The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is our privilege and pleasure to welcome you to the Seventh International Conference on Computer Science and Information Technology, CSIT 2016, in Amman, Jordan. The previous CSIT meetings were held all at Applied Science Private University. As an established international event and one of the main conferences for the computer science and information technology community, once again our conference...
Mobile robot system will be an important asset in our future. Mobile robot not only has to execute predefined tasks programmed with, but also it must explore the unknown environment that might be pushed to work in. In this paper we propose, implement and test a new model for mobile robot environment using mono-vision system. This proposed system develops 3D environment model utilizing mono-vision...
It is assumed that stability and maintainability are relating to each other. We attempt to verify and validate this assumption in object-oriented paradigm. Two candidate metrics were chosen, one for stability and one for maintainability. CSM is used in stability due to its high accuracy and wide coverage. MI was chosen for maintainability due to its clarity, ease of use and solely based on source...
Refactoring has been widely used to improve software design. Refactoring is applied when a bad smell is detected. Several bad smells might be present in the code. In this paper, we conduct an empirical study to find if the order of applying refactoring has any impact on the quality of the final code. We run six experiments by applying three refactoring methods in different orders and evaluate the...
Managing interest in collaborative data sharing involves determining interest of both owner and other parties. Interest management method is bound to information such as user request, location, history, preferences and data policies. Considering other researchers' works, managing data interest of sharing for its' constitutional adhered policy are rarely done in computerize manner. With attention that...
although the tendency towards a Semantic Web is increasing, the current Web is keen on more semantic data. There are several web application domains which need to present their data in the form of graphs to get information and knowledge to allow semantic web searching to deal with them. These domains can be for example geographic data, data in the area of bioinformatics, social networks or even corporate...
Many experts agree that the greatest threat to the success of any project, especially IT projects, is a failure to communicate. Project managers say they spend as much as 90 percent of their time communicating. Just as it is difficult to understand people and their motivations, it is also difficult to communicate with people effectively. Communications software and collaboration tools like e-mail,...
Emotions play an important role in our thinking and behavior and hence contribute in shaping up of our personality. Many theoretical and experimental researches have been conducted to recognize the emotions from verbal or non-verbal behaviors. It is well known that the electroencephalogram (EEG) signals contain rich information about the activities of the brain and they can reliably enable us to estimate...
Holy Quran is the religious book of Islam. It is very special type of data for more than 1.6 billion Muslims over the world. With the advancements of Information Technology it is now available in digital forms through the internet, websites and mobile applications. There is a remarkable need of having a standard rules to manage and monitor Holy Quran electronic versions. In this paper, an application...
This paper reports the development of an ontology for Juz' Amma in the Quran manuscript that is designed based on the contextual information support sourced from expert knowledge. The ontology development adopts an existing methology called the Methontology that covers steps from identifying motivation scenarios, formulating the competency questions, development, and evaluation. The ontology was evaluated...
Lately, the large increasing in data amount results in compound and large data-sets that caused the appearance of “Big Data” concept which gained the attention of industrial organizations as well as academic communities. Big data APIs that need large memory can benefit from Phoenix MapReduce implementation for shared-memory machines, instead of large, distributed clusters of computers. This paper...
In the collaborative working environment, users in a group activity are formally communicated to each other in the public workspace to collaboratively develop information artefact. However, complex tasks activities required dynamic and creative solutions that need additional spaces for private and informal interactions among group members. Hence, one group project may consist of various sub-group...
Nowadays, the current trend is to integrate WiFi with Long Term Evolution (LTE) networks in order to meet the growing demand for huge amounts of data traffic and provide ubiquitous coverage. Seamless mobility between heterogeneous networks with the required Quality of Services (QoS) provisioning for Mobile Terminals (MTs) is one of the most challenging issues while considering LTE-WiFi integration...
The increasing amount of text information on the Internet web pages affects the clustering analysis. The text clustering is a favorable analysis technique used for partitioning a massive amount of information into clusters. Hence, the major problem that affects the text clustering technique is the presence uninformative and sparse features in text documents. The feature selection (FS) is an important...
Open government aims to improve the relationship between the government and citizens. In a shift from e-Government 2.0, open government provides openness of information and openness of interactions with the public. However, these opportunities pose privacy challenges in the implementation of open government. In order to address these privacy challenges, it is important to explore public employees'...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.