whole "flash sequence" in order to automatically identify individual markers, ambiguities related to current color cues and problems associated with missing information in data streams. Experiments indicate that the new markers support active marker extraction and robust tracking across time steps.

Proceedings Article•DOI•
Muhammad Mazlan1•
01 Nov 2006
TL;DR: This paper has documented the experiences and some recommendations to improve the current practice in stress test development for Java component in J2ME compatible mobile devices.
Abstract: In software engineering, software testing phase has its own role in reducing bugs and ensuring software does what it is supposed to do. In order to maintain software quality, a few approaches of testing have been widely used in Motorola. One of the effective approaches is stress test. It has been practiced in system level testing on mobile device products. Stress test has helped a lot in identifying bugs and errors during testing phase especially under stressful conditions. Stress test on Java component for J2ME compatible mobile device is a phase of validation and verification of the operations of mobile devices under stressful situations. The stress test is based on requirements and test procedures that have been determined during test development phase. In this paper, we have documented our experiences and some recommendations to improve the current practice in stress test development for Java component in J2ME compatible mobile devices.

Proceedings Article•DOI•
Kee. Woi Hin1•
01 Nov 2006
TL;DR: In this paper, the authors discuss the benefit, limitation and possible implementation and integration of Agile method in software development and testing process and suggest a comprehensive integration of agile method with some good features of classical method to enhance the current software development techniques.
Abstract: In software development, there are two broad schools of thought: the traditional sequential or the "Waterfall method" and the iterative or the "Agile method". This paper aims to discuss the benefit, limitation and possible implementation and integration of Agile method in software development and testing process. It also suggests a comprehensive integration of Agile method with some good features of classical method to enhance the current software development techniques. This in-turn can be used in a highly adaptive software environment.