ISSN 2253-0150

HomeAbout IJISTEditorial BoardInstructions for AuthorsPaper submissionPeer ReviewContact
Editor-in-Chief :
Mohamed Ridda LAOUAR

Table of contents:
Volume 4 issue 1 - Current Issue
Published: 2016


- Ahyoung Kim, Junwoo Lee and Mucheol Kim.
Electronics and Telecommunications Research Institute, Korea.
Department of Multimedia, Sungkyul University, Korea

Mobile-based Context-aware Analysis Platform
Show/Hide Abstract

Recently, various types of log data have been collected and used due to the explosive increase of mobile devices. In mobile environment with high portability and mobility, in addition, the use of users’ context information is an important factor in the recommendation system. This study attempted to analyze usability log data in a mobile app collected from the mobile device through an app analysis platform and suggest a context-aware recommendation model to recommend mobile app or contents by recognizing users’ context data. The mobile app’s usability data consist of activities which were active during the use of a mobile device. The features of these activities are related with time, location and device information. A model proposed in this study has a flexible structure which can be selectively used depending on user circumstances and performs a mobile app’s usability patterns based on the collaborative filtering method.

- Ahmed Aljarray and Abdulla Abouda
Almadar Aljadid R&D Oce, Misrata, Libya.

Analysis and Detection of Fraud in International Calls Using Decision Tree
Show/Hide Abstract
Fraud is one of the most severe threats to revenue and quality of service in telecommunication networks. The advent of new technologies has provided fraudsters with new techniques to commit fraud. Subscriber identity module box (SIMbox) fraud is one of such fraud that is used in international calls and it has emerged with the use of VOIP technologies. In this paper, we propose a novel technique for detecting SIMbox fraud in international calls. The proposed technique is based in using decision tree algorithm to build a model based on six features extracted from call data record (CDR). The proposed algorithm is tested using dataset obtained from a real mobile operator (Almadar Ajadid Co.,) and it has shown 97.95% detection accuracy.

Ji-Young Kwak, SaeHoon Kang, YongYoon Shin, Younghwa Kim and Sunhee Yang
Electronics and Telecommunications Research Institute. Daejeon, Korea.

The Design of Policy-driven Intelligent Cloud Networking System
Show/Hide Abstract
The QoS requirements of various services have created a big challenge in the virtualization environments for cloud networking that cannot support the fine-grained network QoS management. As an emerging technology for satisfying these requirements, the Software Defined Networking (SDN) has the potential to enable dynamic configuration and control for the enhanced network management. This paper presents the design of a SDN controller for intelligent cloud networking that supports policy-driven flexible forwarding function for the flows with various QoS. The proposed controller performs the mechanism for policy-based intelligent control to provide differentiated virtual network services based on the content of an Open- Flow packet header and mapping relationships between physical infrastructure and virtual overlay network. With this approach, the intelligent controller enables the distribution of traffics with different QoS requirements on available paths under the constraints of available resources by adopting the structure for enforcing the QoS policy of flows.

M. Angelica Pinningho J., Hans Villagran V., Ricardo Contreras A. and Marco Mora C.
University of Concepcion, Chile.
Catholic University of Maule, Chile.

Hybridizing ACO algorithms for band detection in DGGE images
Show/Hide Abstract
This work presents an algorithm for detecting edges in bands that belong to DGGE images. DGGE (Denaturing Gradient Gel Elec- trophoresis) images are used to identify microorganisms present in sam- ples that goes through a process of DNA separation in di erent se- quences, that can be visualized as bands belonging to a lane. This pro- posal uses an hybrid algorithm, fuzzy logic and ant colony optimization to detect bands and edges, including the use of binarization and an his- togram for automatically detect the band position, a very important issue for identifying a particular micro-organism.

Mike Krey
University of Applied Sciences Zurich, Switzerland.

IT in Health Care: A Business Enabler?
Show/Hide Abstract
Information processing in health care demands reliable, relevant, systematic, integrated, and managed data throughout care delivery. This leads, even with IT, to increased and time-consuming activities and can cause potentially dangerous situations for the patient as important data may not be available when needed, which in turn can lead to wrong diagnostic or therapeutic decisions. Consequently, hospital IT executives must balance many competing priorities. These endeavours require, in addition to the appropriate utilisation of given IT resources, a far-sighted alignment of IT issues with objectives, and a thorough understanding of uncertainties and legal obligations. This approach to integrated IT governance, IT risk management, and IT compliance (IT GRC) in the hospital Environment is the subject of the work presented here. This investigation is associated with a survey that has been conducted in 2009 and allows therefore drawing conclusions on the progress of IT GRC management in Swiss hospitals over the last 5 years. The findings revealed that IT GRC in health care is still all too often seen as the realm and sole responsibility of the CIO and the IT department. The findings proved that IT GRC has not been utilised sufficiently by the executive management of many hospitals, especially the public ones. The findings revealed the reasons for a less pervasive spread of managed IT GRC can be structured into four main categories representing the greatest barriers to a successful convergence of integrated IT GRC.