ESTCON2014 Technical programme

Transcription

ESTCON2014 Technical programme
The 2nd International Conference on
Computer and Information Sciences
A Conference of
World Engineering, Science & Technology Congress
(ESTCON)
3 - 5 June 2014
Kuala Lumpur Convention Centre
Technical Programme
The 2nd International Conference on
Computer and Information Sciences
(ICCOINS2014)
TECHNICAL PROGRAMME
© 2014
Universiti Teknologi PETRONAS
Insititute of Technology PETRONAS Sdn Bhd
Copyright and Reprint Permission:
In compliance with the terms of the Copyright Act 1987 and the IP Policy
of the University, the copyright of this publication has been reassigned by
the authors to the legal entity of the University, Institute of Technology
PETRONAS Sdn. Bhd. Due acknowledgement shall always be made of
the use of any material contained in, or derived from this publication. All
materials are copyright of Universiti Teknologi PETRONAS. Reproduction
in whole or in part is not permitted without the written permission from
the University.
CONTENTS
FOREWORD
2
CONFERENCE ORGANISING COMMITTEE
3
GUEST EDITORS
4
REVIEWERS
5
PLENARY SPEAKERS
8
NOTES TO DELEGATES
12
CONFERENCE PROGRAMME
14
TECHNICAL SESSIONS
17
POSTER SESSIONS
33
ABSTRACTS
35
POSTER PRESENTATION ABSTRACTS
105
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
FOREWORD
ASSOCIATE PROFESSOR
DR. JAFREEZAL JAAFAR
Conference Chair, ICCOINS2014
On behalf of a dedicated team that organized this event, it gives me great pleasure to
welcome all guests, speakers and delegates to Kuala Lumpur to attend the 2nd International
Conference on Computer and Information Science (ICCOINS2014), in part of the World
Engineering, Science & technology Congress (ESTCON2014).
This conference is organized by the Department of Computer and Information Sciences,
Universiti Teknologi PETRONAS (UTP) and is technically co-sponsored by the Institute of the
Electronic Electrical Engineers (IEEE). The aim of this conference is to provide an excellent
platform for professionals, engineers, academicians and practitioners worldwide to share
and exchange research knowledge and ideas in technologies and applications in the field
that relates to information and communication technology and information systems. With
the theme “Innovative Humans and Technology for a Sustainable Environment”, more than
150 papers will be presented at ICCOINS2014. This conference promises a wide variety of
topics that emphasize on the development of latest technology and innovation towards
a sustainable environment that support the values of life and activities in the global and
social perspectives.
I would like to take this opportunity to thank the plenary speakers, presenters and all
participants who take part in this event. It is our hope that this conference can help to
shape a research community that could lead and address the challenges in the area of
computing, information and communication technology, and information systems.
For all the hard work and dedication, I would like to once again thank each and every one
of you for your valuable contribution towards the success of this conference, and wish you
a professionally rewarding and socially enjoyable stay in Kuala Lumpur.
2 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Conference Organising Committee
Chairperson
Jafreezal Jaafar
Co-Chairperson
Abas Md Said
Abdul Rahim Ahmad
Secretary
Norshuhani Zamin
Yong Suet Peng
Treasurer
Leader: Mazlina Mehat
Member: Dayang Rohaya Awang Rambli
Publicity & Protocol
Leader: Nazleeni Samiha Haron/
Foong Ooi Mean
Members: Wan Fatimah Wan Ahmad
Shuib Basri
Publication
Leader: Noreen Izza Arshad
Members: Aliza Sarlan
Emy Elyanee Mustapha
Lukman Abd Rahim
Ainol Rahmah Shazi Shaarani
IT & Media
Leader: Faizal Ahmad Fadzil
Member: Izzatdin Abdul Aziz
Logistics
Leader: Low Tan Jung
Member: Saipunidzam Mahamad
Sponsorship
Leader: Khairul Shafee Kalid
Members: Ahmad Izuddin Zainal Abidin
Ahmad Kamil Mahmood
F&B
Leader: Nurulhuda M Hashim /
Muhaiyuddeen Shaik Allauddin /
Safinaz Hamzah
Event Management
Leader: Helmi Rais
Member: Suziah Sulaiman
Technical
Leader: Dhanapal Durai Dominic
Members: Halabi Hasbullah
Alan Oxley
Nordin Zakaria
Rohiza Ahmad
Baharum Baharudin
IEEE Computer Society, Malaysia Chapter
Zainab Abu Bakar
Fakhrul Hazman Yusoff
Ali Selamat
Hamzah Asyrani Sulaiman
Mohd Naim Mohd Ibrahim
Mohd Zaliman Mohd Yusoff
Nor Azura Md Ghani
Nursuriati Jamil
Suhaimi Ibrahim
Mohamed Rawidean Mohd Kassim
Christopher Chew
page
|3
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
GUEST EDITORS
Journal of Information and Communication Technology (JICT)
Guest Editors:
Jafreezal Jaafar
Lukman Abd Rahim
Emy Elyanee Mustapha
International Journal of Information Systems and Supply Chain Management (IJISSCM)
Special issue on: Information Sciences and Supply Chain Management
Guest Editors:
Dhanapal Durai Dominic
Emy Elyanee Mustapha
Mazlina Mehat
International Journal of Business Information Systems (IJBIS)
Special issue on: Information Sciences and Green Supply Chain Management
Guest Editors:
Dhanapal Durai Dominic
Noreen Izza Arshad
Aliza Sarlan
International Journal of Green Computing (IJGC) – IGI
Special issue on: Green Computing
Guest Editors:
Dhanapal Durai Dominic
Jafreezal Jaafar
Alan Oxley
Izzatdin Abdul Aziz
∗ Oustanding papers will be invited to submit an extended version of the paper to be
considered for publication in special issues in either of the following journals :
• International Journal of Information Systems and Supply Chain
Management (SCOPUS-indexed)
• International Journal of Business Information Systems (SCOPUS-indexed)
• Journal of Information and Communication Technology (SCOPUS-indexed)
• International Journal of Green Computing (SCOPUS-indexed)
4 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
REVIEWERS
Abas Md Said
Abdul Samad Shibghatullah
Abdullah Gani
Abu Bakar Md Sultan
Abubakr Khamis
Aggarwal Amit
Ahmad Fadzil Faizal
Ahmad Rafi
Ahmad Suhaimi Baharudin
Aida Mustapha
Alan Oxley
Alfian Abdul Halin
Aliza Sarlan
Anton Satria Prabuwono
Ashok Kumar
Ashok Sivaji
Asmidar Abu Bakar
Atif Manzoor
Atiq Rahman
Azidah Abu Ziden Abu Ziden
Azniah Ismail
Baharum Baharudin
Bahbibi Rahmatullah
Bilal Mughal
Chan Lee Kwun Chan
Chessda Uttraphan
Chiew Thiam Kian Chiew
Chiung Ching Ho
Dhanapal Durai Dominic
Dhanesh Ramachandram
Edwin Mit
Fadzilah Siraj
Fazal e Amin
Ghazali Sulong
Halabi Hasbullah
Hamada Al-Absi
Hamid Jalab
Hanum Md. Nasaruddin Fariza
Helmi Md Rais
Hitham Alhussian
Hui Hwang Goh
HuiKeng Lau
Ibrahim Alhaji Lawal
Iftikhar Ahmad
Irshad Sumra
Izzatdin A Aziz
Jacey Lynn Minoi
Jafreezal Jaafar
Jamal Dargham
Jane Labadin
Jawad Haider Kazmi
K. Y. Sim
Kashif Nisar
Khairul Shafee Kalid
Kamaludden Usman Danyaro
Kim Nee Goh
Lee Lay Wah Lee
Lukman Ab. Rahim
M. L. Dennis Wong
Maaz Rehan
Manoranjitham Muniandy
Mar Yah Said
Marlia Morsin
Mas Rina Mustaffa
Maziani Sabudin
Mazlina Mamat
Mazlina Mehat
Mazliza Othman
page
|5
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Md Jan Nordin
Mei Choo Ang
Miss Laiha Mat Kiah
Mohamed Nordin Zakaria
Mohamed Rawidean Mohd Kassim
Mohd Faizal Abdollah
Mohd Hanafi Ahmad Hijazi
Mohd Hazli Mohamed Zabil
Mohd Helmy Abd Wahab
Mohd Hilmi Hasan
Mohd Murtadha Mohamad
Mohd. Marzuki Mustafa
Muhammad Azeem Abbas
Muhammad Imran
Muhammad Mohd Arshad
Muhammad Qaiser Saleem
Munwar Ali
Mustapha Abubakar
Muzafar Khan
Nasharuddin Zainal
Nasrullah Pirzada
Nasuha Lee Abdullah
Nazleeni Haron
Nazrita Ibrahim
Nor Aniza Abdullah
Noraziah Ahmad
Norazlina Khamis
Noreen Arshad
Norhisham Mohamad Nordin
Norisma Idris
Norshuhani Zamin
Norwati Mustapha
Nurul Zawiyah Mohamad
Oi Mean Foong
Othman Ibrahim
Peer Azmat Shah
Pei Hwa Siew
6 | page
Phan Koo Yuen
Puteri Suhaiza Sulaiman
Qasim Ali
Rafidah Md Noor
Rahmat Sanudin
Rahmita Wirza O.K. Rahmat
Rajan Thangaveloo
Ramlah Mailok
Razali Yaakob
Rohiza Ahmad
Rosalina Abd. Salam
Rosnah Idrus
Rozana Kasbon
Rozlina Mohamed
Rusli Abdullah
Saipunidzam Mahamad
Sajjad Haider
Salman Yussof
Samsul Ariffin Abdul Karim
Shahida Sulaiman
Shereena Mohd Arif
Shuib Basri
Shyamala Doraisamy
Siti Amely Jumaat
Siti Salwa Salim
Su-Cheng Haw
Suet Peng Yong
Syahrul Nizam Junaini
Syariffanor Hisham
Syed Nasir Mehmood Shah
Tang Low
Tariq Ali
Tat-Chee Wan
Teck Chaw Ling
Teh Aris
Vasaki Ponnusamy
Wahidah Husain
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Wai Khuen Cheng
Wan Fatimah Wan Ahmad
Wan Mohd Nazmee Wan Zainon
Yulita Hanum P Iskandar
Yu-N Cheah
Yusmadi Yah Jusoh
Zarina Tukiran
Zulfiqar Ali
Zulfiqar Arain
Zurina Muda
Zurinahni Zainol
page
|7
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
PLENARY SPEAKER 1
PROFESSOR DR VISWANATH VENKATESH
Distinguished Professor and George and Boyce Billingsley
Chair in Information Systems,
Walton College of Business,
University of Arkansas, USA
Digital Divide In India
BIOGRAPHY
Viswanath Venkatesh is a Distinguished Professor and the first holder of the George and
Boyce Billingsley Chair in Information Systems at the Walton College of Business, University
of Arkansas. Prior to joining Arkansas, he was on the faculty at the University of Maryland.
He received his Ph.D. from the University of Minnesota.
His research focuses on understanding diffusion of technology in organizations and society.
His current favorite project is on the digital divide in India. His research has been published
in leading information systems, organizational behavior and psychology journals, and has
been cited about 30,000 times and about 10,000 times per Google Scholar and Web of
Science respectively. MIS Quarterly named him “Reviewer of the Year” in 1999. He has
served or is currently serving on the editorial boards of MIS Quarterly, Information Systems
Research, Management Science, Production and Operations Management, Journal of the
AIS, and Decision Sciences, and began his role as a Senior Editor at ISR in 2008. Some of
his papers are among the most cited papers published in the respective journals: his ISR
(2000) is the 2nd most cited paper, his DSJ (1996) is the most cited paper, his MISQ (2003)
is the 2nd most cited paper, and his Management Science (2000) is the 5th most cited
paper. In 2008, his MISQ (2003) paper was identified as a current classic by Science Watch
(a Thompson Reuters’ service) and since 2009, it has been rated as the most influential
article in one of only four Research Front Maps identified in business and economics.
In 2009,he launched an IS research rankings web site (http://www.vvenkatesh.com/
ISRanking) that has received many accolades from the academic community and is now
affiliated with the Association for Information Systems (AIS).Recently, he completed a book
titled: “Road to Success: A Guide for Doctoral Students and Junior Faculty Members in the
Behavioral and Social Sciences.”
8 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
ABSTRACT
URL for book, Road to Success: A Guide for Doctoral Students and Junior Faculty Members
in the Behavioral and Social Sciences: http://vvenkatesh.com/book
The digital divide is an economic and social issue that has seen great interest in recent
years. Digital divide refers to the gulf between information and communication technology
(ICT) haves and have-nots, and exists across a variety of demographic, ethnic, and
geographic dimensions. Overcoming the digital divide by successfully deploying ICTs in
developing countries can have major socioeconomic implications for those countries.
In fact, it is hoped and expected that ICTs will be a cornerstone for the development of
these countries by providing better quality of life through greater access to education,
health care, and government. ICT Success, typically defined in terms of adoption and use,
is rare, with up to 85% failing to some degree in developing countries. Success of digital
divide interventions is of great interest to organizations, government and private. Likewise,
corporate social responsibility has been a topic of recent interest to organizations. In
order to be more socially responsible, organizations spend billions of dollars each year
on ICT implementations to bridge the digital divide in developing countries, such as China
and India. For instance, Project Shiksha is a Microsoft-led effort in collaboration with the
government of India to address the digital divide in villages across the country through
increased access and education. Organizations, such as the United Nations, also invest a
great deal in efforts to address the digital divide in developing countries. The goal of this
presentation is to present an overview of a large-scale research project being conducted in
India among over 3,000 farming families across 10 villages in India that are being studied
over 5+ years.
Venkatesh, V., Sykes, T.A., and Zhang, X. “Bridging the Digital Divide in India: A Longitudinal
Study of Women’s Health Outcomes in Rural India,” MIS Quarterly. (invited to be revised
and resubmitted)
Venkatesh, V., and Sykes, T. A. “Digital Divide Initiative Success in Developing Countries: A
Longitudinal Field Study in a Village in India,” Information Systems Research (24:2), 2013,
239-260.
page
|9
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
PLENARY SPEAKER 2
NORIHIRO SUZUKI, DR. ENG.
Senior Vice President & Chief Technical Officer,
Hitachi America Limited, R&D Division
California, USA
BIOGRAPHY
Dr. Suzuki joined Central Research Laboratory, Hitachi, Ltd. in 1986, after graduated from
Tokyo University Graduate School with the degree of Master of Engineering. In 1995, he
received a Doctor Engineering degree from Tokyo University.
After he joined Hitachi, he was assigned as a researcher of telecommunication. He was
in charge of R&D on Extended definition TV, compatible with analog color TV. He was the
manager of Multimedia System Research Department in 2001, andthe research director
of Embedded Systems Platform Laboratory, in 2005, where he led the embedded software
research for TV, mobile phone and car navigation. Then, he was assigned as general
manager of Information Systems Research Center, Central Research Laboratory, in 2008,
and general manager of Information & Control Systems Research Center, Hitachi Research
Laboratory, in 2009. From 2012, he has been a Senior Vice President and Chief Technology
Officer of Hitachi America, Ltd.
Dr. Suzuki is a member of IEEE, and IEICE of Japan. From 1995 to 1996, he was a visiting
scholar of Columbia University, USA
ABSTRACT
Through the proliferation of sensors, smart machines, and instrumentation, industrial
operations are generating ever increasing volumes of data of many different types. At the
same time, advances in computing, storage, communications, and big data technologies
are making it possible to store, process, and analyze enormous volumes of data at scale
and at speed. The convergence of OT and IT, powered by innovative analytics, holds the
promise of creating new social innovation businesses. Hitachi’s R&D Group has established
the Global Big Data Innovation Lab (GBDIL) to coordinate world-wide analytics research
activities in support of the global expansion of the social innovation solution businesses by
providing innovative analytics to the recently launched Hitachi Global Center for Innovative
Analytics (HGC-IA). My talk introduces GBDIL and HGC-IA, and describes a common
10 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
reference architecture for developing, deploying, and operating big data solutions that
leverage Hitachi’s innovative analytics technologies. Through the use of example use cases,
my talk explains the strategy to expand the global big data solution business.
page
| 11
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
NOTES TO DELEGATES
REGISTRATION AND
GENERAL INFORMATION
The conference registration and information
desk is located near the conference main
room. The desk will operate according to
the following schedule:
Tuesday (3rd June 2014):
9.00 am - 6.30 pm
Wednesday (4th June 2014):
8.30 am - 6.30 pm
Thursday (5th June 2014):
8.30 am - 4.05 pm
There will be committee members assisting
delegates with general information. They
will be wearing ICCOINS2014 identification
tags.
CONFERENCE COSTS
Your ICCOINS2014 registration includes
the cost of:
• Lunches
• Morning and afternoon teas
• ICCOINS2014 Programme Book &
Abstracts
• For presenters: full conference
proceedings in CD-ROM
• Optional hardcopy: RM250 + postage
& handling charges per volume.
INSTRUCTIONS FOR PRESENTERS
ORAL PRESENTERS
• Time allocated for each presenter is 20
minutes including Q&A. 15 minutes for
presentation and 5 min Q&A.
12 | page
• Each presenter is required to prepare
and submit Microsoft PowerPoint
Presentation to the Secretariat latest
on the conference registration day.
• Save the PowerPoint presentation
using the given paper ID as the file
name, e.g. if your conference paper ID
is T1_IS1_1_1569591167 the file name
should be T1_IS1_1_1569591167.ppt.
• Maximum number of slides is 15.
• The presenter should be at the
assigned room 15 minutes before the
session starts.
• Note Book/PC will be provided during
the presentation sessions.
POSTER EXHIBITORS
• All exhibitors are responsible to print
their own posters (materials) at their
own costs.
• Poster materials must be printed on a
single A1 sized paper.
• Poster exhibitors are responsible for
setting up and dismantling their poster
material on Day 2, Wednesday, 4th
June 2014 from 3.30 pm till 4.30 pm.
• The venue for poster exhibition is at the
foyer of Level 4.
• Poster exhibitors are requested to
be on the standby at their respective
poster sites during Poster Q&A session.
PUNCTUALITY
To ensure that the conference proceeds
smoothly, the Organizing Committee
specially requests your cooperation to be
punctual. Announcements of any changes
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
to the Program will be announced in the
main conference room before or after
plenary sessions.
LANGUAGE
The official language of ICCOINS2014 is
English. No simultaneous interpretation
services will be provided.
LUNCH/COFFEE/TEA REFRESHMENT
• Coffee/tea and lunch will be served at
the times indicated in the programme
book.
• Participants are required to present
lunch and dinner coupons at the dining
hall. [goody bag]
CONFERENCE IDENTIFICATION TAG
The Organising Committee requests
that you wear your identification tag at
all times during the conference. Your
conference identification tag will serve as
your admission to all conference paper
presentation sessions.
responsibility for any loss or damage of
your personal property.
SMOKING POLICY
The Kuala Lumpur Convention Centre is
deemed as a Non-Smoking venue.
LOCAL TIME
The local Kuala Lumpur time is +8 GMT.
INTERNATIONAL PHONE CALLS
The country code for Malaysia is +60.
To make a call within Kuala Lumpur or
Selangor, a code ‘3’ must be pressed after
the country code followed by the local
telephone number. To make a call to other
states/cities outside of Kuala Lumpur and
Selangor, the correct Malaysian State code
must be entered in place of the ‘3’.
ELECTRICITY
Malaysian electrical power is 240 volts, 50
Hz. The connection for appliances is a 3-pin
plug.
CONFERENCE DRESS CODE
Smart casual is recommended throughout
the conference.
MESSAGE BOARD
A conference message board will be located
near the main conference room .
INSURANCE AND LIABILITY
The Organizing Committee suggests that
you take usual precautions with your
personal belongings. Do not leave them
unattended. The Organizers and the
venue’s staff will not take any
page
| 13
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Conference Programme
Day 1 • Tuesday (3rd June 2014)
Time
Event
09001030
Opening and Keynote : Plenary Hall
MORNING BREAK - Level 1 Foyer, Level 1 Centre Core and Level 3 Foyer
11001145
Keynote II : Plenary Hall
LUNCH BREAK - Grand Ballroom 1&2
13551605
ICCOINS Plenary 1 : Conference Hall 2
EVENING BREAK - Level 3 Foyer and Level 4 Centre Core
ICCOINS Parallel Sessions
16201830
Track 1 - Informations Systems 1
Level 4, Room 404
Track 2 - Data Communication & Networking 1
Level 4, Room 405
Track 3 - Computational Intelligence 1
Level 4, Room 406
Track 4 - Software Engineering 1
Level 4, Room 407
Track 5 - Green Computing 1
Level 4, Room 408
End of Day 1
Day 2 • Wednesday (4th June 2014)
Time
Event
08301030
ICCOINS Plenary 2 - Conference Hall 3, Level 2
MORNING BREAK - Level 3 Foyer and Level 4 Centre Core
14 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Conference Programme
ICCOINS Parallel Sessions
10551305
Track 1 – Information Systems 2
Level 4, Room 401
Track 2 – Data Communication & Networking 2
Level 4, Room 402
Track 3 – Computational Intelligence 2
Level 4, Room 403
Track 4 - Bio Inspired Computing & Computational
Intelligence
Level 4, Room 404
Track 5- Software Engineering 2
Level 4, Room 405
LUNCH BREAK - Grand Ballroom 1 & 2
ICCOINS Parallel Sessions
13551605
1530
Track 1 – Information Systems 3
Level 4, Room 406
Track 2 - Data Communication & Networking 3
Level 4, Room 407
Track 3 – Computational Intelligence 3
Level 4, Room 408
Track 4 - Software Engineering 3
Level 4, Room 409
Track 5 – Human Computer Interaction 1
Level 4, Room 410
ICCOINS Poster Presentations
Level 4, Foyer
EVENING BREAK - Level 3 Foyer and Level 4 Centre Core
16201830
ICCOINS Parallel Sessions
Track 1 – Information Systems 4
Level 4, Room 401
Track 2 – Data Communication & Networking 4
Level 4, Room 402
END OF DAY 2
page
| 15
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Conference Programme
Day 3 • Thursday (5th June 2014)
Time
Event
ICCOINS Parallel Sessions
08301030
Track 1 – Information Systems 5
Level 4, Room 401
Track 2 – Computational Intelligence 4
Level 4, Room 402
MORNING BREAK - Level 3 Foyer and Level 4 Centre Core
ICCOINS Parallel Sessions
10551305
Track 1 – Information Systems 6
Level 4, Room 401
Track 2 – Software Engineering 4
Level 4, Room 402
Special Seminar: How to extend a conference
paper to journals
Level 4, Room 403
LUNCH BREAK - Grand Ballroom 1&2
13551605
Pre-Closing - Conference Hall 2
END OF CONGRESS
16 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Technical Sessions
Day 1 • Tuesday (3rd June 2014)
Venue : 404
Track 1 : INFORMATION SYSTEMS 1
Time : 16:20 - 18:30
Chair : Dhanapal Durai Dominic
Co-Chair : Abid Sohail
Session Code
Paper ID
Paper Title
Authors
T1_IS1_1_
1569866849
Evaluation of Online System Acceptance Through Airlines
Websites in Malaysia
Dhanapal Durai Dominic; Humaira Khan
T1_IS1_2_
1569852645
A Process Warehouse Based Resources Performance Evaluation
Method for Business Processes Improvement
Abid Sohail; Dhanapal Dominic
T1_IS1_3_
1569867087
Dynamics of the Entanglement Over Noisy Quantum Networks
Abdel-Haleem Abdel-Aty; Nordin Zakaria
T1_IS1_4_
1569867131
Mutual Entropy of a Single Cooper Pair-Box Interacting with MultiPhoton Field
Heba Kadry; Nordin Zakaria
T1_IS1_5_
1569867317
A Comparative Study of Different Image Completion Techniques
Sameh Zarif; Ibrahima Faye; Dayang Rohaya Awang Rambli
T1_IS1_6_
1569867333
Document Image Skew Detection and Correction Method Based on
Extreme Points
Marian Wagdy; Ibrahima Faye; Dayang Rohaya Awang Rambli
page
| 17
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Venue : 405
Track 2 : DATA COMMUNICATION & NETWORKING 1
Time : 16:20 - 18:30
Chair : Alan Oxley
Co-Chair : Irshad Sumra
Session Code
Paper ID
Paper Title
Authors
T2_DCN1_1_
1569867781
Issues Affecting the Adoption of IPv6
Alan Oxley
T2_DCN1_2_
1569870581
Effects of Attackers and Attacks on Availability Requirement in
Vehicular Network: A Survey
Irshad Sumra
T2_DCN1_3_
1569866847
IP-CHOCK (filter)-Based Detection Scheme for Denial of Service (DoS)
Attacks in VANET
Karan Verma; Halabi Hasbullah
T2_DCN1_4_
1569866111
Three Hops Reliability Model for Underwater Wireless Sensor
Network
Tariq Ali
T2_DCN1_5_
1569870527
Data Fusion for Reducing Power Consumption in Arduino-Xbee
Wireless Sensor Network Platform
Solahuddin Yusuf Fadhlullah; Widad Ismail
T2_DCN1_6_
1569866559
A Multibit Burst Error Detection and Correction Mechanism for
Application Layer
Shiladitya Bhattacharjee; Lukman Ab. Rahim; Izzatdin A Aziz
Venue : 406
Track 3 : COMPUTATIONAL INTELLIGENCE 1
Time : 16:20 - 18:30
Chair : Yong Suet Peng
Co-Chair : Muhammad Javed Iqbal
Session Code
Paper ID
T3_CI1_1_
1569867035
18 | page
Paper Title
Authors
An Efficient Computational Intelligence Technique for Classification of
Protein Sequences
Muhammad Javed Iqbal; Ibrahima Faye; Abas Md Said;
Brahim Belhaouri Samir
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
T3_CI1_2_
1569866451
Multicolor Recognition Based on Mini-Max Color Threshold
Zacharie MBaitiga
T3_CI1_3_
1569866697
Empirical Analysis of Parallel-NARX Recurrent Network for Long-Term
Chaotic Financial Forecasting
Jadid Abdulkadir Said; Suet Peng Yong
T3_CI1_4_
1569866843
A Computer Aided System for Breast Cancer Detection and Diagnosis
Hamada Al-Absi; Brahim Belhaouri Samir; Suziah Sulaiman
T3_CI1_5_
1569851419
Infomax and FASTICA Using Principle Component Analysis as
Preprocessor for Airwave Removal in Seabed Logging
Adeel Ansari; Afza Shafie; Abas Md Said; Seema Ansari; Elisha Tadiwa
Nyamasvisva; Muhammad Abdulkarim; Muhammad Rauf
T3_CI1_6_
1569867133
Image Processing Based Vehicle Detection and Tracking Method
Prem Kumar Bhaskar; Suet Peng Yong
Venue : 407
Track 4 : SOFTWARE ENGINEERING 1
Time : 16:20 - 18:30
Chair : Lukman Ab. Rahim
Co-Chair : Amos Bajeh
Session Code
Paper ID
Paper Title
Authors
T4_SE1_1_
1569881475
Analysis of Design Patterns in OpenNebula
Dr. Lukman Ab. Rahim
T4_SE1_2_
1569869721
Common Trust Criteria for IaaS Cloud Evaluation and Selection
Hamzeh Alabool
T4_SE1_3_
1569866835
A Theoretical Validation of the Number of Polymorphic Methods as a
Complexity Metric
Amos Bajeh; Shuib Basri; Tang Jung Low
T4_SE1_4_
1569882139
Assessment and Evaluation of Requirements Elicitation Techniques
using Analysis Determination RequirementsFramework
Souhaib Besrour; Lukman Ab. Rahim; Dhanapal Durai Dominic
T4_SE1_5_
1569901895
Work Design Characteristics and Knowledge Sharing Behavior Among
Software Engineers
Mobashar Rehman; Ahmad Mahmood; Rohani Salleh; Aamir Amin
page
| 19
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Venue : 408
Track 5 : GREEN COMPUTING 1
Time : 16:20 - 18:30
Chair : Savita K Sugathan
Co-Chair : Yahia Baashar
Session Code
Paper ID
Paper Title
Authors
T5_GC1_1_
1569872019
The Adoption of Green Information Technologies and Systems as a
Driver Within Green SCM
Savita K Sugathan; Dhanapal Durai Dominic
T5_GC1_2_
1569910713
A Semi-Greedy Soft Real-Time Multiprocessor Scheduling Algorithm
Hitham Alhussian
T5_GC1_3_
1569901913
ZigBee Wireless Communication for Monitoring Renewable Street
Light System
Thinaharan Ramachandran; Vasaki Ponnusamy; Tang Jung Low; Anang
Hudaya Muhamad Amin
T5_GC1_4_
1569890001
An Integrative Perspective for CRMS Implementation in Healthcare in
Malaysia
Yahia Baashar
T5_GC1_5_
1569916897
Root Cause Analysis on Changes in Chiller Performance Using Linear
Regression
Jun Okitsu; Ken Naono; Mohd Fatimie Irzaq Khamis; Shaharin Anwar
Sulaiman; Mohd Amin Abd Majid
20 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Day 2 • Wednesday (4th June 2012)
Venue : 401
Track 1 : INFORMATION SYSTEMS 2
Time : 10:55 - 13:05
Chair : Kalai Anand Ratnam
Co-Chair : Gunasekar Thangarasu
Session Code
Paper ID
Paper Title
Authors
T1_IS2_1_
1569868777
Adoption of Cloud Computing to Enhance the Healthcare Services in
Malaysia
Kalai Anand Ratnam; Dhanapal Durai Dominic
T1_IS2_2_
1569867371
Prediction of Hidden Knowledge From Clinical Database Using Data
Mining Techniques
Gunasekar Thangarasu; Dhanapal Durai Dominic
T1_IS2_3_
1569868213
Conceptual Framework for Effective E-collaboration and Didactic
Enhancement
Alimatu-Saadia Yussiff; Wan Fatimah Wan Ahmad; Alan Oxley
T1_IS2_4_
1569902915
Assessing the Quality of Rail Ticket Reservation Systems: Cases From
Indonesia
Nur Wijayaning Rahayu; Dherry Andika
T1_IS2_5_
1569870935
Role of Information Communication Technology for Evidence Based
Medicine Among Physicians
Fozia Anwar; Suziah Sulaiman; Dhanapal Durai Dominic
T1_IS2_6_
1569891073
Mobile Game Approach to Prevent Childhood Obesity Using
Persuasive Technology
Wahidah Husain; Ammar Almomani; Ying San Oh
page
| 21
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Venue : 402
Track 2 : DATA COMMUNICATION & NETWORKING 2
Time : 10:55 - 13:05
Chair : Low Tan Jung
Co-Chair : Ibrahim A. Lawal
Session Code
Paper ID
Paper Title
Authors
T2_DCN2_1_
1569871723
Fuzzy Logic Based Link Status Classification for Efficient Multipath
Routing in Multi-hop Wireless Mesh Networks
Peer Azmat Shah; Halabi Hasbullah; Shahzad Rafiq; Sadiq ur Rehman;
Tang Jung Low
T2_DCN2_2_
1569872437
Throughput Enhancement for Fixed WiMAX Network Using
Distributed Model
Ibrahim A. Lawal; Abas Md Said; Kashif Nisar; Abubakar Aminu Mu’azu;
Peer Azmat Shah
T2_DCN2_3_
1569871473
Choices Available for Implementing Smart Grid Communication
Network
Hasan Farooq; Tang Jung Low
T2_DCN2_4_
1569872009
Proposed Method for Enhancing Quantum Bit Error Rate Using
Quantum Key Distribution Technique
Mustapha Yusuf Abubakar; Tang Jung Low; Nordin Zakaria; Oi Mean
Foong
T2_DCN2_5_
1569871303
Workability Review of Genetic Algorithm Approach in Networks
Okta Nurika; Mohamed Nordin Zakaria; Mohd Fadzil Hassan; Tang Jung
Low
T2_DCN2_6_
1569903253
Filters for Device-free Indoor Localization System Based on RSSI
Measurement
Nasrullah Pirzada
22 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Venue : 403
Track 3 : COMPUTATIONAL INTELLIGENCE 2
Time : 10:55 - 13:05
Chair : Dayang Rohaya Bt Awang Rambli
Co-Chair : Abdul-Lateef Yussiff
Session Code
Paper ID
Paper Title
Authors
T3_CI2_1_
1569867215
A Semi-Apriori Algorithm for Discovering the Frequent Itemsets
Sallam Osman Fageeri; Rohiza Ahmad; Baharum Baharudin
T3_CI2_2_
1569882187
A Cost-Sensitive Approach to Named Entity Recognition with
Category Hierarchy
Shohei Higashiyama; Mathieu Blondel; Kazuhiro Seki; Kuniaki Uehara
T3_CI2_3_
1569871179
Parallel Kalman Filter-Based Multi-Human Tracking in Surveillance
Video
Abdul-Lateef Yussiff; Suet Peng Yong; Baharum Baharudin
T3_CI2_4_
1569871921
A Framework for the Automatic Identification of Algae (Neomeris
Vanbosseae M.A.Howe):U3S
Ching Soon Tan; Phooi Yee Lau; Siew Moi Phang; Tang Jung Low
T3_CI2_5_
1569878369
Gender Recognition on Real World Faces Based on Shape
Representation and Neural Network
Olasimbo A. Arigbabu; Sharifah Mumtazah Syed Ahmad; Wan Azizun
Wan Adnan; Salman Yussof; Vahab Iranmanesh; Fahad Layth Malallah
T3_CI2_6_
1569898769
Color Space Selection for Human Skin Detection Using Color-Texture
Features and Neural Networks
Hani K. Al-Mohair; Junita Mohamad-Saleh; Shahrel Azmin Suandi
Venue : 404
Track 4 : BIO INSPIRED COMPUTING & COMPUTATIONAL INTELLIGENCE
Time : 10:55 - 13:05
Chair : Evgeny Osipov
Co-Chair : Nur Syafiqah Mohamad Sani
Session Code
Paper ID
T4_BIC1_1_
1569902039
Paper Title
Authors
A Distributed Framework for Supporting 3D Swarming Applications
Ghazaleh Pour Sadrollah; Jan Carlo Barca; Asad Khan; Jens Eliasson;
Ilankaikone Senthooran
page
| 23
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
T4_BIC1_2_
1569902663
A Polymorphic Recogniser for Distributed Intelligence in Wireless
Sensor Networks
Alexander Senior; Ahmet Sekercioglu; Asad Khan
T4_BIC1_3_
1569902897
Brain-like Classifier of Temporal Patterns
Denis Kleyko; Evgeny Osipov
T4_BIC1_4_
1569903203
Holographic Graph Neuron
Evgeny Osipov; Asad Khan; Anang Hudaya Muhamad Amin
T4_BIC1_5_
1569889229
Real-Time Video Enhancement for Various Weather Conditions Using
Dark Channel and Fuzzy Logic
Ahmad Alajarmeh
Venue : 405
Track 5 : SOFTWARE ENGINEERING 2
Time : 10:55 - 13:05
Chair : Shuib Basri
Co-Chair : Ziyaulhaq Aliyu
Session Code
Paper ID
Paper Title
Authors
T5_SE2_1_
1569884603
Communication Risks in GSD During RCM:Results From SLR
Arif Ali Khan
T5_SE2_2_
1569882401
A Combine Usability Framework for IMCAT Evaluation
Ziyaulhaq Aliyu; Lukman Ab. Rahim; Emy Mustapha
T5_SE2_3_
1569883009
Handling Tradeoffs Between Agile and Usability Methods
Saad Masood Butt; Wan Fatimah Wan Ahmad; Lukman Ab. Rahim
T5_SE2_4_
1569883597
Improving Effectiveness of Testing Using Reusability Factor
Maryam Ahmed; Rosziati Ibrahim
T5_SE2_5_
1569883695
A Review of Educational Games Design Frameworks: An Analysis
From Software Engineering Perspective
Mifrah Ahmad; Lukman Ab. Rahim; Noreen Arshad
24 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Venue : 406
Track 1 : INFORMATION SYSTEMS 3
Time : 13:55 - 16:05
Chair : G. Kannabiran
Co-Chair : Okta Norika
Session Code
Paper ID
Paper Title
Authors
T1_IS3_1_
1569917811
Career Anchors and Employee Retention - An Empirical Study of
Indian IT Industry
Kannabiran G; Dhanapal Durai Dominic; A. V. Sarata Vai
T1_IS3_2_
1569871529
A Preliminary Study on Local Folktales Exposures to Support the
Development of Animated Courseware
Norshahila Ibrahim; Wan Fatimah Wan Ahmad; Afza Shafie
T1_IS3_3_
1569871581
Information Audit in Electricity Utilities: Roles, Methodologies, Issues
and Challenges
Izyana Ariffin; Aliza Abdul Latif; Masyura Ahmad Faudzi; Siti Salbiah
Mohamed Shariff; Mawaddah Mohamad Nadzir
T1_IS3_4_
1569871601
Maternity Data Management Utilizing Cloud Computing
Ying San Oh; Wahidah Husain
T1_IS3_5_
1569871649
Maximum-Shift String Matching Algorithms
Nur’Aini Abdul Rashid; Hakim Adil Kadhim
T1_IS3_6_
1569897241
Automatic Method for Bone Age Assessment Based on Combined
Method
Marjan Mansourvar; Maizatul Akmar Ismail; Sameem Abdul Kareem;
Hanum Md. Nasaruddin Fariza
Venue : 407
Track 2 : DATA COMMUNICATIONS & NETWORKING SYSTEM 3
Time : 13:55 - 16:05
Chair : Nazleeni Samiha Haron
Co-Chair : Peer Azmat Shah
Session Code
Paper ID
Paper Title
Authors
T2_DCN3_1_
1569872655
Real-Time Massage Differentiation with Priority Data Service Flows in
VANETs
Abubakar Aminu Mu’azu; Tang Jung Low; Halabi Hasbullah; Ibrahim A.
Lawal; Peer Azmat Shah
page
| 25
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
T2_DCN3_2_
1569874255
Path Loss Simulation in Different Radio Propagation Models with
1.8GHz and 2.6GHz Bands
Ahmed Chariyev
T2_DCN3_3_
1569882325
Access Control and Privacy in MANET Emergency Environment
Asmidar Abu Bakar; Azimah Abdul Ghapar; Roslan Ismail
T2_DCN3_4_
1569901689
Associative Data Models for Voluminous Data Representation and
Processing
Amir Hossein Basirat; Asad Khan; Heinz Schmidt
T2_DCN3_5_
1569916921
Performance Evaluation of Distributed Video Coding with Different
Channel Encoding Techniques
Kin Honn Chiam; Mohd Fadzli Mohd Salleh
T2_DCN3_6_
1569903219
Classifying Peer-to-peer Traffic Using Protocol Hierarchy
Somnuk Puangpronpitag; Thongchai Chuachan
Venue : 408
Track 3 : COMPUTATIONAL INTELLIGENCE 3
Time : 13:55 - 16:05
Chair : Emy Elyanee Mustapha
Co-Chair : Muhammad Abdulkarim
Session Code
Paper ID
Paper Title
Authors
T3_CI3_1_
1569883733
MetOcean Data to Linked Data
Kamaluddeen Usman Danyaro; Jafreezal Jaafar; Mohd Shahir Liew
T3_CI3_2_
1569883761
Hybrid NSGA-II of Three-Term Backpropagation Network for
Multiclass Classification Problems
Ashraf Osman Ibrahim; Siti Mariyam Shamsuddin; Nor Bahiah Ahmad;
Mohd Najib Mohd Salleh
T3_CI3_3_
1569888209
Options Strategy for Technology Companies
Teik Kheong Tan; Benny Bing
T3_CI3_4_
1569888257
Discriminative Discriminant Common Vector in Face Verification
Ying Han Pang; Andrew Teoh Beng Jin; Yee Ping Liew; Fan Ling Goh;
Chu Kiong Loo
26 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
T3_CI3_5_
1569888843
Airwaves Estimation in Shallow Water CSEM Data: Multi-Layer
Perceptron Versus Multiple Regression
Muhammad Abdulkarim; Afza Shafie; Wan Fatimah Wan Ahmad; Adeel
Ansari; Elisha Tadiwa Nyamasvisva
T3_CI3_6_
1569907891
Performance Comparison of Canny and Sobel Edge Detectors on
Balloon Snake in Segmenting Masses
Abdul Kadir Jumaat
Venue : 409
Track 4 : SOFTWARE ENGINEERING 3
Time : 13:55 - 16:05
Chair : Rehan Akbar
Co-Chair : Nasrullah Pirzada
Session Code
Paper ID
Paper Title
Authors
T4_SE3_1_
1569902539
Software Development Process Tailoring for Small and Medium Sized
Companies
Rehan Akbar
T4_SE3_2_
1569888245
Pluggable Scheduling on an Open-Source Based Volunteer Computing
Infrastructure
Nordin Zakaria; Guilherme Dinis Junior; Ken Naono
T4_SE3_3_
1569888767
jFakih: Modelling Mobile Learning Game
Azham Hussain; Norasyikin Abdul Mutalib; Azman Bin Yasin
T4_SE3_4_
1569890959
Assessing Quality Attributes of Object-Oriented Software Design: A
Case Study
Shuib Basri; Zhamri Che Ani; Aliza Sarlan
T4_SE3_5_
1569896429
Ontology Based Development of Domain Specific Languages for
Systems Engineering
Vitaliy Mezhuyev
T4_SE3_6_
1569899729
Flowchart-based Approach to Aid Novice Programmers: A Novel
Framework
Danial Hooshyar; Rodina Binti Ahmad; Mohd Hairul Nizam Md Nasir;
Wong Ching Mun
page
| 27
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Venue : 410
Track 5 : HUMAN COMPUTER INTERACTIONS 1
Time : 13:55 - 16:05
Chair : Goh Kim Nee
Co-Chair : Ahsanullah Abro
Session Code
Paper ID
Paper Title
Authors
T5_HCI1_1_
1569876897
Al-Quran Learning Using Mobile Speech Recognition: An Overview
Noraziahtulhidayu Kamarudin; Syed Abdul Rahman Al-Haddad
Syed Mohamed; Abd Rauf Bin Hassan; Mohammad Abd-Alrahman
Mahmoud Abushariah
T5_HCI1_2_
1569879477
Human Finger Input Properties for Precise Target Selection on Multitouch Screen
Ahsanullah Abro
T5_HCI1_3_
1569883797
Evaluation of Mobile Games with Playability Heuristic Evaluation
System
Sarmad Soomro; Wan Fatimah Wan Ahmad; Suziah Sulaiman
T5_HCI1_4_
1569883873
Story Line in Image-based Virtual Reality for Enhancing Spatial
Presence Experience
Nadia Diyana Mohd Muhaiyuddin; Dayang Rohaya Awang Rambli
T5_HCI1_5_
1569900887
Measuring Malaysian M-Commerce User Behaviour
Ashok Sivaji; Shi Tzuaan Soo; Tek Yong Lim; Li Shan; Mohammad
Hossein Tahriri Zanegenh
T5_HCI1_6_
1569901893
Synchronizing Audio and Haptic Feedback to Read Webpage
Suziah Sulaiman; Dayang Rohaya Awang Rambli; Hanis Hashim;
Mahmud Mokhtahir
Venue : 401
Track 1 : INFORMATION SYSTEMS 4
Time : 16:20 - 18:30
Chair : Mazeyanti Bt M Ariffin
Co-Chair : Muhammad Azeem Abbas
Session Code
Paper ID
T1_IS4_1_
1569872161
28 | page
Paper Title
Authors
Current Limitations and Opportunities in Mobile Augmented Reality
Applications
Nur Intan Adhani Muhamad Nazri
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
T1_IS4_2_
1569872293
e-Supply Chain Trust Model for B2B Collaboration:A Case Study of
Malaysian Construction Industry
Norshakirah Ab Aziz; Dhanapal Durai Dominic; Rohiza Ahmad
T1_IS4_3_
1569872461
Proposed Conceptual Model for E-Service Quality in Malaysian
Universities
Iham Tariq Ismail Al-Nuaimi; Ahmad Mahmood; Hamid H Jebur
T1_IS4_4_
1569872525
Multimodal Interactions in Traditional Foot Reflexology Practice
Hector Chimeremeze Okere; Suziah Sulaiman; Dayang Rohaya Awang
Rambli; Oi Mean Foong
T1_IS4_5_
1569879027
A Pragmatic Use of Semantic Web Technologies for Preschool
Cognitive Skills Tutoring System
Muhammad Azeem Abbas; Wan Fatimah Wan Ahmad; Khairul Shafee
Kalid
T1_IS4_6_
1569871519
Participation/Collaboration Pattern: Perspectives of Trust and
Security Risks
Sadaf Hina; Alan Oxley
Venue : 402
Track 2 : DATA COMMUNICATION & NETWORKING 4
Time : 16:20 - 18:30
Chair : Foong Oi Mean
Co-Chair : Muhammad Maaz Rehan
Session Code
Paper ID
Paper Title
Authors
T2_DCN4_1_
1569890449
Enhance the Performance of ICMP Protocol by Reduction the IP Over
Ethernet Naming Architecture
Waleed Hussein; Longzheng Cai; Shaymaa Alyawer
T2_DCN4_2_
1569901185
Early Detection of Incident Using Vehicular Ad-hoc Network
Bharat Singh; Halabi Hasbullah; Mohd Yunus Nayan; Bhumit Tahlan
T2_DCN4_3_
1569901551
Lifetime and Coverage Maximization Technique for Mobile
Sensor Networks
Muhammad Amir Khan; Halabi Hasbullah; Babar Nazir
T2_DCN4_4_
1569901487
A performance comparison of recent open source wireless sensor
network supporting simulators.
Muhammad Amir Khan; Halabi Hasbullah; Babar Nazir
T2-DCN4_5_
1569903131
Security Framework for Low Latency Vanet Applications
Asif Wagan; Tang Jung Low
page
| 29
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Day 3 • Thursday (5th June 2012)
Venue : 401
Track 1 : INFORMATION SYSTEMS 5
Time : 8:30 - 10:30
Chair : Suziah Sulaiman
Co-Chair : Munwar Ali
Session Code
Paper ID
Paper Title
Authors
T1_IS5_1_
1569880307
A Survey on Deceptions in Online Social Networks
Shafiza Mohd Shariff; Xiuzhen Zhang
T1_IS5_2_
1569881263
K-NN Classifier for Data Confidentiality in Cloud Computing
Munwar Ali
T1_IS5_3_
1569899207
Development of Private Cloud Storage for Medical Image Research
Data
Ahmad Fadzil; Irving V Paputungan; Mohd Fadzil Hassan; Vijanth
Sagayan Asirvadam; Megat Daharus
T1_IS5_4_
1569882693
The Determinants of Airline Online Services Satisfaction: A
Conceptual Model
Rira Rahayu Arridha; Nur Elias; Hazura Mohamed
T1_IS5_5_
1569882765
Social Commerce From the Information Systems Perspective: A
Systematic Literature Review
Mohana Shanmugam; Yusmadi Yah Jusoh
T1_IS5_6_
1569902593
Rationale of Students’ Failure in Comprehending Theoretical
Computer Science Courses
Muhammad Aasim Qureshi; Mohd Fadzil Hassan; Rabia Sammi
Venue : 402
Track 2 : COMPUTATIONAL INTELLIGENCE 4
Time : 8:30 - 10:30
Chair : Saipunidzam Mahamad
Co-Chair : Hani Yasmin Ahmad Zaki
Session Code
Paper ID
T2_CI4_1_
1569900933
30 | page
Paper Title
Authors
Identifying Universal Facial Emotion Markers for Automatic 3D Facial
Expression Recognition
Amal Azazi; Syaheerah Lebai Lutfi; Ibrahim Venkat
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
T2_CI4_2_
1569903225
Lung Cancer Diagnosis Using CT-Scan Images Based on Cellular
Learning Automata
Nooshin Hadavi; Md Jan Nordin; Ali Shojaeipour
T2_CI4_3_
1569904591
Recognition of Occluded Faces Using an Enhanced EBGM Agorithm
Badr Lahasan; Ibrahim Venkat; Syaheerah Lebai Lutfi
T2_CI4_4_
1569905735
Towards Real Time Multidimensional Hierarchical Graph Neuron
(mHGN)
Benny Benyamin Nasution
T2_CI4_5_
1569890219
An Adaptive Method to Determine the Number of Clusters in
Clustering Process
Huan Doan; Thuan Nguyen
T2_CI4_6_
1569890081
Development of an Intelligent Scorpion Detection Technique Using
Vibration Analysis
Abiodun Musa Aibinu; Bala Sadiq; Elijah Joseph; Habeeb Salau; Momoh
Salami
Venue : 408
Track 1 : INFORMATION SYSTEMS 6
Time : 10:55 - 13:05
Chair : Noreen Izza Arshad
Co-Chair : Kwang Hooi Yew
Session Code
Paper ID
Paper Title
Authors
T1_IS6_1_
1569882903
Understanding Factors Affect on the Effectiveness of Social Networks
for Cancer Patients
Marva Mirabolghasemi; Noorminshah A.Iahad; Suraya Miskon
T1_IS6_2_
1569883271
Knowledge Management System Quality:A Survey of Knowledge
Management System Quality Dimensions
Marzanah A. Jabar; Abdallah Alnatsha
T1_IS6_3_
1569883325
Task-Technology Fit and User Adoption of Cloud-based Collaborative
Learning Technologies
Elaheh Yadegaridehkordi; Noorminshah A.Iahad; Norasnita Ahmad
T1_IS6_4_
1569883433
Understanding the Knowledge Transfer Process in the Flood
Management Domain
Hasniza Yahya; Mohd Zuhaili Mohd Rodzi; Mohammad Nazir Ahmad
page
| 31
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
T1_IS6_5_
1569883555
Research Productivity in Computer Science Field for Universiti
Teknologi Malaysia in 2000-2013
Sharanjit Dhillon; Roliana Ibrahim; Ali Selamat
T1_IS6_6_
1569902873
ICT in Process Safety Management
Kwang Hooi Yew; Mohd Fadzil Hassan; Azmi Mohd Shariff; Hanida
Abdul Aziz
Venue : 402
Track 2 : SOFTWARE ENGINEERING 4
Time : 10:55 - 13:05
Chair : Yew Kwang Hooi
Co-Chair : Abdullah Sharif
Session Code
Paper ID
Paper Title
Authors
T2_SE4_1_
1569903003
Risk Assessment Factors for SME Software Development Companies
in Malaysia
Abdullahi Sharif; Shuib Basri
T2_SE4_2_
1569903205
Survey on Maintainability Evaluation Criteria in Service Oriented
Architecture
Nik Marsyahariani Nik Daud
T2_SE4_3_
1569901421
The Effectiveness of using the Dependency Relations Approach in
Recognizing the Head Modifier for Malay Compound Nouns
Suhaimi Rahman
T2_SE4_4_
1569905899
An Integrated Success Adoption Model for Examining E-Learning
Among Adult Workers in Jordan
Ahmad Issa Saleem Alzoubib
32 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Poster Sessions
Poster Code
Paper ID
Paper Title
Authors
Poster_1_
1569867153
Subsurface Exploration of Seabed Using Electromagnetic Waves for
the Detection of Hydrocarbon Layers
Adeel Ansari; Afza Shafie; Seema Ansari; Abas Md Said; Elisha Tadiwa
Nyamasvisva; Muhammad Abdulkarim; Muhammad Rauf
Poster_2_
1569867259
ZLS: A Next-door Lightweight QoS Aware Location Service Technique
for VANET on Highways
Muhammad Maaz Rehan; Halabi Hasbullah; Omer Chughtai;
Muhammad Waqas Rehan
Poster_3_
1569868807
Model Driven Software Development: An Overview
Muhammad Qaiser Saleem; Jafreezal Jaafar; Mohd Fadzil Hassan
Poster_4_
1569902771
Mobile Phone Icons Recognition and Cultural Aspects
Syed Ghayas, Suziah Sulaiman, Jafreezal Jaafar, Saipunidzam Mahamad,
Muzafar Khan
Poster_5_
1569870281
Association Among Independent and Dependent Factors of Host in
Volunteer Computing
Soodeh Peyvandi, SP
Poster_6_
1569871171
QoS Routing for Cognitive Radio Ad-Hoc Networks: Challenges &
Issues
Tauqeer Safdar; Halabi Hasbullah
Poster_7_
1569872323
Classification of Software Project Risk Managers Established on Roles
and Responsibilities
Uzair Iqbal, Alan Oxley, Jafreezal Jaafar
Poster_8_
1569872451
Optimizing BOINC Scheduling Using Genetic Algorithm
Norzatul Natrah Ismail
Poster_9_
1569872581
A Case Study on Travel Information From Social Network – Focus in
Facebook and Blog in Malaysia
Nurul Akhmal Mohd Zulkefli, Baharum Baharudin
Poster_10_
1569882495
Students’ Inclinations Towards Games and Perceptions of Game-Based
Learning (GBL)
Mazeyanti M Ariffin, Alan Oxley, Suziah Sulaiman
page
| 33
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Poster_11_
1569883019
Design of Interactive Whiteboard System for Collaborative Learning
Tahir Mustafa Madni Ikram, Mohd Yunus Nayan, Suziah Sulaiman,
Muhammad Tahir, Majid Iqbal
Poster_12_
1569883903
Performance Comparison of Least Slack Time Based Heuristics for Job
Scheduling on Computational Grid
Ahmed Abba Haruna, Tang Jung Low, Anindya J. Pal
Poster_13_
1569884381
Swarm Inspired Test Case Generation for Online C++ Programming
Assessment
Oi Mean Foong, Tran Quang Trung, Suet Peng Yong, Helmi Md Rais
Poster_14_
1569911443
Exploration of Communication Process Using Business Microscope
Yoke Yie Chen, Kim Nee Goh, Yukihisa Fujita, Ken Naono
Poster_15_
1569901845
Number Skills Mobile Application for Down Syndrome Children
Wan Fatimah Wan Ahmad, Afza Shafie
Poster_16_
1569906097
Experimental Study on the Effective Range of FCM’s Fuzzifier Values
for Web Services’ QoS Data
Mohd Hilmi Hasan, Jafreezal Jaafar, Mohd Fadzil Hassan
Poster_17_
1569882423
Electronic Content Management System Use and Implementation in
Highly Integrated Businesses
Noreen Izza Arshad, Mazlina Mehat, Mohamed Imran Mohamed Ariff
Poster_18_
1569882611
Understanding the Ways Organizational Learning Drives Information
Technology (IT) Infrastructure
Noor Hafizah Hassan; Noreen Izza Arshad; Jafreezal Jaafar; Emy Elyanee
Mustapha
Poster_19_
1569882573
Effects of the Smart Board on Students’ Achievement in Moral
Education
Loh Wai Ling; Termit Kaur Ranjit Singh; Wan Fatimah Wan Ahmad
Poster_20_
1569872553
Predicting BottomHole Flowing Pressure Using Artificial Neural
Network
Paras Memon; Suet Peng Yong; William Pao; Jion Sean Pau
34 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Abstracts
INFORMATION SCIENCE TRACK
Paper ID :
T1_IS1_1_1569866849
Title
:
Evaluation of Online System Acceptance through Airlines
Websites in Malaysia
Authors :
Dhanapal Durai Dominic, Humaira Khan
Abstract
The use of website and online system is increasing rapidly around the globe. The
companies are also concerned to provide the customer valuable services and assure
them all to available on their websites. This study aims to measure the customer
acceptance towards the airline websites. As companies are investing high to switch
from physical delivery channel to self-service online channel, customer acceptance with
online web channel is a major area for research. The proposed research framework
added new variable to the technology acceptance model (TAM) to measure the website
acceptance. A questionnaire was distributed among the consumers who use the airline
websites to purchase online ticket. The results supported all the hypothesis and gives
significant results for measuring customer acceptance of airlines website.
Paper ID :
T1_IS1_2_1569852645
Title
:
A Process Warehouse Based Resources Performance Evaluation
Method for Business Processes Improvement
Authors :
Abid Sohail, Dhanapal Dominic
Abstract
Existing studies on business process improvement (BPI) have widely focused on
development of separate techniques for resource management and structural redesign
of processes. In this study, we contend that the relationship of resource with task is
not sufficiently understood. Particularly, business intelligence based approaches to
BPI have not adequately explored this relationship. To understand this, we classify
resources into human and non human resources, because the two types of resources
behave differently. Subsequently, a set of relationships between human resources,
non-human resources and tasks (named suitability, preference and competence) are
presented. However, only human resource’s relationship with non-human resource/s
(named preference) is presented in detail, as a resource preference model. The model
bundled with the presented preference evaluation method guides users for evaluation
of resources’ performance. The applicability of the method is illustrated through a
healthcare case study.
page
| 35
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T1_IS1_3_1569867087
Title
:
Dynamics of the Entanglement Over Noisy Quantum Networks
Authors :
Abdel-Haleem Abdel-Aty, Nordin Zakaria
Abstract
In this paper, the effect of homogeneous and nonhomogeneous magnetic fields as an
external noisy on the entanglement dynamics over partial entangled state quantum
network is studied. The Dzyaloshiniskii–Moriya (DM) interaction is used to generate
entangled network from partially entangled states in the presence of the spin–orbit
coupling. The entanglement between any two nodes is quantified using Wootter
concurrence. The effect of homogeneous and non-homogeneous magnetic field in
presence and absence of the spin coupling on the entanglement between any two nodes
of the network is investigated. The results show that the homogeneous magnetic field
has no effect on the entanglement without the presence of the spin-orbit interaction. The
non-homogeneous magnetic field has a strong impact on the entanglement either with
or without spin-orbit couplings. For initially entangled channels, the upper bound does
not exceed its initial value, whereas for the channels generated via indirect interaction,
the entanglement reaches its maximum value.
Paper ID :
T1_IS1_4_1569867131
Title
:
Mutual Entropy of a Single Cooper Pair-Box Interacting with
Multi-Photon Field
Authors :
Heba Kadry, Nordin Zakaria
Abstract
We discuss the interaction of a single Cooper pair box interacting with a multi-photon
field. The dynamical behaviour is investigated using the quantum mutual entropy.
The results show that the system parameters (the number of quanta and detuning
parameters) play an important role in entanglement. This result might shed the light on
the possibility to use the number of quanta as a controller parameter for the present
system.
36 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T1_IS1_5_1569867317
Title
:
A Comparative Study of Different Image Completion Techniques
Authors :
Sameh Zarif, Ibrahima Faye, Dayang Rohaya Awang Rambli
Abstract
Image completion is an active and intersesting topic in image and video processing.
Restoration and retouching of damaged areas in an undetectable form is the objective
of image completion techniques. Most of the recently developed video completion
methods are based on image completion techniques to restore the damaged frames.
With respect to video completion challenges, we compared and evaluated the most
recent image completion methods. For a fair comparison, we introduced a new dataset
and evaluated four states-of-art- image completion methods on the same hardware.
Experimental results are conducted to highlight the strengths and drawbacks of each
image completion method.
Paper ID :
T1_IS1_6_1569867333
Title
:
Document Image Skew Detection and Correction
Method Based on Extreme Points
Authors :
Marian Wagdy, Ibrahima Faye, Dayang Rohaya Awang Rambli
Abstract
In this paper we present a method for estimating the document image skew angle.
The main idea of this method is based on the concept that any document image has
objects with rectangular shape such as paragraphs, text lines, tables and figures.
These objects can be bounded by rectangles. We use the extreme point’s properties to
obtain the corners of the rectangle which fits the largest connected component of the
document image. The angle of this rectangle represents the angle of document skew.
The experimental results show the high performance of the algorithm in detecting the
angle of skew for a variety of documents with different levels of complexity.
page
| 37
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T1_IS2_1_1569868777
Title
:
Adoption of Cloud Computing to Enhance the Healthcare
Services in Malaysia
Authors :
Kalai Anand Ratnam, Dhanapal Durai Dominic
Abstract
The global healthcare industry is continuing to grow, and it is important to realize that
healthcare providers will have to continue to invest in IT based systems to improve
overall operations and cross system communications. The study focuses on the
relationships between healthcare providers, IT resources and health insurance providers
in determining the adoption of cloud computing. The results obtained as result of this
study shows that IT resources significantly influences healthcare providers and health
insurance providers. The efficiency and clinical services can be improvised with the
adoption of the cloud. The findings of this study are presented with reliability analysis,
descriptive, factor loading, regression and correlations for IT capability in healthcare
services, structural equation modeling is used to determining the overall model fit.
Structural equation modeling (SEM) using AMOS 20.0 is used for model fit testing and
SPSS 20.0 is used for analyzing the descriptive statistics, hypothesis and assumptions for
SEM.
Paper ID :
T1_IS2_2_1569867371
Title
:
Prediction of Hidden Knowledge from Clinical Database Using
Data Mining Techniques
Authors :
Gunasekar Thangarasu, Dhanapal Durai Dominic
Abstract
Clinical Database has enormous quantity of information about patients and their diseases.
The database mainly contains clinical consultation details, family history, medical lab
report and other information which are considered to taking a final diagnostic decision
by physician. Clinical databases are widely utilized by the numerous researchers for
predicting different diseases. The current diabetes diagnosis methods are carried out
based on the impact of various medical test and the results of physical examination. The
new and innovative prediction methods are projected in this research to identify the
diabetic disease, its types and complications from the clinical database in an efficiently
and an economically faster manner.
38 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T1_IS2_3_1569868213
Title
:
Conceptual Framework for Effective E-collaboration and
Didactic Enhancement
Authors :
Alimatu-Saadia Yussiff, Wan Fatimah Wan Ahmad; Alan Oxley
Abstract
E-collaboration environment through social media technologies is a promising
pedagogical approach for teaching, learning and research. It will support student-tostudent, student-to-lecturer, and student-to-content interaction and collaboration in a
higher educational institution. Despite these benefits, many educators are still reluctant
to start experimenting or using it. Drawing on current developments in social media
software, a literature review on online collaborative teaching and learning, theories of
learning, basic concepts, as well as action research using social media technologies, this
paper reviewed and described eight existing frameworks for e-collaboration and five
learning theories using nine and four criteria respectively. Following an analysis of the
frameworks and learning theories, a conceptual framework for effective e-collaboration
and the didactic enhancement is proposed for higher educational institutions with
support for planning, design, development, implementation and evaluation of such an
environment. The findings, conclusions and implications for future research in this area
are further provided.
Paper ID :
T1_IS2_4_1569902915
Title
:
Assessing the Quality of Rail Ticket Reservation Systems:
Cases from Indonesia
Authors :
Nur Wijayaning Rahayu, Dherry Andika
Abstract
This study compared the quality of e-commerce of rail ticket reservation system among
one government-owned and two privately-owned agencies in Indonesia. The best
two private agencies were chosen based on popularity and award won. There is lack
of research interest in the transportation domain, particularly in developing countries,
even though some studies existWe applied WebQual method as website quality
metric for three dimensions: Usability, Information Quality, and Service Interaction
Quality. We asked 100 respondents between September-October 2013 using WebQual
questionnaire, translated into Indonesian language. The validity and reliability test
shows all of the questions to be valid. Overall result shows that there is no significant
difference in the quality of rail ticket reservation systems between government-owned
and privately-owned agencies.
page
| 39
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T1_IS2_5_1569870935
Title
:
Role of Information Communication Technology for
Evidence Based Medicine among Physicians
Authors :
Fozia Anwar, Suziah Sulaiman, Dhanapal Durai Dominic
Abstract
In the current globalization age, Information communication technology (ICT) is diffusing
its applications and services to every domain. The role of ICT in health care sector
cannot be ignored as healthcare is directly associated with human lives. ICT empowers
healthcare personnel in achieving high productivity and better accuracy in the clinical
tasks by practicing evidence based medicine (EBM). This is a cross sectional quantitative
study exploring the role of ICT and information systems for EBM. Data was collected
using a questionnaire with a sample size of 250 healthcare personnel directly linked with
clinical care. We identified that clinical and other allied health care personnel recognize
the benefits to adopt ICT in the clinical educational workplaces for EBM. However they
feel frustrated by workload preventing access to information technology, limitations of
technology access and lack of opportunities for training in ICT. It is evident from this
research that familiarity, use and self-confidence in the use of ICT are somewhat greater
in personnel who have a recent tertiary education.
40 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T1_IS2_6_1569891073
Title
:
Mobile Game Approach to Prevent Childhood Obesity Using
Persuasive Technology
Authors :
Wahidah Husain, Ammar Almomani, Ying San Oh
Abstract
Obesity is a condition in which the body has excess fat. Childhood obesity has become
an important public health issue because affects every aspect of the life of a child. More
specifically, the condition leads to poor health and negative social perceptions. Many
risk factors are linked to obesity. The varying aspects of the problem and its serious
implications for future health and well-being of children are enormous. The most
effective solution can be achieved via programs geared to prevent such diseases. Children
spend an average of more than three hours daily in front of the television, an hour at
the computer, and 30 minutes playing video games, which opens major opportunities
for us to propose a mobile game approach to prevent childhood obesity (MACO) using
persuasive technology. MACO is a game-based persuasive mobile technology designed
to inspire children to apply healthy eating habits as well as to begin and continue being
physically active. This technology also introduces fun activities to motivate children to
exercise more and encourage them to choose healthier food in appropriate amounts.
A study on persuasive technologies application and childhood obesity prevention is
conducted to determine the best persuasive technology application for MACO. The
study proposes a framework and develops a system prototype.
Paper ID :
T1_IS3_1_1569917811
Title
:
Career Anchors and Employee Retention
- An Empirical Study of Indian IT Industry
Authors :
Kannabiran G, Dhanapal Durai Dominic, A. V. Sarata Vai
Abstract
Profound changes occurring in the occupational environment have implications for
an individual’s career development in the Indian IT industry. Organizations need to
understand individuals’ career anchors and be responsive to improve the employees’
intention to stay. The present empirical study attempts to evaluate the impact of nine
career anchors on employee’s intention to stay through a survey of 450 employees
among top Indian IT companies. It is found that the career anchors service, identity,
variety, autonomy, creativity and geographic security have significant influence on
the employees’ intention to stay. However, other career anchors, namely, managerial
competence, technical competence, and organizational stability have no influence on
the employees’ intention to stay.
page
| 41
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T1_IS3_2_1569871529
Title
:
A Preliminary Study on Local Folktales Exposures to Support the
Development of Animated Courseware
Authors :
Norshahila Ibrahim, Wan Fatimah Wan Ahmad, Afza Shafie
Abstract
Although Malaysia has a wide variety of folktales, children’s knowledge about local
folktales are less compared to foreign folktales. Until this moment, not much Malay
folktales animation courseware was developed and published in the market, as well
as the application for tablet. This paper discusses a preliminary study conducted for
the research on developing an animation courseware for Malay folktales. In order to
choose the genres to be developed for this courseware, a preliminary study has been
carried out, which comprises of a survey using questionnaire distributed to 394 children
aged from 9 to 11 years old assisted by their teachers. The results of this preliminary
study showed that children are interested in animal, humour and exemplary stories.
The results also proved that children are more familiar with foreign folktales compared
to local folktales. Children preferred foreign folktales over local folktales because of the
animation, graphic, character and colours presented in the story.
Paper ID :
T1_IS3_3_1569871581
Title
:
Information Audit in Electricity Utilities: Roles, Methodologies,
Issues and Challenges
Authors :
Izyana Ariffin, Aliza Abdul Latif, Masyura Ahmad Faudzi,
Siti Salbiah Mohamed Shariff, Mawaddah Mohamad Nadzir
Abstract
Information audit is crucial in understanding the current state of an organisation. By
implementing information audit, the needs, the available resources and the gaps
are made known to the top management of an organisation, thus helping them to
identify steps to be taken to improve the way they manage information in order to stay
competitive in their business. Several framework and methodologies were introduced,
aimed at providing step by step guidelines to organisations in executing information
audit while maximizing the benefits of information audit itself. However, despite
the benefits information audit carries, only a minimum number of organisations put
information audit into practice and this indicates that current developed framework
and methodologies fail to convince organisations to implement information audit. This
includes organisations in Electricity Supply Industry (ESI). This paper reviews existing
information audit framework and methodologies applicable to ESI and discuses some
issues and challenges in implementing information audit based on previous literatures.
This review is a preliminary study of a research aims at proposing a new improved
information audit framework for ESI.
42 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T1_IS3_4_1569871601
Title
:
Maternity Data Management Utilizing Cloud Computing
Authors :
Ying San Oh, Wahidah Husain
Abstract
The existing maternity data management in government maternity clinics lags behind
most other industries in new technology adoption. No electronic system exists to share
maternity data between hospitals and clinics. The existing systems continue to rely on
hardcopy logbooks to record maternity data. Therefore, maternity data management
system utilizing cloud computing (E-Maternity) is proposed in this paper to enhance
the existing service handling and management of maternity and baby development
data in government maternity clinics. The main objective of E-Maternity is to provide
a convenient method to manage the maternity data and enhance the efficiency and
effectiveness of existing services. Existing pregnancy related applications are discussed,
and the architecture of the proposed system is presented. Furthermore, the system
requirements and design of the proposed system are presented.
Paper ID :
T1_IS3_5_1569871649
Title
:
Maximum-Shift String Matching Algorithms
Authors :
Nur’Aini Abdul Rashid, Hakim Adil Kadhim
Abstract
The string matching algorithms have broad applications in many areas of computer
sciences. These areas include operating systems, information retrieval, editors, Internet
searching engines, security applications and biological applications. Two important
factors used to evaluate the performance of the sequential string matching algorithms
are number of attempts and total number of character comparisons during the matching
process. This research proposes to integrate the good properties of three single string
matching algorithms, Quick-Search, Zuh-Takaoka and Horspool, to produce hybrid string
matching algorithm called Maximum-Shift algorithm. Three datasets are used to test
the proposed algorithm, which are, DNA, Protein sequence and English text. The hybrid
algorithm, Maximum-Shift, shows efficient results compared to four string matching
algorithms, Quick-Search, Horspool, Smith and Berry- Ravindran, in terms of the number
of attempts and the total number of character comparisons.
page
| 43
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T1_IS3_6_1569897241
Title
:
Automatic Method for Bone Age Assessment Based on
Combined Method
Authors :
Marjan Mansourvar, Maizatul Akmar Ismail,
Sameem Abdul Kareem, Hanum Md. Nasaruddin Fariza
Abstract
Bone age assessment (BAA) is a method of evaluating the level of skeletal maturation in
children. Generally, it is applied manually by comparing an X-ray of a left hand-wrist with
a standard samples as atlas in the clinical procedure. The manual methods are prone
to variability of observation, time consuming and limited to objective decisions. This is
motivation for automatic method for bone age assessment. This study aims to develop an
automated method for BAA based on combined method. A survey questionnaire is used
as the part of research methodology to identify the BAA method used by radiologists
and to extract the factors that effect on determination of bone age in the Faculty of
Medicine, University of Malaya Medical Centre (UMMC).
Paper ID :
T1_IS4_1_1569872161
Title
:
Current Limitations and Future Opportunities in
Mobile Augmented Reality Applications
Authors :
Nur Intan Adhani Muhamad Nazri
Abstract
Mobile AR has evolved from the bulkiness of head-mounted device and backpack device
to smart device (smartphone, tablet etc.). To date, the current implementation has made
what AR is today. However, the advancement of AR technology has met with limitation
and challenges on its own, which resulted in not able to reach mass-market. We have
done a review based on past research papers on technical (Hardware, algorithms and
interaction technique) and non-technical (Social acceptance, privacy and usefulness)
aspects of developing and implementing mobile augmented reality applications. This
paper in turn presents current limitation and and challenges that need to overcome. We
also presented some future opportunities in mobile AR applications.
44 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T1_IS4_2_1569872293
Title
:
e-Supply Chain Trust Model for B2B Collaboration:A Case Study of
Malaysian Construction Industry
Authors :
Norshakirah Ab Aziz, Dhanapal Durai Dominic, Rohiza Ahmad
Abstract
Lack of trust among the supply chain (SC) components has been identified as one of
the issues that hinder collaboration between them. Thus, the focus of this study is to
propose a trust model that helps to identify the trusted partner for B2B SC collaboration.
In other words, this study aims to enable the trusted SC components collaborate in a
trustful business environment. This can be achieved by using the trust model proposed.
The trust model can be considered as guidelines to select a trusted trading partner. In
addition, this study provides trust values identified according to domain chosen. The
e-Supply Chain (e-SC) trust model proposed consider as solution to collaborate SC
components.
Paper ID :
T1_IS4_3_1569872461
Title
:
Proposed Conceptual Model for E-Service Quality
in Malaysian Universities
Authors :
Iham Tariq Ismail Al-Nuaimi, Ahmad Mahmood, Hamid H Jebur
Abstract
There is a significant role of e-services quality in achieving success or failure of online
organizations. It can increase their competitive advantages in the target markets, and
enhance the relationships with customers and their satisfactions. There is no agreement
about what service quality is and how it should be measure. Accurate measurement of
the quality of electronic service is a complex process due to the nature of the service
because it is immaterial and untypical product. It has been indicated through the
literature that there is a lack of universal set of definitions, model and dimensions for
service quality measurement. Since the service quality measures in higher education
have great importance in achieving high tuition-based returns, e-service institutions of
higher education are subjected to continuous pressure to surpass their competitors in
presenting better e-service quality. This paper proposes an e-service quality conceptual
model for measuring e-service quality in higher education sectors in Malaysia for
measuring e-services quality. Nine dimensions are proposed for this model based on
reviewing the related literature. The dimensions include efficiency, availability, privacy/
security, fulfilment, reliability, web design, interactivity, information, and responsiveness.
Results of this paper may help to build a proper scale to measure the quality of e-services
in higher education, which assist to improve the performance and effectiveness of
e-services to achieve users’ satisfaction.
page
| 45
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T1_IS4_4_1569872525
Title
:
Multimodal Interactions in Traditional Foot Reflexology Practice
Authors :
Hector Chimeremeze Okere, Suziah Sulaiman,
Dayang Rohaya Awang Rambli, Oi Mean Foong
Abstract
The application of multimodal interactivity in HCI and VR avails a host of advantages
which includes enhancement of realism and the achievement of interactivity that is
relatively close or identical to the conventional human to human interactions. Visual
and aural interactions have been widely applied in various domains ranging from mobile
industry to medical field. In Virtual reality stress therapy application particularly in the
proliferation development towards the virtualization of traditional foot reflexology
therapy, little is understood on the visual and aural interactive nature of the therapy
and to what extent they contribute in relaxation and stress relief. This paper presents
a study that examines from both the patients’ and practitioners’ perspective, the
visual and aural interactive nature in foot reflexology domain since the practices
promote relaxation and stress relief. The study explored 2 traditional foot reflexology
sessions, data were collected through audio recorded semi-structured interview, and
was analyzed using content analysis. Results were compared with the existing haptic
exploratory procedures. The study findings presented the visual and aural interactive
nature involved from the patients’ and practitioners’ perspective. Implications for future
research are also discussed.
46 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T1_IS4_5_1569879027
Title
:
A Pragmatic Use of Semantic Web Technologies for Preschool
Cognitive Skills Tutoring System
Authors :
Muhammad Azeem Abbas, Wan Fatimah Wan Ahmad,
Khairul Shafee Kalid
Abstract
Primarily preschool cognitive skills are abilities of acquiring generic knowledge. Generic
knowledge is said to be the knowledge about kinds of things. Currently these cognitive
skills are taught through the use of pre-authored (in the form of books or worksheets)
learning contents containing the objects and concepts of the real world. This method
of teaching is known as instructional pedagogy that has several limitations such as it
require specialized skills and a large amount of time for content authoring, thinking and
dedication and it does not support individualized learning. As a remedy to the limitations
of instructional pedagogy, constructive pedagogical method provides learning through
exploration. The present work proposes an intelligent tutoring system (ITS) that follows
the constructive approach for preschool cognitive skills tutoring. The proposed ITS uses
the Semantic Web technologies namely Ontologies and Semantic Web Rule Language
(SWRL) for the construction of a rule-based ITS. The reason is, Ontologies natively
(by definition) provides a formal explicit way of modeling concepts in a domain of
discourse specially the real world objects and also support rule base reasoning. Finally
shortcomings of the existing knowledge sources (ontologies) and step by step processing
of the inference engine to generate learning contents is provided in the present work.
page
| 47
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T1_IS4_6_1569871519
Title
:
Participation/Collaboration Pattern: Perspectives of Trust
and Security Risks
Authors :
Sadaf Hina, Alan Oxley
Abstract
Cyber security issues, due to a lack of trust in social networking sites (SNS), are being
addressed by many researchers and practitioners. Despite the diversity of security and
privacy vulnerabilities, SNS have acquired and are still acquiring great popularity. Cyber
crimes exploiting flaws in information technology and the imprudent trust of users, in
who they add as contacts, are alarming and can lead to serious consequences in terms
of identity theft, harassment, cyber bullying and defamation. People share personal and
sensitive information on profiles and trust SNS service providers and friends to keep
their information private. Our study reveals that trust in SNS and trust in friends are
two different perspectives of the factor ‘trust’ which can be predicted by ‘security’,
‘privacy’ and ‘cyber safety education’ factors. Moreover, trust is a vital factor that affects
the intention of a user to participate in the collaborative sharing pattern. A multiple
regression analysis has been used to validate the proposed research framework. The
results from 380 SNS users in a school community, including students, teachers, parents
and school admin show that perceived privacy and security in SNS are the antecedents
of trust in SNS while cyber safety education is the antecedent of trust in friends. Sensible
levels of trust aid people in collaborating safely using SNS. ‘Trust’ also influences the
intention to use SNS for participation/collaboration among users.
Paper ID :
T1_IS5_1_1569880307
Title
:
A Survey on Deceptions in Online Social Networks
Authors :
Shafiza Mohd Shariff, Xiuzhen Zhang
Abstract
Online Social Network (OSN) sites continue to grow and dominate the Internet with
billions of users signing up and actively participating in these sites. The users use the
sites to build relationships between old and new friends, trusting them by exchanging
and sharing information. However, the OSN users are unaware of the security and
privacy threats instilled with their trust. Many threats exploit the trust in the users as
they create their way into their targeted victims’ virtual communities to gather and
diffuse information. In this paper we present a survey on the types of trust deception
attacks on OSN users and the existing solutions to detect and prevent users’ trust from
being deceived. Finally, we will present open research issues in this area that require
further significant research efforts.
48 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T1_IS5_2_1569881263
Title
:
K-NN Classifier for Data Confidentiality in Cloud Computing
Authors :
Munwar Ali
Abstract
Securing the data in cloud is still a challenging issue. In cloud, many techniques are used
to secure the data. Data encryption is a data security technique which is widely used
for data security. Deciding data security approach for the data without understanding
the security needs of the data is not a technically valid approach. Before applying any
security on data in cloud, it is best to know the security needs of the data. What data
need security and what data do not need security. In this paper, we propose a data
classification approach based on data confidentiality. K-NN data classification technique
is modulated in the cloud virtual environment. The aim to use K-NN is to classify the data
based on their security needs. The data is classified into two classes, sensitive and nonsensitive (public) data. After data classification we got that what data need security and
what data does not need security. The RSA algorithm is used to encrypt the sensitive data
to keep it secure. We used CloudSim simulator to find the results of proposed approach
in cloud. The proposed approach will easily decide the security needs of the data. After
the data classification, it is easy to select an appropriate security for data according to
the need of data. The results show that this approach is appropriate as compared to
store data in cloud without understanding the security requirements of data.
Paper ID :
T1_IS5_3_1569899207
Title
:
Development of Private Cloud Storage for Medical Image
Research Data
Authors :
Ahmad Fadzil, Irving V Paputungan, Mohd Fadzil Hassan,
Vijanth Sagayan Asirvadam, Megat Daharus
Abstract
Medical imaging research deals with large, heterogeneous and fragmented amounts of
medical images. Such challenges lead to the need for secure, federated and functional
medical image storage within this research community. With limited IT professional and
research fund, the community is better provided with an outsourcing arrangement.
Cloud computing promises lower cost, high scalability and availability which can be a
natural solution such problems in long-term medical image archive. This paper presents a
private cloud storage design and prototype development within an organization to solve
such issues. Leveraging on the ability of cloud computing is shown meet to the system
requirements. The prototype is implemented on OwnCloud cloud storage framework.
The complete functionality of OwnCloud made it an ideal platform to develop and deploy
this kind of cloud-based system. OwnCloud can keep images in different file formats and
share such images to other researchers in simple way.
page
| 49
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T1_IS5_4_1569882693
Title
:
The Determinants of Airline Online Services Satisfaction:
A Conceptual Model
Authors :
Rira Rahayu Arridha, Nur Elias, Hazura Mohamed
Abstract
This study seeks to measure customer satisfaction towards airline website services.
Online service refers to any information and services provided in the internet. As
the importance of internet grows in the business field, the quality of online services
plays an even more important role in determining customer satisfaction. This study
aims to examine and thus gain better understanding of the determinants of online
services that affect customer satisfaction in the airline industry from the consumers’
perspective. Based on a detailed literature review, a frame of instruments has been
developed. Five service quality dimensions have been selected to be tested in the airline
online services sector in order to explore the relationship between service quality and
customer satisfaction, namely tangible, information quality, responsiveness, trust and
personalization. An instrument has been developed to operationalise these dimensions.
A pilot study has been conducted to assess the relevancy and face validity of the
instrument. The outcome of the pilot study has indicated that some items need to be
changed and modified to ensure their relevance with the use of airline websites. This
study also makes an important contribution in determining the dimensions of airline
online service satisfaction.
Paper ID :
T1_IS5_5_1569882765
Title
:
Social Commerce from the Information Systems Perspective:
A Systematic Literature Review
Authors :
Mohana Shanmugam, Yusmadi Yah Jusoh
Abstract
The evolution of social media has changed the conventional e-commerce to social
commerce. The delayed growth of the social commerce is however relatively low
researched in the Information Systems disciple despite its intense evolution. As a result,
this paper aims to critically probe into existing and related work in the area of social
commerce from the Information Systems perspective. The standard systematic literature
review method employing a physical search of 12 journals and 6 conference proceedings
were used in conducting the literature review. The comprehensive systematic literature
review is valuable in bridging the social commerce gap and opens up novel directions to
Information Systems scholars in this market segment.
50 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T1_IS5_6_1569902593
Title
:
Rationale of Students’ Failure in Comprehending Theoretical
Computer Science Courses
Authors :
Muhammad Aasim Qureshi, Mohd Fadzil Hassan, Rabia Sammi
Abstract
Being a good IT solution provider one require good programming background. For a good
programmer one need to have a solid back ground of algorithms i.e. theoretical aspects
of the computer science. Most of the students of computer science do not understand
the importance and do not give proper attention to Theoretical Computer Science (TCS)
courses. As a result perform bad in these specialized courses. Intention of this research
is to find the reasons of students’ failure in grasping the subject matter in the light of
the feedback of currently studying students as well as well experienced teachers and
professionals. The study resulted in a set of suggestions including the usage of better
simulation tools, better environment, visualization, etc.
Paper ID :
T1_IS6_1_1569882903
Title
:
Understanding Factors Affect on the Effectiveness of
Social Networks for Cancer Patients
Authors :
Marva Mirabolghasemi, Noorminshah A.Iahad, Suraya Miskon
Abstract
Cancer related social network communities have the potential to develop an interactive
environment where virtual relationships among cancer patients can be made. Few
studies have looked at the role of Social Network Sites (SNS) for cancer patients despite
their potential to deliver health messages to large audiences. The purpose of this
study is to understand factors that affect the effectiveness of the SNS as fast growing
source for online cancer support using Social Cognitive Theory (SCT) and the theory
of Task Technology Fit (TTF). A semi-structured interview designed through reviews of
relevant literature was analyzed using thematic analysis. Most respondents believed
the effectiveness of SNS is significant on information and emotional support. Although,
the central issues appeared to be more focused on the self efficacy, past experience,
social supports, system and task characteristics in explaining the way factors affect on
the effectiveness of SNS for cancer patients. Consequently, more rigorous research
should be focused on explaining the best practices that may help speed up effective
intervention of social network technology in healthcare.
page
| 51
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T1_IS6_2_1569883271
Title
:
Knowledge Management System Quality: A Survey of
Knowledge Management System Quality Dimensions
Authors :
Marzanah A. Jabar, Abdallah Alnatsha
Abstract
The knowledge management systems are becoming more complex and diverse as a
result of advances in information technology. Nowadays, users demanding for more
accurate and reliable KMS systems increases the awareness and need of KMS quality. To
enhance KMS quality the quality dimensions should be identified first. This paper focuses
on investigating the quality dimensions of related KMS work namely: software quality
dimensions, data quality dimensions, information quality dimensions and knowledge
systems quality dimensions. the extracted quality dimensions will be proposed as the
basis of KMS quality dimensions that will be mapped with KM processes to produce the
KMS quality framework.
Paper ID :
T1_IS6_3_1569883325
Title
:
Task-Technology Fit and User Adoption of Cloud-based
Collaborative Learning Technologies
Authors :
Elaheh Yadegaridehkordi, Noorminshah A.Iahad, Norasnita Ahmad
Abstract
Trend of a new generation of students towards collaborative learning as well as
significant characteristics of cloud computing technology have changed the world of
teaching and learning. This paper reported the results of a survey study and provided
evidence of testing Task-Technology Fit (TTF) model in understanding the factors that
play significant roles in predicting student adoption of cloud-based collaborative learning
technologies in university settings. Based on purposive sampling, questionnaires were
distributed to students that have some experience in using cloud-based applications
for collaborative activities. The results indicated that task non-routineness has negative
influence on Task-Technology Fit (TTF). However, inconsistent with past studies, task
Interdependence positively influences Task-Technology Fit (TTF). Significant effect of
Mobility and Personalization and collaboration as technology characteristics were
observed on Task-Technology Fit (TTF). Finally, as expected significant relationships
between Task-Technology Fit (TTF) and User Adoption were also found. Overall, Users’
adoption of cloud-based collaborative learning technologies was determined directly by
fit between characteristics of task and technology.
52 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T1_IS6_4_1569883433
Title
:
Understanding the Knowledge Transfer Process in the
Flood Management Domain
Authors :
Hasniza Yahya, Mohd Zuhaili Mohd Rodzi, Mohammad Nazir Ahmad
Abstract
Numerous studies have shown that disasters can be managed effectively using a
knowledge management system (KMS). To develop an effective KMS, several components
need to be studied. One of the important components in KMS is knowledge transfer.
This study attempts to identify the essential sub-processes of knowledge transfer in the
context of flood management in Malaysia. We propose a conceptual knowledge transfer
model based on these processes.
Paper ID :
T1_IS6_5_1569883555
Title
:
Research Productivity in Computer Science Field for
Universiti Teknologi Malaysia in 2000-2013
Authors :
Sharanjit Dhillon, Roliana Ibrahim, Ali Selamat
Abstract
Numerous studies have shown the productivity of computer science (CS) scholars and
their respective institution. The aim of this paper is to evaluate the research productivity
of a Malaysian university, Universiti Teknologi Malaysia (UTM) particularly the CS
researchers. The author uses the bibliographic repository that is made available to the
world’s scientific research, which is the Scopus database. There are 3102 research works
produced by CS researchers in UTM. The highest number which is 2095 are published
as conference papers and followed by 957 papers in the article category are covered by
the database from year 2000 to 2013. Some important findings are that most articles
are multi-authored which boost the collaboration initiative with the respective faculty
members in the university or from other universities.
page
| 53
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T1_IS6_6_1569902873
Title
:
ICT in Process Safety Management
Authors :
Kwang Hooi Yew, Mohd Fadzil Hassan, Azmi Mohd Shariff,
Hanida Abdul Aziz
Abstract
This paper analyzes the impact of Information Communications Technology (ICT)
in process safety management of Highly Hazardous Chemicals. Although computer
systems have been used in control systems, much work is yet to be done to address
safety at high level. The authors conducted extensive cross-field literature study and
field study to verify findings. Three challenges for ICT in process safety are integration
of process safety subsystems and activities; quality assurance; and propagation of safety
information. Discussion begins with concepts of process safety, safety controls, safety
tools and safety management. The following sections discuss software categories for
process safety and analyses ICT impacts. The contribution of this paper is general picture
of ICT landscape in process safety environment and fresh leads for ICT to optimize plant
safety.
DATA COMMUNICATION & NETWORKING SYSTEM TRACK
Paper ID :
T2_DCN1_1_1569867781
Title
:
Issues Affecting the Adoption of IPv6
Authors :
Alan Oxley
Abstract
Internet Protocol version 4 sets rules for some aspects of communication over the
Internet. The protocol, amongst other things, specifies the format of an Internet Protocol
address. This format places restrictions on the total number of possible addresses. In
2011 the supply of new addresses was exhausted. A new version of the standard, version
6, has been developed. This provides substantially more addresses. The intention is to
replace version 4 with version 6. Organizations are deciding whether or not now is the
right time to change. The change incurs an expenditure of time and money. If any of
the hardware does not support the new protocol then it will have to be replaced. Also,
software needs to be upgraded. A change requires a transitional phase. It is not possible
to make the necessary updates to hardware and software over a weekend, say. This
paper looks at the issues that are relevant to a decision to change.
54 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T2_DCN1_2_1569870581
Title
:
Effects of Attackers and Attacks on Availability Requirement in
Vehicular Network: A Survey
Authors :
Irshad Sumra
Abstract
Availability is one of the key security requirements in vehicular network. The purpose of
vehicular network is to serve the user with its potential applications, but this purpose
is to fulfill only when networks are available to the end users. Due to open nature of
wireless medium, the attackers can affect the vehicular environment. In this paper,
we are providing a survey on the attackers and all possible attacks on the availability
requirement of vehicular network. The main aim of this study is to describe the threat
levels of all possible attacks on the availability. It has been investigated that each level
has its own priorities. Threats levels and its priorities will be useful to understand the
behavior of attackers and attacks in the vehicular network.
Paper ID :
T2_DCN1_3_1569866847
Title
:
IP-CHOCK (filter)-Based Detection Scheme for Denial of Service
(DoS) Attacks in VANET
Authors :
Karan Verma, Halabi Hasbullah
Abstract
The vehicular ad-hoc Network (VANET) has drawn increasing attention in recent years
due to its wide range of applications. At the present time, a vehicle’s communication
is exposed to many security threats such as Denial of Service (DoS) attacks, in which a
malicious node forges a large number of fake identities. Internet Protocol (IP) spoofing of
addresses - is initiated to disrupt the proper functioning of the fair data transfer between
two fast moving vehicles. In this paper, the IP-CHOCK (filter)-based detection method,
which provides the availability of a service for the legitimate vehicles in the VANET,
as used to detect and defend against the IP spoofing of addresses of the DoS attacks.
The IP spoofing of addresses in the DoS attacks which is committed by fraudulent and
malicious nodes has been investigated. This method provides a secure communication
and also frees the bandwidth. This proposed approach requires fewer resources and is
easy to deploy. Simulation results have shown that this method is efficient and effective
to defend against and detect DoS attacks. Specifically, this method provides a faster
detection time, lower storage capacity and computational cost.
page
| 55
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T2_DCN1_4_1569866111
Title
:
Three Hops Reliability Model for Underwater Wireless
Sensor Network
Authors :
Tariq Ali
Abstract
Due to the instability of underwater environment, the reliable data transfers is more
sensitive issue in Underwater Wireless Sensor Networks (UWSNs) as compare to land
based sensor network. Underwater networks are mostly designed by acoustic sensor
nodes and surface sinks that are connected to any onshore control center. Acoustic
channel characteristics are create many problems like, low bandwidth; long propagation
delays and high error channel rates that can cause to hamper the efficiency of UWSNs.
With these constraints, it is very difficult task to design a routing protocol which has the
ability to maximize the reliability of these networks. In this paper, we proposed a reliable
model with the name of 3 Hops Reliability Model (3H-RM), in which every sender node
of each group of three layers will maintain the copy of same successful transferred data
packets without creating extra burden on the networks. Simulation results shows that
3H-RM can achieve better delivery ratios as compare to 2H-ACK reliability model without
using any additional resources and configurations.
Paper ID :
T2_DCN1_5_1569870527
Title
:
Data Fusion for Reducing Power Consumption in Arduino-Xbee
Wireless Sensor Network Platform
Authors :
Solahuddin Yusuf Fadhlullah, Widad Ismail
Abstract
Data fusion is one of the subsystems in data aggregation that aims to conserve power
consumption by reducing the size of the transmitted data. The purpose of this paper is
to present a simple data fusion mechanism called local data differentiation (LDD) for
actual implementation in micro-controlled sensor nodes. LDD requires the end node to
calculate the average value of an initially sampled data and afterwards, to only transmit
the difference between the newly collected data with the average value. Usage of buffer
in conjunction with LDD is also explored and empirical results are shown based on a
hardware prototype to verify the benefit of the proposed method. The hardware for the
test run is based on the Arduino platform and Xbee modules, as both are very popular in
small-scale research and wireless automation solution.
56 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T2_DCN1_6_1569866559
Title
:
A Multibit Burst Error Detection and Correction Mechanism for
Application Layer
Authors :
Shiladitya Bhattacharjee, Lukman Ab. Rahim, Izzatdin A Aziz
Abstract
To enhance the correctness and robustness of received text information at the receiver
end, we propose an error detection and correction mechanism that executes at the
application layer. Basically the error checking bits are incorporated with the original
information during transition at the network. The error positions are detected by these
error checking bits and then corresponding errors are corrected accordingly. Generally,
the data link layer performs the task of error detection and correction but it platform
dependent. So we introduce such a mechanism which is totally platform independent
and acts at the application layer. It is capable of detecting all the error position and
correcting all the error bits while it is destroyed or corrupted during the transmission.
The data link layer sometimes fails to detect and correct all the error bits which can be
solved by our proposed mechanism.
Paper ID :
T2_DCN2_1_1569871723
Title
:
Fuzzy Logic Based Link Status Classification for Efficient Multipath
Routing in Multi-hop WMNs
Authors :
Peer Azmat Shah, Halabi Hasbullah, Shahzad Rafiq,
Sadiq ur Rehman and Tang Jung Low
Abstract
In contrast to traditional wireless networks, hosts of a multi-hop wireless network,
like wireless mesh network (WMN), may rely on each other to maintain network
connectivity. A main design objective of these networks is to eliminate or minimize
the unavailability of network at some point. However, in infrastructure and the client
part of WMN movement of nodes still creates delay as path failure detection and reestablishment consumes considerable time. Existing solutions for link classification
operate on discrete values resulting in performance degradation. This problem can
best be modelled through fuzzy logic based classification that is based on continuous
values. This paper presents a new fuzzy logic based link status classification mechanism
for use with multipath routing protocols in multi-hop wireless networks like WMNs.
The proposed mechanism classifies the link status as active, about-to-break or broken.
On the basis of link status, said algorithm predicts in advance that a particular link, on
the active path between sender and receiver, is about to break and helps the reactive
multipath routing protocol to start the rerouting operation, thus minimizing the route
discovery frequency, delay and packet loss.
page
| 57
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T2_DCN2_2_1569872437
Title
:
Throughput Enhancement for Fixed WiMAX Network Using
Distributed Model
Authors :
Ibrahim A. Lawal, Abas Md Said, Kashif Nisar,
Abubakar Aminu Mu’azu, Peer Azmat Shah
Abstract
Recently, broadband wireless communication serves as one of the most growing and
developing technology in the field of telecommunications. The broadband provides
multimedia services for voice, video, High Definition TV (HDTV), and games with certain
Quality of Service (QoS). For these services, a high data transmission is greatly needed.
Worldwide Interoperability for Microwave Access (WiMAX) Network aims to provide
this QoS with high data rate and throughput. However the existing WiMAX architecture
does not provide sufficient QoS. In this regard, a Distributed Master-Slave Model was
developed to improve QoS with respect to throughput in the Fixed WiMAX Network
in order to evaluate the throughput performance for the delivery of better services to
the end users. The new model was simulated in OPNET modeler 16.0 with introduction
Master Base Stations (BSs) using Orthogonal Frequency Division Multiplexing (OFDM)
techniques and compared with the existing model which is centralized using Frequency
Division Multiplexing (FDM) techniques. The proposed model throughput results
obtained show that the proposed model has better results as compared with the existing
model.
58 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T2_DCN2_3_1569871473
Title
:
Choices Available for Implementing Smart Grid
Communication Network
Authors :
Hasan Farooq, Tang Jung Low
Abstract
Communication network is considered to be a vital component and cornerstone of smart
grids. It is envisaged that design of communication network will be the most challenging
task for transforming ageing power grid into a modern smart grid. Many communication
technologies existing today can be utilized for enabling communication among smart
grid entities, however, each one of them has its own trade-offs which needs to be
considered. Hierarchically, smart grid communication network is made up of three area
networks each having its own requirements and limitations. It is, therefore, necessary
to analyze the communication technologies in perspective of these three area networks
of smart grids. This paper presents the choices available for enabling communication in
respective area networks of smart grids. Moreover, performances of IEEE 802.11 and
IEEE 802.15.4 standards are evaluated using NS-2 simulations for deployment of multihop ad-hoc architecture of smart grid communication network.
page
| 59
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T2_DCN2_4_1569872009
Title
:
Proposed Method for Enhancing Quantum Bit Error Rate Using
Quantum Key Distribution Technique
Authors :
Mustapha Yusuf Abubakar, Tang Jung Low, Nordin Zakaria,
Oi Mean Foong
Abstract
The current public key infrastructure (pki) encryption/decryption method are still
vulnerable to attacks. The main issue is, the public key algorithm suffers no efficient
solutions that are inherent in certain integer factorization, discrete logarithm and
elliptic curve relationships. It is computationally possible for a user to generate public
and private key pair for attacking purposes. The current single channel quantum key
distribution (qkd) technique suffers high quantum bit error rates (qber) in the presence
of eavesdropping attacks. Therefore this high error rate needs to be reduced for better
security using two channels qkd. With the current emergence of quantum computers
many security algorithm that could take classical computer years to break could now be
broken in matter of seconds. Therefore stronger quantum cryptography is needed for
high security networking. This project is proposed to provide a way for solving the key
transmission issues using qkd, as a new method, by providing two quantum channels
to improve qber. In addition also to develop an algorithm for integrating pki and qkd in
solving the secrete key sharing issues in grid environment. The research methodology
will require the use of qkd devices to be placed at the end of the sender and the receiver
nodes for quantum channel secrete key sharing. The outcome of the research shall
provide highly enhanced network cryptography mechanism for cyber security.
Paper ID :
T2_DCN2_5_1569871303
Title
:
Workability Review of Genetic Algorithm Approach in Networks
Authors :
Okta Nurika, Mohamed Nordin Zakaria, Mohd Fadzil Hassan,
Tang Jung Low
Abstract
In this paper, we surveyed the implementations of genetic algorithm within networks,
whether it is computer network, transportation network, and other fields that have
networking context. Their feasibilities are discussed along with our suggestions
for potential improvements. Genetic algorithm can also be an alternative to other
optimization methods/algorithms. In some cases, it even outperforms other methods.
However, the choice of genetic algorithm might be influenced by some concerns, such
as execution time and problem size. Generally, genetic algorithm process will accomplish
according to its parameters sizes. Finally, the success stories prove the applicability,
adaptability, and scalability of genetic algorithm, specifically for almost-any network
optimization.
60 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T2_DCN2_6_1569903253
Title
:
Filters for Device-free Indoor Localization System Based on
RSSI Measurement
Authors :
Nasrullah Pirzada
Abstract
Based on wireless sensor networks, device-free indoor localization technique has
received much attention in the field of indoor localization system Due to different indoor
environmental parameters, multipath fading, human presences and different system
configurations, the WiFi-based received signal strength indicator values are affected.
This problem leads the researchers to choose any filter or smoothing algorithm to get
proper values of received signal strength in the indoor environment. The aim of using
the filter or smoothing algorithm is to get a signal value which can clearly identify the
changes in the signal values due to interferences caused by various factors in the indoor
environment. Wi-Fi based device-free indoor localization technique has become more
attractive because its simplicity, as well as it does not require extra hardware. However
the implementation of this technique in the indoor environment becomes complex,
sometimes because of imprecise and unreliable readings caused by multipath fading.
There are various filters designed and tested to remove the inconsistencies occurring
in RSSI readings due to the various environmental effects. This paper presents various
types of filters which are used for smoothing the raw data received signal strength
indicator values and also improving the strength of these values by mitigating multipath
fading effects in an indoor environment.
page
| 61
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T2_DCN3_1_1569872655
Title
:
Real-Time Massage Differentiation with Priority Data
Service Flows in VANETs
Authors :
Abubakar Aminu Mu’azu, Tang Jung Low, Halabi Hasbullah,
Ibrahim A. Lawal, Peer Azmat Shah
Abstract
The IEEE 802.11e standard was designed to support Quality of Service (QoS) at the MAC
layer to support incapability of real-time traffic. The real-time safety messages in critical
VANETs environment are guaranteed high priority transmission as a requirement of
DSRC. Due to the intermittent connection in VANETs, the transmission of real-time traffic
data frame needs to obtain a higher priority of channel access to the best-effort data.
Data frame of higher priority is based on the intensity of message (urgency) which is
consorted with different QoS in terms of delay and throughput. Classifying data packets
of the same priority, the physical layer from the IEEE 802.11p which is the recommended
VANETs MAC protocol suffers a huge amount of packet losses. More so, when messages
are placed with the same queue, data packet loss and variable delay are much likely to
occur. To overcome these difficulties, in this paper, our scheme adheres to the DSRC
seven channels bandplan to set the priority queues over separate. To achieve the level
of QoS in our scheme, messages of the same priority would be sent using strict priority
queue (SPQ) priority traffic differentiation techniques to improve Packet Delivery Ratio
for real-time traffic based on IEEE 802.11e MAC protocol. The results were obtained
through NCTUns simulator which is used for the analysis to improve the packet delivery
ratio of the real-time messages.
Paper ID :
T2_DCN3_2_1569874255
Title
:
Path Loss Simulation in Different Radio Propagation Models
with 1.8GHz and 2.6GHz Bands
Authors :
Ahmed Chariyev
Abstract
This paper presents the simulation of path loss propagation models in LTE-Advanced
Networks for suburban and rural areas. Calculations were done using MATLAB based
simulation; for various prediction techniques such as Cost 231 Hata Model, Stanford
University Interim (SUI) and Ericsson Model. The authors used to analyze the 1800MHz
(1.8 GHZ) and 2600MHz (2.6 GHz) wideband channels which are operating bands for
Malaysian 4G companies. Results show almost 60dB gap between using COST231 and
SUI; and 20dB gap is achieved among COST231 and Ericsson models. The effectiveness
of Stanford University Interim Model is also discussed.
62 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T2_DCN3_3_1569882325
Title
:
Access Control and Privacy in MANET Emergency Environment
Authors :
Asmidar Abu Bakar, Azimah Abdul Ghapar, Roslan Ismail
Abstract
Mobile ad hoc networks (MANETs) cultivate a new research trend in today’s computing.
With some unique features such as scalability, fault tolerant and autonomous system
enable a network to be setup with or without any trusted authority. This makes MANET
suitable for the emergency and rescue operations. During an emergency situation, there
is a need for the data to be shared with the rescuers. However, there are some of the
personal data cannot be shared to all rescuers. Thus, the privacy and security of data
becomes a main concern here. This paper addresses these issues with a combination of
access control mechanism and privacy policy to ensure that the privacy and security of
personal data is protected accordingly.
Paper ID :
T2_DCN3_4_1569901689
Title
:
Associative Data Models for Voluminous Data Representation
and Processing
Authors :
Amir Hossein Basirat, Asad Khan, Heinz Schmidt
Abstract
With emerging interest to leverage massive amounts of data available in open sources
such as the Web for solving long standing information retrieval problems, the question
as how to effectively process immense data sets is becoming increasingly relevant. In
this paper, this question will be addressed by looking at distributed processing approach
for scalable data recognition and processing. For this purpose; a highly distributable,
and single-cycle learning associative framework, known as Edge Detecting Hierarchical
Graph Neuron (EdgeHGN) is developed which uses a universal structure for all data types.
While the proposed scheme is fundamentally different from all published approaches
in data management, it provides comparable performance benchmarks when tested
against well-known large-scale data management schemes like Distributed MapReduce
and GraphLab.
page
| 63
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T2_DCN3_5_1569916921
Title
:
Performance Evaluation of Distributed Video Coding with Different
Channel Encoding Techniques
Authors :
Kin Honn Chiam, Mohd Fadzli Mohd Salleh
Abstract
Most recently, the low density parity check codes are chosen as the channel encoding
method to encode the Wyner-Ziv frames in distributed video coding. These codes
involve much complicated encoding and decoding algorithms, and might increase the
processing time of the system. In this paper, we use the codes with simpler encoding
and decoding algorithms, the Reed Solomon codes, and compare the performance of
both codes in encoding the Wyner-Ziv frames. The proposed model is verified with the
addition of white Gaussian noise. The simulation shows that the output video sequence
is of acceptable quality compared to the current model with the low density parity check
codes. The proposed model is also more efficient as the results could be obtained in a
shorter time.
Paper ID :
T2_DCN3_6_1569903219
Title
:
Classifying Peer-to-peer Traffic Using Protocol Hierarchy
Authors :
Somnuk Puangpronpitag, Thongchai Chuachan
Abstract
Detection and classification of peer-to-peer traffic are still difficult tasks for bandwidth
shapers. First, peer-to-peer traffic is not easy to detect, and can be a serious problem.
Second, some peer-to-peer applications may be desirable, while some may be
undesirable. Hence, different peer-to-peer applications should also be treated differently.
The previous work of peer-to-peer traffic detection still faces both problems. So, in this
paper, we propose new classification mechanisms to solve the problems. Our proposed
solution has been implemented by using JAVA, and experimented on a network test-bed.
Experimental results have demonstrated that our extended classification mechanism
can improve the peer-to-peer traffic detection and classification.
64 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T2_DCN4_1_1569890449
Title
:
Enhance the Performance of ICMP Protocol by Reduction the IP
Over Ethernet Naming Architecture
Authors :
Waleed Hussein, Longzheng Cai, Shaymaa Alyawer
Abstract
This study addresses the Internet Control Message Protocol (ICMP) performance
problems arising in Internet protocol (IP) over Ethernet networks. These problems arise
because of the compatibility issue between two different compositional protocols: the
IP and Ethernet protocol. The motivation behind addressing the compatibility problem is
to improve the security and performance of networks by studying the link compatibility
between the Ethernet and IP protocols. The findings of this study have given rise to
proposals for modifications. A reduction in the current naming architecture design
is advocated to improve the performance and security of IP over Ethernet networks.
The use of the IP address, as one flat address for the naming architecture, is proposed
instead of using both the IP and Media Access Control (MAC) addresses. The proposed
architecture is evaluated through a simulated cancellation of the use of the Address
Resolution Protocol (ARP) protocol.
Paper ID :
T2_DCN4_2_1569901185
Title
:
Early Detection of Incident Using Vehicular Ad-hoc Network
Authors :
Bharat Singh, Halabi Hasbullah, Mohd Yunus Nayan, Bhumit Tahlan
Abstract
Vehicular Ad-hoc Networks (VANET) are currently used to investigate ITS (Intelligent
Transportation Systems) design solutions for road safety and traffic monitoring
management. Through the vehicle information exchange to vehicles, road side units
(RSU) and infrastructure nodes, Traffic Monitoring Center (TMC) can support incident
detection monitoring and management. In this context, Early Detection of Incident (EDI)
presents and discusses in this paper, a Vehicle-to-Vehicle (V2V) cooperative technique
for detecting incident early using Incident Detection Node (IDN). EDI is experimented
under small-scale highway based scenario using two cars equipped with on-board unit
and one access point (AP). EDI is evaluated with measurement of received signal strength
indication (RSSI) using network monitoring tool. The experimented results demonstrate
average throughput, average signal strength, overall performance of AP in vehicle-toroadside (V2R). EDI results demonstrate incident detection probabilities and capability
to detect accurately.
page
| 65
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T2_DCN4_3_ 1569901551
Title
:
Lifetime and Coverage Maximization Technique for
Mobile Sensor Networks
Authors :
Muhammad Amir Khan, Halabi Hasbullah, Babar Nazir
Abstract
In recent times possess viewed a developing desire for the actual apps connected with
wireless sensor communities (WSNs). In some of these apps, for instance lookup and
also relief and also battlefield reconnaissance, a few cell nodes will be implemented so
as to in concert survey an area of interest and/or conduct specific monitoring jobs. Like
venture one of the detectors demands internode discussion thereby sustaining network
on the web connectivity is important to the potency of WSNs. Though on the web
connectivity could be provisioned with medical period then continual by way of watchful
coordination when nodes go, extreme failing of your node postures an issue because
network could get partitioned. Numerous strategies that will practice node moving to
restore on the web connectivity possess been recently proposed. Even so, these types of
strategies tend to disregard the feasible lack of insurance policy coverage in most areas,
both a result of the failing alone or a result of the connectivity-limited concentrate on
the recuperation. This paper floods that hole simply by addressing the actual on the web
connectivity and also insurance policy coverage worries within the included manner. A
new node repositioning Method along with a smaller amount percentage decrease in
insurance policy coverage Intended for Mobile Sensor Sites protocol will be shown. Just
about every next door neighbor quickly relocates to replacement the actual failed node,
one at a time, then returns time for its authentic location. The simulation outcomes
confirm the potency of the actual protocol.
66 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T2_DCN4_4_1569901487
Title
:
A Performance Comparison of Recent Open Source Wireless Sensor
Network Supporting Simulators
Authors :
Muhammad Amir Khan; Halabi Hasbullah; Babar Nazir
Abstract
Any common methodology for functionality research in the field of communication
systems engineering is network simulation. There is always the overriding worry when
utilizing simulation that the results may not reflect appropriate behavior. Therefore, it is
important to recognize the particular strengths and also flaws of such simulators. There
are a variety of network simulators, as an illustration, NS-2, NS-3, OMNET++, SWAN,
OPNET, Jist, and also GloMoSiM and so forth. As a result, the selection of any network
simulator for assessing investigation function is really a critical activity for researchers.
The leading emphasis in this research is usually to examine the particular advanced,
open source network simulators based on the parameters, CPU usage, memory usage,
computational time period, and also scalibility by simulating a wireless sensor network
routing protocol, to identify a best network simulator to the investigation area.
Paper ID :
T2-DCN4_5_1569903131
Title
:
Security Framework for Low Latency Vanet Applications
Authors :
Asif Wagan, Tang Jung Low
Abstract
Vehicular Ad hoc Network (VANET) is a communication network for vehicles on the
highway. Presently, VANET technology is surrounded with security challenges and it is
essentially important for VANET to successfully implement a security measure according
to the safety applications requirements. Many academia researcher have suggested a
various solutions to encounter security attacks and also proposed models to strengthen
security characteristics i.e. authentication, privacy, and non-repudiation. The current
most suitable security scheme for VANET is an Elliptic Curve Digital Signature Algorithm
(ECDSA). However ECDSA is associated with high computational cost, therefore it is
considered an inappropriate approach for low latency safety applications. In this study,
a security framework is proposed to solve above issues; a proposed framework utilizes
both traditional cryptographic schemes; asymmetric PKI and symmetric respectively.
The asymmetric cryptography scheme is used to securely exchange the key and
authentication process and symmetric cryptography scheme is used for low latency
safety application (especially time critical safety applications). The suggested framework
is not only reduce the latency but also enhance the security cryptography characteristics
by establishing trust between ongoing vehicles.
page
| 67
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
COMPUTATIONAL INTELLIGENCE TRACK
Paper ID :
T3_CI1_1_1569867035
Title
:
An Efficient Computational Intelligence Technique for
Classification of Protein Sequences
Authors :
Muhammad Javed Iqbal, Ibrahima Faye, Abas Md Said,
Brahim Belhaouri Samir
Abstract
Many artificial intelligence techniques have been developed to process the constantly
increasing volume of data to extract meaningful information from it. The accurate
annotation of the unknown protein using the classification of the protein sequence into
an existing superfamily is considered a critical and challenging task in bioinformatics
and computational biology. This classification would be helpful in the analysis and
modeling of unknown protein to determine their structure and function. In this
paper, a frequency-based feature encoding technique has been used in the proposed
framework to represent amino acids of a protein’s primary sequence. The technique
has considered the occurrence frequency of each amino acid in a sequence. Popular
classification algorithms such as decision tree, naïve Bayes, neural network, random
forest and support vector machine have been employed to evaluate the effectiveness
of the encoding method utilized in the proposed framework. Results have indicated that
the decision tree classifier significantly shows better results in terms of classification
accuracy, specificity, sensitivity, F-measure, etc. The classification accuracy of 88.7% was
achieved over the Yeast protein sequence data taken from the well-known UniProtKB
database.
Paper ID :
T3_CI1_2_1569866451
Title
:
Multi-Color Recognition Based On Mini-Max Color Threshold
Authors :
Zacharie MBaitiga
Abstract
This paper discusses the multi-color recognition using the min-max color threshold for
outdoor robot navigation. All colors used in this project are RGB orthogonal color space
in order to see how much of each primary color between min and max that can be
observed in the color to be recognized. The white color value in the color space is set
as the object for which the target color to be recognized belongs, while the black color
value is set as the object background. The recognition process is done by summing up
first the values of the red, green and blue in each color to obtain the rgb sum value,
which is then divided by the individual color element to obtain the color threshold. This
threshold is compared to the originally color threshold for the recognition, where a
satisfactory result is expected as the project is not yet finished.
68 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T3_CI1_3_1569866697
Title
:
Empirical Analysis of Parallel-Narx Recurrent Network for
Long-Term Chaotic Financial Forecasting
Authors :
Jadid Abdulkadir Said, Suet Peng Yong
Abstract
Financial data are characterized by non-linearity, noise, volatility and are chaotic in nature
thus making the process of forecasting cumbersome. The main aim of forecasters is to
develop an approach that focuses on increasing profit by being able to forecast future
stock prices based on current stock data. This paper presents an empirical long term
chaotic financial forecasting approach using Parallel Non-linear Auto-Regressive with
eXogenous Input (P-NARX) network trained with Bayesian Regulation algorithm. Kuala
Lumpur Composite daily Index (KLCI) collated from FTSE Bursa Malaysia is used as the
data sets, ranging from 1988 to 2013. Other commonly used training algorithms are also
examined. The experimental results based on mean absolute percentage error (MAPE)
and other forecasting error metrics shows that P-NARX network trained with Bayesian
Regulation slightly outperforms Levenberg-Marquardt, Resilient Back-propagation and
one-step-secant training algorithm in forecasting daily Kuala Lumpur Composite Indices.
Paper ID :
T3_CI1_4_1569866843
Title
:
A Computer Aided System for Breast Cancer Detection
and Diagnosis
Authors :
Hamada Al-Absi, Brahim Belhaouri Samir, Suziah Sulaiman
Abstract
Breast cancer has become a significant health problem worldwide as it is considered
the leading cause of death among women. In order to prevent the increase of deaths
caused by breast cancer, early diagnosis through computer aided diagnosis systems has
been very effective. This paper introduces a computer aided system for detecting and
classifying suspicious regions in digital mammograms. The system starts by extracting
regions of interest that are suspicious of containing cancerous cells. Then, all these
regions are classified to check whether they are normal or abnormal. For the detection
phase, template matching techniques are utilized. As for the classification phase,
a 3-step process is applied which enclose feature extraction with wavelet transform,
feature selection with statistical techniques and classification with clustering K-Nearest
Neighbor classifier. A preliminary result shows a 97.73 % accuracy rate.
page
| 69
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T3_CI1_5_1569851419
Title
:
Infomax and FASTICA Using PCA as Preprocessor for Airwave
Removal in Seabed Logging
Authors :
Adeel Ansari, Afza Shafie, Abas Md Said, Seema Ansari, Elisha
Tadiwa Nyamasvisva, Muhammad Abdulkarim, Muhammad Rauf
Abstract
This research aims to apply the FASTICA and Infomax algorithm in the field of seabed
logging, by utilizing the Principal Component Analysis (PCA) as pre-processor. All the three
algorithms are statistical algorithms used for signal deconvolution and are respectively
in the field of Independent Component Analysis (ICA). In seabed logging (SBL) implies
the marine controlled source electromagnetic (CSEM) technique for the detection of
hydrocarbons underneath the seabed floor. The results from SBL, indicate the presence
of Hydrocarbon, but due to the presence of noise, in the form of airwaves, interfere with
the signals from the subsurface and tend to dominate the receiver response. Hence,
the Infomax and FASTICA de-convolution algorithms are used, considering PCA as a
pre-processor to filter out the airwaves which disrupt the subsurface signals within the
receiver response. The results obtained from simulations and their comparative analysis,
indicate that the results from the infomax algorithm are better.
Paper ID :
T3_CI1_6_1569867133
Title
:
Image Processing Based Vehicle Detection and Tracking Method
Authors :
Prem Kumar Bhaskar, Suet Peng Yong
Abstract
Vehicle detection and tracking plays an effective and significant role in the area of traffic
surveillance system where efficient traffic management and safety is the main concern. In
this paper, we discuss and address the issue of detecting vehicle / traffic data from video
frames. Although various researches have been done in this area and many methods
have been implemented, still this area has room for improvements. With a view to do
improvements, it is proposed to develop a unique algorithm for vehicle data recognition
and tracking using Gaussian mixture model and blob detection methods. First, we
differentiate the foreground from background in frames by learning the background.
Here, foreground detector detects the object and a binary computation is done to define
rectangular regions around every detected object. To detect the moving object correctly
and to remove the noise some morphological operations have been applied. Then the
final counting is done by tracking the detected objects and their regions. The results are
encouraging and we got more than 96% accuracy in detection and tracking using the
Gaussian Mixture Model and Blob Detection methods.
70 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T3_CI2_1_1569867215
Title
:
A Semi-Apriori Algorithm for Discovering the Frequent Itemsets
Authors :
Sallam Osman Fageeri, Rohiza Ahmad, Baharum Baharudin
Abstract
Mining the frequent itemsets are still one of the data mining research challenges.
Frequent itemsets generation produce extremely large numbers of generated itemsets
that make the algorithms inefficient. The reason is that the most traditional approaches
adopt an iterative strategy to discover the itemsets, that’s require very large process.
Furthermore, the present mining algorithms cannot perform efficiently due to high and
repeatedly database scan. In this paper we introduce a new binary-based Semi-Apriori
technique that efficiently discovers the frequent itemsets. Extensive experiments had
been carried out using the new technique, compared to the existing Apriori algorithms,
a tentative result reveal that our technique outperforms Apriori algorithm in terms of
execution time.
Paper ID :
T3_CI2_2_1569882187
Title
:
A Cost-Sensitive Approach to Named Entity Recognition
with Category Hierarchy
Authors :
Shohei Higashiyama, Mathieu Blondel, Kazuhiro Seki,
Kuniaki Uehara
Abstract
Named Entity Recognition (NER) is a fundamental natural language processing task for
the identification and classification of expressions into predefined categories such as
person and organization. Existing NER systems usually target about 10 categories and
do not incorporate analysis of category relations. However, categories often belong
naturally to some predefined hierarchy. In such cases, the distance between categories
in the hierarchy becomes a rich source of information that can be exploited and which
is intuitively useful particularly when the categories are numerous. As described in this
paper, we propose a NER system that can leverage category hierarchy information by
introducing, in the structured Perceptron framework, a cost function that more strongly
penalizes category predictions that are more distant in the hierarchy from the correct
category. Our experimental results on the GENIA biomedical text corpus strongly suggest
the effectiveness of the proposed method at decreasing misclassification errors.
page
| 71
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T3_CI2_3_1569871179
Title
:
Parallel Kalman Filter-Based Multi-Human Tracking in
Surveillance Video
Authors :
Abdul-Lateef Yussiff, Suet Peng Yong, Baharum Baharudin
Abstract
A novel approach to robust and flexible person tracking using an algorithm that integrates
state of the arts techniques; an Enhanced Person Detector (EPD) which combines HOG
features and Haar features to detect human in images, and the second technique is
the Kalman-filtering algorithm, for tracking multiple person in parallel within video
sequence. This proposed algorithm employs multiple instances of Kalman Filter with
complex assignment constraints implemented in parallel on Graphics Processing Unit
(GPU-NVDIA CUDA) for tracking stationary and non-stationary multiple person even
in the presence of occlusion. A Kalman filter is recursive algorithm which predict the
state variables and further uses the observed data to correct the estimated value.
Data association in different frames are solved using Hungarian technique to link data
in previous frame to the current frame. The benefit of this research is an adoption of
standard kalman Filter for multiple target tracking of humans in real time. This can
further be used to in all applications where human tracking is needed. The parallel
implementation has increased the frame processing speed by 20-30 percent over the
CPU implementation.
72 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T3_CI2_4_1569871921
Title
:
A Framework for the Automatic Identification of Algae
(Neomeris Vanbosseae M.A.Howe):U3S
Authors :
Ching Soon Tan, Phooi Yee Lau, Siew Moi Phang, Tang Jung Low
Abstract
Neomeris vanbosseae M.A.Howe (NVH) is an algae belonging to the Chlorophyta, which is
a very diverse group of algae. Therefore when an algae biologist establishes an abundance
assessment for algae biodiversity, the taxonomic identification and quantification could
frequently lead to a time intensive procedure which is prone to a counting bias, due
to fatigue when processing large pools of data samples repeatedly. To improve the
effectiveness, this paper proposed a framework, being an assistive tool, to help marine
biologists. The framework consists of (1) pre-processing the image, (2) segmenting
region of interest, (3) extracting features (namely four different geometric features)
, (4) evaluating and combining those features based on the given decision criterions,
and (5) the quantification. Our methodology achieved satisfactory performance (NVH
abundance) as it’s able to provide an encouraging result with 78.38% detection rate
yielded by the comparison between manual count and our system automatic count. The
major contribution of this work is the development and the deployment of an automatic
identification system, named U3S, for biodiversity abundance studies of algae to assist
the marine biologist in identifying algae species, complementing the existing operator
intensive procedures.
page
| 73
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T3_CI2_5_1569878369
Title
:
Gender Recognition on Real World Faces Based on Shape
Representation and Neural Network
Authors :
Olasimbo A. Arigbabu, Sharifah Mumtazah Syed Ahmad,
Wan Azizun Wan Adnan, Salman Yussof, Vahab Iranmanesh,
Fahad Layth Malallah
Abstract
Gender as a soft biometric attribute has been extensively investigated in the domain of
computer vision because of its numerous potential application areas. However, studies
have shown that gender recognition performance can be hindered by improper alignment
of facial images. As a result, previous experiments have adopted face alignment as an
important stage in the recognition process, before performing feature extraction. In
this paper, the problem of recognizing human gender from unaligned real world faces
using single image per individual is investigated. The use of feature descriptor to form
shape representation of face images with any arbitrary orientation from the cropped
version of Labeled Faces in the Wild (LFW) dataset is proposed. By combining the feature
extraction technique with artificial neural network for classification, a recognition rate
of 89.3% is attained.
Paper ID :
T3_CI2_6_1569898769
Title
:
Color Space Selection for Human Skin Detection Using
Color-Texture Features and Neural Networks
Authors :
Hani K. Al-Mohair, Junita Mohamad-Saleh, Shahrel Azmin Suandi
Abstract
Skin color is a robust cue in human skin detection. It has been widely used in various
human-related image processing applications. Although many researches have been
carried out for skin color detection, there is no consensus on which color space is the
most appropriate for skin color detection because many researchers do not provide
strict justification of their color space choice. In this paper, a comprehensive comparative
study using the Multilayer Perceptron artificial neural network (MLP), which is a universal
classifier, is carried out to evaluate the overall performance of different color-spaces for
skin detection. It aims at determining the most optimal color space using color and colortexture features separately. The study has been carried out using images of different
databases. The experimental results showed that the YIQ color space gives the highest
separability between skin and non-skin pixels among the different color spaces tested
using color features. Combining color and texture eliminates the differences between
color spaces but leads to much more accurate and efficient skin detection.
74 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T4_BIC1_5_1569889229
Title
:
Real-Time Video Enhancement for Various Weather
Conditions Using Dark Channel and Fuzzy Logic
Authors :
Ahmad Alajarmeh
Abstract
Rain, fog and haze are natural phenomena that fade scenes, limit the visibility range,
and cause shifts in colors. These phenomena also play a decisive role in determining the
degree of reliability of many kinds of outdoor applications, such as aerial and satellite
imaging, surveillance, and driver assistance systems. Thus, removing their effects from
images/videos is very crucial. Due to its mathematically ill posed nature, enhancement
process of rain, fog, and haze plagued images/videos is highly challenging. In this paper,
we propose a fast yet robust technique to enhance the visibility of video frames using
the dark channel prior combined with fuzzy logic-based technique. The dark channel
prior is a statistical regularity of outdoor haze-free images based on the observation that
most local patches in the haze-free images contain pixels which are dark in at least one
color channel, where the Fuzzy Logic-based technique is used to map an input space to
an output space using a collection of fuzzy membership functions and rules to decide
softly in case of uncertainties. The combination of the dark channel and the Fuzzy Logicbased technique will produce high quality haze-free images in real-time. Furthermore, it
will be combined with rules derived from the stable atmospheric scattering model and
will yield a fast yet high quality enhancement results.
Paper ID :
T3_CI3_1_1569883733
Title
:
MetOcean Data to Linked Data
Authors :
Kamaluddeen Usman Danyaro, Jafreezal Jaafar, Mohd Shahir Liew
Abstract
This paper describes the Linked Data initiative in meteorological environment. MetOcean
data are meteorological and oceanographic datasets that provide information to
meteorological industries, petroleum industries as well as research institutes. The
MetOcean has a myriad of data and scattered along the globe which lack Linked Data
or Semantic Web capabilities. Linked Data is a concept of publishing interoperable data
globally. As a way of integrating MetOcean data, this work used D2R server, a server that
manages data sources and translates it to Web data. Therefore, the paper elucidates
the process of developing Linked Data in Meteorological sector. Also, the results were
queried using SPARQL endpoint as a graph. This approach was analyzed using F-measure
which reveals the system is sufficient for querying and accessing the data as a graph.
page
| 75
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T3_CI3_2_1569883761
Title
:
Hybrid NSGA-II of Three-Term Backpropagation Network for
Multiclass Classification Problems
Authors :
Ashraf Osman Ibrahim, Siti Mariyam Shamsuddin,
Nor Bahiah Ahmad, Mohd Najib Mohd Salleh
Abstract
Hybridization has become one of the current focuses of new research areas of the
evolutionary algorithms over the past few years. Hybridization offers better speed of
convergence to the evolutionary approach and better accuracy of the final solutions.
This paper presents a hybrid non-dominated sorting genetic algorithm-II (NSGA-II) to
optimize Three-Term Backpropagation (TBP) network in terms of two objectives which
are: accuracy and complexity of the network. Backpropagation algorithm (BP) is often
used as a local search algorithm and when combined with NSGA-II, the performance
of NSGA II is enhanced due to the improvement of the individuals in the population.
The experimental results show that the proposed method is effective in multiclass
classification problems. The results of the hybrid approach to the classification problems
are compared with multiobjective genetic algorithm based TBP network (MOGATBP) and
some methods found in the literature. Moreover, the results indicate that the proposed
method is a potentially useful classifier for enhancing classification process ability.
76 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T3_CI3_3_1569888209
Title
:
Options Strategy for Technology Companies
Authors :
Teik Kheong Tan, Benny Bing
Abstract
Product innovation in the technology ecosystem can be enhanced through proper
management of the supply chain. While there are several strategies that technology
investors favor for profitability during the earning cycles, one of the strategies utilized
quite often is the short strangle. A short strangle is an effective strategy with a
theoretically unlimited risk. For example, Google’s recent earnings sent its share price
up sharply by 13.8%, breaking the $1,000 barrier for the first time and increasing the
company’s value by nearly $40 billion within a day. Such variations can be very costly
for an investor who trades around earnings using short strangles. The aim of this paper
is to debunk this myth and demonstrate how a short strangle can be traded safely as
long as certain requirements are met. We will employ two companies in the technology
sector to illustrate how our criteria can help in making better trading decisions. Since the
volatility crush is the key determinant for profitability, we modeled the crush between
the implied volatility of the front and next earliest expiration using Bayesian statistics.
The accuracy of the Bayesian model is quantified using the Google stock as an example
and it is shown that the method is reasonably accurate even with sharp changes in
volatility trends.
Paper ID :
T3_CI3_4_1569888257
Title
:
Discriminative Discriminant Common Vector in Face Verification
Authors :
Ying Han Pang, Andrew Teoh Beng Jin,
Yee Ping Liew, Fan Ling Goh, Chu Kiong Loo
Abstract
Discriminant Common Vectors (DCV) is proposed to solve small sample size problem.
Face recognition encounters this dilemma where number of training samples is always
smaller than the data dimension. In literature, it is shown that DCV is efficient in face
recognition. In this paper, DCV is enhanced for further boosting its discriminating
power. This modified version is namely Discriminative Discriminant Common Vectors
(DDCV). In this technique, a local Laplacian matrix of face data is computed. This matrix
is used to derive a regularization model for computing discriminative class common
vectors. Experimental results demonstrate that DDCV illustrates its effectiveness on face
verification, especially on facial images with significant intra class variations.
page
| 77
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T3_CI3_5_1569888843
Title
:
Airwaves Estimation in Shallow Water CSEM Data: Multi-Layer
Perceptron versus Multiple Regression
Authors :
Muhammad Abdulkarim, Afza Shafie, Wan Fatimah Wan Ahmad,
Adeel Ansari, Elisha Tadiwa Nyamasvisva
Abstract
In this study, a Multi-Layer Perceptron Neural Network and Multiple Regression
techniques are used to estimate airwaves associated with shallow water ControlledSource Electro-Magnetic (CSEM) data. Both techniques are appropriate for the
development of estimation models. However, multiple regression models make some
assumptions about the underlying data. These assumptions include independence,
normality and homogeneity of variance. Conversely, neural network based models
are not constrained by such assumptions. The performance of the two techniques is
calculated based on coefficient of determination (R2) and mean square error (MSE). The
results indicate that MLP produced better estimate for the airwaves with MSE of 0.0113
and R2 of 0.9935.
Paper ID :
T3_CI3_6_1569907891
Title
:
Performance Comparison of Canny and Sobel Edge Detectors on
Balloon Snake in Segmenting Masses
Authors :
Abdul Kadir Jumaat
Abstract
The most common problem in image processing is image segmentation. One of the
methods which can segment an image with a high accuracy is Balloon Snake. It uses the
energy minimization conception where it has a dynamic behavior that deforms from
an initial position and converges to the boundary of the object in an image. However,
we found that the accurateness always influences by the edge map detector that being
used in implementing the Balloon Snake. Edge map detector is used to strengthen the
boundary of the object before the object is segmented. Two edge map detectors are
used in this research namely Canny and Sobel edge detector. Both edge detectors are
implemented in Balloon Snake in segmenting 40 masses in breast ultrasound images.
The pixel area traced by the two combination methods namely Canny and Balloon Snake
and Sobel and Balloon Snake are evaluated. The accuracy is measured based on the
percentage pixel area difference between radiologist and both combination methods. It
is found that the combination of using Canny and Balloon Snake give 3.5% percentage
of pixel area difference which is smaller compared to the other combination which have
12.7% percentage pixel area difference.
78 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T2_CI4_1_1569900933
Title
:
Identifying Universal Facial Emotion Markers for Automatic
3D Facial Expression Recognition
Authors :
Amal Azazi, Syaheerah Lebai Lutfi, Ibrahim Venkat
Abstract
Facial expressions convey human emotions as a simple and effective non-verbal
communication method. Motivated by this special characteristic, facial expression
recognition rapidly gains attention in social computing fields, especially in Human
Computer Interaction (HCI). Identifying the optimal set of facial emotion markers is
an important technique that not only reduces the feature vector dimensionality, but
also impacts the recognition accuracy. In this paper, we propose a new emotion marker
identification algorithm for automatic and person-independent 3D facial expression
recognition system. First, we mapped the 3D face images into the 2D plane via conformal
geometry to reduce the dimensionality. Then, the identification algorithm is designed to
seek the best discriminative markers and the classifier parameters simultaneously by
integrating three techniques viz., Differential Evolution (DE), Support Vector Machine
(SVM) and Speed Up Robust Feature (SURF). The proposed system yielded an average
recognition rate of 79% and outperformed the previous studies using the Bosphorus
database.
page
| 79
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T2_CI4_2_1569903225
Title
:
Lung Cancer Diagnosis Using CT-Scan Images Based on
Cellular Learning Automata
Authors :
Nooshin Hadavi, Md Jan Nordin, Ali Shojaeipour
Abstract
Lung cancer has killed many people in recent years. Early diagnosis of lung cancer can
help doctors to treat patients and keep them alive. The most common way to detect lung
cancer is using the Computed Tomography (CT) image. The systems that are created by
the integration of computers and medical science are called Computer Aided Diagnosis
(CAD). A CAD system that is adopted for the diagnosis lung cancer, uses lung CT images
as input and based on an algorithm helps doctors to perform an image analysis. With
the help of CAD, doctors can make the final decision. This paper is a study concerning
automatic detection of lung cancer by using cellular learning automata. Images include
some unwanted data and some feature that are important for processing; pre-processing
improves images by removing distortion and enhance the important features. This
system used lung CT scan so we applied some pre-processing method such as Gabor filter
and region growing to improve CT images. After pre-processing step according features
the lung cancer nodule was extracted. The obtained image through previous steps was
entered to cellular learning automata lattice for training and making them possess the
ability to detect lung cancer. The obtained results show, the proposed approach can
reduce the error rate.
Paper ID :
T2_CI4_3_1569904591
Title
:
Recognition of Occluded Faces Using an Enhanced EBGM Agorithm
Authors :
Badr Lahasan, Ibrahim Venkat, Syaheerah Lebai Lutfi
Abstract
A new approach to recognize occluded faces is presented in this paper to enhance the
conventional Elastic Bunch Graph Matching (EBGM) technique. In the conventional
EBGM approach, facial landmarks need to be chosen manually in the initial stage and
a single graph per face had been modeled. Our proposed approach intuitively fuses a
Harmony search based optimization algorithm over the EBGM approach to automatically
choose optimal land marks for a given face. Further, instead of using a single graph,
we deploy component level sub-graphs and locate optimal landmarks by maximizing
the similarity between each of the sub-graphs. Experimental results show that the
proposed automatic method achieves an improved recognition rate when compared to
the conventional EBGM approach.
80 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T2_CI4_4_1569905735
Title
:
Towards Real Time Multidimensional Hierarchical
Graph Neuron (mHGN)
Authors :
Benny Benyamin Nasution
Abstract
The Hierarchical Graph Neuron (HGN) has already been known that it implements a
single cycle memorization and recall operation. The scheme also utilizes small response
time that is insensitive to the increases in the number of stored patterns. In this improved
approach, the architecture is developed so, that it is not only suitable for scrutinizing
1D- or 2D-patterns; it can also accommodate multidimensional patterns. As the result,
the multidimensional HGN (mHGN) architecture is able to recognize multidimensional
patterns. Some approaches usually need a lot number of cycles and require complex
deployment, when patterns need to be memorized and recalled. Such capability of
mHGN can contribute to recognizing not only concrete but also abstract patterns in
real time manner. The mHGN architecture still encompasses a lightweight in-network
processing algorithm which does not require expensive floating point computations;
hence, it is still suitable for real-time applications.
Paper ID :
T2_CI4_5_1569890219
Title
:
An Adaptive Method to Determine the Number of Clusters
in Clustering Process
Authors :
Huan Doan, Thuan Nguyen
Abstract
A difficult problem of most clustering algorithms is how to specify the appropriate
number of clusters. This paper proposes an adaptive method of selecting of number of
clusters in clustering process by making coefficients indicated the appropriate number
of clusters. The intra-cluster coefficient reflects intra distortion of cluster through
maximum distance and a mean distance of cluster’s extremely marginal objects. The
inter-cluster coefficient reflects distance among clusters. It is ratio between closest
distance from this cluster’s centre to an extremely marginal object of other cluster and
mean distance from this cluster’s centre to all of extremely marginal object of other
cluster respectively. A new coefficient that indicates the appropriate number of clusters
is build from the intra-cluster coefficient and inter-cluster coefficient. The looking for
extremely marginal objects and the new coefficient are integrated in a weighted FCM
algorithm and it is calculated adaptively while the weighted FCM is processing. The
weighted FCM algorithm integrated new coefficient is called FCM++. We experiment
with FCM++ on some data sets of UCI: Iris, Wine, Soybean-small and show encouraging
results.
page
| 81
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T2_CI4_6_1569890081
Title
:
Development of an Intelligent Scorpion Detection Technique
Using Vibration Analysis
Authors :
Abiodun Musa Aibinu, Bala Sadiq, Elijah Joseph, Habeeb Salau,
Momoh Salami
Abstract
A possible solution to address the problem of Scorpion stings is the capability of
detecting its presence earlier before it stings. This paper presents efforts in Scorpion
detection using substrate vibration modelling approach. An eight stage approach has
been presented in this work. Using sinusoidal signal, signal representing Scorpion
behaviour was firstly sampled and then amplified before transmitting to a nearby
receiving module. The received signal undergoes filtering for noise removal before being
modelled for coefficients determination. The computed coefficients were then clustered
for analysis of behavioural determination. Results obtained in this work show that the
proposed technique can be used for Scorpion detection.
BIO-INSPIRED COMPUTATION TRACK
Paper ID :
T4_BIC1_1_1569902039
Title
:
A Distributed Framework for Supporting 3D Swarming Applications
Authors :
Ghazaleh Pour Sadrollah, Jan Carlo Barca, Asad Khan, Jens Eliasson,
Ilankaikone Senthooran
Abstract
In-flight wireless sensor networks (WSN) are of increased interest owing to efficiency
gains in weight and operational lifetime of IP-enabled computers. High impact 3D
swarming applications for such systems include autonomous mapping, surveying,
servicing, environmental monitoring and disaster site management. For distributed
robotic applications, such as quad copter swarms, it is critical that the robots are
able to localise themselves autonomously with respect to other robots and to share
information. The importance of fast and reliable dissemination of localised information
in these elastic three dimensional networks provides us sufficient reason to present a
distributed framework and hardware settings for passing this information pervasively
through the swarm. The research field of Internet of Things (IoT) have for several years
been addressing issues around low-power, low-bandwidth wireless communication.
By applying IoT technologies to the challenges around swarming, new opportunities
are created. However, since IoT have been primarily used with stationary devices, the
introduction of flying sensors will add more challenges to address.
82 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T4_BIC1_2_1569902663
Title
:
A Polymorphic Recogniser for Distributed Intelligence in
Wireless Sensor Networks
Authors :
Alexander Senior, Ahmet Sekercioglu, Asad Khan
Abstract
We present an innovative scheme for performing pattern recognition in wireless
sensor networks. It is based on the concept of a distributed computer that can alter
itself to adjust to the user’s needs. By emulating the distributed nature of biological
computational devices and evenly spreading the computational and communication
workload throughout the network, we will reduce energy consumption and enhance
the reliability of the recognition process of sensing applications utilising this approach.
We introduce the basic concepts of the scheme as a computer that operates via
message passing (and not arithmetic operations), and show a theoretical validation of
its operation.
Paper ID :
T4_BIC1_3_1569902897
Title
:
Brain-like Classifier of Temporal Patterns
Authors :
Denis Kleyko, Evgeny Osipov
Abstract
In this article we present pattern classification system which is used Vector Symbolic
Architecture (VSA) for processing, representation, learning and consecutive classification
of patterns. As a showcase we have used classification of vibration sensors measurements
to vehicles types. On the quantitative side the proposed classifier requires only few kB
of memory to classify an incoming signal against of several hundred of training samples.
To classify into N classes the classification operation requires only 2*N+1 arithmetic
operations this makes the proposed classifier directly implementable on a low-end
sensor nodes. The main contribution of this article is the proposed methodology for
encoding of raw sensory signals using distributed representation without explicitly
specifying their features and VSA based classifier.
page
| 83
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T4_BIC1_4_1569903203
Title
:
Holographic Graph Neuron
Authors :
Evgeny Osipov, Asad Khan, Anang Hudaya Muhamad Amin
Abstract
This article proposes the usage of Vector Symbolic Architectures for implementing
Hierarchical Graph Neuron. The adoption of VSA representation maintains previously
reported properties and performance characteristics of HGN and further makes it
suitable for implementation in distributed wireless sensor networks of tiny devices.
SOFTWARE ENGINEERING TRACK
Paper ID :
T4_SE1_1_1569881475
Title
:
Analysis of Design Patterns in OpenNebula
Authors :
Lukman Ab. Rahim
Abstract
Computer system models and designs have been used in helping verification and
validation activities. Computer systems have also been designed to make verification and
validation easier such as the work on Design for Verification. The concepts of separation
of concerns and modular design are two examples of how design decisions can make
verification and validation easier. The objective of this research is to verify cloud-based
systems and use its design to make the verification easier. Since a cloud-based system
consists of many interacting software and hardware components, we start with verifying
OpenNebula, a cloud-based system middleware. The methodology is to analyze
OpenNebula’s code and identify the design patterns that will later be used in simplifying
the verification. The analysis is performed by reverse engineering the code using class
diagram generation tools and code analysis functions in an Intergrated Development
Environment (IDE). This paper will present the design patterns in OpenNebula and how
it can influence the verification.
84 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T4_SE1_2_1569869721
Title
:
Common Trust Criteria for IaaS Cloud Evaluation and Selection
Authors :
Hamzeh Alabool
Abstract
As Infrastructure as a Service (IaaS) cloud becomes increasingly important to all
stakeholders; the evaluation on the degree of trust of the IaaS cloud remains a challenge.
This study aims to discover and identify the Common Trust Criteria (CTC) from contextbased trust and context-based cloud and later organized, discussed, compared, and
aggregated a conceptual model of CTC in an impartial manner. The main purposes of CTC
model are: (a) to provide Cloud Service Requesters (CSRs) with a CTC model with which
to evaluate the degree of trust that can be placed in IaaS cloud (b) to provide guidance
to Cloud Service Providers (CSPs) as to what to build into their new, widely-available
trusted IaaS cloud in order to satisfy trust requirements. To do so, a systematic review on
context based trust and context-based cloud is provided. The results indicated that there
was an important set of trust criteria such as Integrity, Benevolence, and Reputation that
were neglected from the current research related to cloud.trust.
Paper ID :
T4_SE1_3_1569866835
Title
:
A Theoretical Validation of the Number of Polymorphic
Methods as a Complexity Metric
Authors :
Amos Bajeh, Shuib Basri, Tang Jung Low
Abstract
The external quality attributes of software product are influenced by the internal and
structural properties of the design of software products. This implies that to estimate
the external quality, the internal properties need to be accurately measured. Measuring
the internal attributes requires the use of metrics that are both theoretically and
empirically valid. This work identifies and theoretically validates an OO metrics that
measures polymorphism: Number of Polymorphic methods (NOP). The property-based
and measurement theory-based validation approaches are used to show that the metric
measures the concept of complexity which has impact on the external quality attribute
of software design.
page
| 85
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T4_SE1_4_1569882139
Title
:
Assessment and Evaluation of Requirement Elicitation Techniques
Using Analysis Determination Requirements Framework
Authors :
Souhaib Besrour, Lukman Ab. Rahim, Dhanapal Durai Dominic
Abstract
Numerous requirements engineering methods have been proposed to improve the
quality of requirements documents and to increase customer satisfaction with the final
product. However, the choosing between various techniques may be confusing and
puzzling. Therefore, this paper aims to present an empirical study to assess requirement
analysis techniques, highlight their key features, strength and limitations. The empirical
study results show a high competitiveness between requirement engineering techniques
and slight score differences among them. Statistics shows that Interview technique is the
uppermost obtained score among all techniques, followed by JAD and Brainstorming
technique.
86 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T4_SE1_5_1569901895
Title
:
Work Design Characteristics and Knowledge Sharing Behavior
among Software Engineers
Authors :
Mobashar Rehman, Ahmad Mahmood, Rohani Salleh, Aamir Amin
Abstract
Knowledge sharing is important for Software Engineers because software is purely based
on individual’s knowledge and one of the sources to learn new knowledge is through
sharing. Although Software Engineering is a growing field, however research done in
this profession is still not mature. One of the areas, which have not been thoroughly
investigated in this profession, is working environment and its impact on knowledge
sharing. Focus on this aspect of Software Engineering is important because work
environment not only influences the performance of an individual but also the behavior
(which in this case will be knowledge sharing behavior). Therefore, huge number of
studies has been done conducted on designing work environment. One of the important
works done was Job Characteristics Model (also mostly used in Software Engineering
field). However, it covers only five aspects of work/job. Therefore different other studies
focused on more work design characteristics. This study analyzed the relationship
between knowledge sharing behavior and work design characteristics among Software
Engineers. Work design characteristics proposed by Morgeson and Humphrey (2006)
were used for this study. This study was conducted in Malaysia and four locations were
selected through geographical cluster sampling (simple random). Results indicated that
task identity, feedback from job, skill variety and received interdependence are the main
work design characteristics for Software Engineers. Results also indicated that all work
design characteristics has positive relationship with knowledge sharing behavior.
page
| 87
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T5_SE2_1_1569884603
Title
:
Communication Risks in GSD during RCM: Results from Literature
Authors :
Arif Ali Khan
Abstract
Majority of the software production companies are adopting Global Software
Development (GSD) and it is incessantly getting fast. Most of Software development
organizations are trying to globalize their study worldwide in order to get the various
benefits. However, GSD is not a simple task and the organizations face different
challenges. But Communication is a major issue and it becomes more complicated during
the process of Requirements Change Management (RCM). This research will result to
explore different communication risks, their causes, negative effects and mitigation
strategies to allay the identified communication risks during the RCM process by
conducting the literature review. In this study total 31 risks are identified their causes 31
and negative effects 29.Total 10 best practices are identified which are used to mitigate
the identified communication risks.
Paper ID :
T5_SE2_2_1569882401
Title
:
A Combine Usability Framework for IMCAT Evaluation
Authors :
Ziyaulhaq Aliyu, Lukman Ab. Rahim, Emy Mustapha
Abstract
Model transformation (MT) is a key component of model driven software development.
It is used to transform source model into a target model, to increase model quality and
introduce design pattern and refactoring. As with other software development artifacts,
MTs are not free from bugs and thus they must be verified. Various researches have been
carried out on model transformation verification approaches,but no one has evaluated
their usability. Indirect model checking approach for transformation (IMCAT) is an
approach that can verify code generators by model checking the generated code. In this
paper a combine usability model to evaluate IMCAT usability related to its learnability,
efficiency and reliability will be presented.
88 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T5_SE2_3_1569883009
Title
:
Handling Tradeoffs Between Agile and Usability Methods
Authors :
Saad Masood Butt, Wan Fatimah Wan Ahmad, Lukman Ab. Rahim
Abstract
In the past few years, many organization have tried to improve their software development
methodology. Different development approaches had been introduced but only a
few are still functioning in the software industry. Agile software development is one
the approach which is currently successful in software industry. For the development
of interactive and usable software this agile approach needs to integrate with usability
approaches. But this integration is not clear as both agile and usability follows iterative
approach of development while agile approach is more toward on writing code and
development of a running system; whereas, usability focused on the user interface to
make the software more usable and increase its usability by following UCD process.
This paper provides an extensive related work on the integration of agile methods with
usability that highlights critical issues in agile methods and shows the importance of
usability in agile methods. In the end the proposed model is discussed to handle tradeoff
between usability and agile methods under one model.
Paper ID :
T5_SE2_4_1569883597
Title
:
Improving Effectiveness of Testing Using Reusability Factor
Authors :
Maryam Ahmed, Rosziati Ibrahim
Abstract
An important aspect of software development and engineering is software testing.
Despite the indispensable role of testing, developers find the process as tiring and
repetitive. Testing has been known to take more than half of system development time
and effort. However, the concept of software reuse reduces the boredom of repeating
the same activity by generating reusable codes that can be used to test other systems.
This paper discusses the economic effect of reusability in testing and the effect of
reusability in testing effort. Reusability can be said to reduce testing effort and increase
the economic value (profit) of software testers without compromising the quality of the
software.
page
| 89
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T5_SE2_5_1569883695
Title
:
A Review of Educational Games Design Frameworks:
An Analysis from Software Engineering Perspective
Authors :
Mifrah Ahmad, Lukman Ab. Rahim, Noreen Izza Arshad
Abstract
Game-based learning allows leveraging on young learners preference towards playing
games to turn games into tools for learning. There are a number of frameworks
developed in the various aspects and theories of game-based learning. There are many
relationships in existing frameworks that has been discussed regarding certain domains
such as subject-matter expert, the game environment, developers, game goals and
game designs, however, the relationship between subject-matter, game environment,
learning theories and game-play is yet to be discussed together. This paper analyzes
a few educational frameworks and discusses their relations among domains that they
have used. In addition, this paper will discuss the software engineering practices that is
of concern to educational games development but have not been discussed in previous
literature.
Paper ID :
T4_SE3_1_1569902539
Title
:
Software Development Process Tailoring for
Small and Medium Sized Companies
Authors :
Rehan Akbar
Abstract
Software development process tailoring is an emerging practice in today’s IT. A limited
number of research works have been published in this area. The existing process tailoring
approaches describe similar set of operations and are of very surface level. No proper
guideline has been provided on how process tailoring is performed. Existing process
tailoring approaches mainly focus on large companies and only one or two agile methods.
Rarely any work has been presented on tailoring agile based methodologies as well as
for small and medium sized companies. The present study addresses this limitation and
identifies process tailoring operations and key processes of agile based methodologies
and uses them for tailoring process for small and medium sized companies. Qualitative
research methods are used to identify and validate tailoring operations and key
processes of agile based methodologies. The results show that performing these tailoring
operations to tailor three key agile based processes is an effective and applicable process
tailoring approach for small and medium sized companies.
90 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T4_SE3_2_1569888245
Title
:
Pluggable Scheduling on an Open-Source
Based Volunteer Computing Infrastructure
Authors :
Nordin Zakaria, Guilherme Dinis Junior, Ken Naono
Abstract
Nowadays, there are different types of computing infrastructures, like grids and
volunteer communities, which have distinct needs and the preservation of energy or
other resources is chief among them.This paper presents an attempt of our center to
incorporate pluggable scheduling into an existing open-source volunteer computing
system named BOINC. Our efforts proved valid, as we managed to re-engineer BOINC to
support different scheduling applications and interchange between them dynamically,
with additional support for thermal-aware scheduling algorithms. Our aim is to start a
path into what could be a collection of middleware tools with standardized integration
to sensor systems to support distinct types of scheduling policies, without the need to
recompile the server system.
Paper ID :
T4_SE3_3_1569888767
Title
:
jFakih: Modelling Mobile Learning Game
Authors :
Azham Hussain, Norasyikin Abdul Mutalib, Azman Bin Yasin
Abstract
This study introduce a new method for learning Jawi for deaf children by adding some
hand signs and named the method as jFakih. Since Fakih is a learning method for deaf
children to read Quran, it’s also possible to be used in Jawi learning for deaf children.
Fakih used number and colours to recognize the Arabic character and also the script.
We also designed the reference model for jFakih for future development of mobile
application. By using waterfall-agile hybrid method, we gathered the requirements and
designed the model using UML technique. The model was validated through prototype
development and some survey was implemented to get feedbacks from users.
page
| 91
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T4_SE3_4_1569890959
Title
:
Assessing Quality Attributes of Object-Oriented Software Design:
A Case Study
Authors :
Shuib Basri, Zhamri Che Ani, Aliza Sarlan
Abstract
In recent years, most of the software products are becoming more complex due to rapidly
growing of technology. Complex software is hard to maintain and need more efforts to
understand both the architectural and components level. That is the main reason why
software engineers are focusing on quantitative measurements for accessing the quality
of the software designs. But the issue is how to ensure every new design of software
product achieves the software quality attributes? Therefore, this paper presents a case
study of applying object-oriented design metrics to assess software quality. Two versions
of jUnit software products were analyzed using QMOOD to find out what are the levels
of quality attributes to be achieved. The results show that both versions of jUnit have
met five quality attributes and the designs are good to be used as a guideline at the early
stages to those who are planning to develop new software products.
Paper ID :
T4_SE3_5_1569896429
Title
:
Ontology Based Development of Domain Specific Languages
for Systems Engineering
Authors :
Vitaliy Mezhuyev
Abstract
The new approach to development of Domain Specific Languages (DSL) for solving
tasks of Systems Engineering (SE) is proposed. A DSL alphabet is defined on the base
of an ontology of the SE domain as the set of its typical concepts. A DSL grammar
on the base of Finite State Machine (FSM) formalism is defined, which allows to link
the SE ontology with the different SE processes (specification of requirements, work
planning, development, validation, standardisation etc.). A DSL is mapped with the set
of mathematical methods, which allows to solve arising in the SE domains tasks. The
approach on the sample of development of the DSL for specification of requirements is
illustrated.
92 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T4_SE3_6_1569899729
Title
:
Flowchart-based Approach to Aid Novice Programmers:
A Novel Framework
Authors :
Danial Hooshyar, Rodina Binti Ahmad,
Mohd Hairul Nizam Md Nasir, Wong Ching Mun
Abstract
Many tools have been used in the programming area to teach programming to novices.
The most familiar tools comprise of flowchart-based notation along with programming
environments depending on icons. Much more exploration on this area has disclosed
that the deficiency of problem-solving abilities is directly tied with language syntax that
they apply and the development environment. The main objective of this research is to
develop a framework for improving the problem-solving skills of novice programmers.
Hence, our research proposes a novel strategy, simulating human mechanism of solving
problems in programming by converting the textual description of a problem, in English,
into a flowchart. Two knowledge bases are employed to interpret the programming
meaning of a given textual description in an attempt to draw its flowchart. Our future
work will include the implementation and evaluation of this proposed framework.
Paper ID :
T2_SE4_1_1569903003
Title
:
Risk Assessment Factors for SME Software
Development Companies in Malaysia
Authors :
Abdullahi Sharif, Shuib Basri
Abstract
There are large, medium, and small enterprises which develop software projects that can
be influenced by a risk. Identifying risk is first step of perfectly assessing and controlling
risks in a project. In the literature, a lot of researchers identified risk factors in software
projects but none of these can be generalized as base of risk factors in the software
projects as they differ in time, culture, and being studied in different application areas
while using different research methodologies. Majority of the researchers focused on
general software projects while few of them focused on specific application areas like
virtual projects or e-commerce projects but no research focused identifying risk factors
of software projects in terms of the firm size. In this paper, we are studying risk factors
that Small and Medium Enterprise (SME) in Malaysia perceive as risk in their software
development projects. 202 respondents from 25 enterprises located in three states in
Malaysia was surveyed and analyzed. Finally, the top risk factors for each risk dimension
were presented along their relationship with project risks.
page
| 93
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T2_SE4_2_1569903205
Title
:
Survey on Maintainability Evaluation Criteria in
Service Oriented Architecture
Authors :
Nik Marsyahariani Nik Daud
Abstract
Changes in software after its deployment is unavoidable due to various reasons thus
maintaining software is a necessities to keep it relevant in its environment. Software
instilled with high maintainability value can save lots of costs and efforts. Service
oriented architecture (SOA) is a new paradigm that has been adopted in industry, where
software can be developed using services offer from different organizations. Evaluating
maintainability of SOA is considered underdeveloped when compared to other quality
attributes. Evaluation process involved many elements and one of the elements is
evaluation criteria. In this paper, we selected maintainability evaluation criteria based on
recent studies and discusses on its applicability within the evaluation of maintainability
in SOA. It will also serve to find gaps in related researches of SOA. Two categories of
evaluation approaches are used to classify studies in this survey, which are qualitative
evaluation approaches and quantitative evaluation approaches. These categories are
then evaluated against the selected evaluation criteria. Based on the survey, there are
gaps that can be explored by researchers in this area.
94 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T2_SE4_3_1569901421
Title
:
The Effectiveness of using the Dependency Relations Approach in
Recognizing the Head Modifier for Malay Compound Nouns
Authors :
Suhaimi Rahman
Abstract
This paper addresses the approach named dependency relations to identify the position
of words located in compound noun as a head modifier or modifier head. To identify
correctly the head modifier in the words, the type of relationships needs to be used.
Currently, there are a few outstanding parsers available to analyze the input sentence
in the structure of dependency triples, hierarchy of typed dependencies and syntactic
level of words. All these kinds of structures are useful in our research work. However, the
output generated is in an English form. Extensive research and development are needed
to adopt them in our localized data. The data gathered need to be analyzed before
being executed in the next process of checking the head and modifier relations between
words. In this situation, not all the relations used in the three structures above are used
in our research work. We have to choose only the most relevant relations, those which
can assist us to solve the problems. The effectiveness of the relations used in our study
can be measured using recall, precision and F1-score techniques. The comparison of the
baseline values is important, so that whether or not there has been an improvement in
a result can be seen.
page
| 95
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T2_SE4_4_1569905899
Title
:
An Integrated Success Adoption Model for Examining
E-Learning Among Adult Workers in Jordan
Authors :
Ahmad Issa Saleem Alzoubib
Abstract
Researching about adult workers’ adoption reflected to organisation and individual in
developing countries are needed due to obtaining better and bridge the gap. In addition,
previous empirical studies that conducted on e-learning have shown low adoption
rate among e-learners in Jordan. This study aimed to examine factors such as relative
advantage, compatibility, complexity, information quality, system quality and service
quality that drive adult workers in adopting e-learning system in their learning process.
In other words, there is a weakness in applying e-learning implementation in Jordanian
government universities. As a result, the Ministry of Higher Education in Jordan needs to
have guidelines to help higher learning institutions to implement e-learning successfully
and efficiently. A total of 502 adult workers currently pursuing their study at Arab Open
University in Jordan were selected to be the sample for this study. Questionnaire was
employed as the data collection approach for the present study. The findings revealed
that five predictor variables, namely relative advantage, complexity, information quality,
system quality and service quality were the most significant factor influencing e-learning
adoption. This research has provided new knowledge with regard to e-learning through
the development of an e-learning adoption model. Practical contribution includes
insights into the factors and causes deterring e-learner from adopting e-learning in their
learning process.
96 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
GREEN COMPUTING TRACK
Paper ID :
T5_GC1_1_1569872019
Title
:
The Adoption of Green Information Technologies and
Systems as a Driver within Green SCM
Authors :
Savita K Sugathan, Dhanapal Durai Dominic
Abstract
Information Technology (IT) and Information System (IS) have begun to demonstrate
their role in motivating, enabling, and transforming Supply Chain Management (SCM)
towards ecological sustainability. The relationship between SCM, IT, IS and environmental
sustainability are complex but interdependent to an extent for a greater energy and
environmental efficiency. Most companies typically disregard the need to adopt, assess
and report on the impacts of IT and IS for environmental sustainability. This paper discusses
on cognitive interviewing procedures conducted and preliminary findings obtained from
semi-structured interview with three of the ISO 14001 manufacturing companies in
Perak as the input for the full scale main study. During cognitive interview, both the think
aloud and probing method were used that have leads to number of amendments to the
survey questionnaire. The preliminary discoveries from the semi-structured interview
reveal that IT and IS play a greater role in environmental sustainability among ISO14001
manufacturing company in Malaysia. The role of IT and IS for environmental sustainability
are deem as a necessity in enhancing flexibility and visibility in decision making as well as
in minimizing energy consumption, carbon footprint and e-waste disposal. The decision
on implementing IT and IS for environmental sustainability are highly dependent on the
trade-off between costs and gains. This is because the implementation of information
technologies might not produce the immediate benefits or required payback, as
compared to information systems which are more apparent. This situation is further
aggravated with poor assessments on the performance the information technology and
systems invested.
page
| 97
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T5_GC1_2_1569910713
Title
:
A Semi-Greedy Soft Real-Time Multiprocessor Scheduling Algorithm
Authors :
Hitham Alhussian
Abstract
Soft real-time systems are systems that can tolerate deadline misses but at the expense
of degradation in quality of service. Many of the Scheduling algorithms used to schedule
real-time tasks in a multiprocessor soft real-time systems are extended from their
uniprocessor counterparts such as Global Earliest Deadline First (G-EDF) and Least
Laxity First (LLF). However such algorithms when extended to real-time multiprocessor
scheduling achieve low schedulability rates. In this paper, we present an efficient
real-time multiprocessor scheduling algorithm that achieves high schedulability rates
compared to currently existing algorithms. Unlike the current algorithms which are
known to be greedy, our proposed algorithm uses a semi-greedy criteria to schedule
tasks. The simulation showed that the proposed algorithm misses few deadlines as well
as achieves high schedulability rates compared to currently existing algorithms.
98 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T5_GC1_3_1569901913
Title
:
ZigBee Wireless Communication for Monitoring
Renewable Street Light System
Authors :
Thinaharan Ramachandran, Vasaki Ponnusamy, Tang Jung Low,
Anang Hudaya Muhamad Amin
Abstract
The advancement of technology brings advantages to human race to certain extent.
Unfortunately, some of the technological inventions not only brings advantages, but
also disadvantages. One of the disadvantages is the pollution of environment. Therefore,
to prevent the pollution from getting worse, the environmental-friendly aspect is
suggested to be included in new inventions nowadays. Thanks to the invention of solar
panel, solar energy is able to become a renewable energy source that can be applied
to various applications. Considering the increase of electricity consumption every year
in Malaysia, solar powered street lighting system is proposed in order to reduce the
burning of fossil fuels to generate electricity, hence reducing air pollution. The street
lighting system will consist of automated switching mechanism to further reduce the
electricity consumption of street lights. The system will also be able to provide energy
measurement to determine the efficiency of street lights. Some security features
provided by selected wireless communication protocol will also be implemented to
secure the system.
page
| 99
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T5_GC1_4_1569890001
Title
:
An Integrative Perspective for CRMS Implementation in
Healthcare in Malaysia
Authors :
Yahia Baashar
Abstract
Customer Relationship Management (CRM) is a powerful tool to help healthcare
organizations in managing patient interactions. The further that the healthcare
organizations understand the value of being customer-centric, the more likely they adopt
to CRM as their main source of business strategy. Numerous of healthcare organizations
are now practicing the CRM in order to computerize the medical processes and manage
relationships with patients to deliver the best quality of medical services. Unfortunately,
only few numbers of CRM projects have been successfully implemented, as the failure
rate is said to be very high. In the Malaysian healthcare sector, the CRM concept has not
acknowledged much attention and according to the review of literatures, there is a lack
of CRM implementation and adoption in that field. In order to fill this gap and to improve
the process of CRM implementation, this paper presents the investigation of CRMS
implementation from an integration perspective. A mixed methodology of qualitative
and quantitative and a study model that leads to CRMS implementation are proposed.
100 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T5_GC1_5_1569916897
Title
:
Root Cause Analysis on Changes in Chiller Performance
Using Linear Regression
Authors :
Jun Okitsu, Ken Naono, Mohd Fatimie Irzaq Khamis,
Shaharin Anwar Sulaiman, Mohd Amin Abd Majid
Abstract
Gas District Cooling (GDC) plants, designed to be environmentally efficient, require
frequent maintenances, in order to avoid corrosions or leakages from the chemical
reactions in Steam Absorption Chillers (SACs) of the plant. However, most of the
plant managers face difficulty that the positive and the negative effects from the SAC
maintenances are not clear. This is because there are various metrics to indicate GDC
SAC performance, but they don’t have enough information to describe chiller internal
conditions. The paper describes a method to detect the root cause of the GDC SAC
performance changes. Specifically, (1) the chiller performance is modeled by linear
regression on the performance related sensor data, and (2) the root cause is determined
by time series analysis of the sensor contribution ratios to the performance. Evaluations
in Universiti Teknologi PETRONAS (UTP) GDC plant show that the method determines
the root cause of the chiller problem correctly in 3 cases out of 4 problem cases. Because
the method determines the root cause only from the plant operation historical data
without any inspections, it is generalized to detect component failures and other plant
anomalies.
HUMAN FACTORS AND ERGONOMICS TRACK
Paper ID :
T5_HCI1_1_1569876897
Title
:
Al-Quran Learning Using Mobile Speech Recognition: An Overview
Authors :
Noraziahtulhidayu Kamarudin, Syed Abdul Rahman Al-Haddad Syed
Mohamed, Abd Rauf Bin Hassan, Mohammad Abd-Alrahman
Mahmoud Abushariah
Abstract
The usage of mobile application in various aspects has been worldwide accepted and
there are variety of mobile applications which developed to cater the usage of different
background of the user. In this research, a short survey which includes questionnaire is
disseminated to find the specific interest of the user whom using application for learning
Quran by using mobile speech apps. As the survey was conducted, the main interest is to
find out either that the apps able to accepted by the user and explain on the proposed
usage of mobile speech recognition with feature of learning apps. Factors of mobile
speech recognition and mobile learning are listed to support the results from the short
survey.
page
| 101
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T5_HCI1_2_1569879477
Title
:
Human Finger Input Properties for Precise Target Selection on
Multi-touch Screen
Authors :
Ahsanullah Abro
Abstract
In recent years, touch enabling technologies potentially have supported to design
and construct the small and large size of multi-touch screens. These sensitive devices
assist users to select and manipulate the targets using their bare fingers. However, it
is reported that user fingertips cause the imprecise selection of small size targets and
subsequently users get frustrated during interaction. Keeping in view this problem, it is
attempted to provide an overview on human finger input properties and their possible
use for the selection of targets on multi-touch screens. This survey paper helps in
understanding the finger touch input and some inherited finger input properties. It also
provides a rational to explore the finger input properties that may help in proposing new
interaction techniques to avoid the imprecision problem.
Paper ID :
T5_HCI1_3_1569883797
Title
:
Evaluation of Mobile Games with Playability Heuristic
Evaluation System
Authors :
Sarmad Soomro, Wan Fatimah Wan Ahmad, Suziah Sulaiman
Abstract
Heuristics evaluation is proved to be an efficient and effective method for inspecting
usability of application software and game. However, it is reported in literature that
negative usability results may cause failure to the product. In large projects usability
evaluation in time consuming and due to time constraints project may fail. There is a
need of improving method of conducting heuristic evaluation. Therefore, a motivation
is raised to improve the method of conducting heuristic evaluation by automation the
process. An automated heuristics evaluation tool empower users to focus on inspecting
more usability problems within time constraints and reduce manual efforts. In this study,
a playability heuristic evaluation system (PHES) is designed and developed to automate
the process of conducting heuristics evaluation for games. To ensure the functionality of
this systems, several tests were conducted. The results of this study advocates that with
the help of playability heuristic evaluation system (PHES) more playability problems can
be identified with in short time.
102 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T5_HCI1_4_1569883873
Title
:
Story Line in Image-based Virtual Reality for Enhancing
Spatial Presence Experience
Authors :
Nadia Diyana Mohd Muhaiyuddin, Dayang Rohaya Awang Rambli
Abstract
Presence or feel being located in virtual environment can make the Virtual Reality
application more effective. One type of Virtual Reality application is Image-based Virtual
Reality application; which defined as the panoramic virtual environment that mimic the
real environment which users can interact with. Due to the limited interaction function,
none research exists between Image-based Virtual Reality application and user’s Presence
experience. However, Communication Theory claims that one type of presence which is
spatial presence can be experienced by users with virtual environments that match the
real environment. As motivated by this theory, An exploratory study on Image-based
Virtual Reality and Spatial Presence is conducted by using Repertory Grid Technique.
The objective of this study is to measure the user’s spatial presence experience and to
identify the factors that could enhance the experience. The result revealed that IBVR
application could developed user’s spatial presence experience. Moreover, a few IBVR
characteristics are revealed by this study. However, in this paper, the result on the story
line in IBVR application is only presented. Our results suggested three features of story
line in IBVR application that could create users spatial presence experience; clear story
line, acceptable story line, and end-start visual of the story line.
Paper ID :
T5_HCI1_5_1569900887
Title
:
Measuring Malaysian M-Commerce User Behaviour
Authors :
Ashok Sivaji, Shi Tzuaan Soo, Tek Yong Lim, Li Shan,
Mohammad Hossein Tahriri Zanegenh
Abstract
M-Commerce is expected to play an even larger role, with over half a billion customers
following the trend to shop via mobile devices by 2016. With tourism being identified
as one of the 12 National Key Economic Area, objective of this study is to determine
the ranking of attention that is paid to different information during hotel booking. Lab
Based Usability Testing with eye tracking technology was carried out with Malaysians to
achieve this objective. Results revealed that Malaysian are highly attracted to both the
“booking” and “price” information, followed by the “ratings”, “introduction” and lastly
the “title” of the hotel, which is in contrast to other countries.
page
| 103
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
T5_HCI1_6_1569901893
Title
:
Synchronizing Audio and Haptic Feedback to Read Webpage
Authors :
Suziah Sulaiman, Dayang Rohaya Awang Rambli, Hanis Hashim,
Mahmud Mokhtahir
Abstract
The limitations of Website’s accessibility in terms of its text attributes representation
in web pages hinder the visually impaired users from having a comprehensive
understanding of the web content. Current assistive technology such as screen reader
and refreshable Braille device are unable to represent this non-textual attributes to the
visually impaired. This paper presents a study that examines the significance of text
attributes to support Web accessibility and improve understanding of the content. It
was hypothesized that the synchronization of audio and haptic feedbacks could improve
Web accessibility through text attributes identification; thus, providing comprehensive
understanding of the webpage. The study involves development of a prototype system
that synchronizes audio and haptic to read webpage and represents text attributes. A
mixture of qualitative and quantitative data collection methods was adopted. Interviews
with the visually impaired users were conducted to gather their requirements for the
prototype. A pilot and user testing were carried out to evaluate the prototype. The user
testing involves those who suffer from high degree of visual impairment. The findings
show significant improvement in web browsing performance and text attributes
identification using the prototype as compared to the existing screen reader.
104 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
POSTER PRESENTATION ABSTRACT
Paper ID :
Poster_1_1569867153
Title
:
Subsurface Exploration of Seabed Using Electromagnetic Waves
for the Detection of Hydrocarbon Layers
Authors :
Adeel Ansari, Afza Shafie, Seema Ansari, Abas Md Said,
Elisha Tadiwa Nyamasvisva, Muhammad Abdulkarim,
Muhammad Rauf
Abstract
This paper focuses on the detection of hydrocarbon layers under the seabed using
Electromagnetic methods and to prove the relationship between the thickness and
resistivity constrast of the hydrocarbon. Simulations have been carried out by varying
the depth of seawater from 1000m to 100m and the resistivity contrast and thickness
for each level of depth is also varied. The electric field is also measured using various
simulation models and graphs over different offsets. The results obtained prove that
the resistivity property of Hydrocarbon is directly proportional to the thickness. and at
particular points the presence of hydrocarbon layer is clearly significant.
page
| 105
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
Poster_2_1569867259
Title
:
ZLS: A Next-door Lightweight QoS Aware Location Service
Technique for VANET on Highways
Authors :
Muhammad Maaz Rehan, Halabi Hasbullah, Omer Chughtai,
Muhammad Waqas Rehan
Abstract
In VANET, a Location service technique comprises of location update and location
request. In location update, a destination vehicle advertises its services and location
to a set of vehicles called location servers. In location request, a source vehicle queries
location servers in its broadcast range about the location and services of destinations.
During location update, separate control messages are exchanged to periodically update
location servers which create delay and congestion in the network. Similarly, after location
request, pre-loaded digital maps at source vehicle are used to find the shortest path
towards destination which does not give vehicle density on road at that moment in time.
Other than digital maps, Dijkstra or Bellmen ford algorithms at source or intermediate
nodes are also used to find shortest path, which is a computationally time consuming
activity leading to an extra delay during path finding and before packet transmission.
We therefore propose QoS and traffic density aware location service technique called
ZoomOut Location Service (ZLS). We have implemented ZLS in NS2.33. The simulation
results for highway traffic show that ZLS updates its location servers in a uni-cast fashion
such that the location servers have up-to-date information of advertised services and
destination position. Similarly, a source can reach destination in the quickest possible
way by sending uni-cast messages without using digital map or shortest path finding
algorithms.
106 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
Poster_3_1569868807
Title
:
Model Driven Software Development: An Overview
Authors :
Muhammad Qaiser Saleem, Jafreezal Jaafar, Mohd Fadzil Hassan
Abstract
The vision of the MDSD is an era of software engineering where modelling completely
replaces programming i.e. the systems are entirely generated from high-level models,
each one specifying a different view of the same system. The MDSD can be seen as the
new generation of visual programming languages which provides methods and tools to
streamline the process of software engineering. Productivity of the development process
is significantly improved by the MDSD approach and it also increases the quality of the
resulting software system. The MDSD is particularly suited for those software applications
which require highly specialized technical knowledge due to the involvement of complex
technologies and the large number of complex and unmanageable standards. In this
paper, an overview of the MDSD is presented; the working styles and the main concepts
are illustrated in detail.
Paper ID :
Poster_4_1569902771
Title
:
Mobile Phone Icons Recognition and Cultural Aspects
Authors :
Syed Ghayas, Suziah Sulaiman, Jafreezal Jaafar,
Saipunidzam Mahamad, Muzafar Khan
Abstract
There is a rapid growth in the development of mobile phone applications which are widely
used around the globe. Different cultures may affect the usage of such applications;
there is a need to explore the cultural differences in this context. In order to study such
differences, those icons which interpretability might be affected by culture differences
are taken into consideration and hypothesized. Two groups of ten subjects (twenty in
total) from two different countries i.e. Malaysia and Estonia participated in the study.
The factors considered in the study were navigation time, working with menu icons,
and recognition test. The results indicated that Malaysian subjects performed well while
interpreting the third generation of icons which were operating system provided icons.
On the other side, Estonian subjects were not much familiar with modern icons. There
was no difference found in the both groups to interpret the most familiar icons. The
results reveal that there are possible cultural differences on icons interpretability based
on their levels of abstraction.
page
| 107
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
Poster_5_1569870281
Title
:
Association among Independent and Dependent Factors of
Host in Volunteer Computing
Authors :
Soodeh Peyvandi, SP
Abstract
These days, many scientific projects such as: SETI@home and Distributed.net are using
computers which are connected to internet from the entire world in order to run their
jobs. This large distributed system is a Volunteer Computing (VC) that includes volunteer
hosts. An important attribute of volunteer hosts is the volatile behavior that means often
they are not available because of the autonomy nature of owners. The volatile behavior
of hosts is significant and effective issue on fault tolerance of the system. Therefore,
characterization factors of volatile hosts have influence on reliability of jobs schedulers
and improve fault tolerance of the VC system. This paper considered on characterization
host’s factors in concept of association between dependent and independent factors
of hosts. We assumed that CPU interval availability and frequency number of CPU
availability are dependent factors, also time zone, location, RAM size and numbers of
processors are independent factors. In other words, the main hypothesis is that there is
an association between dependent and independent factors. To proof this hypothesis,
we used real trace data of volunteers which are taken from SETI@home project. We
found that time zone and location have dependency, also processor’s number have
correlation with CPU interval availability while frequency number of CPU availability has
correlation with RAM size.
108 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
Poster_6_1569871171
Title
:
QoS Routing for Cognitive Radio Ad-Hoc Networks:
Challenges & Issues
Authors :
Tauqeer Safdar, Halabi Hasbullah
Abstract
Cognitive Radio Ad-Hoc Network (CRAHN) is an emerging class of mobile ad hoc
networks that provides each network node with a list of available channels. It is expected
that the traditional routing protocols and routing metrics will not cope well for CRAHN
with frequent topology changes and interference conditions which result in varying
connectivity conditions among the terminals. Therefore, to achieve more realistic
cognitive routing in wireless ad hoc networks, routing metric and routing protocol
design should be designed to adapt to traffic and propagation conditions. The focus
of this work will be on the routing metrics with emphasizing on the implementation
and improvement of the protocols operating with such metrics. The aim of any routing
protocol is to provide QoS in the parameters like throughput, delay, and interference
and according to this the focus of this research is to identify the challenges and issues to
provide the QoS routing in CRAHN environment.
Paper ID :
Poster_7_1569872323
Title
:
Classification of Software Project Risk Managers:
Established on Roles and Responsibilities
Authors :
Uzair Iqbal, Alan Oxley, Jafreezal Jaafar
Abstract
Generally, people have used the term “risk manager” in different fields of science to
represent a person who is responsible for handling risk management activities. However,
in the field of software engineering, the term “risk manager” is not well defined and
there is ambiguity over the term’s meaning.The main objective of the paper is to review
the literature in order to make the terms understandable and to find the role of a risk
manager for effective software project risk management.Additionally, in the end of
paper different title of software project risk managers has been classified on the base of
their role an responsibilities.
page
| 109
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
Poster_8_1569872451
Title
:
Optimizing BOINC Scheduling Using Genetic Algorithm
Based on Thermal Profile
Authors :
Norzatul Natrah Ismail
Abstract
Berkeley Open Infrastructure for Network Computing (BOINC) is an open source
middleware for volunteer and grid computing. Main function of BOINC is to use the idle
time of computer to run some computation at background. Universiti Teknologi Petronas
(UTP) campus grid used BOINC as middleware in computer labs. However, computer can
only process jobs during weekday and office hour because they want to reduce energy
used for cooling power. In order to fully utilize the computer in labs, we proposed new
jobs scheduling algorithm can run based on thermal constraint. The proposed algorithm
is combination of thermal profile and heuristic approach. We use genetic algorithm to
find the best combination of clients and jobs based on clients order and least execution
time. Then we compare our algorithm with brute force method. Result from simulation it
shows that proposed algorithm successfully distribute and execute job based on thermal
constraints in an effective and efficient way compare to brute force method.
Paper ID :
Poster_9_1569872581
Title
:
A Case Study on Travel Information from Social Network Focus in Facebook and Blogs in Malaysia
Authors :
Nurul Akhmal Mohd Zulkefli, Baharum Baharudin
Abstract
Due to the rapidly growing of social network media such as Facebook, Twitter and Blog,
the rich contexts and sharing information of human activities are also explosive increase.
Lately, many people used social media as a platform to exchange and share information
such as education, lifestyle, recipes and medical treatment. Tourism is one of the most
popular topics shared in Facebook and Blog. To explore details about the travel data, we
created a survey to study the user sharing behavior. This paper presents the case study
of travel sharing information in social network and the travel data collection in Place of
Interest (POI) in Malaysia.
110 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
Poster_10_1569882495
Title
:
Students’Inclinations towards Games and Perceptions of Game
Based Learning (GBL)
Authors :
Mazeyanti M Ariffin, Alan Oxley, Suziah Sulaiman
Abstract
The term ‘games’ has remained as one of the most popular search terms in Google for the
past 10 years. Looking at games’ popularity, especially among the youth, there is a need
for academicians and educationists to find ways in which games might support learning.
In order to ensure a close match between the learning activities and the expected
outcome, instructors should aware of the learners’ needs and their perception towards
Game-Based Learning. The research focuses on the learner specification dimension in
the Four-Dimensional Framework (FDF).The method of study was through a survey and
the target audience is students of Universiti Teknologi PETRONAS. The outcomes of this
paper are twofold: first is the identification of sets of game characteristics to be used
either by game developers or instructors, and second is an indication of the viability of
games as an educational tool for Higher Education settings.
Paper ID :
Poster_11_1569883019
Title
:
Design of Interactive Whiteboard System for Collaborative Learning
Authors :
Tahir Mustafa Madni Ikram, Mohd Yunus Nayan, Suziah Sulaiman,
Muhammad Tahir, Majid Iqbal
Abstract
The research in the education system describes that the students generally do not
produce good results because of the use of traditional ways of educational system.
It has been identified that the use of interactive technologies, constructive methods
and appropriate interfaces has a great impact in improving creative education and
learning. With the advancements of Interactive technologies provides initiative
human-computer interaction as compared with conventional mouse and keyboards. A
prototype was developed to analyze the efficiency of collaborative students learning
system which enables co-location, multiple users, hands-on activities and multiplemodes of communication using hand-held laser pointer device(s). This collaborative
learning prototype enables the use of laser pointer(s) to interact with the whiteboard.
The laser pointer controls mouse events and additional gesture events as with the same
functionality provided by conventional mouse pointer. Furthermore, a quantitative
investigation on the usefulness of collaborative learning system was conducted with
twenty participants. The participants showed deeper and more interactive learning
experience. The results of the user-study shows substantial use of this technology in class
rooms and meeting rooms for improving the effectiveness of brainstorming sessions.
page
| 111
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
Poster_12_1569883903
Title
:
Performance Comparison of Least Slack Time Based Heuristics
for Job Scheduling on Computational Grid
Authors :
Ahmed Abba Haruna, Tang Jung Low, Anindya J. Pal
Abstract
In recent years, increasing demand for computing has led to the development of
computational grid. Typically scheduling challenges tend to be NP-hard problems
where there is no optimal solution. The research reported here therefore is focused
on the development of hybrids scheduling algorithms based on deadline and slack
time parameters and its variations, using the concept of optimization techniques. An
extensive performance comparison has been presented using real workload traces as
benchmark on a grid computational environment. The results were compared with some
baseline scheduling approaches in extant literature. The results have shown that the
performances of grid scheduling algorithms developed and reported in this paper give
good results in most of the cases and also support true scalability, when in the scenario
of increasing workload and number of processors on a computational grid environment.
Paper ID :
Poster_13_1569884381
Title
:
Swarm Inspired Test Case Generation for Online C++ Programming
Assessment
Authors :
Oi Mean Foong, Tran Quang Trung, Suet Peng Yong, Helmi Md Rais
Abstract
It is time consuming for lecturers to manually compile, run and verify students’
programming assignments. Moreover, they also need to define test cases for different
programming exercises in order to assess students’ code. This paper presents a swarm
inspired automatic test case generation for Online Programming Assessment or Judge
(UOJ) system. The UOJ is built with the purpose to assist lecturers in evaluating codes
submitted from students and generate test cases for every programming problem
automatically. It also helps students to practice and enhance their programming skills. In
this study, the mechanism of automatic test case generation was explored using Particle
Swarm Optimization (PSO) algorithm and new fitness function is proposed to determine
the optimal solution for each problem. Experiments were set up to benchmark between
manual and automatic PSO test case generation results to evaluate the efficiency of
the proposed method. The preliminary results are satisfactory for automatic test case
generation using swarm inspired PSO algorithm in C++ programming assignments.
112 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
Poster_14_1569911443
Title
:
Exploration of Communication Process Using Business Microscope
Authors :
Yoke Yie Chen, Kim Nee Goh, Yukihisa Fujita, Ken Naono
Abstract
This paper describes first results of ongoing research effort to investigate communication
pattern within a procurement process in an organization. Previous studies have shown
that the main reasons of long ordering cycle are it takes too long to deal with purchase
order and unable to share information with vendors. The procurement process of
an educational institution is chosen as a research sample. We outline opportunities
for the development of a theoretical framework around the construct of effective
communication pattern in procurement department. In particular, we are able to
identify typical communication patterns between inter- and intra-departments. We aim
to develop a theoretical framework that integrates efficient modes of communication
that will influence and regulate the communication process.
Paper ID :
Poster_15_1569901845
Title
:
Number Skills Mobile Application for Down Syndrome Children
Authors :
Wan Fatimah Wan Ahmad, Afza Shafie
Abstract
Down syndrome (DS) children seem to have difficulties in learning numbers compared
to reading. They need customized learning in numbers due to their slower pace of
learning.Unfortunately, there is limited theory to guide DS children to learn and master
in mathematics. With the advancement oftechnology, the learning style of special
children has been improved from time to time from the paper and pen method, to
the use of computer application such as courseware to the latest technology such as
mobile application in smart phones and tablets. As for now, there is no personalized
mathematics learning mobile application for DS children. The objectives of this paper
are to report on the development of a mobile application on learning the basic
numbers for DS children and to evaluate the user acceptance on the developed mobile
application. The study will be focusing on the DS children with moderate level of IQ who
are learning to recognize basic numbers. The method used to achieve the objectives
is Rapid Application Development (RAD). The mobile application was developed using
Eclipse Android Development Tool (ADT). An observation has been conducted to 5 DS
children who have different level of IQ. The
finding shows that the mobile application is really suitable for DS children who have
moderate level IQ.
page
| 113
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
Poster_16_1569906097
Title
:
Experimental Study on the Effective Range of FCM’s
Fuzzifier Values for Web Services’ QoS Data
Authors :
Mohd Hilmi Hasan, Jafreezal Jaafar, Mohd Fadzil Hassan
Abstract
The work presented in this paper is part of the development of a fuzzy Interval Type2 (IT2)-based system. An IT2 system contains fuzzy type-2 membership functions that
can be generated using a pair of FCM fuzzifier, m values. Evidences show that the
effective range of m values is influenced by the underlying dataset. Hence, the objective
of this paper is to present the experimental study on finding the effective range of m
values for web services’ QoS data. The study aimed at identifying range of m values
that successfully generated Gaussian membership functions. As proposed by previous
work, the experiment was carried out upon the m values in the range of 1.4 to 2.6. The
works involved the datasets of three QoS parameters. The results showed that two of
the datasets has the effective range of 1.7 to 2.6, while another one was 1.6 to 2.6.
Paper ID :
Poster_17_1569882423
Title
:
Electronic Content Management Systems Use and
Implementation in Highly Integrated Businesses
Authors :
Noreen Izza Arshad, Mazlina Mehata,
Mohamed Imran Mohamed Ariff
Abstract
Many organizations have invested large amounts of money in implementing Electronic
Content Management Systems (ECMS), which refers to the technologies used to manage,
store, and deliver business-related information across the organization. However,
research indicates that many ECMS implementations fail to yield the kind of information
sharing that is useful for business process executions. From the IS literature point of
view, this is not because of the technologies, but it is due to ways ECMS is implemented
and used which is not aligned with organization’s way of doing business. Therefore,
this paper explores how organizations that emphasize high integration and low
standardization of business processes termed as Coordination use and implement ECMS
to support its business operations. We suggest guidelines that explain the ways ECMS
should be used and implemented in Coordination organizations that include (1) ways to
use ECMS for sharing business process-related information, (2) ECMS infrastructure, (3)
ways to manage content and (4) administration of ECMS. These findings are grounded
in the analysis of qualitative data from one case study. The finding is significant for
business and IT managers because it will guide them with ways to use ECMS and gain
more benefits from these types of systems
114 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
Poster_18_1569882611
Title
:
Understanding the Ways Organizational Learning Drives
Information Technology (IT) Infrastructure
Authors :
Noor Hafizah Hassan, Noreen Izza Arshad, Jafreezal Jaafar,
Emy Elyanee Mustapha
Abstract
Many businesses today are struggling to find a better and substantive IT capability
to achieve its competitive advantage. Therefore, this study aims to explore how
organizational learning orientation may be the driver that may strengthen organizational
IT capability. In the context of this study, organizational learning orientation involves
commitment to learning, shared vision, open-mindedness, and intraorganizational
knowledge sharing. This study will further explore how these four organization learning
orientation may positively or negatively drives organizations’ IT capability. Drawing upon
dynamic capability theory and Resource-Based View (RBV) theory, four hypotheses are
developed to better understand how organizations strategized its IT capability with
the right learning orientation. Questionnaires and interviews will be adopted as data
collection method and further analyzed with Structural Equation Modeling (SEM). As
a result, a validated research model will be empirically validated and presented in the
future stages of this research.
page
| 115
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
Poster_19_1569882573
Title
:
Effects of the Smart Board on Students’ Achievement
in Moral Education
Authors :
Loh Wai Ling, Termit Kaur Ranjit Singh, Wan Fatimah Wan Ahmad
Abstract
In this era of globalization, Malaysia is recognized as one of the pioneers in introducing
Smart board among schools in the region of Southeast Asia. The aim of this study is
to investigate whether the use of Smart board in Moral Education improved students’
achievement. The study examined the achievement of the Form 4 students in a school
in the Kinta district in Perak Darul Ridzuan, Malaysia comparing scores between students
whose teachers used the Smart board for instruction and those whose teachers did
not. A total number of 50 students are involved in the study. They are divided into
two experimental and control groups. A pre-test and post-test was conducted. The
findings show slightly higher achievement among students in the Smart board group
as compared to students not using it, thus exhibiting the advantage of using the Smart
board instruction. The resultant dataset after comparing a pre-post test supports the
idea that students whose teachers used the Smart board with a new Moral Education
smart board courseware show greater post-test to pre-test achievement gains than
students whose teachers did not use the SB.
116 | page
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Paper ID :
Poster_20_1569872553
Title
:
Predicting BottomHole Flowing Pressure Using Artificial
Neural Network
Authors :
Paras Memon, Suet Peng Yong, William Pao, Jion Sean Pau
Abstract
This paper presents the application of Surrogate Reservoir Model (SRM) for predicting
Bottom-Hole Flowing Pressure (BHFP) on an initially undersaturated reservoir. SRM
is recently introduced technology that is used to replicates the results of numerical
simulation model. High computational cost and long processing time limits our ability
to perform compre-hensive sensitivity analysis and quantify uncertainties associated
with reservoir because reservoir model contain large number of grids in its geological
structure that usually takes considerable amount of time for a single simulation run.
And also making hundred and thousands is considered as a cumbersome process and
sometimes impractical. SRM is considered as as a solution tool to tackle this issue.
SRM uses Artificial Neural Network (ANN) and data mining techniques for the reservoir
simulation and modeling. In this paper, the results of SRM for predicting BHFP is
presented and a reservoir simulation model has been presented using Black Oil Applied
Simulation Tool (BOAST). To build any SRM, it requires small number of runs to train the
model. Once we train the SRM, it can generate hundred and thousands of simulation
runs in a matter of seconds. As a part of this system, it is proposed to develop a SRM
extraction based on ANN to enhance the realization run time.
page
| 117
The 2nd International Conference on Computer and Information Sciences
A Conference of World Engineering, Science & Technology Congress (ESTCON)
Notes
118 | page