ESTCON2014 Technical programme
Transcription
ESTCON2014 Technical programme
The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) 3 - 5 June 2014 Kuala Lumpur Convention Centre Technical Programme The 2nd International Conference on Computer and Information Sciences (ICCOINS2014) TECHNICAL PROGRAMME © 2014 Universiti Teknologi PETRONAS Insititute of Technology PETRONAS Sdn Bhd Copyright and Reprint Permission: In compliance with the terms of the Copyright Act 1987 and the IP Policy of the University, the copyright of this publication has been reassigned by the authors to the legal entity of the University, Institute of Technology PETRONAS Sdn. Bhd. Due acknowledgement shall always be made of the use of any material contained in, or derived from this publication. All materials are copyright of Universiti Teknologi PETRONAS. Reproduction in whole or in part is not permitted without the written permission from the University. CONTENTS FOREWORD 2 CONFERENCE ORGANISING COMMITTEE 3 GUEST EDITORS 4 REVIEWERS 5 PLENARY SPEAKERS 8 NOTES TO DELEGATES 12 CONFERENCE PROGRAMME 14 TECHNICAL SESSIONS 17 POSTER SESSIONS 33 ABSTRACTS 35 POSTER PRESENTATION ABSTRACTS 105 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) FOREWORD ASSOCIATE PROFESSOR DR. JAFREEZAL JAAFAR Conference Chair, ICCOINS2014 On behalf of a dedicated team that organized this event, it gives me great pleasure to welcome all guests, speakers and delegates to Kuala Lumpur to attend the 2nd International Conference on Computer and Information Science (ICCOINS2014), in part of the World Engineering, Science & technology Congress (ESTCON2014). This conference is organized by the Department of Computer and Information Sciences, Universiti Teknologi PETRONAS (UTP) and is technically co-sponsored by the Institute of the Electronic Electrical Engineers (IEEE). The aim of this conference is to provide an excellent platform for professionals, engineers, academicians and practitioners worldwide to share and exchange research knowledge and ideas in technologies and applications in the field that relates to information and communication technology and information systems. With the theme “Innovative Humans and Technology for a Sustainable Environment”, more than 150 papers will be presented at ICCOINS2014. This conference promises a wide variety of topics that emphasize on the development of latest technology and innovation towards a sustainable environment that support the values of life and activities in the global and social perspectives. I would like to take this opportunity to thank the plenary speakers, presenters and all participants who take part in this event. It is our hope that this conference can help to shape a research community that could lead and address the challenges in the area of computing, information and communication technology, and information systems. For all the hard work and dedication, I would like to once again thank each and every one of you for your valuable contribution towards the success of this conference, and wish you a professionally rewarding and socially enjoyable stay in Kuala Lumpur. 2 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Conference Organising Committee Chairperson Jafreezal Jaafar Co-Chairperson Abas Md Said Abdul Rahim Ahmad Secretary Norshuhani Zamin Yong Suet Peng Treasurer Leader: Mazlina Mehat Member: Dayang Rohaya Awang Rambli Publicity & Protocol Leader: Nazleeni Samiha Haron/ Foong Ooi Mean Members: Wan Fatimah Wan Ahmad Shuib Basri Publication Leader: Noreen Izza Arshad Members: Aliza Sarlan Emy Elyanee Mustapha Lukman Abd Rahim Ainol Rahmah Shazi Shaarani IT & Media Leader: Faizal Ahmad Fadzil Member: Izzatdin Abdul Aziz Logistics Leader: Low Tan Jung Member: Saipunidzam Mahamad Sponsorship Leader: Khairul Shafee Kalid Members: Ahmad Izuddin Zainal Abidin Ahmad Kamil Mahmood F&B Leader: Nurulhuda M Hashim / Muhaiyuddeen Shaik Allauddin / Safinaz Hamzah Event Management Leader: Helmi Rais Member: Suziah Sulaiman Technical Leader: Dhanapal Durai Dominic Members: Halabi Hasbullah Alan Oxley Nordin Zakaria Rohiza Ahmad Baharum Baharudin IEEE Computer Society, Malaysia Chapter Zainab Abu Bakar Fakhrul Hazman Yusoff Ali Selamat Hamzah Asyrani Sulaiman Mohd Naim Mohd Ibrahim Mohd Zaliman Mohd Yusoff Nor Azura Md Ghani Nursuriati Jamil Suhaimi Ibrahim Mohamed Rawidean Mohd Kassim Christopher Chew page |3 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) GUEST EDITORS Journal of Information and Communication Technology (JICT) Guest Editors: Jafreezal Jaafar Lukman Abd Rahim Emy Elyanee Mustapha International Journal of Information Systems and Supply Chain Management (IJISSCM) Special issue on: Information Sciences and Supply Chain Management Guest Editors: Dhanapal Durai Dominic Emy Elyanee Mustapha Mazlina Mehat International Journal of Business Information Systems (IJBIS) Special issue on: Information Sciences and Green Supply Chain Management Guest Editors: Dhanapal Durai Dominic Noreen Izza Arshad Aliza Sarlan International Journal of Green Computing (IJGC) – IGI Special issue on: Green Computing Guest Editors: Dhanapal Durai Dominic Jafreezal Jaafar Alan Oxley Izzatdin Abdul Aziz ∗ Oustanding papers will be invited to submit an extended version of the paper to be considered for publication in special issues in either of the following journals : • International Journal of Information Systems and Supply Chain Management (SCOPUS-indexed) • International Journal of Business Information Systems (SCOPUS-indexed) • Journal of Information and Communication Technology (SCOPUS-indexed) • International Journal of Green Computing (SCOPUS-indexed) 4 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) REVIEWERS Abas Md Said Abdul Samad Shibghatullah Abdullah Gani Abu Bakar Md Sultan Abubakr Khamis Aggarwal Amit Ahmad Fadzil Faizal Ahmad Rafi Ahmad Suhaimi Baharudin Aida Mustapha Alan Oxley Alfian Abdul Halin Aliza Sarlan Anton Satria Prabuwono Ashok Kumar Ashok Sivaji Asmidar Abu Bakar Atif Manzoor Atiq Rahman Azidah Abu Ziden Abu Ziden Azniah Ismail Baharum Baharudin Bahbibi Rahmatullah Bilal Mughal Chan Lee Kwun Chan Chessda Uttraphan Chiew Thiam Kian Chiew Chiung Ching Ho Dhanapal Durai Dominic Dhanesh Ramachandram Edwin Mit Fadzilah Siraj Fazal e Amin Ghazali Sulong Halabi Hasbullah Hamada Al-Absi Hamid Jalab Hanum Md. Nasaruddin Fariza Helmi Md Rais Hitham Alhussian Hui Hwang Goh HuiKeng Lau Ibrahim Alhaji Lawal Iftikhar Ahmad Irshad Sumra Izzatdin A Aziz Jacey Lynn Minoi Jafreezal Jaafar Jamal Dargham Jane Labadin Jawad Haider Kazmi K. Y. Sim Kashif Nisar Khairul Shafee Kalid Kamaludden Usman Danyaro Kim Nee Goh Lee Lay Wah Lee Lukman Ab. Rahim M. L. Dennis Wong Maaz Rehan Manoranjitham Muniandy Mar Yah Said Marlia Morsin Mas Rina Mustaffa Maziani Sabudin Mazlina Mamat Mazlina Mehat Mazliza Othman page |5 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Md Jan Nordin Mei Choo Ang Miss Laiha Mat Kiah Mohamed Nordin Zakaria Mohamed Rawidean Mohd Kassim Mohd Faizal Abdollah Mohd Hanafi Ahmad Hijazi Mohd Hazli Mohamed Zabil Mohd Helmy Abd Wahab Mohd Hilmi Hasan Mohd Murtadha Mohamad Mohd. Marzuki Mustafa Muhammad Azeem Abbas Muhammad Imran Muhammad Mohd Arshad Muhammad Qaiser Saleem Munwar Ali Mustapha Abubakar Muzafar Khan Nasharuddin Zainal Nasrullah Pirzada Nasuha Lee Abdullah Nazleeni Haron Nazrita Ibrahim Nor Aniza Abdullah Noraziah Ahmad Norazlina Khamis Noreen Arshad Norhisham Mohamad Nordin Norisma Idris Norshuhani Zamin Norwati Mustapha Nurul Zawiyah Mohamad Oi Mean Foong Othman Ibrahim Peer Azmat Shah Pei Hwa Siew 6 | page Phan Koo Yuen Puteri Suhaiza Sulaiman Qasim Ali Rafidah Md Noor Rahmat Sanudin Rahmita Wirza O.K. Rahmat Rajan Thangaveloo Ramlah Mailok Razali Yaakob Rohiza Ahmad Rosalina Abd. Salam Rosnah Idrus Rozana Kasbon Rozlina Mohamed Rusli Abdullah Saipunidzam Mahamad Sajjad Haider Salman Yussof Samsul Ariffin Abdul Karim Shahida Sulaiman Shereena Mohd Arif Shuib Basri Shyamala Doraisamy Siti Amely Jumaat Siti Salwa Salim Su-Cheng Haw Suet Peng Yong Syahrul Nizam Junaini Syariffanor Hisham Syed Nasir Mehmood Shah Tang Low Tariq Ali Tat-Chee Wan Teck Chaw Ling Teh Aris Vasaki Ponnusamy Wahidah Husain The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Wai Khuen Cheng Wan Fatimah Wan Ahmad Wan Mohd Nazmee Wan Zainon Yulita Hanum P Iskandar Yu-N Cheah Yusmadi Yah Jusoh Zarina Tukiran Zulfiqar Ali Zulfiqar Arain Zurina Muda Zurinahni Zainol page |7 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) PLENARY SPEAKER 1 PROFESSOR DR VISWANATH VENKATESH Distinguished Professor and George and Boyce Billingsley Chair in Information Systems, Walton College of Business, University of Arkansas, USA Digital Divide In India BIOGRAPHY Viswanath Venkatesh is a Distinguished Professor and the first holder of the George and Boyce Billingsley Chair in Information Systems at the Walton College of Business, University of Arkansas. Prior to joining Arkansas, he was on the faculty at the University of Maryland. He received his Ph.D. from the University of Minnesota. His research focuses on understanding diffusion of technology in organizations and society. His current favorite project is on the digital divide in India. His research has been published in leading information systems, organizational behavior and psychology journals, and has been cited about 30,000 times and about 10,000 times per Google Scholar and Web of Science respectively. MIS Quarterly named him “Reviewer of the Year” in 1999. He has served or is currently serving on the editorial boards of MIS Quarterly, Information Systems Research, Management Science, Production and Operations Management, Journal of the AIS, and Decision Sciences, and began his role as a Senior Editor at ISR in 2008. Some of his papers are among the most cited papers published in the respective journals: his ISR (2000) is the 2nd most cited paper, his DSJ (1996) is the most cited paper, his MISQ (2003) is the 2nd most cited paper, and his Management Science (2000) is the 5th most cited paper. In 2008, his MISQ (2003) paper was identified as a current classic by Science Watch (a Thompson Reuters’ service) and since 2009, it has been rated as the most influential article in one of only four Research Front Maps identified in business and economics. In 2009,he launched an IS research rankings web site (http://www.vvenkatesh.com/ ISRanking) that has received many accolades from the academic community and is now affiliated with the Association for Information Systems (AIS).Recently, he completed a book titled: “Road to Success: A Guide for Doctoral Students and Junior Faculty Members in the Behavioral and Social Sciences.” 8 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) ABSTRACT URL for book, Road to Success: A Guide for Doctoral Students and Junior Faculty Members in the Behavioral and Social Sciences: http://vvenkatesh.com/book The digital divide is an economic and social issue that has seen great interest in recent years. Digital divide refers to the gulf between information and communication technology (ICT) haves and have-nots, and exists across a variety of demographic, ethnic, and geographic dimensions. Overcoming the digital divide by successfully deploying ICTs in developing countries can have major socioeconomic implications for those countries. In fact, it is hoped and expected that ICTs will be a cornerstone for the development of these countries by providing better quality of life through greater access to education, health care, and government. ICT Success, typically defined in terms of adoption and use, is rare, with up to 85% failing to some degree in developing countries. Success of digital divide interventions is of great interest to organizations, government and private. Likewise, corporate social responsibility has been a topic of recent interest to organizations. In order to be more socially responsible, organizations spend billions of dollars each year on ICT implementations to bridge the digital divide in developing countries, such as China and India. For instance, Project Shiksha is a Microsoft-led effort in collaboration with the government of India to address the digital divide in villages across the country through increased access and education. Organizations, such as the United Nations, also invest a great deal in efforts to address the digital divide in developing countries. The goal of this presentation is to present an overview of a large-scale research project being conducted in India among over 3,000 farming families across 10 villages in India that are being studied over 5+ years. Venkatesh, V., Sykes, T.A., and Zhang, X. “Bridging the Digital Divide in India: A Longitudinal Study of Women’s Health Outcomes in Rural India,” MIS Quarterly. (invited to be revised and resubmitted) Venkatesh, V., and Sykes, T. A. “Digital Divide Initiative Success in Developing Countries: A Longitudinal Field Study in a Village in India,” Information Systems Research (24:2), 2013, 239-260. page |9 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) PLENARY SPEAKER 2 NORIHIRO SUZUKI, DR. ENG. Senior Vice President & Chief Technical Officer, Hitachi America Limited, R&D Division California, USA BIOGRAPHY Dr. Suzuki joined Central Research Laboratory, Hitachi, Ltd. in 1986, after graduated from Tokyo University Graduate School with the degree of Master of Engineering. In 1995, he received a Doctor Engineering degree from Tokyo University. After he joined Hitachi, he was assigned as a researcher of telecommunication. He was in charge of R&D on Extended definition TV, compatible with analog color TV. He was the manager of Multimedia System Research Department in 2001, andthe research director of Embedded Systems Platform Laboratory, in 2005, where he led the embedded software research for TV, mobile phone and car navigation. Then, he was assigned as general manager of Information Systems Research Center, Central Research Laboratory, in 2008, and general manager of Information & Control Systems Research Center, Hitachi Research Laboratory, in 2009. From 2012, he has been a Senior Vice President and Chief Technology Officer of Hitachi America, Ltd. Dr. Suzuki is a member of IEEE, and IEICE of Japan. From 1995 to 1996, he was a visiting scholar of Columbia University, USA ABSTRACT Through the proliferation of sensors, smart machines, and instrumentation, industrial operations are generating ever increasing volumes of data of many different types. At the same time, advances in computing, storage, communications, and big data technologies are making it possible to store, process, and analyze enormous volumes of data at scale and at speed. The convergence of OT and IT, powered by innovative analytics, holds the promise of creating new social innovation businesses. Hitachi’s R&D Group has established the Global Big Data Innovation Lab (GBDIL) to coordinate world-wide analytics research activities in support of the global expansion of the social innovation solution businesses by providing innovative analytics to the recently launched Hitachi Global Center for Innovative Analytics (HGC-IA). My talk introduces GBDIL and HGC-IA, and describes a common 10 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) reference architecture for developing, deploying, and operating big data solutions that leverage Hitachi’s innovative analytics technologies. Through the use of example use cases, my talk explains the strategy to expand the global big data solution business. page | 11 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) NOTES TO DELEGATES REGISTRATION AND GENERAL INFORMATION The conference registration and information desk is located near the conference main room. The desk will operate according to the following schedule: Tuesday (3rd June 2014): 9.00 am - 6.30 pm Wednesday (4th June 2014): 8.30 am - 6.30 pm Thursday (5th June 2014): 8.30 am - 4.05 pm There will be committee members assisting delegates with general information. They will be wearing ICCOINS2014 identification tags. CONFERENCE COSTS Your ICCOINS2014 registration includes the cost of: • Lunches • Morning and afternoon teas • ICCOINS2014 Programme Book & Abstracts • For presenters: full conference proceedings in CD-ROM • Optional hardcopy: RM250 + postage & handling charges per volume. INSTRUCTIONS FOR PRESENTERS ORAL PRESENTERS • Time allocated for each presenter is 20 minutes including Q&A. 15 minutes for presentation and 5 min Q&A. 12 | page • Each presenter is required to prepare and submit Microsoft PowerPoint Presentation to the Secretariat latest on the conference registration day. • Save the PowerPoint presentation using the given paper ID as the file name, e.g. if your conference paper ID is T1_IS1_1_1569591167 the file name should be T1_IS1_1_1569591167.ppt. • Maximum number of slides is 15. • The presenter should be at the assigned room 15 minutes before the session starts. • Note Book/PC will be provided during the presentation sessions. POSTER EXHIBITORS • All exhibitors are responsible to print their own posters (materials) at their own costs. • Poster materials must be printed on a single A1 sized paper. • Poster exhibitors are responsible for setting up and dismantling their poster material on Day 2, Wednesday, 4th June 2014 from 3.30 pm till 4.30 pm. • The venue for poster exhibition is at the foyer of Level 4. • Poster exhibitors are requested to be on the standby at their respective poster sites during Poster Q&A session. PUNCTUALITY To ensure that the conference proceeds smoothly, the Organizing Committee specially requests your cooperation to be punctual. Announcements of any changes The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) to the Program will be announced in the main conference room before or after plenary sessions. LANGUAGE The official language of ICCOINS2014 is English. No simultaneous interpretation services will be provided. LUNCH/COFFEE/TEA REFRESHMENT • Coffee/tea and lunch will be served at the times indicated in the programme book. • Participants are required to present lunch and dinner coupons at the dining hall. [goody bag] CONFERENCE IDENTIFICATION TAG The Organising Committee requests that you wear your identification tag at all times during the conference. Your conference identification tag will serve as your admission to all conference paper presentation sessions. responsibility for any loss or damage of your personal property. SMOKING POLICY The Kuala Lumpur Convention Centre is deemed as a Non-Smoking venue. LOCAL TIME The local Kuala Lumpur time is +8 GMT. INTERNATIONAL PHONE CALLS The country code for Malaysia is +60. To make a call within Kuala Lumpur or Selangor, a code ‘3’ must be pressed after the country code followed by the local telephone number. To make a call to other states/cities outside of Kuala Lumpur and Selangor, the correct Malaysian State code must be entered in place of the ‘3’. ELECTRICITY Malaysian electrical power is 240 volts, 50 Hz. The connection for appliances is a 3-pin plug. CONFERENCE DRESS CODE Smart casual is recommended throughout the conference. MESSAGE BOARD A conference message board will be located near the main conference room . INSURANCE AND LIABILITY The Organizing Committee suggests that you take usual precautions with your personal belongings. Do not leave them unattended. The Organizers and the venue’s staff will not take any page | 13 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Conference Programme Day 1 • Tuesday (3rd June 2014) Time Event 09001030 Opening and Keynote : Plenary Hall MORNING BREAK - Level 1 Foyer, Level 1 Centre Core and Level 3 Foyer 11001145 Keynote II : Plenary Hall LUNCH BREAK - Grand Ballroom 1&2 13551605 ICCOINS Plenary 1 : Conference Hall 2 EVENING BREAK - Level 3 Foyer and Level 4 Centre Core ICCOINS Parallel Sessions 16201830 Track 1 - Informations Systems 1 Level 4, Room 404 Track 2 - Data Communication & Networking 1 Level 4, Room 405 Track 3 - Computational Intelligence 1 Level 4, Room 406 Track 4 - Software Engineering 1 Level 4, Room 407 Track 5 - Green Computing 1 Level 4, Room 408 End of Day 1 Day 2 • Wednesday (4th June 2014) Time Event 08301030 ICCOINS Plenary 2 - Conference Hall 3, Level 2 MORNING BREAK - Level 3 Foyer and Level 4 Centre Core 14 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Conference Programme ICCOINS Parallel Sessions 10551305 Track 1 – Information Systems 2 Level 4, Room 401 Track 2 – Data Communication & Networking 2 Level 4, Room 402 Track 3 – Computational Intelligence 2 Level 4, Room 403 Track 4 - Bio Inspired Computing & Computational Intelligence Level 4, Room 404 Track 5- Software Engineering 2 Level 4, Room 405 LUNCH BREAK - Grand Ballroom 1 & 2 ICCOINS Parallel Sessions 13551605 1530 Track 1 – Information Systems 3 Level 4, Room 406 Track 2 - Data Communication & Networking 3 Level 4, Room 407 Track 3 – Computational Intelligence 3 Level 4, Room 408 Track 4 - Software Engineering 3 Level 4, Room 409 Track 5 – Human Computer Interaction 1 Level 4, Room 410 ICCOINS Poster Presentations Level 4, Foyer EVENING BREAK - Level 3 Foyer and Level 4 Centre Core 16201830 ICCOINS Parallel Sessions Track 1 – Information Systems 4 Level 4, Room 401 Track 2 – Data Communication & Networking 4 Level 4, Room 402 END OF DAY 2 page | 15 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Conference Programme Day 3 • Thursday (5th June 2014) Time Event ICCOINS Parallel Sessions 08301030 Track 1 – Information Systems 5 Level 4, Room 401 Track 2 – Computational Intelligence 4 Level 4, Room 402 MORNING BREAK - Level 3 Foyer and Level 4 Centre Core ICCOINS Parallel Sessions 10551305 Track 1 – Information Systems 6 Level 4, Room 401 Track 2 – Software Engineering 4 Level 4, Room 402 Special Seminar: How to extend a conference paper to journals Level 4, Room 403 LUNCH BREAK - Grand Ballroom 1&2 13551605 Pre-Closing - Conference Hall 2 END OF CONGRESS 16 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Technical Sessions Day 1 • Tuesday (3rd June 2014) Venue : 404 Track 1 : INFORMATION SYSTEMS 1 Time : 16:20 - 18:30 Chair : Dhanapal Durai Dominic Co-Chair : Abid Sohail Session Code Paper ID Paper Title Authors T1_IS1_1_ 1569866849 Evaluation of Online System Acceptance Through Airlines Websites in Malaysia Dhanapal Durai Dominic; Humaira Khan T1_IS1_2_ 1569852645 A Process Warehouse Based Resources Performance Evaluation Method for Business Processes Improvement Abid Sohail; Dhanapal Dominic T1_IS1_3_ 1569867087 Dynamics of the Entanglement Over Noisy Quantum Networks Abdel-Haleem Abdel-Aty; Nordin Zakaria T1_IS1_4_ 1569867131 Mutual Entropy of a Single Cooper Pair-Box Interacting with MultiPhoton Field Heba Kadry; Nordin Zakaria T1_IS1_5_ 1569867317 A Comparative Study of Different Image Completion Techniques Sameh Zarif; Ibrahima Faye; Dayang Rohaya Awang Rambli T1_IS1_6_ 1569867333 Document Image Skew Detection and Correction Method Based on Extreme Points Marian Wagdy; Ibrahima Faye; Dayang Rohaya Awang Rambli page | 17 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Venue : 405 Track 2 : DATA COMMUNICATION & NETWORKING 1 Time : 16:20 - 18:30 Chair : Alan Oxley Co-Chair : Irshad Sumra Session Code Paper ID Paper Title Authors T2_DCN1_1_ 1569867781 Issues Affecting the Adoption of IPv6 Alan Oxley T2_DCN1_2_ 1569870581 Effects of Attackers and Attacks on Availability Requirement in Vehicular Network: A Survey Irshad Sumra T2_DCN1_3_ 1569866847 IP-CHOCK (filter)-Based Detection Scheme for Denial of Service (DoS) Attacks in VANET Karan Verma; Halabi Hasbullah T2_DCN1_4_ 1569866111 Three Hops Reliability Model for Underwater Wireless Sensor Network Tariq Ali T2_DCN1_5_ 1569870527 Data Fusion for Reducing Power Consumption in Arduino-Xbee Wireless Sensor Network Platform Solahuddin Yusuf Fadhlullah; Widad Ismail T2_DCN1_6_ 1569866559 A Multibit Burst Error Detection and Correction Mechanism for Application Layer Shiladitya Bhattacharjee; Lukman Ab. Rahim; Izzatdin A Aziz Venue : 406 Track 3 : COMPUTATIONAL INTELLIGENCE 1 Time : 16:20 - 18:30 Chair : Yong Suet Peng Co-Chair : Muhammad Javed Iqbal Session Code Paper ID T3_CI1_1_ 1569867035 18 | page Paper Title Authors An Efficient Computational Intelligence Technique for Classification of Protein Sequences Muhammad Javed Iqbal; Ibrahima Faye; Abas Md Said; Brahim Belhaouri Samir The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) T3_CI1_2_ 1569866451 Multicolor Recognition Based on Mini-Max Color Threshold Zacharie MBaitiga T3_CI1_3_ 1569866697 Empirical Analysis of Parallel-NARX Recurrent Network for Long-Term Chaotic Financial Forecasting Jadid Abdulkadir Said; Suet Peng Yong T3_CI1_4_ 1569866843 A Computer Aided System for Breast Cancer Detection and Diagnosis Hamada Al-Absi; Brahim Belhaouri Samir; Suziah Sulaiman T3_CI1_5_ 1569851419 Infomax and FASTICA Using Principle Component Analysis as Preprocessor for Airwave Removal in Seabed Logging Adeel Ansari; Afza Shafie; Abas Md Said; Seema Ansari; Elisha Tadiwa Nyamasvisva; Muhammad Abdulkarim; Muhammad Rauf T3_CI1_6_ 1569867133 Image Processing Based Vehicle Detection and Tracking Method Prem Kumar Bhaskar; Suet Peng Yong Venue : 407 Track 4 : SOFTWARE ENGINEERING 1 Time : 16:20 - 18:30 Chair : Lukman Ab. Rahim Co-Chair : Amos Bajeh Session Code Paper ID Paper Title Authors T4_SE1_1_ 1569881475 Analysis of Design Patterns in OpenNebula Dr. Lukman Ab. Rahim T4_SE1_2_ 1569869721 Common Trust Criteria for IaaS Cloud Evaluation and Selection Hamzeh Alabool T4_SE1_3_ 1569866835 A Theoretical Validation of the Number of Polymorphic Methods as a Complexity Metric Amos Bajeh; Shuib Basri; Tang Jung Low T4_SE1_4_ 1569882139 Assessment and Evaluation of Requirements Elicitation Techniques using Analysis Determination RequirementsFramework Souhaib Besrour; Lukman Ab. Rahim; Dhanapal Durai Dominic T4_SE1_5_ 1569901895 Work Design Characteristics and Knowledge Sharing Behavior Among Software Engineers Mobashar Rehman; Ahmad Mahmood; Rohani Salleh; Aamir Amin page | 19 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Venue : 408 Track 5 : GREEN COMPUTING 1 Time : 16:20 - 18:30 Chair : Savita K Sugathan Co-Chair : Yahia Baashar Session Code Paper ID Paper Title Authors T5_GC1_1_ 1569872019 The Adoption of Green Information Technologies and Systems as a Driver Within Green SCM Savita K Sugathan; Dhanapal Durai Dominic T5_GC1_2_ 1569910713 A Semi-Greedy Soft Real-Time Multiprocessor Scheduling Algorithm Hitham Alhussian T5_GC1_3_ 1569901913 ZigBee Wireless Communication for Monitoring Renewable Street Light System Thinaharan Ramachandran; Vasaki Ponnusamy; Tang Jung Low; Anang Hudaya Muhamad Amin T5_GC1_4_ 1569890001 An Integrative Perspective for CRMS Implementation in Healthcare in Malaysia Yahia Baashar T5_GC1_5_ 1569916897 Root Cause Analysis on Changes in Chiller Performance Using Linear Regression Jun Okitsu; Ken Naono; Mohd Fatimie Irzaq Khamis; Shaharin Anwar Sulaiman; Mohd Amin Abd Majid 20 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Day 2 • Wednesday (4th June 2012) Venue : 401 Track 1 : INFORMATION SYSTEMS 2 Time : 10:55 - 13:05 Chair : Kalai Anand Ratnam Co-Chair : Gunasekar Thangarasu Session Code Paper ID Paper Title Authors T1_IS2_1_ 1569868777 Adoption of Cloud Computing to Enhance the Healthcare Services in Malaysia Kalai Anand Ratnam; Dhanapal Durai Dominic T1_IS2_2_ 1569867371 Prediction of Hidden Knowledge From Clinical Database Using Data Mining Techniques Gunasekar Thangarasu; Dhanapal Durai Dominic T1_IS2_3_ 1569868213 Conceptual Framework for Effective E-collaboration and Didactic Enhancement Alimatu-Saadia Yussiff; Wan Fatimah Wan Ahmad; Alan Oxley T1_IS2_4_ 1569902915 Assessing the Quality of Rail Ticket Reservation Systems: Cases From Indonesia Nur Wijayaning Rahayu; Dherry Andika T1_IS2_5_ 1569870935 Role of Information Communication Technology for Evidence Based Medicine Among Physicians Fozia Anwar; Suziah Sulaiman; Dhanapal Durai Dominic T1_IS2_6_ 1569891073 Mobile Game Approach to Prevent Childhood Obesity Using Persuasive Technology Wahidah Husain; Ammar Almomani; Ying San Oh page | 21 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Venue : 402 Track 2 : DATA COMMUNICATION & NETWORKING 2 Time : 10:55 - 13:05 Chair : Low Tan Jung Co-Chair : Ibrahim A. Lawal Session Code Paper ID Paper Title Authors T2_DCN2_1_ 1569871723 Fuzzy Logic Based Link Status Classification for Efficient Multipath Routing in Multi-hop Wireless Mesh Networks Peer Azmat Shah; Halabi Hasbullah; Shahzad Rafiq; Sadiq ur Rehman; Tang Jung Low T2_DCN2_2_ 1569872437 Throughput Enhancement for Fixed WiMAX Network Using Distributed Model Ibrahim A. Lawal; Abas Md Said; Kashif Nisar; Abubakar Aminu Mu’azu; Peer Azmat Shah T2_DCN2_3_ 1569871473 Choices Available for Implementing Smart Grid Communication Network Hasan Farooq; Tang Jung Low T2_DCN2_4_ 1569872009 Proposed Method for Enhancing Quantum Bit Error Rate Using Quantum Key Distribution Technique Mustapha Yusuf Abubakar; Tang Jung Low; Nordin Zakaria; Oi Mean Foong T2_DCN2_5_ 1569871303 Workability Review of Genetic Algorithm Approach in Networks Okta Nurika; Mohamed Nordin Zakaria; Mohd Fadzil Hassan; Tang Jung Low T2_DCN2_6_ 1569903253 Filters for Device-free Indoor Localization System Based on RSSI Measurement Nasrullah Pirzada 22 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Venue : 403 Track 3 : COMPUTATIONAL INTELLIGENCE 2 Time : 10:55 - 13:05 Chair : Dayang Rohaya Bt Awang Rambli Co-Chair : Abdul-Lateef Yussiff Session Code Paper ID Paper Title Authors T3_CI2_1_ 1569867215 A Semi-Apriori Algorithm for Discovering the Frequent Itemsets Sallam Osman Fageeri; Rohiza Ahmad; Baharum Baharudin T3_CI2_2_ 1569882187 A Cost-Sensitive Approach to Named Entity Recognition with Category Hierarchy Shohei Higashiyama; Mathieu Blondel; Kazuhiro Seki; Kuniaki Uehara T3_CI2_3_ 1569871179 Parallel Kalman Filter-Based Multi-Human Tracking in Surveillance Video Abdul-Lateef Yussiff; Suet Peng Yong; Baharum Baharudin T3_CI2_4_ 1569871921 A Framework for the Automatic Identification of Algae (Neomeris Vanbosseae M.A.Howe):U3S Ching Soon Tan; Phooi Yee Lau; Siew Moi Phang; Tang Jung Low T3_CI2_5_ 1569878369 Gender Recognition on Real World Faces Based on Shape Representation and Neural Network Olasimbo A. Arigbabu; Sharifah Mumtazah Syed Ahmad; Wan Azizun Wan Adnan; Salman Yussof; Vahab Iranmanesh; Fahad Layth Malallah T3_CI2_6_ 1569898769 Color Space Selection for Human Skin Detection Using Color-Texture Features and Neural Networks Hani K. Al-Mohair; Junita Mohamad-Saleh; Shahrel Azmin Suandi Venue : 404 Track 4 : BIO INSPIRED COMPUTING & COMPUTATIONAL INTELLIGENCE Time : 10:55 - 13:05 Chair : Evgeny Osipov Co-Chair : Nur Syafiqah Mohamad Sani Session Code Paper ID T4_BIC1_1_ 1569902039 Paper Title Authors A Distributed Framework for Supporting 3D Swarming Applications Ghazaleh Pour Sadrollah; Jan Carlo Barca; Asad Khan; Jens Eliasson; Ilankaikone Senthooran page | 23 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) T4_BIC1_2_ 1569902663 A Polymorphic Recogniser for Distributed Intelligence in Wireless Sensor Networks Alexander Senior; Ahmet Sekercioglu; Asad Khan T4_BIC1_3_ 1569902897 Brain-like Classifier of Temporal Patterns Denis Kleyko; Evgeny Osipov T4_BIC1_4_ 1569903203 Holographic Graph Neuron Evgeny Osipov; Asad Khan; Anang Hudaya Muhamad Amin T4_BIC1_5_ 1569889229 Real-Time Video Enhancement for Various Weather Conditions Using Dark Channel and Fuzzy Logic Ahmad Alajarmeh Venue : 405 Track 5 : SOFTWARE ENGINEERING 2 Time : 10:55 - 13:05 Chair : Shuib Basri Co-Chair : Ziyaulhaq Aliyu Session Code Paper ID Paper Title Authors T5_SE2_1_ 1569884603 Communication Risks in GSD During RCM:Results From SLR Arif Ali Khan T5_SE2_2_ 1569882401 A Combine Usability Framework for IMCAT Evaluation Ziyaulhaq Aliyu; Lukman Ab. Rahim; Emy Mustapha T5_SE2_3_ 1569883009 Handling Tradeoffs Between Agile and Usability Methods Saad Masood Butt; Wan Fatimah Wan Ahmad; Lukman Ab. Rahim T5_SE2_4_ 1569883597 Improving Effectiveness of Testing Using Reusability Factor Maryam Ahmed; Rosziati Ibrahim T5_SE2_5_ 1569883695 A Review of Educational Games Design Frameworks: An Analysis From Software Engineering Perspective Mifrah Ahmad; Lukman Ab. Rahim; Noreen Arshad 24 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Venue : 406 Track 1 : INFORMATION SYSTEMS 3 Time : 13:55 - 16:05 Chair : G. Kannabiran Co-Chair : Okta Norika Session Code Paper ID Paper Title Authors T1_IS3_1_ 1569917811 Career Anchors and Employee Retention - An Empirical Study of Indian IT Industry Kannabiran G; Dhanapal Durai Dominic; A. V. Sarata Vai T1_IS3_2_ 1569871529 A Preliminary Study on Local Folktales Exposures to Support the Development of Animated Courseware Norshahila Ibrahim; Wan Fatimah Wan Ahmad; Afza Shafie T1_IS3_3_ 1569871581 Information Audit in Electricity Utilities: Roles, Methodologies, Issues and Challenges Izyana Ariffin; Aliza Abdul Latif; Masyura Ahmad Faudzi; Siti Salbiah Mohamed Shariff; Mawaddah Mohamad Nadzir T1_IS3_4_ 1569871601 Maternity Data Management Utilizing Cloud Computing Ying San Oh; Wahidah Husain T1_IS3_5_ 1569871649 Maximum-Shift String Matching Algorithms Nur’Aini Abdul Rashid; Hakim Adil Kadhim T1_IS3_6_ 1569897241 Automatic Method for Bone Age Assessment Based on Combined Method Marjan Mansourvar; Maizatul Akmar Ismail; Sameem Abdul Kareem; Hanum Md. Nasaruddin Fariza Venue : 407 Track 2 : DATA COMMUNICATIONS & NETWORKING SYSTEM 3 Time : 13:55 - 16:05 Chair : Nazleeni Samiha Haron Co-Chair : Peer Azmat Shah Session Code Paper ID Paper Title Authors T2_DCN3_1_ 1569872655 Real-Time Massage Differentiation with Priority Data Service Flows in VANETs Abubakar Aminu Mu’azu; Tang Jung Low; Halabi Hasbullah; Ibrahim A. Lawal; Peer Azmat Shah page | 25 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) T2_DCN3_2_ 1569874255 Path Loss Simulation in Different Radio Propagation Models with 1.8GHz and 2.6GHz Bands Ahmed Chariyev T2_DCN3_3_ 1569882325 Access Control and Privacy in MANET Emergency Environment Asmidar Abu Bakar; Azimah Abdul Ghapar; Roslan Ismail T2_DCN3_4_ 1569901689 Associative Data Models for Voluminous Data Representation and Processing Amir Hossein Basirat; Asad Khan; Heinz Schmidt T2_DCN3_5_ 1569916921 Performance Evaluation of Distributed Video Coding with Different Channel Encoding Techniques Kin Honn Chiam; Mohd Fadzli Mohd Salleh T2_DCN3_6_ 1569903219 Classifying Peer-to-peer Traffic Using Protocol Hierarchy Somnuk Puangpronpitag; Thongchai Chuachan Venue : 408 Track 3 : COMPUTATIONAL INTELLIGENCE 3 Time : 13:55 - 16:05 Chair : Emy Elyanee Mustapha Co-Chair : Muhammad Abdulkarim Session Code Paper ID Paper Title Authors T3_CI3_1_ 1569883733 MetOcean Data to Linked Data Kamaluddeen Usman Danyaro; Jafreezal Jaafar; Mohd Shahir Liew T3_CI3_2_ 1569883761 Hybrid NSGA-II of Three-Term Backpropagation Network for Multiclass Classification Problems Ashraf Osman Ibrahim; Siti Mariyam Shamsuddin; Nor Bahiah Ahmad; Mohd Najib Mohd Salleh T3_CI3_3_ 1569888209 Options Strategy for Technology Companies Teik Kheong Tan; Benny Bing T3_CI3_4_ 1569888257 Discriminative Discriminant Common Vector in Face Verification Ying Han Pang; Andrew Teoh Beng Jin; Yee Ping Liew; Fan Ling Goh; Chu Kiong Loo 26 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) T3_CI3_5_ 1569888843 Airwaves Estimation in Shallow Water CSEM Data: Multi-Layer Perceptron Versus Multiple Regression Muhammad Abdulkarim; Afza Shafie; Wan Fatimah Wan Ahmad; Adeel Ansari; Elisha Tadiwa Nyamasvisva T3_CI3_6_ 1569907891 Performance Comparison of Canny and Sobel Edge Detectors on Balloon Snake in Segmenting Masses Abdul Kadir Jumaat Venue : 409 Track 4 : SOFTWARE ENGINEERING 3 Time : 13:55 - 16:05 Chair : Rehan Akbar Co-Chair : Nasrullah Pirzada Session Code Paper ID Paper Title Authors T4_SE3_1_ 1569902539 Software Development Process Tailoring for Small and Medium Sized Companies Rehan Akbar T4_SE3_2_ 1569888245 Pluggable Scheduling on an Open-Source Based Volunteer Computing Infrastructure Nordin Zakaria; Guilherme Dinis Junior; Ken Naono T4_SE3_3_ 1569888767 jFakih: Modelling Mobile Learning Game Azham Hussain; Norasyikin Abdul Mutalib; Azman Bin Yasin T4_SE3_4_ 1569890959 Assessing Quality Attributes of Object-Oriented Software Design: A Case Study Shuib Basri; Zhamri Che Ani; Aliza Sarlan T4_SE3_5_ 1569896429 Ontology Based Development of Domain Specific Languages for Systems Engineering Vitaliy Mezhuyev T4_SE3_6_ 1569899729 Flowchart-based Approach to Aid Novice Programmers: A Novel Framework Danial Hooshyar; Rodina Binti Ahmad; Mohd Hairul Nizam Md Nasir; Wong Ching Mun page | 27 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Venue : 410 Track 5 : HUMAN COMPUTER INTERACTIONS 1 Time : 13:55 - 16:05 Chair : Goh Kim Nee Co-Chair : Ahsanullah Abro Session Code Paper ID Paper Title Authors T5_HCI1_1_ 1569876897 Al-Quran Learning Using Mobile Speech Recognition: An Overview Noraziahtulhidayu Kamarudin; Syed Abdul Rahman Al-Haddad Syed Mohamed; Abd Rauf Bin Hassan; Mohammad Abd-Alrahman Mahmoud Abushariah T5_HCI1_2_ 1569879477 Human Finger Input Properties for Precise Target Selection on Multitouch Screen Ahsanullah Abro T5_HCI1_3_ 1569883797 Evaluation of Mobile Games with Playability Heuristic Evaluation System Sarmad Soomro; Wan Fatimah Wan Ahmad; Suziah Sulaiman T5_HCI1_4_ 1569883873 Story Line in Image-based Virtual Reality for Enhancing Spatial Presence Experience Nadia Diyana Mohd Muhaiyuddin; Dayang Rohaya Awang Rambli T5_HCI1_5_ 1569900887 Measuring Malaysian M-Commerce User Behaviour Ashok Sivaji; Shi Tzuaan Soo; Tek Yong Lim; Li Shan; Mohammad Hossein Tahriri Zanegenh T5_HCI1_6_ 1569901893 Synchronizing Audio and Haptic Feedback to Read Webpage Suziah Sulaiman; Dayang Rohaya Awang Rambli; Hanis Hashim; Mahmud Mokhtahir Venue : 401 Track 1 : INFORMATION SYSTEMS 4 Time : 16:20 - 18:30 Chair : Mazeyanti Bt M Ariffin Co-Chair : Muhammad Azeem Abbas Session Code Paper ID T1_IS4_1_ 1569872161 28 | page Paper Title Authors Current Limitations and Opportunities in Mobile Augmented Reality Applications Nur Intan Adhani Muhamad Nazri The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) T1_IS4_2_ 1569872293 e-Supply Chain Trust Model for B2B Collaboration:A Case Study of Malaysian Construction Industry Norshakirah Ab Aziz; Dhanapal Durai Dominic; Rohiza Ahmad T1_IS4_3_ 1569872461 Proposed Conceptual Model for E-Service Quality in Malaysian Universities Iham Tariq Ismail Al-Nuaimi; Ahmad Mahmood; Hamid H Jebur T1_IS4_4_ 1569872525 Multimodal Interactions in Traditional Foot Reflexology Practice Hector Chimeremeze Okere; Suziah Sulaiman; Dayang Rohaya Awang Rambli; Oi Mean Foong T1_IS4_5_ 1569879027 A Pragmatic Use of Semantic Web Technologies for Preschool Cognitive Skills Tutoring System Muhammad Azeem Abbas; Wan Fatimah Wan Ahmad; Khairul Shafee Kalid T1_IS4_6_ 1569871519 Participation/Collaboration Pattern: Perspectives of Trust and Security Risks Sadaf Hina; Alan Oxley Venue : 402 Track 2 : DATA COMMUNICATION & NETWORKING 4 Time : 16:20 - 18:30 Chair : Foong Oi Mean Co-Chair : Muhammad Maaz Rehan Session Code Paper ID Paper Title Authors T2_DCN4_1_ 1569890449 Enhance the Performance of ICMP Protocol by Reduction the IP Over Ethernet Naming Architecture Waleed Hussein; Longzheng Cai; Shaymaa Alyawer T2_DCN4_2_ 1569901185 Early Detection of Incident Using Vehicular Ad-hoc Network Bharat Singh; Halabi Hasbullah; Mohd Yunus Nayan; Bhumit Tahlan T2_DCN4_3_ 1569901551 Lifetime and Coverage Maximization Technique for Mobile Sensor Networks Muhammad Amir Khan; Halabi Hasbullah; Babar Nazir T2_DCN4_4_ 1569901487 A performance comparison of recent open source wireless sensor network supporting simulators. Muhammad Amir Khan; Halabi Hasbullah; Babar Nazir T2-DCN4_5_ 1569903131 Security Framework for Low Latency Vanet Applications Asif Wagan; Tang Jung Low page | 29 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Day 3 • Thursday (5th June 2012) Venue : 401 Track 1 : INFORMATION SYSTEMS 5 Time : 8:30 - 10:30 Chair : Suziah Sulaiman Co-Chair : Munwar Ali Session Code Paper ID Paper Title Authors T1_IS5_1_ 1569880307 A Survey on Deceptions in Online Social Networks Shafiza Mohd Shariff; Xiuzhen Zhang T1_IS5_2_ 1569881263 K-NN Classifier for Data Confidentiality in Cloud Computing Munwar Ali T1_IS5_3_ 1569899207 Development of Private Cloud Storage for Medical Image Research Data Ahmad Fadzil; Irving V Paputungan; Mohd Fadzil Hassan; Vijanth Sagayan Asirvadam; Megat Daharus T1_IS5_4_ 1569882693 The Determinants of Airline Online Services Satisfaction: A Conceptual Model Rira Rahayu Arridha; Nur Elias; Hazura Mohamed T1_IS5_5_ 1569882765 Social Commerce From the Information Systems Perspective: A Systematic Literature Review Mohana Shanmugam; Yusmadi Yah Jusoh T1_IS5_6_ 1569902593 Rationale of Students’ Failure in Comprehending Theoretical Computer Science Courses Muhammad Aasim Qureshi; Mohd Fadzil Hassan; Rabia Sammi Venue : 402 Track 2 : COMPUTATIONAL INTELLIGENCE 4 Time : 8:30 - 10:30 Chair : Saipunidzam Mahamad Co-Chair : Hani Yasmin Ahmad Zaki Session Code Paper ID T2_CI4_1_ 1569900933 30 | page Paper Title Authors Identifying Universal Facial Emotion Markers for Automatic 3D Facial Expression Recognition Amal Azazi; Syaheerah Lebai Lutfi; Ibrahim Venkat The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) T2_CI4_2_ 1569903225 Lung Cancer Diagnosis Using CT-Scan Images Based on Cellular Learning Automata Nooshin Hadavi; Md Jan Nordin; Ali Shojaeipour T2_CI4_3_ 1569904591 Recognition of Occluded Faces Using an Enhanced EBGM Agorithm Badr Lahasan; Ibrahim Venkat; Syaheerah Lebai Lutfi T2_CI4_4_ 1569905735 Towards Real Time Multidimensional Hierarchical Graph Neuron (mHGN) Benny Benyamin Nasution T2_CI4_5_ 1569890219 An Adaptive Method to Determine the Number of Clusters in Clustering Process Huan Doan; Thuan Nguyen T2_CI4_6_ 1569890081 Development of an Intelligent Scorpion Detection Technique Using Vibration Analysis Abiodun Musa Aibinu; Bala Sadiq; Elijah Joseph; Habeeb Salau; Momoh Salami Venue : 408 Track 1 : INFORMATION SYSTEMS 6 Time : 10:55 - 13:05 Chair : Noreen Izza Arshad Co-Chair : Kwang Hooi Yew Session Code Paper ID Paper Title Authors T1_IS6_1_ 1569882903 Understanding Factors Affect on the Effectiveness of Social Networks for Cancer Patients Marva Mirabolghasemi; Noorminshah A.Iahad; Suraya Miskon T1_IS6_2_ 1569883271 Knowledge Management System Quality:A Survey of Knowledge Management System Quality Dimensions Marzanah A. Jabar; Abdallah Alnatsha T1_IS6_3_ 1569883325 Task-Technology Fit and User Adoption of Cloud-based Collaborative Learning Technologies Elaheh Yadegaridehkordi; Noorminshah A.Iahad; Norasnita Ahmad T1_IS6_4_ 1569883433 Understanding the Knowledge Transfer Process in the Flood Management Domain Hasniza Yahya; Mohd Zuhaili Mohd Rodzi; Mohammad Nazir Ahmad page | 31 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) T1_IS6_5_ 1569883555 Research Productivity in Computer Science Field for Universiti Teknologi Malaysia in 2000-2013 Sharanjit Dhillon; Roliana Ibrahim; Ali Selamat T1_IS6_6_ 1569902873 ICT in Process Safety Management Kwang Hooi Yew; Mohd Fadzil Hassan; Azmi Mohd Shariff; Hanida Abdul Aziz Venue : 402 Track 2 : SOFTWARE ENGINEERING 4 Time : 10:55 - 13:05 Chair : Yew Kwang Hooi Co-Chair : Abdullah Sharif Session Code Paper ID Paper Title Authors T2_SE4_1_ 1569903003 Risk Assessment Factors for SME Software Development Companies in Malaysia Abdullahi Sharif; Shuib Basri T2_SE4_2_ 1569903205 Survey on Maintainability Evaluation Criteria in Service Oriented Architecture Nik Marsyahariani Nik Daud T2_SE4_3_ 1569901421 The Effectiveness of using the Dependency Relations Approach in Recognizing the Head Modifier for Malay Compound Nouns Suhaimi Rahman T2_SE4_4_ 1569905899 An Integrated Success Adoption Model for Examining E-Learning Among Adult Workers in Jordan Ahmad Issa Saleem Alzoubib 32 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Poster Sessions Poster Code Paper ID Paper Title Authors Poster_1_ 1569867153 Subsurface Exploration of Seabed Using Electromagnetic Waves for the Detection of Hydrocarbon Layers Adeel Ansari; Afza Shafie; Seema Ansari; Abas Md Said; Elisha Tadiwa Nyamasvisva; Muhammad Abdulkarim; Muhammad Rauf Poster_2_ 1569867259 ZLS: A Next-door Lightweight QoS Aware Location Service Technique for VANET on Highways Muhammad Maaz Rehan; Halabi Hasbullah; Omer Chughtai; Muhammad Waqas Rehan Poster_3_ 1569868807 Model Driven Software Development: An Overview Muhammad Qaiser Saleem; Jafreezal Jaafar; Mohd Fadzil Hassan Poster_4_ 1569902771 Mobile Phone Icons Recognition and Cultural Aspects Syed Ghayas, Suziah Sulaiman, Jafreezal Jaafar, Saipunidzam Mahamad, Muzafar Khan Poster_5_ 1569870281 Association Among Independent and Dependent Factors of Host in Volunteer Computing Soodeh Peyvandi, SP Poster_6_ 1569871171 QoS Routing for Cognitive Radio Ad-Hoc Networks: Challenges & Issues Tauqeer Safdar; Halabi Hasbullah Poster_7_ 1569872323 Classification of Software Project Risk Managers Established on Roles and Responsibilities Uzair Iqbal, Alan Oxley, Jafreezal Jaafar Poster_8_ 1569872451 Optimizing BOINC Scheduling Using Genetic Algorithm Norzatul Natrah Ismail Poster_9_ 1569872581 A Case Study on Travel Information From Social Network – Focus in Facebook and Blog in Malaysia Nurul Akhmal Mohd Zulkefli, Baharum Baharudin Poster_10_ 1569882495 Students’ Inclinations Towards Games and Perceptions of Game-Based Learning (GBL) Mazeyanti M Ariffin, Alan Oxley, Suziah Sulaiman page | 33 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Poster_11_ 1569883019 Design of Interactive Whiteboard System for Collaborative Learning Tahir Mustafa Madni Ikram, Mohd Yunus Nayan, Suziah Sulaiman, Muhammad Tahir, Majid Iqbal Poster_12_ 1569883903 Performance Comparison of Least Slack Time Based Heuristics for Job Scheduling on Computational Grid Ahmed Abba Haruna, Tang Jung Low, Anindya J. Pal Poster_13_ 1569884381 Swarm Inspired Test Case Generation for Online C++ Programming Assessment Oi Mean Foong, Tran Quang Trung, Suet Peng Yong, Helmi Md Rais Poster_14_ 1569911443 Exploration of Communication Process Using Business Microscope Yoke Yie Chen, Kim Nee Goh, Yukihisa Fujita, Ken Naono Poster_15_ 1569901845 Number Skills Mobile Application for Down Syndrome Children Wan Fatimah Wan Ahmad, Afza Shafie Poster_16_ 1569906097 Experimental Study on the Effective Range of FCM’s Fuzzifier Values for Web Services’ QoS Data Mohd Hilmi Hasan, Jafreezal Jaafar, Mohd Fadzil Hassan Poster_17_ 1569882423 Electronic Content Management System Use and Implementation in Highly Integrated Businesses Noreen Izza Arshad, Mazlina Mehat, Mohamed Imran Mohamed Ariff Poster_18_ 1569882611 Understanding the Ways Organizational Learning Drives Information Technology (IT) Infrastructure Noor Hafizah Hassan; Noreen Izza Arshad; Jafreezal Jaafar; Emy Elyanee Mustapha Poster_19_ 1569882573 Effects of the Smart Board on Students’ Achievement in Moral Education Loh Wai Ling; Termit Kaur Ranjit Singh; Wan Fatimah Wan Ahmad Poster_20_ 1569872553 Predicting BottomHole Flowing Pressure Using Artificial Neural Network Paras Memon; Suet Peng Yong; William Pao; Jion Sean Pau 34 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Abstracts INFORMATION SCIENCE TRACK Paper ID : T1_IS1_1_1569866849 Title : Evaluation of Online System Acceptance through Airlines Websites in Malaysia Authors : Dhanapal Durai Dominic, Humaira Khan Abstract The use of website and online system is increasing rapidly around the globe. The companies are also concerned to provide the customer valuable services and assure them all to available on their websites. This study aims to measure the customer acceptance towards the airline websites. As companies are investing high to switch from physical delivery channel to self-service online channel, customer acceptance with online web channel is a major area for research. The proposed research framework added new variable to the technology acceptance model (TAM) to measure the website acceptance. A questionnaire was distributed among the consumers who use the airline websites to purchase online ticket. The results supported all the hypothesis and gives significant results for measuring customer acceptance of airlines website. Paper ID : T1_IS1_2_1569852645 Title : A Process Warehouse Based Resources Performance Evaluation Method for Business Processes Improvement Authors : Abid Sohail, Dhanapal Dominic Abstract Existing studies on business process improvement (BPI) have widely focused on development of separate techniques for resource management and structural redesign of processes. In this study, we contend that the relationship of resource with task is not sufficiently understood. Particularly, business intelligence based approaches to BPI have not adequately explored this relationship. To understand this, we classify resources into human and non human resources, because the two types of resources behave differently. Subsequently, a set of relationships between human resources, non-human resources and tasks (named suitability, preference and competence) are presented. However, only human resource’s relationship with non-human resource/s (named preference) is presented in detail, as a resource preference model. The model bundled with the presented preference evaluation method guides users for evaluation of resources’ performance. The applicability of the method is illustrated through a healthcare case study. page | 35 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T1_IS1_3_1569867087 Title : Dynamics of the Entanglement Over Noisy Quantum Networks Authors : Abdel-Haleem Abdel-Aty, Nordin Zakaria Abstract In this paper, the effect of homogeneous and nonhomogeneous magnetic fields as an external noisy on the entanglement dynamics over partial entangled state quantum network is studied. The Dzyaloshiniskii–Moriya (DM) interaction is used to generate entangled network from partially entangled states in the presence of the spin–orbit coupling. The entanglement between any two nodes is quantified using Wootter concurrence. The effect of homogeneous and non-homogeneous magnetic field in presence and absence of the spin coupling on the entanglement between any two nodes of the network is investigated. The results show that the homogeneous magnetic field has no effect on the entanglement without the presence of the spin-orbit interaction. The non-homogeneous magnetic field has a strong impact on the entanglement either with or without spin-orbit couplings. For initially entangled channels, the upper bound does not exceed its initial value, whereas for the channels generated via indirect interaction, the entanglement reaches its maximum value. Paper ID : T1_IS1_4_1569867131 Title : Mutual Entropy of a Single Cooper Pair-Box Interacting with Multi-Photon Field Authors : Heba Kadry, Nordin Zakaria Abstract We discuss the interaction of a single Cooper pair box interacting with a multi-photon field. The dynamical behaviour is investigated using the quantum mutual entropy. The results show that the system parameters (the number of quanta and detuning parameters) play an important role in entanglement. This result might shed the light on the possibility to use the number of quanta as a controller parameter for the present system. 36 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T1_IS1_5_1569867317 Title : A Comparative Study of Different Image Completion Techniques Authors : Sameh Zarif, Ibrahima Faye, Dayang Rohaya Awang Rambli Abstract Image completion is an active and intersesting topic in image and video processing. Restoration and retouching of damaged areas in an undetectable form is the objective of image completion techniques. Most of the recently developed video completion methods are based on image completion techniques to restore the damaged frames. With respect to video completion challenges, we compared and evaluated the most recent image completion methods. For a fair comparison, we introduced a new dataset and evaluated four states-of-art- image completion methods on the same hardware. Experimental results are conducted to highlight the strengths and drawbacks of each image completion method. Paper ID : T1_IS1_6_1569867333 Title : Document Image Skew Detection and Correction Method Based on Extreme Points Authors : Marian Wagdy, Ibrahima Faye, Dayang Rohaya Awang Rambli Abstract In this paper we present a method for estimating the document image skew angle. The main idea of this method is based on the concept that any document image has objects with rectangular shape such as paragraphs, text lines, tables and figures. These objects can be bounded by rectangles. We use the extreme point’s properties to obtain the corners of the rectangle which fits the largest connected component of the document image. The angle of this rectangle represents the angle of document skew. The experimental results show the high performance of the algorithm in detecting the angle of skew for a variety of documents with different levels of complexity. page | 37 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T1_IS2_1_1569868777 Title : Adoption of Cloud Computing to Enhance the Healthcare Services in Malaysia Authors : Kalai Anand Ratnam, Dhanapal Durai Dominic Abstract The global healthcare industry is continuing to grow, and it is important to realize that healthcare providers will have to continue to invest in IT based systems to improve overall operations and cross system communications. The study focuses on the relationships between healthcare providers, IT resources and health insurance providers in determining the adoption of cloud computing. The results obtained as result of this study shows that IT resources significantly influences healthcare providers and health insurance providers. The efficiency and clinical services can be improvised with the adoption of the cloud. The findings of this study are presented with reliability analysis, descriptive, factor loading, regression and correlations for IT capability in healthcare services, structural equation modeling is used to determining the overall model fit. Structural equation modeling (SEM) using AMOS 20.0 is used for model fit testing and SPSS 20.0 is used for analyzing the descriptive statistics, hypothesis and assumptions for SEM. Paper ID : T1_IS2_2_1569867371 Title : Prediction of Hidden Knowledge from Clinical Database Using Data Mining Techniques Authors : Gunasekar Thangarasu, Dhanapal Durai Dominic Abstract Clinical Database has enormous quantity of information about patients and their diseases. The database mainly contains clinical consultation details, family history, medical lab report and other information which are considered to taking a final diagnostic decision by physician. Clinical databases are widely utilized by the numerous researchers for predicting different diseases. The current diabetes diagnosis methods are carried out based on the impact of various medical test and the results of physical examination. The new and innovative prediction methods are projected in this research to identify the diabetic disease, its types and complications from the clinical database in an efficiently and an economically faster manner. 38 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T1_IS2_3_1569868213 Title : Conceptual Framework for Effective E-collaboration and Didactic Enhancement Authors : Alimatu-Saadia Yussiff, Wan Fatimah Wan Ahmad; Alan Oxley Abstract E-collaboration environment through social media technologies is a promising pedagogical approach for teaching, learning and research. It will support student-tostudent, student-to-lecturer, and student-to-content interaction and collaboration in a higher educational institution. Despite these benefits, many educators are still reluctant to start experimenting or using it. Drawing on current developments in social media software, a literature review on online collaborative teaching and learning, theories of learning, basic concepts, as well as action research using social media technologies, this paper reviewed and described eight existing frameworks for e-collaboration and five learning theories using nine and four criteria respectively. Following an analysis of the frameworks and learning theories, a conceptual framework for effective e-collaboration and the didactic enhancement is proposed for higher educational institutions with support for planning, design, development, implementation and evaluation of such an environment. The findings, conclusions and implications for future research in this area are further provided. Paper ID : T1_IS2_4_1569902915 Title : Assessing the Quality of Rail Ticket Reservation Systems: Cases from Indonesia Authors : Nur Wijayaning Rahayu, Dherry Andika Abstract This study compared the quality of e-commerce of rail ticket reservation system among one government-owned and two privately-owned agencies in Indonesia. The best two private agencies were chosen based on popularity and award won. There is lack of research interest in the transportation domain, particularly in developing countries, even though some studies existWe applied WebQual method as website quality metric for three dimensions: Usability, Information Quality, and Service Interaction Quality. We asked 100 respondents between September-October 2013 using WebQual questionnaire, translated into Indonesian language. The validity and reliability test shows all of the questions to be valid. Overall result shows that there is no significant difference in the quality of rail ticket reservation systems between government-owned and privately-owned agencies. page | 39 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T1_IS2_5_1569870935 Title : Role of Information Communication Technology for Evidence Based Medicine among Physicians Authors : Fozia Anwar, Suziah Sulaiman, Dhanapal Durai Dominic Abstract In the current globalization age, Information communication technology (ICT) is diffusing its applications and services to every domain. The role of ICT in health care sector cannot be ignored as healthcare is directly associated with human lives. ICT empowers healthcare personnel in achieving high productivity and better accuracy in the clinical tasks by practicing evidence based medicine (EBM). This is a cross sectional quantitative study exploring the role of ICT and information systems for EBM. Data was collected using a questionnaire with a sample size of 250 healthcare personnel directly linked with clinical care. We identified that clinical and other allied health care personnel recognize the benefits to adopt ICT in the clinical educational workplaces for EBM. However they feel frustrated by workload preventing access to information technology, limitations of technology access and lack of opportunities for training in ICT. It is evident from this research that familiarity, use and self-confidence in the use of ICT are somewhat greater in personnel who have a recent tertiary education. 40 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T1_IS2_6_1569891073 Title : Mobile Game Approach to Prevent Childhood Obesity Using Persuasive Technology Authors : Wahidah Husain, Ammar Almomani, Ying San Oh Abstract Obesity is a condition in which the body has excess fat. Childhood obesity has become an important public health issue because affects every aspect of the life of a child. More specifically, the condition leads to poor health and negative social perceptions. Many risk factors are linked to obesity. The varying aspects of the problem and its serious implications for future health and well-being of children are enormous. The most effective solution can be achieved via programs geared to prevent such diseases. Children spend an average of more than three hours daily in front of the television, an hour at the computer, and 30 minutes playing video games, which opens major opportunities for us to propose a mobile game approach to prevent childhood obesity (MACO) using persuasive technology. MACO is a game-based persuasive mobile technology designed to inspire children to apply healthy eating habits as well as to begin and continue being physically active. This technology also introduces fun activities to motivate children to exercise more and encourage them to choose healthier food in appropriate amounts. A study on persuasive technologies application and childhood obesity prevention is conducted to determine the best persuasive technology application for MACO. The study proposes a framework and develops a system prototype. Paper ID : T1_IS3_1_1569917811 Title : Career Anchors and Employee Retention - An Empirical Study of Indian IT Industry Authors : Kannabiran G, Dhanapal Durai Dominic, A. V. Sarata Vai Abstract Profound changes occurring in the occupational environment have implications for an individual’s career development in the Indian IT industry. Organizations need to understand individuals’ career anchors and be responsive to improve the employees’ intention to stay. The present empirical study attempts to evaluate the impact of nine career anchors on employee’s intention to stay through a survey of 450 employees among top Indian IT companies. It is found that the career anchors service, identity, variety, autonomy, creativity and geographic security have significant influence on the employees’ intention to stay. However, other career anchors, namely, managerial competence, technical competence, and organizational stability have no influence on the employees’ intention to stay. page | 41 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T1_IS3_2_1569871529 Title : A Preliminary Study on Local Folktales Exposures to Support the Development of Animated Courseware Authors : Norshahila Ibrahim, Wan Fatimah Wan Ahmad, Afza Shafie Abstract Although Malaysia has a wide variety of folktales, children’s knowledge about local folktales are less compared to foreign folktales. Until this moment, not much Malay folktales animation courseware was developed and published in the market, as well as the application for tablet. This paper discusses a preliminary study conducted for the research on developing an animation courseware for Malay folktales. In order to choose the genres to be developed for this courseware, a preliminary study has been carried out, which comprises of a survey using questionnaire distributed to 394 children aged from 9 to 11 years old assisted by their teachers. The results of this preliminary study showed that children are interested in animal, humour and exemplary stories. The results also proved that children are more familiar with foreign folktales compared to local folktales. Children preferred foreign folktales over local folktales because of the animation, graphic, character and colours presented in the story. Paper ID : T1_IS3_3_1569871581 Title : Information Audit in Electricity Utilities: Roles, Methodologies, Issues and Challenges Authors : Izyana Ariffin, Aliza Abdul Latif, Masyura Ahmad Faudzi, Siti Salbiah Mohamed Shariff, Mawaddah Mohamad Nadzir Abstract Information audit is crucial in understanding the current state of an organisation. By implementing information audit, the needs, the available resources and the gaps are made known to the top management of an organisation, thus helping them to identify steps to be taken to improve the way they manage information in order to stay competitive in their business. Several framework and methodologies were introduced, aimed at providing step by step guidelines to organisations in executing information audit while maximizing the benefits of information audit itself. However, despite the benefits information audit carries, only a minimum number of organisations put information audit into practice and this indicates that current developed framework and methodologies fail to convince organisations to implement information audit. This includes organisations in Electricity Supply Industry (ESI). This paper reviews existing information audit framework and methodologies applicable to ESI and discuses some issues and challenges in implementing information audit based on previous literatures. This review is a preliminary study of a research aims at proposing a new improved information audit framework for ESI. 42 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T1_IS3_4_1569871601 Title : Maternity Data Management Utilizing Cloud Computing Authors : Ying San Oh, Wahidah Husain Abstract The existing maternity data management in government maternity clinics lags behind most other industries in new technology adoption. No electronic system exists to share maternity data between hospitals and clinics. The existing systems continue to rely on hardcopy logbooks to record maternity data. Therefore, maternity data management system utilizing cloud computing (E-Maternity) is proposed in this paper to enhance the existing service handling and management of maternity and baby development data in government maternity clinics. The main objective of E-Maternity is to provide a convenient method to manage the maternity data and enhance the efficiency and effectiveness of existing services. Existing pregnancy related applications are discussed, and the architecture of the proposed system is presented. Furthermore, the system requirements and design of the proposed system are presented. Paper ID : T1_IS3_5_1569871649 Title : Maximum-Shift String Matching Algorithms Authors : Nur’Aini Abdul Rashid, Hakim Adil Kadhim Abstract The string matching algorithms have broad applications in many areas of computer sciences. These areas include operating systems, information retrieval, editors, Internet searching engines, security applications and biological applications. Two important factors used to evaluate the performance of the sequential string matching algorithms are number of attempts and total number of character comparisons during the matching process. This research proposes to integrate the good properties of three single string matching algorithms, Quick-Search, Zuh-Takaoka and Horspool, to produce hybrid string matching algorithm called Maximum-Shift algorithm. Three datasets are used to test the proposed algorithm, which are, DNA, Protein sequence and English text. The hybrid algorithm, Maximum-Shift, shows efficient results compared to four string matching algorithms, Quick-Search, Horspool, Smith and Berry- Ravindran, in terms of the number of attempts and the total number of character comparisons. page | 43 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T1_IS3_6_1569897241 Title : Automatic Method for Bone Age Assessment Based on Combined Method Authors : Marjan Mansourvar, Maizatul Akmar Ismail, Sameem Abdul Kareem, Hanum Md. Nasaruddin Fariza Abstract Bone age assessment (BAA) is a method of evaluating the level of skeletal maturation in children. Generally, it is applied manually by comparing an X-ray of a left hand-wrist with a standard samples as atlas in the clinical procedure. The manual methods are prone to variability of observation, time consuming and limited to objective decisions. This is motivation for automatic method for bone age assessment. This study aims to develop an automated method for BAA based on combined method. A survey questionnaire is used as the part of research methodology to identify the BAA method used by radiologists and to extract the factors that effect on determination of bone age in the Faculty of Medicine, University of Malaya Medical Centre (UMMC). Paper ID : T1_IS4_1_1569872161 Title : Current Limitations and Future Opportunities in Mobile Augmented Reality Applications Authors : Nur Intan Adhani Muhamad Nazri Abstract Mobile AR has evolved from the bulkiness of head-mounted device and backpack device to smart device (smartphone, tablet etc.). To date, the current implementation has made what AR is today. However, the advancement of AR technology has met with limitation and challenges on its own, which resulted in not able to reach mass-market. We have done a review based on past research papers on technical (Hardware, algorithms and interaction technique) and non-technical (Social acceptance, privacy and usefulness) aspects of developing and implementing mobile augmented reality applications. This paper in turn presents current limitation and and challenges that need to overcome. We also presented some future opportunities in mobile AR applications. 44 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T1_IS4_2_1569872293 Title : e-Supply Chain Trust Model for B2B Collaboration:A Case Study of Malaysian Construction Industry Authors : Norshakirah Ab Aziz, Dhanapal Durai Dominic, Rohiza Ahmad Abstract Lack of trust among the supply chain (SC) components has been identified as one of the issues that hinder collaboration between them. Thus, the focus of this study is to propose a trust model that helps to identify the trusted partner for B2B SC collaboration. In other words, this study aims to enable the trusted SC components collaborate in a trustful business environment. This can be achieved by using the trust model proposed. The trust model can be considered as guidelines to select a trusted trading partner. In addition, this study provides trust values identified according to domain chosen. The e-Supply Chain (e-SC) trust model proposed consider as solution to collaborate SC components. Paper ID : T1_IS4_3_1569872461 Title : Proposed Conceptual Model for E-Service Quality in Malaysian Universities Authors : Iham Tariq Ismail Al-Nuaimi, Ahmad Mahmood, Hamid H Jebur Abstract There is a significant role of e-services quality in achieving success or failure of online organizations. It can increase their competitive advantages in the target markets, and enhance the relationships with customers and their satisfactions. There is no agreement about what service quality is and how it should be measure. Accurate measurement of the quality of electronic service is a complex process due to the nature of the service because it is immaterial and untypical product. It has been indicated through the literature that there is a lack of universal set of definitions, model and dimensions for service quality measurement. Since the service quality measures in higher education have great importance in achieving high tuition-based returns, e-service institutions of higher education are subjected to continuous pressure to surpass their competitors in presenting better e-service quality. This paper proposes an e-service quality conceptual model for measuring e-service quality in higher education sectors in Malaysia for measuring e-services quality. Nine dimensions are proposed for this model based on reviewing the related literature. The dimensions include efficiency, availability, privacy/ security, fulfilment, reliability, web design, interactivity, information, and responsiveness. Results of this paper may help to build a proper scale to measure the quality of e-services in higher education, which assist to improve the performance and effectiveness of e-services to achieve users’ satisfaction. page | 45 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T1_IS4_4_1569872525 Title : Multimodal Interactions in Traditional Foot Reflexology Practice Authors : Hector Chimeremeze Okere, Suziah Sulaiman, Dayang Rohaya Awang Rambli, Oi Mean Foong Abstract The application of multimodal interactivity in HCI and VR avails a host of advantages which includes enhancement of realism and the achievement of interactivity that is relatively close or identical to the conventional human to human interactions. Visual and aural interactions have been widely applied in various domains ranging from mobile industry to medical field. In Virtual reality stress therapy application particularly in the proliferation development towards the virtualization of traditional foot reflexology therapy, little is understood on the visual and aural interactive nature of the therapy and to what extent they contribute in relaxation and stress relief. This paper presents a study that examines from both the patients’ and practitioners’ perspective, the visual and aural interactive nature in foot reflexology domain since the practices promote relaxation and stress relief. The study explored 2 traditional foot reflexology sessions, data were collected through audio recorded semi-structured interview, and was analyzed using content analysis. Results were compared with the existing haptic exploratory procedures. The study findings presented the visual and aural interactive nature involved from the patients’ and practitioners’ perspective. Implications for future research are also discussed. 46 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T1_IS4_5_1569879027 Title : A Pragmatic Use of Semantic Web Technologies for Preschool Cognitive Skills Tutoring System Authors : Muhammad Azeem Abbas, Wan Fatimah Wan Ahmad, Khairul Shafee Kalid Abstract Primarily preschool cognitive skills are abilities of acquiring generic knowledge. Generic knowledge is said to be the knowledge about kinds of things. Currently these cognitive skills are taught through the use of pre-authored (in the form of books or worksheets) learning contents containing the objects and concepts of the real world. This method of teaching is known as instructional pedagogy that has several limitations such as it require specialized skills and a large amount of time for content authoring, thinking and dedication and it does not support individualized learning. As a remedy to the limitations of instructional pedagogy, constructive pedagogical method provides learning through exploration. The present work proposes an intelligent tutoring system (ITS) that follows the constructive approach for preschool cognitive skills tutoring. The proposed ITS uses the Semantic Web technologies namely Ontologies and Semantic Web Rule Language (SWRL) for the construction of a rule-based ITS. The reason is, Ontologies natively (by definition) provides a formal explicit way of modeling concepts in a domain of discourse specially the real world objects and also support rule base reasoning. Finally shortcomings of the existing knowledge sources (ontologies) and step by step processing of the inference engine to generate learning contents is provided in the present work. page | 47 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T1_IS4_6_1569871519 Title : Participation/Collaboration Pattern: Perspectives of Trust and Security Risks Authors : Sadaf Hina, Alan Oxley Abstract Cyber security issues, due to a lack of trust in social networking sites (SNS), are being addressed by many researchers and practitioners. Despite the diversity of security and privacy vulnerabilities, SNS have acquired and are still acquiring great popularity. Cyber crimes exploiting flaws in information technology and the imprudent trust of users, in who they add as contacts, are alarming and can lead to serious consequences in terms of identity theft, harassment, cyber bullying and defamation. People share personal and sensitive information on profiles and trust SNS service providers and friends to keep their information private. Our study reveals that trust in SNS and trust in friends are two different perspectives of the factor ‘trust’ which can be predicted by ‘security’, ‘privacy’ and ‘cyber safety education’ factors. Moreover, trust is a vital factor that affects the intention of a user to participate in the collaborative sharing pattern. A multiple regression analysis has been used to validate the proposed research framework. The results from 380 SNS users in a school community, including students, teachers, parents and school admin show that perceived privacy and security in SNS are the antecedents of trust in SNS while cyber safety education is the antecedent of trust in friends. Sensible levels of trust aid people in collaborating safely using SNS. ‘Trust’ also influences the intention to use SNS for participation/collaboration among users. Paper ID : T1_IS5_1_1569880307 Title : A Survey on Deceptions in Online Social Networks Authors : Shafiza Mohd Shariff, Xiuzhen Zhang Abstract Online Social Network (OSN) sites continue to grow and dominate the Internet with billions of users signing up and actively participating in these sites. The users use the sites to build relationships between old and new friends, trusting them by exchanging and sharing information. However, the OSN users are unaware of the security and privacy threats instilled with their trust. Many threats exploit the trust in the users as they create their way into their targeted victims’ virtual communities to gather and diffuse information. In this paper we present a survey on the types of trust deception attacks on OSN users and the existing solutions to detect and prevent users’ trust from being deceived. Finally, we will present open research issues in this area that require further significant research efforts. 48 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T1_IS5_2_1569881263 Title : K-NN Classifier for Data Confidentiality in Cloud Computing Authors : Munwar Ali Abstract Securing the data in cloud is still a challenging issue. In cloud, many techniques are used to secure the data. Data encryption is a data security technique which is widely used for data security. Deciding data security approach for the data without understanding the security needs of the data is not a technically valid approach. Before applying any security on data in cloud, it is best to know the security needs of the data. What data need security and what data do not need security. In this paper, we propose a data classification approach based on data confidentiality. K-NN data classification technique is modulated in the cloud virtual environment. The aim to use K-NN is to classify the data based on their security needs. The data is classified into two classes, sensitive and nonsensitive (public) data. After data classification we got that what data need security and what data does not need security. The RSA algorithm is used to encrypt the sensitive data to keep it secure. We used CloudSim simulator to find the results of proposed approach in cloud. The proposed approach will easily decide the security needs of the data. After the data classification, it is easy to select an appropriate security for data according to the need of data. The results show that this approach is appropriate as compared to store data in cloud without understanding the security requirements of data. Paper ID : T1_IS5_3_1569899207 Title : Development of Private Cloud Storage for Medical Image Research Data Authors : Ahmad Fadzil, Irving V Paputungan, Mohd Fadzil Hassan, Vijanth Sagayan Asirvadam, Megat Daharus Abstract Medical imaging research deals with large, heterogeneous and fragmented amounts of medical images. Such challenges lead to the need for secure, federated and functional medical image storage within this research community. With limited IT professional and research fund, the community is better provided with an outsourcing arrangement. Cloud computing promises lower cost, high scalability and availability which can be a natural solution such problems in long-term medical image archive. This paper presents a private cloud storage design and prototype development within an organization to solve such issues. Leveraging on the ability of cloud computing is shown meet to the system requirements. The prototype is implemented on OwnCloud cloud storage framework. The complete functionality of OwnCloud made it an ideal platform to develop and deploy this kind of cloud-based system. OwnCloud can keep images in different file formats and share such images to other researchers in simple way. page | 49 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T1_IS5_4_1569882693 Title : The Determinants of Airline Online Services Satisfaction: A Conceptual Model Authors : Rira Rahayu Arridha, Nur Elias, Hazura Mohamed Abstract This study seeks to measure customer satisfaction towards airline website services. Online service refers to any information and services provided in the internet. As the importance of internet grows in the business field, the quality of online services plays an even more important role in determining customer satisfaction. This study aims to examine and thus gain better understanding of the determinants of online services that affect customer satisfaction in the airline industry from the consumers’ perspective. Based on a detailed literature review, a frame of instruments has been developed. Five service quality dimensions have been selected to be tested in the airline online services sector in order to explore the relationship between service quality and customer satisfaction, namely tangible, information quality, responsiveness, trust and personalization. An instrument has been developed to operationalise these dimensions. A pilot study has been conducted to assess the relevancy and face validity of the instrument. The outcome of the pilot study has indicated that some items need to be changed and modified to ensure their relevance with the use of airline websites. This study also makes an important contribution in determining the dimensions of airline online service satisfaction. Paper ID : T1_IS5_5_1569882765 Title : Social Commerce from the Information Systems Perspective: A Systematic Literature Review Authors : Mohana Shanmugam, Yusmadi Yah Jusoh Abstract The evolution of social media has changed the conventional e-commerce to social commerce. The delayed growth of the social commerce is however relatively low researched in the Information Systems disciple despite its intense evolution. As a result, this paper aims to critically probe into existing and related work in the area of social commerce from the Information Systems perspective. The standard systematic literature review method employing a physical search of 12 journals and 6 conference proceedings were used in conducting the literature review. The comprehensive systematic literature review is valuable in bridging the social commerce gap and opens up novel directions to Information Systems scholars in this market segment. 50 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T1_IS5_6_1569902593 Title : Rationale of Students’ Failure in Comprehending Theoretical Computer Science Courses Authors : Muhammad Aasim Qureshi, Mohd Fadzil Hassan, Rabia Sammi Abstract Being a good IT solution provider one require good programming background. For a good programmer one need to have a solid back ground of algorithms i.e. theoretical aspects of the computer science. Most of the students of computer science do not understand the importance and do not give proper attention to Theoretical Computer Science (TCS) courses. As a result perform bad in these specialized courses. Intention of this research is to find the reasons of students’ failure in grasping the subject matter in the light of the feedback of currently studying students as well as well experienced teachers and professionals. The study resulted in a set of suggestions including the usage of better simulation tools, better environment, visualization, etc. Paper ID : T1_IS6_1_1569882903 Title : Understanding Factors Affect on the Effectiveness of Social Networks for Cancer Patients Authors : Marva Mirabolghasemi, Noorminshah A.Iahad, Suraya Miskon Abstract Cancer related social network communities have the potential to develop an interactive environment where virtual relationships among cancer patients can be made. Few studies have looked at the role of Social Network Sites (SNS) for cancer patients despite their potential to deliver health messages to large audiences. The purpose of this study is to understand factors that affect the effectiveness of the SNS as fast growing source for online cancer support using Social Cognitive Theory (SCT) and the theory of Task Technology Fit (TTF). A semi-structured interview designed through reviews of relevant literature was analyzed using thematic analysis. Most respondents believed the effectiveness of SNS is significant on information and emotional support. Although, the central issues appeared to be more focused on the self efficacy, past experience, social supports, system and task characteristics in explaining the way factors affect on the effectiveness of SNS for cancer patients. Consequently, more rigorous research should be focused on explaining the best practices that may help speed up effective intervention of social network technology in healthcare. page | 51 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T1_IS6_2_1569883271 Title : Knowledge Management System Quality: A Survey of Knowledge Management System Quality Dimensions Authors : Marzanah A. Jabar, Abdallah Alnatsha Abstract The knowledge management systems are becoming more complex and diverse as a result of advances in information technology. Nowadays, users demanding for more accurate and reliable KMS systems increases the awareness and need of KMS quality. To enhance KMS quality the quality dimensions should be identified first. This paper focuses on investigating the quality dimensions of related KMS work namely: software quality dimensions, data quality dimensions, information quality dimensions and knowledge systems quality dimensions. the extracted quality dimensions will be proposed as the basis of KMS quality dimensions that will be mapped with KM processes to produce the KMS quality framework. Paper ID : T1_IS6_3_1569883325 Title : Task-Technology Fit and User Adoption of Cloud-based Collaborative Learning Technologies Authors : Elaheh Yadegaridehkordi, Noorminshah A.Iahad, Norasnita Ahmad Abstract Trend of a new generation of students towards collaborative learning as well as significant characteristics of cloud computing technology have changed the world of teaching and learning. This paper reported the results of a survey study and provided evidence of testing Task-Technology Fit (TTF) model in understanding the factors that play significant roles in predicting student adoption of cloud-based collaborative learning technologies in university settings. Based on purposive sampling, questionnaires were distributed to students that have some experience in using cloud-based applications for collaborative activities. The results indicated that task non-routineness has negative influence on Task-Technology Fit (TTF). However, inconsistent with past studies, task Interdependence positively influences Task-Technology Fit (TTF). Significant effect of Mobility and Personalization and collaboration as technology characteristics were observed on Task-Technology Fit (TTF). Finally, as expected significant relationships between Task-Technology Fit (TTF) and User Adoption were also found. Overall, Users’ adoption of cloud-based collaborative learning technologies was determined directly by fit between characteristics of task and technology. 52 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T1_IS6_4_1569883433 Title : Understanding the Knowledge Transfer Process in the Flood Management Domain Authors : Hasniza Yahya, Mohd Zuhaili Mohd Rodzi, Mohammad Nazir Ahmad Abstract Numerous studies have shown that disasters can be managed effectively using a knowledge management system (KMS). To develop an effective KMS, several components need to be studied. One of the important components in KMS is knowledge transfer. This study attempts to identify the essential sub-processes of knowledge transfer in the context of flood management in Malaysia. We propose a conceptual knowledge transfer model based on these processes. Paper ID : T1_IS6_5_1569883555 Title : Research Productivity in Computer Science Field for Universiti Teknologi Malaysia in 2000-2013 Authors : Sharanjit Dhillon, Roliana Ibrahim, Ali Selamat Abstract Numerous studies have shown the productivity of computer science (CS) scholars and their respective institution. The aim of this paper is to evaluate the research productivity of a Malaysian university, Universiti Teknologi Malaysia (UTM) particularly the CS researchers. The author uses the bibliographic repository that is made available to the world’s scientific research, which is the Scopus database. There are 3102 research works produced by CS researchers in UTM. The highest number which is 2095 are published as conference papers and followed by 957 papers in the article category are covered by the database from year 2000 to 2013. Some important findings are that most articles are multi-authored which boost the collaboration initiative with the respective faculty members in the university or from other universities. page | 53 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T1_IS6_6_1569902873 Title : ICT in Process Safety Management Authors : Kwang Hooi Yew, Mohd Fadzil Hassan, Azmi Mohd Shariff, Hanida Abdul Aziz Abstract This paper analyzes the impact of Information Communications Technology (ICT) in process safety management of Highly Hazardous Chemicals. Although computer systems have been used in control systems, much work is yet to be done to address safety at high level. The authors conducted extensive cross-field literature study and field study to verify findings. Three challenges for ICT in process safety are integration of process safety subsystems and activities; quality assurance; and propagation of safety information. Discussion begins with concepts of process safety, safety controls, safety tools and safety management. The following sections discuss software categories for process safety and analyses ICT impacts. The contribution of this paper is general picture of ICT landscape in process safety environment and fresh leads for ICT to optimize plant safety. DATA COMMUNICATION & NETWORKING SYSTEM TRACK Paper ID : T2_DCN1_1_1569867781 Title : Issues Affecting the Adoption of IPv6 Authors : Alan Oxley Abstract Internet Protocol version 4 sets rules for some aspects of communication over the Internet. The protocol, amongst other things, specifies the format of an Internet Protocol address. This format places restrictions on the total number of possible addresses. In 2011 the supply of new addresses was exhausted. A new version of the standard, version 6, has been developed. This provides substantially more addresses. The intention is to replace version 4 with version 6. Organizations are deciding whether or not now is the right time to change. The change incurs an expenditure of time and money. If any of the hardware does not support the new protocol then it will have to be replaced. Also, software needs to be upgraded. A change requires a transitional phase. It is not possible to make the necessary updates to hardware and software over a weekend, say. This paper looks at the issues that are relevant to a decision to change. 54 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T2_DCN1_2_1569870581 Title : Effects of Attackers and Attacks on Availability Requirement in Vehicular Network: A Survey Authors : Irshad Sumra Abstract Availability is one of the key security requirements in vehicular network. The purpose of vehicular network is to serve the user with its potential applications, but this purpose is to fulfill only when networks are available to the end users. Due to open nature of wireless medium, the attackers can affect the vehicular environment. In this paper, we are providing a survey on the attackers and all possible attacks on the availability requirement of vehicular network. The main aim of this study is to describe the threat levels of all possible attacks on the availability. It has been investigated that each level has its own priorities. Threats levels and its priorities will be useful to understand the behavior of attackers and attacks in the vehicular network. Paper ID : T2_DCN1_3_1569866847 Title : IP-CHOCK (filter)-Based Detection Scheme for Denial of Service (DoS) Attacks in VANET Authors : Karan Verma, Halabi Hasbullah Abstract The vehicular ad-hoc Network (VANET) has drawn increasing attention in recent years due to its wide range of applications. At the present time, a vehicle’s communication is exposed to many security threats such as Denial of Service (DoS) attacks, in which a malicious node forges a large number of fake identities. Internet Protocol (IP) spoofing of addresses - is initiated to disrupt the proper functioning of the fair data transfer between two fast moving vehicles. In this paper, the IP-CHOCK (filter)-based detection method, which provides the availability of a service for the legitimate vehicles in the VANET, as used to detect and defend against the IP spoofing of addresses of the DoS attacks. The IP spoofing of addresses in the DoS attacks which is committed by fraudulent and malicious nodes has been investigated. This method provides a secure communication and also frees the bandwidth. This proposed approach requires fewer resources and is easy to deploy. Simulation results have shown that this method is efficient and effective to defend against and detect DoS attacks. Specifically, this method provides a faster detection time, lower storage capacity and computational cost. page | 55 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T2_DCN1_4_1569866111 Title : Three Hops Reliability Model for Underwater Wireless Sensor Network Authors : Tariq Ali Abstract Due to the instability of underwater environment, the reliable data transfers is more sensitive issue in Underwater Wireless Sensor Networks (UWSNs) as compare to land based sensor network. Underwater networks are mostly designed by acoustic sensor nodes and surface sinks that are connected to any onshore control center. Acoustic channel characteristics are create many problems like, low bandwidth; long propagation delays and high error channel rates that can cause to hamper the efficiency of UWSNs. With these constraints, it is very difficult task to design a routing protocol which has the ability to maximize the reliability of these networks. In this paper, we proposed a reliable model with the name of 3 Hops Reliability Model (3H-RM), in which every sender node of each group of three layers will maintain the copy of same successful transferred data packets without creating extra burden on the networks. Simulation results shows that 3H-RM can achieve better delivery ratios as compare to 2H-ACK reliability model without using any additional resources and configurations. Paper ID : T2_DCN1_5_1569870527 Title : Data Fusion for Reducing Power Consumption in Arduino-Xbee Wireless Sensor Network Platform Authors : Solahuddin Yusuf Fadhlullah, Widad Ismail Abstract Data fusion is one of the subsystems in data aggregation that aims to conserve power consumption by reducing the size of the transmitted data. The purpose of this paper is to present a simple data fusion mechanism called local data differentiation (LDD) for actual implementation in micro-controlled sensor nodes. LDD requires the end node to calculate the average value of an initially sampled data and afterwards, to only transmit the difference between the newly collected data with the average value. Usage of buffer in conjunction with LDD is also explored and empirical results are shown based on a hardware prototype to verify the benefit of the proposed method. The hardware for the test run is based on the Arduino platform and Xbee modules, as both are very popular in small-scale research and wireless automation solution. 56 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T2_DCN1_6_1569866559 Title : A Multibit Burst Error Detection and Correction Mechanism for Application Layer Authors : Shiladitya Bhattacharjee, Lukman Ab. Rahim, Izzatdin A Aziz Abstract To enhance the correctness and robustness of received text information at the receiver end, we propose an error detection and correction mechanism that executes at the application layer. Basically the error checking bits are incorporated with the original information during transition at the network. The error positions are detected by these error checking bits and then corresponding errors are corrected accordingly. Generally, the data link layer performs the task of error detection and correction but it platform dependent. So we introduce such a mechanism which is totally platform independent and acts at the application layer. It is capable of detecting all the error position and correcting all the error bits while it is destroyed or corrupted during the transmission. The data link layer sometimes fails to detect and correct all the error bits which can be solved by our proposed mechanism. Paper ID : T2_DCN2_1_1569871723 Title : Fuzzy Logic Based Link Status Classification for Efficient Multipath Routing in Multi-hop WMNs Authors : Peer Azmat Shah, Halabi Hasbullah, Shahzad Rafiq, Sadiq ur Rehman and Tang Jung Low Abstract In contrast to traditional wireless networks, hosts of a multi-hop wireless network, like wireless mesh network (WMN), may rely on each other to maintain network connectivity. A main design objective of these networks is to eliminate or minimize the unavailability of network at some point. However, in infrastructure and the client part of WMN movement of nodes still creates delay as path failure detection and reestablishment consumes considerable time. Existing solutions for link classification operate on discrete values resulting in performance degradation. This problem can best be modelled through fuzzy logic based classification that is based on continuous values. This paper presents a new fuzzy logic based link status classification mechanism for use with multipath routing protocols in multi-hop wireless networks like WMNs. The proposed mechanism classifies the link status as active, about-to-break or broken. On the basis of link status, said algorithm predicts in advance that a particular link, on the active path between sender and receiver, is about to break and helps the reactive multipath routing protocol to start the rerouting operation, thus minimizing the route discovery frequency, delay and packet loss. page | 57 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T2_DCN2_2_1569872437 Title : Throughput Enhancement for Fixed WiMAX Network Using Distributed Model Authors : Ibrahim A. Lawal, Abas Md Said, Kashif Nisar, Abubakar Aminu Mu’azu, Peer Azmat Shah Abstract Recently, broadband wireless communication serves as one of the most growing and developing technology in the field of telecommunications. The broadband provides multimedia services for voice, video, High Definition TV (HDTV), and games with certain Quality of Service (QoS). For these services, a high data transmission is greatly needed. Worldwide Interoperability for Microwave Access (WiMAX) Network aims to provide this QoS with high data rate and throughput. However the existing WiMAX architecture does not provide sufficient QoS. In this regard, a Distributed Master-Slave Model was developed to improve QoS with respect to throughput in the Fixed WiMAX Network in order to evaluate the throughput performance for the delivery of better services to the end users. The new model was simulated in OPNET modeler 16.0 with introduction Master Base Stations (BSs) using Orthogonal Frequency Division Multiplexing (OFDM) techniques and compared with the existing model which is centralized using Frequency Division Multiplexing (FDM) techniques. The proposed model throughput results obtained show that the proposed model has better results as compared with the existing model. 58 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T2_DCN2_3_1569871473 Title : Choices Available for Implementing Smart Grid Communication Network Authors : Hasan Farooq, Tang Jung Low Abstract Communication network is considered to be a vital component and cornerstone of smart grids. It is envisaged that design of communication network will be the most challenging task for transforming ageing power grid into a modern smart grid. Many communication technologies existing today can be utilized for enabling communication among smart grid entities, however, each one of them has its own trade-offs which needs to be considered. Hierarchically, smart grid communication network is made up of three area networks each having its own requirements and limitations. It is, therefore, necessary to analyze the communication technologies in perspective of these three area networks of smart grids. This paper presents the choices available for enabling communication in respective area networks of smart grids. Moreover, performances of IEEE 802.11 and IEEE 802.15.4 standards are evaluated using NS-2 simulations for deployment of multihop ad-hoc architecture of smart grid communication network. page | 59 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T2_DCN2_4_1569872009 Title : Proposed Method for Enhancing Quantum Bit Error Rate Using Quantum Key Distribution Technique Authors : Mustapha Yusuf Abubakar, Tang Jung Low, Nordin Zakaria, Oi Mean Foong Abstract The current public key infrastructure (pki) encryption/decryption method are still vulnerable to attacks. The main issue is, the public key algorithm suffers no efficient solutions that are inherent in certain integer factorization, discrete logarithm and elliptic curve relationships. It is computationally possible for a user to generate public and private key pair for attacking purposes. The current single channel quantum key distribution (qkd) technique suffers high quantum bit error rates (qber) in the presence of eavesdropping attacks. Therefore this high error rate needs to be reduced for better security using two channels qkd. With the current emergence of quantum computers many security algorithm that could take classical computer years to break could now be broken in matter of seconds. Therefore stronger quantum cryptography is needed for high security networking. This project is proposed to provide a way for solving the key transmission issues using qkd, as a new method, by providing two quantum channels to improve qber. In addition also to develop an algorithm for integrating pki and qkd in solving the secrete key sharing issues in grid environment. The research methodology will require the use of qkd devices to be placed at the end of the sender and the receiver nodes for quantum channel secrete key sharing. The outcome of the research shall provide highly enhanced network cryptography mechanism for cyber security. Paper ID : T2_DCN2_5_1569871303 Title : Workability Review of Genetic Algorithm Approach in Networks Authors : Okta Nurika, Mohamed Nordin Zakaria, Mohd Fadzil Hassan, Tang Jung Low Abstract In this paper, we surveyed the implementations of genetic algorithm within networks, whether it is computer network, transportation network, and other fields that have networking context. Their feasibilities are discussed along with our suggestions for potential improvements. Genetic algorithm can also be an alternative to other optimization methods/algorithms. In some cases, it even outperforms other methods. However, the choice of genetic algorithm might be influenced by some concerns, such as execution time and problem size. Generally, genetic algorithm process will accomplish according to its parameters sizes. Finally, the success stories prove the applicability, adaptability, and scalability of genetic algorithm, specifically for almost-any network optimization. 60 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T2_DCN2_6_1569903253 Title : Filters for Device-free Indoor Localization System Based on RSSI Measurement Authors : Nasrullah Pirzada Abstract Based on wireless sensor networks, device-free indoor localization technique has received much attention in the field of indoor localization system Due to different indoor environmental parameters, multipath fading, human presences and different system configurations, the WiFi-based received signal strength indicator values are affected. This problem leads the researchers to choose any filter or smoothing algorithm to get proper values of received signal strength in the indoor environment. The aim of using the filter or smoothing algorithm is to get a signal value which can clearly identify the changes in the signal values due to interferences caused by various factors in the indoor environment. Wi-Fi based device-free indoor localization technique has become more attractive because its simplicity, as well as it does not require extra hardware. However the implementation of this technique in the indoor environment becomes complex, sometimes because of imprecise and unreliable readings caused by multipath fading. There are various filters designed and tested to remove the inconsistencies occurring in RSSI readings due to the various environmental effects. This paper presents various types of filters which are used for smoothing the raw data received signal strength indicator values and also improving the strength of these values by mitigating multipath fading effects in an indoor environment. page | 61 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T2_DCN3_1_1569872655 Title : Real-Time Massage Differentiation with Priority Data Service Flows in VANETs Authors : Abubakar Aminu Mu’azu, Tang Jung Low, Halabi Hasbullah, Ibrahim A. Lawal, Peer Azmat Shah Abstract The IEEE 802.11e standard was designed to support Quality of Service (QoS) at the MAC layer to support incapability of real-time traffic. The real-time safety messages in critical VANETs environment are guaranteed high priority transmission as a requirement of DSRC. Due to the intermittent connection in VANETs, the transmission of real-time traffic data frame needs to obtain a higher priority of channel access to the best-effort data. Data frame of higher priority is based on the intensity of message (urgency) which is consorted with different QoS in terms of delay and throughput. Classifying data packets of the same priority, the physical layer from the IEEE 802.11p which is the recommended VANETs MAC protocol suffers a huge amount of packet losses. More so, when messages are placed with the same queue, data packet loss and variable delay are much likely to occur. To overcome these difficulties, in this paper, our scheme adheres to the DSRC seven channels bandplan to set the priority queues over separate. To achieve the level of QoS in our scheme, messages of the same priority would be sent using strict priority queue (SPQ) priority traffic differentiation techniques to improve Packet Delivery Ratio for real-time traffic based on IEEE 802.11e MAC protocol. The results were obtained through NCTUns simulator which is used for the analysis to improve the packet delivery ratio of the real-time messages. Paper ID : T2_DCN3_2_1569874255 Title : Path Loss Simulation in Different Radio Propagation Models with 1.8GHz and 2.6GHz Bands Authors : Ahmed Chariyev Abstract This paper presents the simulation of path loss propagation models in LTE-Advanced Networks for suburban and rural areas. Calculations were done using MATLAB based simulation; for various prediction techniques such as Cost 231 Hata Model, Stanford University Interim (SUI) and Ericsson Model. The authors used to analyze the 1800MHz (1.8 GHZ) and 2600MHz (2.6 GHz) wideband channels which are operating bands for Malaysian 4G companies. Results show almost 60dB gap between using COST231 and SUI; and 20dB gap is achieved among COST231 and Ericsson models. The effectiveness of Stanford University Interim Model is also discussed. 62 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T2_DCN3_3_1569882325 Title : Access Control and Privacy in MANET Emergency Environment Authors : Asmidar Abu Bakar, Azimah Abdul Ghapar, Roslan Ismail Abstract Mobile ad hoc networks (MANETs) cultivate a new research trend in today’s computing. With some unique features such as scalability, fault tolerant and autonomous system enable a network to be setup with or without any trusted authority. This makes MANET suitable for the emergency and rescue operations. During an emergency situation, there is a need for the data to be shared with the rescuers. However, there are some of the personal data cannot be shared to all rescuers. Thus, the privacy and security of data becomes a main concern here. This paper addresses these issues with a combination of access control mechanism and privacy policy to ensure that the privacy and security of personal data is protected accordingly. Paper ID : T2_DCN3_4_1569901689 Title : Associative Data Models for Voluminous Data Representation and Processing Authors : Amir Hossein Basirat, Asad Khan, Heinz Schmidt Abstract With emerging interest to leverage massive amounts of data available in open sources such as the Web for solving long standing information retrieval problems, the question as how to effectively process immense data sets is becoming increasingly relevant. In this paper, this question will be addressed by looking at distributed processing approach for scalable data recognition and processing. For this purpose; a highly distributable, and single-cycle learning associative framework, known as Edge Detecting Hierarchical Graph Neuron (EdgeHGN) is developed which uses a universal structure for all data types. While the proposed scheme is fundamentally different from all published approaches in data management, it provides comparable performance benchmarks when tested against well-known large-scale data management schemes like Distributed MapReduce and GraphLab. page | 63 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T2_DCN3_5_1569916921 Title : Performance Evaluation of Distributed Video Coding with Different Channel Encoding Techniques Authors : Kin Honn Chiam, Mohd Fadzli Mohd Salleh Abstract Most recently, the low density parity check codes are chosen as the channel encoding method to encode the Wyner-Ziv frames in distributed video coding. These codes involve much complicated encoding and decoding algorithms, and might increase the processing time of the system. In this paper, we use the codes with simpler encoding and decoding algorithms, the Reed Solomon codes, and compare the performance of both codes in encoding the Wyner-Ziv frames. The proposed model is verified with the addition of white Gaussian noise. The simulation shows that the output video sequence is of acceptable quality compared to the current model with the low density parity check codes. The proposed model is also more efficient as the results could be obtained in a shorter time. Paper ID : T2_DCN3_6_1569903219 Title : Classifying Peer-to-peer Traffic Using Protocol Hierarchy Authors : Somnuk Puangpronpitag, Thongchai Chuachan Abstract Detection and classification of peer-to-peer traffic are still difficult tasks for bandwidth shapers. First, peer-to-peer traffic is not easy to detect, and can be a serious problem. Second, some peer-to-peer applications may be desirable, while some may be undesirable. Hence, different peer-to-peer applications should also be treated differently. The previous work of peer-to-peer traffic detection still faces both problems. So, in this paper, we propose new classification mechanisms to solve the problems. Our proposed solution has been implemented by using JAVA, and experimented on a network test-bed. Experimental results have demonstrated that our extended classification mechanism can improve the peer-to-peer traffic detection and classification. 64 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T2_DCN4_1_1569890449 Title : Enhance the Performance of ICMP Protocol by Reduction the IP Over Ethernet Naming Architecture Authors : Waleed Hussein, Longzheng Cai, Shaymaa Alyawer Abstract This study addresses the Internet Control Message Protocol (ICMP) performance problems arising in Internet protocol (IP) over Ethernet networks. These problems arise because of the compatibility issue between two different compositional protocols: the IP and Ethernet protocol. The motivation behind addressing the compatibility problem is to improve the security and performance of networks by studying the link compatibility between the Ethernet and IP protocols. The findings of this study have given rise to proposals for modifications. A reduction in the current naming architecture design is advocated to improve the performance and security of IP over Ethernet networks. The use of the IP address, as one flat address for the naming architecture, is proposed instead of using both the IP and Media Access Control (MAC) addresses. The proposed architecture is evaluated through a simulated cancellation of the use of the Address Resolution Protocol (ARP) protocol. Paper ID : T2_DCN4_2_1569901185 Title : Early Detection of Incident Using Vehicular Ad-hoc Network Authors : Bharat Singh, Halabi Hasbullah, Mohd Yunus Nayan, Bhumit Tahlan Abstract Vehicular Ad-hoc Networks (VANET) are currently used to investigate ITS (Intelligent Transportation Systems) design solutions for road safety and traffic monitoring management. Through the vehicle information exchange to vehicles, road side units (RSU) and infrastructure nodes, Traffic Monitoring Center (TMC) can support incident detection monitoring and management. In this context, Early Detection of Incident (EDI) presents and discusses in this paper, a Vehicle-to-Vehicle (V2V) cooperative technique for detecting incident early using Incident Detection Node (IDN). EDI is experimented under small-scale highway based scenario using two cars equipped with on-board unit and one access point (AP). EDI is evaluated with measurement of received signal strength indication (RSSI) using network monitoring tool. The experimented results demonstrate average throughput, average signal strength, overall performance of AP in vehicle-toroadside (V2R). EDI results demonstrate incident detection probabilities and capability to detect accurately. page | 65 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T2_DCN4_3_ 1569901551 Title : Lifetime and Coverage Maximization Technique for Mobile Sensor Networks Authors : Muhammad Amir Khan, Halabi Hasbullah, Babar Nazir Abstract In recent times possess viewed a developing desire for the actual apps connected with wireless sensor communities (WSNs). In some of these apps, for instance lookup and also relief and also battlefield reconnaissance, a few cell nodes will be implemented so as to in concert survey an area of interest and/or conduct specific monitoring jobs. Like venture one of the detectors demands internode discussion thereby sustaining network on the web connectivity is important to the potency of WSNs. Though on the web connectivity could be provisioned with medical period then continual by way of watchful coordination when nodes go, extreme failing of your node postures an issue because network could get partitioned. Numerous strategies that will practice node moving to restore on the web connectivity possess been recently proposed. Even so, these types of strategies tend to disregard the feasible lack of insurance policy coverage in most areas, both a result of the failing alone or a result of the connectivity-limited concentrate on the recuperation. This paper floods that hole simply by addressing the actual on the web connectivity and also insurance policy coverage worries within the included manner. A new node repositioning Method along with a smaller amount percentage decrease in insurance policy coverage Intended for Mobile Sensor Sites protocol will be shown. Just about every next door neighbor quickly relocates to replacement the actual failed node, one at a time, then returns time for its authentic location. The simulation outcomes confirm the potency of the actual protocol. 66 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T2_DCN4_4_1569901487 Title : A Performance Comparison of Recent Open Source Wireless Sensor Network Supporting Simulators Authors : Muhammad Amir Khan; Halabi Hasbullah; Babar Nazir Abstract Any common methodology for functionality research in the field of communication systems engineering is network simulation. There is always the overriding worry when utilizing simulation that the results may not reflect appropriate behavior. Therefore, it is important to recognize the particular strengths and also flaws of such simulators. There are a variety of network simulators, as an illustration, NS-2, NS-3, OMNET++, SWAN, OPNET, Jist, and also GloMoSiM and so forth. As a result, the selection of any network simulator for assessing investigation function is really a critical activity for researchers. The leading emphasis in this research is usually to examine the particular advanced, open source network simulators based on the parameters, CPU usage, memory usage, computational time period, and also scalibility by simulating a wireless sensor network routing protocol, to identify a best network simulator to the investigation area. Paper ID : T2-DCN4_5_1569903131 Title : Security Framework for Low Latency Vanet Applications Authors : Asif Wagan, Tang Jung Low Abstract Vehicular Ad hoc Network (VANET) is a communication network for vehicles on the highway. Presently, VANET technology is surrounded with security challenges and it is essentially important for VANET to successfully implement a security measure according to the safety applications requirements. Many academia researcher have suggested a various solutions to encounter security attacks and also proposed models to strengthen security characteristics i.e. authentication, privacy, and non-repudiation. The current most suitable security scheme for VANET is an Elliptic Curve Digital Signature Algorithm (ECDSA). However ECDSA is associated with high computational cost, therefore it is considered an inappropriate approach for low latency safety applications. In this study, a security framework is proposed to solve above issues; a proposed framework utilizes both traditional cryptographic schemes; asymmetric PKI and symmetric respectively. The asymmetric cryptography scheme is used to securely exchange the key and authentication process and symmetric cryptography scheme is used for low latency safety application (especially time critical safety applications). The suggested framework is not only reduce the latency but also enhance the security cryptography characteristics by establishing trust between ongoing vehicles. page | 67 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) COMPUTATIONAL INTELLIGENCE TRACK Paper ID : T3_CI1_1_1569867035 Title : An Efficient Computational Intelligence Technique for Classification of Protein Sequences Authors : Muhammad Javed Iqbal, Ibrahima Faye, Abas Md Said, Brahim Belhaouri Samir Abstract Many artificial intelligence techniques have been developed to process the constantly increasing volume of data to extract meaningful information from it. The accurate annotation of the unknown protein using the classification of the protein sequence into an existing superfamily is considered a critical and challenging task in bioinformatics and computational biology. This classification would be helpful in the analysis and modeling of unknown protein to determine their structure and function. In this paper, a frequency-based feature encoding technique has been used in the proposed framework to represent amino acids of a protein’s primary sequence. The technique has considered the occurrence frequency of each amino acid in a sequence. Popular classification algorithms such as decision tree, naïve Bayes, neural network, random forest and support vector machine have been employed to evaluate the effectiveness of the encoding method utilized in the proposed framework. Results have indicated that the decision tree classifier significantly shows better results in terms of classification accuracy, specificity, sensitivity, F-measure, etc. The classification accuracy of 88.7% was achieved over the Yeast protein sequence data taken from the well-known UniProtKB database. Paper ID : T3_CI1_2_1569866451 Title : Multi-Color Recognition Based On Mini-Max Color Threshold Authors : Zacharie MBaitiga Abstract This paper discusses the multi-color recognition using the min-max color threshold for outdoor robot navigation. All colors used in this project are RGB orthogonal color space in order to see how much of each primary color between min and max that can be observed in the color to be recognized. The white color value in the color space is set as the object for which the target color to be recognized belongs, while the black color value is set as the object background. The recognition process is done by summing up first the values of the red, green and blue in each color to obtain the rgb sum value, which is then divided by the individual color element to obtain the color threshold. This threshold is compared to the originally color threshold for the recognition, where a satisfactory result is expected as the project is not yet finished. 68 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T3_CI1_3_1569866697 Title : Empirical Analysis of Parallel-Narx Recurrent Network for Long-Term Chaotic Financial Forecasting Authors : Jadid Abdulkadir Said, Suet Peng Yong Abstract Financial data are characterized by non-linearity, noise, volatility and are chaotic in nature thus making the process of forecasting cumbersome. The main aim of forecasters is to develop an approach that focuses on increasing profit by being able to forecast future stock prices based on current stock data. This paper presents an empirical long term chaotic financial forecasting approach using Parallel Non-linear Auto-Regressive with eXogenous Input (P-NARX) network trained with Bayesian Regulation algorithm. Kuala Lumpur Composite daily Index (KLCI) collated from FTSE Bursa Malaysia is used as the data sets, ranging from 1988 to 2013. Other commonly used training algorithms are also examined. The experimental results based on mean absolute percentage error (MAPE) and other forecasting error metrics shows that P-NARX network trained with Bayesian Regulation slightly outperforms Levenberg-Marquardt, Resilient Back-propagation and one-step-secant training algorithm in forecasting daily Kuala Lumpur Composite Indices. Paper ID : T3_CI1_4_1569866843 Title : A Computer Aided System for Breast Cancer Detection and Diagnosis Authors : Hamada Al-Absi, Brahim Belhaouri Samir, Suziah Sulaiman Abstract Breast cancer has become a significant health problem worldwide as it is considered the leading cause of death among women. In order to prevent the increase of deaths caused by breast cancer, early diagnosis through computer aided diagnosis systems has been very effective. This paper introduces a computer aided system for detecting and classifying suspicious regions in digital mammograms. The system starts by extracting regions of interest that are suspicious of containing cancerous cells. Then, all these regions are classified to check whether they are normal or abnormal. For the detection phase, template matching techniques are utilized. As for the classification phase, a 3-step process is applied which enclose feature extraction with wavelet transform, feature selection with statistical techniques and classification with clustering K-Nearest Neighbor classifier. A preliminary result shows a 97.73 % accuracy rate. page | 69 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T3_CI1_5_1569851419 Title : Infomax and FASTICA Using PCA as Preprocessor for Airwave Removal in Seabed Logging Authors : Adeel Ansari, Afza Shafie, Abas Md Said, Seema Ansari, Elisha Tadiwa Nyamasvisva, Muhammad Abdulkarim, Muhammad Rauf Abstract This research aims to apply the FASTICA and Infomax algorithm in the field of seabed logging, by utilizing the Principal Component Analysis (PCA) as pre-processor. All the three algorithms are statistical algorithms used for signal deconvolution and are respectively in the field of Independent Component Analysis (ICA). In seabed logging (SBL) implies the marine controlled source electromagnetic (CSEM) technique for the detection of hydrocarbons underneath the seabed floor. The results from SBL, indicate the presence of Hydrocarbon, but due to the presence of noise, in the form of airwaves, interfere with the signals from the subsurface and tend to dominate the receiver response. Hence, the Infomax and FASTICA de-convolution algorithms are used, considering PCA as a pre-processor to filter out the airwaves which disrupt the subsurface signals within the receiver response. The results obtained from simulations and their comparative analysis, indicate that the results from the infomax algorithm are better. Paper ID : T3_CI1_6_1569867133 Title : Image Processing Based Vehicle Detection and Tracking Method Authors : Prem Kumar Bhaskar, Suet Peng Yong Abstract Vehicle detection and tracking plays an effective and significant role in the area of traffic surveillance system where efficient traffic management and safety is the main concern. In this paper, we discuss and address the issue of detecting vehicle / traffic data from video frames. Although various researches have been done in this area and many methods have been implemented, still this area has room for improvements. With a view to do improvements, it is proposed to develop a unique algorithm for vehicle data recognition and tracking using Gaussian mixture model and blob detection methods. First, we differentiate the foreground from background in frames by learning the background. Here, foreground detector detects the object and a binary computation is done to define rectangular regions around every detected object. To detect the moving object correctly and to remove the noise some morphological operations have been applied. Then the final counting is done by tracking the detected objects and their regions. The results are encouraging and we got more than 96% accuracy in detection and tracking using the Gaussian Mixture Model and Blob Detection methods. 70 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T3_CI2_1_1569867215 Title : A Semi-Apriori Algorithm for Discovering the Frequent Itemsets Authors : Sallam Osman Fageeri, Rohiza Ahmad, Baharum Baharudin Abstract Mining the frequent itemsets are still one of the data mining research challenges. Frequent itemsets generation produce extremely large numbers of generated itemsets that make the algorithms inefficient. The reason is that the most traditional approaches adopt an iterative strategy to discover the itemsets, that’s require very large process. Furthermore, the present mining algorithms cannot perform efficiently due to high and repeatedly database scan. In this paper we introduce a new binary-based Semi-Apriori technique that efficiently discovers the frequent itemsets. Extensive experiments had been carried out using the new technique, compared to the existing Apriori algorithms, a tentative result reveal that our technique outperforms Apriori algorithm in terms of execution time. Paper ID : T3_CI2_2_1569882187 Title : A Cost-Sensitive Approach to Named Entity Recognition with Category Hierarchy Authors : Shohei Higashiyama, Mathieu Blondel, Kazuhiro Seki, Kuniaki Uehara Abstract Named Entity Recognition (NER) is a fundamental natural language processing task for the identification and classification of expressions into predefined categories such as person and organization. Existing NER systems usually target about 10 categories and do not incorporate analysis of category relations. However, categories often belong naturally to some predefined hierarchy. In such cases, the distance between categories in the hierarchy becomes a rich source of information that can be exploited and which is intuitively useful particularly when the categories are numerous. As described in this paper, we propose a NER system that can leverage category hierarchy information by introducing, in the structured Perceptron framework, a cost function that more strongly penalizes category predictions that are more distant in the hierarchy from the correct category. Our experimental results on the GENIA biomedical text corpus strongly suggest the effectiveness of the proposed method at decreasing misclassification errors. page | 71 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T3_CI2_3_1569871179 Title : Parallel Kalman Filter-Based Multi-Human Tracking in Surveillance Video Authors : Abdul-Lateef Yussiff, Suet Peng Yong, Baharum Baharudin Abstract A novel approach to robust and flexible person tracking using an algorithm that integrates state of the arts techniques; an Enhanced Person Detector (EPD) which combines HOG features and Haar features to detect human in images, and the second technique is the Kalman-filtering algorithm, for tracking multiple person in parallel within video sequence. This proposed algorithm employs multiple instances of Kalman Filter with complex assignment constraints implemented in parallel on Graphics Processing Unit (GPU-NVDIA CUDA) for tracking stationary and non-stationary multiple person even in the presence of occlusion. A Kalman filter is recursive algorithm which predict the state variables and further uses the observed data to correct the estimated value. Data association in different frames are solved using Hungarian technique to link data in previous frame to the current frame. The benefit of this research is an adoption of standard kalman Filter for multiple target tracking of humans in real time. This can further be used to in all applications where human tracking is needed. The parallel implementation has increased the frame processing speed by 20-30 percent over the CPU implementation. 72 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T3_CI2_4_1569871921 Title : A Framework for the Automatic Identification of Algae (Neomeris Vanbosseae M.A.Howe):U3S Authors : Ching Soon Tan, Phooi Yee Lau, Siew Moi Phang, Tang Jung Low Abstract Neomeris vanbosseae M.A.Howe (NVH) is an algae belonging to the Chlorophyta, which is a very diverse group of algae. Therefore when an algae biologist establishes an abundance assessment for algae biodiversity, the taxonomic identification and quantification could frequently lead to a time intensive procedure which is prone to a counting bias, due to fatigue when processing large pools of data samples repeatedly. To improve the effectiveness, this paper proposed a framework, being an assistive tool, to help marine biologists. The framework consists of (1) pre-processing the image, (2) segmenting region of interest, (3) extracting features (namely four different geometric features) , (4) evaluating and combining those features based on the given decision criterions, and (5) the quantification. Our methodology achieved satisfactory performance (NVH abundance) as it’s able to provide an encouraging result with 78.38% detection rate yielded by the comparison between manual count and our system automatic count. The major contribution of this work is the development and the deployment of an automatic identification system, named U3S, for biodiversity abundance studies of algae to assist the marine biologist in identifying algae species, complementing the existing operator intensive procedures. page | 73 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T3_CI2_5_1569878369 Title : Gender Recognition on Real World Faces Based on Shape Representation and Neural Network Authors : Olasimbo A. Arigbabu, Sharifah Mumtazah Syed Ahmad, Wan Azizun Wan Adnan, Salman Yussof, Vahab Iranmanesh, Fahad Layth Malallah Abstract Gender as a soft biometric attribute has been extensively investigated in the domain of computer vision because of its numerous potential application areas. However, studies have shown that gender recognition performance can be hindered by improper alignment of facial images. As a result, previous experiments have adopted face alignment as an important stage in the recognition process, before performing feature extraction. In this paper, the problem of recognizing human gender from unaligned real world faces using single image per individual is investigated. The use of feature descriptor to form shape representation of face images with any arbitrary orientation from the cropped version of Labeled Faces in the Wild (LFW) dataset is proposed. By combining the feature extraction technique with artificial neural network for classification, a recognition rate of 89.3% is attained. Paper ID : T3_CI2_6_1569898769 Title : Color Space Selection for Human Skin Detection Using Color-Texture Features and Neural Networks Authors : Hani K. Al-Mohair, Junita Mohamad-Saleh, Shahrel Azmin Suandi Abstract Skin color is a robust cue in human skin detection. It has been widely used in various human-related image processing applications. Although many researches have been carried out for skin color detection, there is no consensus on which color space is the most appropriate for skin color detection because many researchers do not provide strict justification of their color space choice. In this paper, a comprehensive comparative study using the Multilayer Perceptron artificial neural network (MLP), which is a universal classifier, is carried out to evaluate the overall performance of different color-spaces for skin detection. It aims at determining the most optimal color space using color and colortexture features separately. The study has been carried out using images of different databases. The experimental results showed that the YIQ color space gives the highest separability between skin and non-skin pixels among the different color spaces tested using color features. Combining color and texture eliminates the differences between color spaces but leads to much more accurate and efficient skin detection. 74 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T4_BIC1_5_1569889229 Title : Real-Time Video Enhancement for Various Weather Conditions Using Dark Channel and Fuzzy Logic Authors : Ahmad Alajarmeh Abstract Rain, fog and haze are natural phenomena that fade scenes, limit the visibility range, and cause shifts in colors. These phenomena also play a decisive role in determining the degree of reliability of many kinds of outdoor applications, such as aerial and satellite imaging, surveillance, and driver assistance systems. Thus, removing their effects from images/videos is very crucial. Due to its mathematically ill posed nature, enhancement process of rain, fog, and haze plagued images/videos is highly challenging. In this paper, we propose a fast yet robust technique to enhance the visibility of video frames using the dark channel prior combined with fuzzy logic-based technique. The dark channel prior is a statistical regularity of outdoor haze-free images based on the observation that most local patches in the haze-free images contain pixels which are dark in at least one color channel, where the Fuzzy Logic-based technique is used to map an input space to an output space using a collection of fuzzy membership functions and rules to decide softly in case of uncertainties. The combination of the dark channel and the Fuzzy Logicbased technique will produce high quality haze-free images in real-time. Furthermore, it will be combined with rules derived from the stable atmospheric scattering model and will yield a fast yet high quality enhancement results. Paper ID : T3_CI3_1_1569883733 Title : MetOcean Data to Linked Data Authors : Kamaluddeen Usman Danyaro, Jafreezal Jaafar, Mohd Shahir Liew Abstract This paper describes the Linked Data initiative in meteorological environment. MetOcean data are meteorological and oceanographic datasets that provide information to meteorological industries, petroleum industries as well as research institutes. The MetOcean has a myriad of data and scattered along the globe which lack Linked Data or Semantic Web capabilities. Linked Data is a concept of publishing interoperable data globally. As a way of integrating MetOcean data, this work used D2R server, a server that manages data sources and translates it to Web data. Therefore, the paper elucidates the process of developing Linked Data in Meteorological sector. Also, the results were queried using SPARQL endpoint as a graph. This approach was analyzed using F-measure which reveals the system is sufficient for querying and accessing the data as a graph. page | 75 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T3_CI3_2_1569883761 Title : Hybrid NSGA-II of Three-Term Backpropagation Network for Multiclass Classification Problems Authors : Ashraf Osman Ibrahim, Siti Mariyam Shamsuddin, Nor Bahiah Ahmad, Mohd Najib Mohd Salleh Abstract Hybridization has become one of the current focuses of new research areas of the evolutionary algorithms over the past few years. Hybridization offers better speed of convergence to the evolutionary approach and better accuracy of the final solutions. This paper presents a hybrid non-dominated sorting genetic algorithm-II (NSGA-II) to optimize Three-Term Backpropagation (TBP) network in terms of two objectives which are: accuracy and complexity of the network. Backpropagation algorithm (BP) is often used as a local search algorithm and when combined with NSGA-II, the performance of NSGA II is enhanced due to the improvement of the individuals in the population. The experimental results show that the proposed method is effective in multiclass classification problems. The results of the hybrid approach to the classification problems are compared with multiobjective genetic algorithm based TBP network (MOGATBP) and some methods found in the literature. Moreover, the results indicate that the proposed method is a potentially useful classifier for enhancing classification process ability. 76 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T3_CI3_3_1569888209 Title : Options Strategy for Technology Companies Authors : Teik Kheong Tan, Benny Bing Abstract Product innovation in the technology ecosystem can be enhanced through proper management of the supply chain. While there are several strategies that technology investors favor for profitability during the earning cycles, one of the strategies utilized quite often is the short strangle. A short strangle is an effective strategy with a theoretically unlimited risk. For example, Google’s recent earnings sent its share price up sharply by 13.8%, breaking the $1,000 barrier for the first time and increasing the company’s value by nearly $40 billion within a day. Such variations can be very costly for an investor who trades around earnings using short strangles. The aim of this paper is to debunk this myth and demonstrate how a short strangle can be traded safely as long as certain requirements are met. We will employ two companies in the technology sector to illustrate how our criteria can help in making better trading decisions. Since the volatility crush is the key determinant for profitability, we modeled the crush between the implied volatility of the front and next earliest expiration using Bayesian statistics. The accuracy of the Bayesian model is quantified using the Google stock as an example and it is shown that the method is reasonably accurate even with sharp changes in volatility trends. Paper ID : T3_CI3_4_1569888257 Title : Discriminative Discriminant Common Vector in Face Verification Authors : Ying Han Pang, Andrew Teoh Beng Jin, Yee Ping Liew, Fan Ling Goh, Chu Kiong Loo Abstract Discriminant Common Vectors (DCV) is proposed to solve small sample size problem. Face recognition encounters this dilemma where number of training samples is always smaller than the data dimension. In literature, it is shown that DCV is efficient in face recognition. In this paper, DCV is enhanced for further boosting its discriminating power. This modified version is namely Discriminative Discriminant Common Vectors (DDCV). In this technique, a local Laplacian matrix of face data is computed. This matrix is used to derive a regularization model for computing discriminative class common vectors. Experimental results demonstrate that DDCV illustrates its effectiveness on face verification, especially on facial images with significant intra class variations. page | 77 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T3_CI3_5_1569888843 Title : Airwaves Estimation in Shallow Water CSEM Data: Multi-Layer Perceptron versus Multiple Regression Authors : Muhammad Abdulkarim, Afza Shafie, Wan Fatimah Wan Ahmad, Adeel Ansari, Elisha Tadiwa Nyamasvisva Abstract In this study, a Multi-Layer Perceptron Neural Network and Multiple Regression techniques are used to estimate airwaves associated with shallow water ControlledSource Electro-Magnetic (CSEM) data. Both techniques are appropriate for the development of estimation models. However, multiple regression models make some assumptions about the underlying data. These assumptions include independence, normality and homogeneity of variance. Conversely, neural network based models are not constrained by such assumptions. The performance of the two techniques is calculated based on coefficient of determination (R2) and mean square error (MSE). The results indicate that MLP produced better estimate for the airwaves with MSE of 0.0113 and R2 of 0.9935. Paper ID : T3_CI3_6_1569907891 Title : Performance Comparison of Canny and Sobel Edge Detectors on Balloon Snake in Segmenting Masses Authors : Abdul Kadir Jumaat Abstract The most common problem in image processing is image segmentation. One of the methods which can segment an image with a high accuracy is Balloon Snake. It uses the energy minimization conception where it has a dynamic behavior that deforms from an initial position and converges to the boundary of the object in an image. However, we found that the accurateness always influences by the edge map detector that being used in implementing the Balloon Snake. Edge map detector is used to strengthen the boundary of the object before the object is segmented. Two edge map detectors are used in this research namely Canny and Sobel edge detector. Both edge detectors are implemented in Balloon Snake in segmenting 40 masses in breast ultrasound images. The pixel area traced by the two combination methods namely Canny and Balloon Snake and Sobel and Balloon Snake are evaluated. The accuracy is measured based on the percentage pixel area difference between radiologist and both combination methods. It is found that the combination of using Canny and Balloon Snake give 3.5% percentage of pixel area difference which is smaller compared to the other combination which have 12.7% percentage pixel area difference. 78 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T2_CI4_1_1569900933 Title : Identifying Universal Facial Emotion Markers for Automatic 3D Facial Expression Recognition Authors : Amal Azazi, Syaheerah Lebai Lutfi, Ibrahim Venkat Abstract Facial expressions convey human emotions as a simple and effective non-verbal communication method. Motivated by this special characteristic, facial expression recognition rapidly gains attention in social computing fields, especially in Human Computer Interaction (HCI). Identifying the optimal set of facial emotion markers is an important technique that not only reduces the feature vector dimensionality, but also impacts the recognition accuracy. In this paper, we propose a new emotion marker identification algorithm for automatic and person-independent 3D facial expression recognition system. First, we mapped the 3D face images into the 2D plane via conformal geometry to reduce the dimensionality. Then, the identification algorithm is designed to seek the best discriminative markers and the classifier parameters simultaneously by integrating three techniques viz., Differential Evolution (DE), Support Vector Machine (SVM) and Speed Up Robust Feature (SURF). The proposed system yielded an average recognition rate of 79% and outperformed the previous studies using the Bosphorus database. page | 79 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T2_CI4_2_1569903225 Title : Lung Cancer Diagnosis Using CT-Scan Images Based on Cellular Learning Automata Authors : Nooshin Hadavi, Md Jan Nordin, Ali Shojaeipour Abstract Lung cancer has killed many people in recent years. Early diagnosis of lung cancer can help doctors to treat patients and keep them alive. The most common way to detect lung cancer is using the Computed Tomography (CT) image. The systems that are created by the integration of computers and medical science are called Computer Aided Diagnosis (CAD). A CAD system that is adopted for the diagnosis lung cancer, uses lung CT images as input and based on an algorithm helps doctors to perform an image analysis. With the help of CAD, doctors can make the final decision. This paper is a study concerning automatic detection of lung cancer by using cellular learning automata. Images include some unwanted data and some feature that are important for processing; pre-processing improves images by removing distortion and enhance the important features. This system used lung CT scan so we applied some pre-processing method such as Gabor filter and region growing to improve CT images. After pre-processing step according features the lung cancer nodule was extracted. The obtained image through previous steps was entered to cellular learning automata lattice for training and making them possess the ability to detect lung cancer. The obtained results show, the proposed approach can reduce the error rate. Paper ID : T2_CI4_3_1569904591 Title : Recognition of Occluded Faces Using an Enhanced EBGM Agorithm Authors : Badr Lahasan, Ibrahim Venkat, Syaheerah Lebai Lutfi Abstract A new approach to recognize occluded faces is presented in this paper to enhance the conventional Elastic Bunch Graph Matching (EBGM) technique. In the conventional EBGM approach, facial landmarks need to be chosen manually in the initial stage and a single graph per face had been modeled. Our proposed approach intuitively fuses a Harmony search based optimization algorithm over the EBGM approach to automatically choose optimal land marks for a given face. Further, instead of using a single graph, we deploy component level sub-graphs and locate optimal landmarks by maximizing the similarity between each of the sub-graphs. Experimental results show that the proposed automatic method achieves an improved recognition rate when compared to the conventional EBGM approach. 80 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T2_CI4_4_1569905735 Title : Towards Real Time Multidimensional Hierarchical Graph Neuron (mHGN) Authors : Benny Benyamin Nasution Abstract The Hierarchical Graph Neuron (HGN) has already been known that it implements a single cycle memorization and recall operation. The scheme also utilizes small response time that is insensitive to the increases in the number of stored patterns. In this improved approach, the architecture is developed so, that it is not only suitable for scrutinizing 1D- or 2D-patterns; it can also accommodate multidimensional patterns. As the result, the multidimensional HGN (mHGN) architecture is able to recognize multidimensional patterns. Some approaches usually need a lot number of cycles and require complex deployment, when patterns need to be memorized and recalled. Such capability of mHGN can contribute to recognizing not only concrete but also abstract patterns in real time manner. The mHGN architecture still encompasses a lightweight in-network processing algorithm which does not require expensive floating point computations; hence, it is still suitable for real-time applications. Paper ID : T2_CI4_5_1569890219 Title : An Adaptive Method to Determine the Number of Clusters in Clustering Process Authors : Huan Doan, Thuan Nguyen Abstract A difficult problem of most clustering algorithms is how to specify the appropriate number of clusters. This paper proposes an adaptive method of selecting of number of clusters in clustering process by making coefficients indicated the appropriate number of clusters. The intra-cluster coefficient reflects intra distortion of cluster through maximum distance and a mean distance of cluster’s extremely marginal objects. The inter-cluster coefficient reflects distance among clusters. It is ratio between closest distance from this cluster’s centre to an extremely marginal object of other cluster and mean distance from this cluster’s centre to all of extremely marginal object of other cluster respectively. A new coefficient that indicates the appropriate number of clusters is build from the intra-cluster coefficient and inter-cluster coefficient. The looking for extremely marginal objects and the new coefficient are integrated in a weighted FCM algorithm and it is calculated adaptively while the weighted FCM is processing. The weighted FCM algorithm integrated new coefficient is called FCM++. We experiment with FCM++ on some data sets of UCI: Iris, Wine, Soybean-small and show encouraging results. page | 81 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T2_CI4_6_1569890081 Title : Development of an Intelligent Scorpion Detection Technique Using Vibration Analysis Authors : Abiodun Musa Aibinu, Bala Sadiq, Elijah Joseph, Habeeb Salau, Momoh Salami Abstract A possible solution to address the problem of Scorpion stings is the capability of detecting its presence earlier before it stings. This paper presents efforts in Scorpion detection using substrate vibration modelling approach. An eight stage approach has been presented in this work. Using sinusoidal signal, signal representing Scorpion behaviour was firstly sampled and then amplified before transmitting to a nearby receiving module. The received signal undergoes filtering for noise removal before being modelled for coefficients determination. The computed coefficients were then clustered for analysis of behavioural determination. Results obtained in this work show that the proposed technique can be used for Scorpion detection. BIO-INSPIRED COMPUTATION TRACK Paper ID : T4_BIC1_1_1569902039 Title : A Distributed Framework for Supporting 3D Swarming Applications Authors : Ghazaleh Pour Sadrollah, Jan Carlo Barca, Asad Khan, Jens Eliasson, Ilankaikone Senthooran Abstract In-flight wireless sensor networks (WSN) are of increased interest owing to efficiency gains in weight and operational lifetime of IP-enabled computers. High impact 3D swarming applications for such systems include autonomous mapping, surveying, servicing, environmental monitoring and disaster site management. For distributed robotic applications, such as quad copter swarms, it is critical that the robots are able to localise themselves autonomously with respect to other robots and to share information. The importance of fast and reliable dissemination of localised information in these elastic three dimensional networks provides us sufficient reason to present a distributed framework and hardware settings for passing this information pervasively through the swarm. The research field of Internet of Things (IoT) have for several years been addressing issues around low-power, low-bandwidth wireless communication. By applying IoT technologies to the challenges around swarming, new opportunities are created. However, since IoT have been primarily used with stationary devices, the introduction of flying sensors will add more challenges to address. 82 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T4_BIC1_2_1569902663 Title : A Polymorphic Recogniser for Distributed Intelligence in Wireless Sensor Networks Authors : Alexander Senior, Ahmet Sekercioglu, Asad Khan Abstract We present an innovative scheme for performing pattern recognition in wireless sensor networks. It is based on the concept of a distributed computer that can alter itself to adjust to the user’s needs. By emulating the distributed nature of biological computational devices and evenly spreading the computational and communication workload throughout the network, we will reduce energy consumption and enhance the reliability of the recognition process of sensing applications utilising this approach. We introduce the basic concepts of the scheme as a computer that operates via message passing (and not arithmetic operations), and show a theoretical validation of its operation. Paper ID : T4_BIC1_3_1569902897 Title : Brain-like Classifier of Temporal Patterns Authors : Denis Kleyko, Evgeny Osipov Abstract In this article we present pattern classification system which is used Vector Symbolic Architecture (VSA) for processing, representation, learning and consecutive classification of patterns. As a showcase we have used classification of vibration sensors measurements to vehicles types. On the quantitative side the proposed classifier requires only few kB of memory to classify an incoming signal against of several hundred of training samples. To classify into N classes the classification operation requires only 2*N+1 arithmetic operations this makes the proposed classifier directly implementable on a low-end sensor nodes. The main contribution of this article is the proposed methodology for encoding of raw sensory signals using distributed representation without explicitly specifying their features and VSA based classifier. page | 83 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T4_BIC1_4_1569903203 Title : Holographic Graph Neuron Authors : Evgeny Osipov, Asad Khan, Anang Hudaya Muhamad Amin Abstract This article proposes the usage of Vector Symbolic Architectures for implementing Hierarchical Graph Neuron. The adoption of VSA representation maintains previously reported properties and performance characteristics of HGN and further makes it suitable for implementation in distributed wireless sensor networks of tiny devices. SOFTWARE ENGINEERING TRACK Paper ID : T4_SE1_1_1569881475 Title : Analysis of Design Patterns in OpenNebula Authors : Lukman Ab. Rahim Abstract Computer system models and designs have been used in helping verification and validation activities. Computer systems have also been designed to make verification and validation easier such as the work on Design for Verification. The concepts of separation of concerns and modular design are two examples of how design decisions can make verification and validation easier. The objective of this research is to verify cloud-based systems and use its design to make the verification easier. Since a cloud-based system consists of many interacting software and hardware components, we start with verifying OpenNebula, a cloud-based system middleware. The methodology is to analyze OpenNebula’s code and identify the design patterns that will later be used in simplifying the verification. The analysis is performed by reverse engineering the code using class diagram generation tools and code analysis functions in an Intergrated Development Environment (IDE). This paper will present the design patterns in OpenNebula and how it can influence the verification. 84 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T4_SE1_2_1569869721 Title : Common Trust Criteria for IaaS Cloud Evaluation and Selection Authors : Hamzeh Alabool Abstract As Infrastructure as a Service (IaaS) cloud becomes increasingly important to all stakeholders; the evaluation on the degree of trust of the IaaS cloud remains a challenge. This study aims to discover and identify the Common Trust Criteria (CTC) from contextbased trust and context-based cloud and later organized, discussed, compared, and aggregated a conceptual model of CTC in an impartial manner. The main purposes of CTC model are: (a) to provide Cloud Service Requesters (CSRs) with a CTC model with which to evaluate the degree of trust that can be placed in IaaS cloud (b) to provide guidance to Cloud Service Providers (CSPs) as to what to build into their new, widely-available trusted IaaS cloud in order to satisfy trust requirements. To do so, a systematic review on context based trust and context-based cloud is provided. The results indicated that there was an important set of trust criteria such as Integrity, Benevolence, and Reputation that were neglected from the current research related to cloud.trust. Paper ID : T4_SE1_3_1569866835 Title : A Theoretical Validation of the Number of Polymorphic Methods as a Complexity Metric Authors : Amos Bajeh, Shuib Basri, Tang Jung Low Abstract The external quality attributes of software product are influenced by the internal and structural properties of the design of software products. This implies that to estimate the external quality, the internal properties need to be accurately measured. Measuring the internal attributes requires the use of metrics that are both theoretically and empirically valid. This work identifies and theoretically validates an OO metrics that measures polymorphism: Number of Polymorphic methods (NOP). The property-based and measurement theory-based validation approaches are used to show that the metric measures the concept of complexity which has impact on the external quality attribute of software design. page | 85 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T4_SE1_4_1569882139 Title : Assessment and Evaluation of Requirement Elicitation Techniques Using Analysis Determination Requirements Framework Authors : Souhaib Besrour, Lukman Ab. Rahim, Dhanapal Durai Dominic Abstract Numerous requirements engineering methods have been proposed to improve the quality of requirements documents and to increase customer satisfaction with the final product. However, the choosing between various techniques may be confusing and puzzling. Therefore, this paper aims to present an empirical study to assess requirement analysis techniques, highlight their key features, strength and limitations. The empirical study results show a high competitiveness between requirement engineering techniques and slight score differences among them. Statistics shows that Interview technique is the uppermost obtained score among all techniques, followed by JAD and Brainstorming technique. 86 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T4_SE1_5_1569901895 Title : Work Design Characteristics and Knowledge Sharing Behavior among Software Engineers Authors : Mobashar Rehman, Ahmad Mahmood, Rohani Salleh, Aamir Amin Abstract Knowledge sharing is important for Software Engineers because software is purely based on individual’s knowledge and one of the sources to learn new knowledge is through sharing. Although Software Engineering is a growing field, however research done in this profession is still not mature. One of the areas, which have not been thoroughly investigated in this profession, is working environment and its impact on knowledge sharing. Focus on this aspect of Software Engineering is important because work environment not only influences the performance of an individual but also the behavior (which in this case will be knowledge sharing behavior). Therefore, huge number of studies has been done conducted on designing work environment. One of the important works done was Job Characteristics Model (also mostly used in Software Engineering field). However, it covers only five aspects of work/job. Therefore different other studies focused on more work design characteristics. This study analyzed the relationship between knowledge sharing behavior and work design characteristics among Software Engineers. Work design characteristics proposed by Morgeson and Humphrey (2006) were used for this study. This study was conducted in Malaysia and four locations were selected through geographical cluster sampling (simple random). Results indicated that task identity, feedback from job, skill variety and received interdependence are the main work design characteristics for Software Engineers. Results also indicated that all work design characteristics has positive relationship with knowledge sharing behavior. page | 87 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T5_SE2_1_1569884603 Title : Communication Risks in GSD during RCM: Results from Literature Authors : Arif Ali Khan Abstract Majority of the software production companies are adopting Global Software Development (GSD) and it is incessantly getting fast. Most of Software development organizations are trying to globalize their study worldwide in order to get the various benefits. However, GSD is not a simple task and the organizations face different challenges. But Communication is a major issue and it becomes more complicated during the process of Requirements Change Management (RCM). This research will result to explore different communication risks, their causes, negative effects and mitigation strategies to allay the identified communication risks during the RCM process by conducting the literature review. In this study total 31 risks are identified their causes 31 and negative effects 29.Total 10 best practices are identified which are used to mitigate the identified communication risks. Paper ID : T5_SE2_2_1569882401 Title : A Combine Usability Framework for IMCAT Evaluation Authors : Ziyaulhaq Aliyu, Lukman Ab. Rahim, Emy Mustapha Abstract Model transformation (MT) is a key component of model driven software development. It is used to transform source model into a target model, to increase model quality and introduce design pattern and refactoring. As with other software development artifacts, MTs are not free from bugs and thus they must be verified. Various researches have been carried out on model transformation verification approaches,but no one has evaluated their usability. Indirect model checking approach for transformation (IMCAT) is an approach that can verify code generators by model checking the generated code. In this paper a combine usability model to evaluate IMCAT usability related to its learnability, efficiency and reliability will be presented. 88 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T5_SE2_3_1569883009 Title : Handling Tradeoffs Between Agile and Usability Methods Authors : Saad Masood Butt, Wan Fatimah Wan Ahmad, Lukman Ab. Rahim Abstract In the past few years, many organization have tried to improve their software development methodology. Different development approaches had been introduced but only a few are still functioning in the software industry. Agile software development is one the approach which is currently successful in software industry. For the development of interactive and usable software this agile approach needs to integrate with usability approaches. But this integration is not clear as both agile and usability follows iterative approach of development while agile approach is more toward on writing code and development of a running system; whereas, usability focused on the user interface to make the software more usable and increase its usability by following UCD process. This paper provides an extensive related work on the integration of agile methods with usability that highlights critical issues in agile methods and shows the importance of usability in agile methods. In the end the proposed model is discussed to handle tradeoff between usability and agile methods under one model. Paper ID : T5_SE2_4_1569883597 Title : Improving Effectiveness of Testing Using Reusability Factor Authors : Maryam Ahmed, Rosziati Ibrahim Abstract An important aspect of software development and engineering is software testing. Despite the indispensable role of testing, developers find the process as tiring and repetitive. Testing has been known to take more than half of system development time and effort. However, the concept of software reuse reduces the boredom of repeating the same activity by generating reusable codes that can be used to test other systems. This paper discusses the economic effect of reusability in testing and the effect of reusability in testing effort. Reusability can be said to reduce testing effort and increase the economic value (profit) of software testers without compromising the quality of the software. page | 89 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T5_SE2_5_1569883695 Title : A Review of Educational Games Design Frameworks: An Analysis from Software Engineering Perspective Authors : Mifrah Ahmad, Lukman Ab. Rahim, Noreen Izza Arshad Abstract Game-based learning allows leveraging on young learners preference towards playing games to turn games into tools for learning. There are a number of frameworks developed in the various aspects and theories of game-based learning. There are many relationships in existing frameworks that has been discussed regarding certain domains such as subject-matter expert, the game environment, developers, game goals and game designs, however, the relationship between subject-matter, game environment, learning theories and game-play is yet to be discussed together. This paper analyzes a few educational frameworks and discusses their relations among domains that they have used. In addition, this paper will discuss the software engineering practices that is of concern to educational games development but have not been discussed in previous literature. Paper ID : T4_SE3_1_1569902539 Title : Software Development Process Tailoring for Small and Medium Sized Companies Authors : Rehan Akbar Abstract Software development process tailoring is an emerging practice in today’s IT. A limited number of research works have been published in this area. The existing process tailoring approaches describe similar set of operations and are of very surface level. No proper guideline has been provided on how process tailoring is performed. Existing process tailoring approaches mainly focus on large companies and only one or two agile methods. Rarely any work has been presented on tailoring agile based methodologies as well as for small and medium sized companies. The present study addresses this limitation and identifies process tailoring operations and key processes of agile based methodologies and uses them for tailoring process for small and medium sized companies. Qualitative research methods are used to identify and validate tailoring operations and key processes of agile based methodologies. The results show that performing these tailoring operations to tailor three key agile based processes is an effective and applicable process tailoring approach for small and medium sized companies. 90 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T4_SE3_2_1569888245 Title : Pluggable Scheduling on an Open-Source Based Volunteer Computing Infrastructure Authors : Nordin Zakaria, Guilherme Dinis Junior, Ken Naono Abstract Nowadays, there are different types of computing infrastructures, like grids and volunteer communities, which have distinct needs and the preservation of energy or other resources is chief among them.This paper presents an attempt of our center to incorporate pluggable scheduling into an existing open-source volunteer computing system named BOINC. Our efforts proved valid, as we managed to re-engineer BOINC to support different scheduling applications and interchange between them dynamically, with additional support for thermal-aware scheduling algorithms. Our aim is to start a path into what could be a collection of middleware tools with standardized integration to sensor systems to support distinct types of scheduling policies, without the need to recompile the server system. Paper ID : T4_SE3_3_1569888767 Title : jFakih: Modelling Mobile Learning Game Authors : Azham Hussain, Norasyikin Abdul Mutalib, Azman Bin Yasin Abstract This study introduce a new method for learning Jawi for deaf children by adding some hand signs and named the method as jFakih. Since Fakih is a learning method for deaf children to read Quran, it’s also possible to be used in Jawi learning for deaf children. Fakih used number and colours to recognize the Arabic character and also the script. We also designed the reference model for jFakih for future development of mobile application. By using waterfall-agile hybrid method, we gathered the requirements and designed the model using UML technique. The model was validated through prototype development and some survey was implemented to get feedbacks from users. page | 91 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T4_SE3_4_1569890959 Title : Assessing Quality Attributes of Object-Oriented Software Design: A Case Study Authors : Shuib Basri, Zhamri Che Ani, Aliza Sarlan Abstract In recent years, most of the software products are becoming more complex due to rapidly growing of technology. Complex software is hard to maintain and need more efforts to understand both the architectural and components level. That is the main reason why software engineers are focusing on quantitative measurements for accessing the quality of the software designs. But the issue is how to ensure every new design of software product achieves the software quality attributes? Therefore, this paper presents a case study of applying object-oriented design metrics to assess software quality. Two versions of jUnit software products were analyzed using QMOOD to find out what are the levels of quality attributes to be achieved. The results show that both versions of jUnit have met five quality attributes and the designs are good to be used as a guideline at the early stages to those who are planning to develop new software products. Paper ID : T4_SE3_5_1569896429 Title : Ontology Based Development of Domain Specific Languages for Systems Engineering Authors : Vitaliy Mezhuyev Abstract The new approach to development of Domain Specific Languages (DSL) for solving tasks of Systems Engineering (SE) is proposed. A DSL alphabet is defined on the base of an ontology of the SE domain as the set of its typical concepts. A DSL grammar on the base of Finite State Machine (FSM) formalism is defined, which allows to link the SE ontology with the different SE processes (specification of requirements, work planning, development, validation, standardisation etc.). A DSL is mapped with the set of mathematical methods, which allows to solve arising in the SE domains tasks. The approach on the sample of development of the DSL for specification of requirements is illustrated. 92 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T4_SE3_6_1569899729 Title : Flowchart-based Approach to Aid Novice Programmers: A Novel Framework Authors : Danial Hooshyar, Rodina Binti Ahmad, Mohd Hairul Nizam Md Nasir, Wong Ching Mun Abstract Many tools have been used in the programming area to teach programming to novices. The most familiar tools comprise of flowchart-based notation along with programming environments depending on icons. Much more exploration on this area has disclosed that the deficiency of problem-solving abilities is directly tied with language syntax that they apply and the development environment. The main objective of this research is to develop a framework for improving the problem-solving skills of novice programmers. Hence, our research proposes a novel strategy, simulating human mechanism of solving problems in programming by converting the textual description of a problem, in English, into a flowchart. Two knowledge bases are employed to interpret the programming meaning of a given textual description in an attempt to draw its flowchart. Our future work will include the implementation and evaluation of this proposed framework. Paper ID : T2_SE4_1_1569903003 Title : Risk Assessment Factors for SME Software Development Companies in Malaysia Authors : Abdullahi Sharif, Shuib Basri Abstract There are large, medium, and small enterprises which develop software projects that can be influenced by a risk. Identifying risk is first step of perfectly assessing and controlling risks in a project. In the literature, a lot of researchers identified risk factors in software projects but none of these can be generalized as base of risk factors in the software projects as they differ in time, culture, and being studied in different application areas while using different research methodologies. Majority of the researchers focused on general software projects while few of them focused on specific application areas like virtual projects or e-commerce projects but no research focused identifying risk factors of software projects in terms of the firm size. In this paper, we are studying risk factors that Small and Medium Enterprise (SME) in Malaysia perceive as risk in their software development projects. 202 respondents from 25 enterprises located in three states in Malaysia was surveyed and analyzed. Finally, the top risk factors for each risk dimension were presented along their relationship with project risks. page | 93 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T2_SE4_2_1569903205 Title : Survey on Maintainability Evaluation Criteria in Service Oriented Architecture Authors : Nik Marsyahariani Nik Daud Abstract Changes in software after its deployment is unavoidable due to various reasons thus maintaining software is a necessities to keep it relevant in its environment. Software instilled with high maintainability value can save lots of costs and efforts. Service oriented architecture (SOA) is a new paradigm that has been adopted in industry, where software can be developed using services offer from different organizations. Evaluating maintainability of SOA is considered underdeveloped when compared to other quality attributes. Evaluation process involved many elements and one of the elements is evaluation criteria. In this paper, we selected maintainability evaluation criteria based on recent studies and discusses on its applicability within the evaluation of maintainability in SOA. It will also serve to find gaps in related researches of SOA. Two categories of evaluation approaches are used to classify studies in this survey, which are qualitative evaluation approaches and quantitative evaluation approaches. These categories are then evaluated against the selected evaluation criteria. Based on the survey, there are gaps that can be explored by researchers in this area. 94 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T2_SE4_3_1569901421 Title : The Effectiveness of using the Dependency Relations Approach in Recognizing the Head Modifier for Malay Compound Nouns Authors : Suhaimi Rahman Abstract This paper addresses the approach named dependency relations to identify the position of words located in compound noun as a head modifier or modifier head. To identify correctly the head modifier in the words, the type of relationships needs to be used. Currently, there are a few outstanding parsers available to analyze the input sentence in the structure of dependency triples, hierarchy of typed dependencies and syntactic level of words. All these kinds of structures are useful in our research work. However, the output generated is in an English form. Extensive research and development are needed to adopt them in our localized data. The data gathered need to be analyzed before being executed in the next process of checking the head and modifier relations between words. In this situation, not all the relations used in the three structures above are used in our research work. We have to choose only the most relevant relations, those which can assist us to solve the problems. The effectiveness of the relations used in our study can be measured using recall, precision and F1-score techniques. The comparison of the baseline values is important, so that whether or not there has been an improvement in a result can be seen. page | 95 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T2_SE4_4_1569905899 Title : An Integrated Success Adoption Model for Examining E-Learning Among Adult Workers in Jordan Authors : Ahmad Issa Saleem Alzoubib Abstract Researching about adult workers’ adoption reflected to organisation and individual in developing countries are needed due to obtaining better and bridge the gap. In addition, previous empirical studies that conducted on e-learning have shown low adoption rate among e-learners in Jordan. This study aimed to examine factors such as relative advantage, compatibility, complexity, information quality, system quality and service quality that drive adult workers in adopting e-learning system in their learning process. In other words, there is a weakness in applying e-learning implementation in Jordanian government universities. As a result, the Ministry of Higher Education in Jordan needs to have guidelines to help higher learning institutions to implement e-learning successfully and efficiently. A total of 502 adult workers currently pursuing their study at Arab Open University in Jordan were selected to be the sample for this study. Questionnaire was employed as the data collection approach for the present study. The findings revealed that five predictor variables, namely relative advantage, complexity, information quality, system quality and service quality were the most significant factor influencing e-learning adoption. This research has provided new knowledge with regard to e-learning through the development of an e-learning adoption model. Practical contribution includes insights into the factors and causes deterring e-learner from adopting e-learning in their learning process. 96 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) GREEN COMPUTING TRACK Paper ID : T5_GC1_1_1569872019 Title : The Adoption of Green Information Technologies and Systems as a Driver within Green SCM Authors : Savita K Sugathan, Dhanapal Durai Dominic Abstract Information Technology (IT) and Information System (IS) have begun to demonstrate their role in motivating, enabling, and transforming Supply Chain Management (SCM) towards ecological sustainability. The relationship between SCM, IT, IS and environmental sustainability are complex but interdependent to an extent for a greater energy and environmental efficiency. Most companies typically disregard the need to adopt, assess and report on the impacts of IT and IS for environmental sustainability. This paper discusses on cognitive interviewing procedures conducted and preliminary findings obtained from semi-structured interview with three of the ISO 14001 manufacturing companies in Perak as the input for the full scale main study. During cognitive interview, both the think aloud and probing method were used that have leads to number of amendments to the survey questionnaire. The preliminary discoveries from the semi-structured interview reveal that IT and IS play a greater role in environmental sustainability among ISO14001 manufacturing company in Malaysia. The role of IT and IS for environmental sustainability are deem as a necessity in enhancing flexibility and visibility in decision making as well as in minimizing energy consumption, carbon footprint and e-waste disposal. The decision on implementing IT and IS for environmental sustainability are highly dependent on the trade-off between costs and gains. This is because the implementation of information technologies might not produce the immediate benefits or required payback, as compared to information systems which are more apparent. This situation is further aggravated with poor assessments on the performance the information technology and systems invested. page | 97 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T5_GC1_2_1569910713 Title : A Semi-Greedy Soft Real-Time Multiprocessor Scheduling Algorithm Authors : Hitham Alhussian Abstract Soft real-time systems are systems that can tolerate deadline misses but at the expense of degradation in quality of service. Many of the Scheduling algorithms used to schedule real-time tasks in a multiprocessor soft real-time systems are extended from their uniprocessor counterparts such as Global Earliest Deadline First (G-EDF) and Least Laxity First (LLF). However such algorithms when extended to real-time multiprocessor scheduling achieve low schedulability rates. In this paper, we present an efficient real-time multiprocessor scheduling algorithm that achieves high schedulability rates compared to currently existing algorithms. Unlike the current algorithms which are known to be greedy, our proposed algorithm uses a semi-greedy criteria to schedule tasks. The simulation showed that the proposed algorithm misses few deadlines as well as achieves high schedulability rates compared to currently existing algorithms. 98 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T5_GC1_3_1569901913 Title : ZigBee Wireless Communication for Monitoring Renewable Street Light System Authors : Thinaharan Ramachandran, Vasaki Ponnusamy, Tang Jung Low, Anang Hudaya Muhamad Amin Abstract The advancement of technology brings advantages to human race to certain extent. Unfortunately, some of the technological inventions not only brings advantages, but also disadvantages. One of the disadvantages is the pollution of environment. Therefore, to prevent the pollution from getting worse, the environmental-friendly aspect is suggested to be included in new inventions nowadays. Thanks to the invention of solar panel, solar energy is able to become a renewable energy source that can be applied to various applications. Considering the increase of electricity consumption every year in Malaysia, solar powered street lighting system is proposed in order to reduce the burning of fossil fuels to generate electricity, hence reducing air pollution. The street lighting system will consist of automated switching mechanism to further reduce the electricity consumption of street lights. The system will also be able to provide energy measurement to determine the efficiency of street lights. Some security features provided by selected wireless communication protocol will also be implemented to secure the system. page | 99 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T5_GC1_4_1569890001 Title : An Integrative Perspective for CRMS Implementation in Healthcare in Malaysia Authors : Yahia Baashar Abstract Customer Relationship Management (CRM) is a powerful tool to help healthcare organizations in managing patient interactions. The further that the healthcare organizations understand the value of being customer-centric, the more likely they adopt to CRM as their main source of business strategy. Numerous of healthcare organizations are now practicing the CRM in order to computerize the medical processes and manage relationships with patients to deliver the best quality of medical services. Unfortunately, only few numbers of CRM projects have been successfully implemented, as the failure rate is said to be very high. In the Malaysian healthcare sector, the CRM concept has not acknowledged much attention and according to the review of literatures, there is a lack of CRM implementation and adoption in that field. In order to fill this gap and to improve the process of CRM implementation, this paper presents the investigation of CRMS implementation from an integration perspective. A mixed methodology of qualitative and quantitative and a study model that leads to CRMS implementation are proposed. 100 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T5_GC1_5_1569916897 Title : Root Cause Analysis on Changes in Chiller Performance Using Linear Regression Authors : Jun Okitsu, Ken Naono, Mohd Fatimie Irzaq Khamis, Shaharin Anwar Sulaiman, Mohd Amin Abd Majid Abstract Gas District Cooling (GDC) plants, designed to be environmentally efficient, require frequent maintenances, in order to avoid corrosions or leakages from the chemical reactions in Steam Absorption Chillers (SACs) of the plant. However, most of the plant managers face difficulty that the positive and the negative effects from the SAC maintenances are not clear. This is because there are various metrics to indicate GDC SAC performance, but they don’t have enough information to describe chiller internal conditions. The paper describes a method to detect the root cause of the GDC SAC performance changes. Specifically, (1) the chiller performance is modeled by linear regression on the performance related sensor data, and (2) the root cause is determined by time series analysis of the sensor contribution ratios to the performance. Evaluations in Universiti Teknologi PETRONAS (UTP) GDC plant show that the method determines the root cause of the chiller problem correctly in 3 cases out of 4 problem cases. Because the method determines the root cause only from the plant operation historical data without any inspections, it is generalized to detect component failures and other plant anomalies. HUMAN FACTORS AND ERGONOMICS TRACK Paper ID : T5_HCI1_1_1569876897 Title : Al-Quran Learning Using Mobile Speech Recognition: An Overview Authors : Noraziahtulhidayu Kamarudin, Syed Abdul Rahman Al-Haddad Syed Mohamed, Abd Rauf Bin Hassan, Mohammad Abd-Alrahman Mahmoud Abushariah Abstract The usage of mobile application in various aspects has been worldwide accepted and there are variety of mobile applications which developed to cater the usage of different background of the user. In this research, a short survey which includes questionnaire is disseminated to find the specific interest of the user whom using application for learning Quran by using mobile speech apps. As the survey was conducted, the main interest is to find out either that the apps able to accepted by the user and explain on the proposed usage of mobile speech recognition with feature of learning apps. Factors of mobile speech recognition and mobile learning are listed to support the results from the short survey. page | 101 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T5_HCI1_2_1569879477 Title : Human Finger Input Properties for Precise Target Selection on Multi-touch Screen Authors : Ahsanullah Abro Abstract In recent years, touch enabling technologies potentially have supported to design and construct the small and large size of multi-touch screens. These sensitive devices assist users to select and manipulate the targets using their bare fingers. However, it is reported that user fingertips cause the imprecise selection of small size targets and subsequently users get frustrated during interaction. Keeping in view this problem, it is attempted to provide an overview on human finger input properties and their possible use for the selection of targets on multi-touch screens. This survey paper helps in understanding the finger touch input and some inherited finger input properties. It also provides a rational to explore the finger input properties that may help in proposing new interaction techniques to avoid the imprecision problem. Paper ID : T5_HCI1_3_1569883797 Title : Evaluation of Mobile Games with Playability Heuristic Evaluation System Authors : Sarmad Soomro, Wan Fatimah Wan Ahmad, Suziah Sulaiman Abstract Heuristics evaluation is proved to be an efficient and effective method for inspecting usability of application software and game. However, it is reported in literature that negative usability results may cause failure to the product. In large projects usability evaluation in time consuming and due to time constraints project may fail. There is a need of improving method of conducting heuristic evaluation. Therefore, a motivation is raised to improve the method of conducting heuristic evaluation by automation the process. An automated heuristics evaluation tool empower users to focus on inspecting more usability problems within time constraints and reduce manual efforts. In this study, a playability heuristic evaluation system (PHES) is designed and developed to automate the process of conducting heuristics evaluation for games. To ensure the functionality of this systems, several tests were conducted. The results of this study advocates that with the help of playability heuristic evaluation system (PHES) more playability problems can be identified with in short time. 102 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T5_HCI1_4_1569883873 Title : Story Line in Image-based Virtual Reality for Enhancing Spatial Presence Experience Authors : Nadia Diyana Mohd Muhaiyuddin, Dayang Rohaya Awang Rambli Abstract Presence or feel being located in virtual environment can make the Virtual Reality application more effective. One type of Virtual Reality application is Image-based Virtual Reality application; which defined as the panoramic virtual environment that mimic the real environment which users can interact with. Due to the limited interaction function, none research exists between Image-based Virtual Reality application and user’s Presence experience. However, Communication Theory claims that one type of presence which is spatial presence can be experienced by users with virtual environments that match the real environment. As motivated by this theory, An exploratory study on Image-based Virtual Reality and Spatial Presence is conducted by using Repertory Grid Technique. The objective of this study is to measure the user’s spatial presence experience and to identify the factors that could enhance the experience. The result revealed that IBVR application could developed user’s spatial presence experience. Moreover, a few IBVR characteristics are revealed by this study. However, in this paper, the result on the story line in IBVR application is only presented. Our results suggested three features of story line in IBVR application that could create users spatial presence experience; clear story line, acceptable story line, and end-start visual of the story line. Paper ID : T5_HCI1_5_1569900887 Title : Measuring Malaysian M-Commerce User Behaviour Authors : Ashok Sivaji, Shi Tzuaan Soo, Tek Yong Lim, Li Shan, Mohammad Hossein Tahriri Zanegenh Abstract M-Commerce is expected to play an even larger role, with over half a billion customers following the trend to shop via mobile devices by 2016. With tourism being identified as one of the 12 National Key Economic Area, objective of this study is to determine the ranking of attention that is paid to different information during hotel booking. Lab Based Usability Testing with eye tracking technology was carried out with Malaysians to achieve this objective. Results revealed that Malaysian are highly attracted to both the “booking” and “price” information, followed by the “ratings”, “introduction” and lastly the “title” of the hotel, which is in contrast to other countries. page | 103 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : T5_HCI1_6_1569901893 Title : Synchronizing Audio and Haptic Feedback to Read Webpage Authors : Suziah Sulaiman, Dayang Rohaya Awang Rambli, Hanis Hashim, Mahmud Mokhtahir Abstract The limitations of Website’s accessibility in terms of its text attributes representation in web pages hinder the visually impaired users from having a comprehensive understanding of the web content. Current assistive technology such as screen reader and refreshable Braille device are unable to represent this non-textual attributes to the visually impaired. This paper presents a study that examines the significance of text attributes to support Web accessibility and improve understanding of the content. It was hypothesized that the synchronization of audio and haptic feedbacks could improve Web accessibility through text attributes identification; thus, providing comprehensive understanding of the webpage. The study involves development of a prototype system that synchronizes audio and haptic to read webpage and represents text attributes. A mixture of qualitative and quantitative data collection methods was adopted. Interviews with the visually impaired users were conducted to gather their requirements for the prototype. A pilot and user testing were carried out to evaluate the prototype. The user testing involves those who suffer from high degree of visual impairment. The findings show significant improvement in web browsing performance and text attributes identification using the prototype as compared to the existing screen reader. 104 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) POSTER PRESENTATION ABSTRACT Paper ID : Poster_1_1569867153 Title : Subsurface Exploration of Seabed Using Electromagnetic Waves for the Detection of Hydrocarbon Layers Authors : Adeel Ansari, Afza Shafie, Seema Ansari, Abas Md Said, Elisha Tadiwa Nyamasvisva, Muhammad Abdulkarim, Muhammad Rauf Abstract This paper focuses on the detection of hydrocarbon layers under the seabed using Electromagnetic methods and to prove the relationship between the thickness and resistivity constrast of the hydrocarbon. Simulations have been carried out by varying the depth of seawater from 1000m to 100m and the resistivity contrast and thickness for each level of depth is also varied. The electric field is also measured using various simulation models and graphs over different offsets. The results obtained prove that the resistivity property of Hydrocarbon is directly proportional to the thickness. and at particular points the presence of hydrocarbon layer is clearly significant. page | 105 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : Poster_2_1569867259 Title : ZLS: A Next-door Lightweight QoS Aware Location Service Technique for VANET on Highways Authors : Muhammad Maaz Rehan, Halabi Hasbullah, Omer Chughtai, Muhammad Waqas Rehan Abstract In VANET, a Location service technique comprises of location update and location request. In location update, a destination vehicle advertises its services and location to a set of vehicles called location servers. In location request, a source vehicle queries location servers in its broadcast range about the location and services of destinations. During location update, separate control messages are exchanged to periodically update location servers which create delay and congestion in the network. Similarly, after location request, pre-loaded digital maps at source vehicle are used to find the shortest path towards destination which does not give vehicle density on road at that moment in time. Other than digital maps, Dijkstra or Bellmen ford algorithms at source or intermediate nodes are also used to find shortest path, which is a computationally time consuming activity leading to an extra delay during path finding and before packet transmission. We therefore propose QoS and traffic density aware location service technique called ZoomOut Location Service (ZLS). We have implemented ZLS in NS2.33. The simulation results for highway traffic show that ZLS updates its location servers in a uni-cast fashion such that the location servers have up-to-date information of advertised services and destination position. Similarly, a source can reach destination in the quickest possible way by sending uni-cast messages without using digital map or shortest path finding algorithms. 106 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : Poster_3_1569868807 Title : Model Driven Software Development: An Overview Authors : Muhammad Qaiser Saleem, Jafreezal Jaafar, Mohd Fadzil Hassan Abstract The vision of the MDSD is an era of software engineering where modelling completely replaces programming i.e. the systems are entirely generated from high-level models, each one specifying a different view of the same system. The MDSD can be seen as the new generation of visual programming languages which provides methods and tools to streamline the process of software engineering. Productivity of the development process is significantly improved by the MDSD approach and it also increases the quality of the resulting software system. The MDSD is particularly suited for those software applications which require highly specialized technical knowledge due to the involvement of complex technologies and the large number of complex and unmanageable standards. In this paper, an overview of the MDSD is presented; the working styles and the main concepts are illustrated in detail. Paper ID : Poster_4_1569902771 Title : Mobile Phone Icons Recognition and Cultural Aspects Authors : Syed Ghayas, Suziah Sulaiman, Jafreezal Jaafar, Saipunidzam Mahamad, Muzafar Khan Abstract There is a rapid growth in the development of mobile phone applications which are widely used around the globe. Different cultures may affect the usage of such applications; there is a need to explore the cultural differences in this context. In order to study such differences, those icons which interpretability might be affected by culture differences are taken into consideration and hypothesized. Two groups of ten subjects (twenty in total) from two different countries i.e. Malaysia and Estonia participated in the study. The factors considered in the study were navigation time, working with menu icons, and recognition test. The results indicated that Malaysian subjects performed well while interpreting the third generation of icons which were operating system provided icons. On the other side, Estonian subjects were not much familiar with modern icons. There was no difference found in the both groups to interpret the most familiar icons. The results reveal that there are possible cultural differences on icons interpretability based on their levels of abstraction. page | 107 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : Poster_5_1569870281 Title : Association among Independent and Dependent Factors of Host in Volunteer Computing Authors : Soodeh Peyvandi, SP Abstract These days, many scientific projects such as: SETI@home and Distributed.net are using computers which are connected to internet from the entire world in order to run their jobs. This large distributed system is a Volunteer Computing (VC) that includes volunteer hosts. An important attribute of volunteer hosts is the volatile behavior that means often they are not available because of the autonomy nature of owners. The volatile behavior of hosts is significant and effective issue on fault tolerance of the system. Therefore, characterization factors of volatile hosts have influence on reliability of jobs schedulers and improve fault tolerance of the VC system. This paper considered on characterization host’s factors in concept of association between dependent and independent factors of hosts. We assumed that CPU interval availability and frequency number of CPU availability are dependent factors, also time zone, location, RAM size and numbers of processors are independent factors. In other words, the main hypothesis is that there is an association between dependent and independent factors. To proof this hypothesis, we used real trace data of volunteers which are taken from SETI@home project. We found that time zone and location have dependency, also processor’s number have correlation with CPU interval availability while frequency number of CPU availability has correlation with RAM size. 108 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : Poster_6_1569871171 Title : QoS Routing for Cognitive Radio Ad-Hoc Networks: Challenges & Issues Authors : Tauqeer Safdar, Halabi Hasbullah Abstract Cognitive Radio Ad-Hoc Network (CRAHN) is an emerging class of mobile ad hoc networks that provides each network node with a list of available channels. It is expected that the traditional routing protocols and routing metrics will not cope well for CRAHN with frequent topology changes and interference conditions which result in varying connectivity conditions among the terminals. Therefore, to achieve more realistic cognitive routing in wireless ad hoc networks, routing metric and routing protocol design should be designed to adapt to traffic and propagation conditions. The focus of this work will be on the routing metrics with emphasizing on the implementation and improvement of the protocols operating with such metrics. The aim of any routing protocol is to provide QoS in the parameters like throughput, delay, and interference and according to this the focus of this research is to identify the challenges and issues to provide the QoS routing in CRAHN environment. Paper ID : Poster_7_1569872323 Title : Classification of Software Project Risk Managers: Established on Roles and Responsibilities Authors : Uzair Iqbal, Alan Oxley, Jafreezal Jaafar Abstract Generally, people have used the term “risk manager” in different fields of science to represent a person who is responsible for handling risk management activities. However, in the field of software engineering, the term “risk manager” is not well defined and there is ambiguity over the term’s meaning.The main objective of the paper is to review the literature in order to make the terms understandable and to find the role of a risk manager for effective software project risk management.Additionally, in the end of paper different title of software project risk managers has been classified on the base of their role an responsibilities. page | 109 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : Poster_8_1569872451 Title : Optimizing BOINC Scheduling Using Genetic Algorithm Based on Thermal Profile Authors : Norzatul Natrah Ismail Abstract Berkeley Open Infrastructure for Network Computing (BOINC) is an open source middleware for volunteer and grid computing. Main function of BOINC is to use the idle time of computer to run some computation at background. Universiti Teknologi Petronas (UTP) campus grid used BOINC as middleware in computer labs. However, computer can only process jobs during weekday and office hour because they want to reduce energy used for cooling power. In order to fully utilize the computer in labs, we proposed new jobs scheduling algorithm can run based on thermal constraint. The proposed algorithm is combination of thermal profile and heuristic approach. We use genetic algorithm to find the best combination of clients and jobs based on clients order and least execution time. Then we compare our algorithm with brute force method. Result from simulation it shows that proposed algorithm successfully distribute and execute job based on thermal constraints in an effective and efficient way compare to brute force method. Paper ID : Poster_9_1569872581 Title : A Case Study on Travel Information from Social Network Focus in Facebook and Blogs in Malaysia Authors : Nurul Akhmal Mohd Zulkefli, Baharum Baharudin Abstract Due to the rapidly growing of social network media such as Facebook, Twitter and Blog, the rich contexts and sharing information of human activities are also explosive increase. Lately, many people used social media as a platform to exchange and share information such as education, lifestyle, recipes and medical treatment. Tourism is one of the most popular topics shared in Facebook and Blog. To explore details about the travel data, we created a survey to study the user sharing behavior. This paper presents the case study of travel sharing information in social network and the travel data collection in Place of Interest (POI) in Malaysia. 110 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : Poster_10_1569882495 Title : Students’Inclinations towards Games and Perceptions of Game Based Learning (GBL) Authors : Mazeyanti M Ariffin, Alan Oxley, Suziah Sulaiman Abstract The term ‘games’ has remained as one of the most popular search terms in Google for the past 10 years. Looking at games’ popularity, especially among the youth, there is a need for academicians and educationists to find ways in which games might support learning. In order to ensure a close match between the learning activities and the expected outcome, instructors should aware of the learners’ needs and their perception towards Game-Based Learning. The research focuses on the learner specification dimension in the Four-Dimensional Framework (FDF).The method of study was through a survey and the target audience is students of Universiti Teknologi PETRONAS. The outcomes of this paper are twofold: first is the identification of sets of game characteristics to be used either by game developers or instructors, and second is an indication of the viability of games as an educational tool for Higher Education settings. Paper ID : Poster_11_1569883019 Title : Design of Interactive Whiteboard System for Collaborative Learning Authors : Tahir Mustafa Madni Ikram, Mohd Yunus Nayan, Suziah Sulaiman, Muhammad Tahir, Majid Iqbal Abstract The research in the education system describes that the students generally do not produce good results because of the use of traditional ways of educational system. It has been identified that the use of interactive technologies, constructive methods and appropriate interfaces has a great impact in improving creative education and learning. With the advancements of Interactive technologies provides initiative human-computer interaction as compared with conventional mouse and keyboards. A prototype was developed to analyze the efficiency of collaborative students learning system which enables co-location, multiple users, hands-on activities and multiplemodes of communication using hand-held laser pointer device(s). This collaborative learning prototype enables the use of laser pointer(s) to interact with the whiteboard. The laser pointer controls mouse events and additional gesture events as with the same functionality provided by conventional mouse pointer. Furthermore, a quantitative investigation on the usefulness of collaborative learning system was conducted with twenty participants. The participants showed deeper and more interactive learning experience. The results of the user-study shows substantial use of this technology in class rooms and meeting rooms for improving the effectiveness of brainstorming sessions. page | 111 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : Poster_12_1569883903 Title : Performance Comparison of Least Slack Time Based Heuristics for Job Scheduling on Computational Grid Authors : Ahmed Abba Haruna, Tang Jung Low, Anindya J. Pal Abstract In recent years, increasing demand for computing has led to the development of computational grid. Typically scheduling challenges tend to be NP-hard problems where there is no optimal solution. The research reported here therefore is focused on the development of hybrids scheduling algorithms based on deadline and slack time parameters and its variations, using the concept of optimization techniques. An extensive performance comparison has been presented using real workload traces as benchmark on a grid computational environment. The results were compared with some baseline scheduling approaches in extant literature. The results have shown that the performances of grid scheduling algorithms developed and reported in this paper give good results in most of the cases and also support true scalability, when in the scenario of increasing workload and number of processors on a computational grid environment. Paper ID : Poster_13_1569884381 Title : Swarm Inspired Test Case Generation for Online C++ Programming Assessment Authors : Oi Mean Foong, Tran Quang Trung, Suet Peng Yong, Helmi Md Rais Abstract It is time consuming for lecturers to manually compile, run and verify students’ programming assignments. Moreover, they also need to define test cases for different programming exercises in order to assess students’ code. This paper presents a swarm inspired automatic test case generation for Online Programming Assessment or Judge (UOJ) system. The UOJ is built with the purpose to assist lecturers in evaluating codes submitted from students and generate test cases for every programming problem automatically. It also helps students to practice and enhance their programming skills. In this study, the mechanism of automatic test case generation was explored using Particle Swarm Optimization (PSO) algorithm and new fitness function is proposed to determine the optimal solution for each problem. Experiments were set up to benchmark between manual and automatic PSO test case generation results to evaluate the efficiency of the proposed method. The preliminary results are satisfactory for automatic test case generation using swarm inspired PSO algorithm in C++ programming assignments. 112 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : Poster_14_1569911443 Title : Exploration of Communication Process Using Business Microscope Authors : Yoke Yie Chen, Kim Nee Goh, Yukihisa Fujita, Ken Naono Abstract This paper describes first results of ongoing research effort to investigate communication pattern within a procurement process in an organization. Previous studies have shown that the main reasons of long ordering cycle are it takes too long to deal with purchase order and unable to share information with vendors. The procurement process of an educational institution is chosen as a research sample. We outline opportunities for the development of a theoretical framework around the construct of effective communication pattern in procurement department. In particular, we are able to identify typical communication patterns between inter- and intra-departments. We aim to develop a theoretical framework that integrates efficient modes of communication that will influence and regulate the communication process. Paper ID : Poster_15_1569901845 Title : Number Skills Mobile Application for Down Syndrome Children Authors : Wan Fatimah Wan Ahmad, Afza Shafie Abstract Down syndrome (DS) children seem to have difficulties in learning numbers compared to reading. They need customized learning in numbers due to their slower pace of learning.Unfortunately, there is limited theory to guide DS children to learn and master in mathematics. With the advancement oftechnology, the learning style of special children has been improved from time to time from the paper and pen method, to the use of computer application such as courseware to the latest technology such as mobile application in smart phones and tablets. As for now, there is no personalized mathematics learning mobile application for DS children. The objectives of this paper are to report on the development of a mobile application on learning the basic numbers for DS children and to evaluate the user acceptance on the developed mobile application. The study will be focusing on the DS children with moderate level of IQ who are learning to recognize basic numbers. The method used to achieve the objectives is Rapid Application Development (RAD). The mobile application was developed using Eclipse Android Development Tool (ADT). An observation has been conducted to 5 DS children who have different level of IQ. The finding shows that the mobile application is really suitable for DS children who have moderate level IQ. page | 113 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : Poster_16_1569906097 Title : Experimental Study on the Effective Range of FCM’s Fuzzifier Values for Web Services’ QoS Data Authors : Mohd Hilmi Hasan, Jafreezal Jaafar, Mohd Fadzil Hassan Abstract The work presented in this paper is part of the development of a fuzzy Interval Type2 (IT2)-based system. An IT2 system contains fuzzy type-2 membership functions that can be generated using a pair of FCM fuzzifier, m values. Evidences show that the effective range of m values is influenced by the underlying dataset. Hence, the objective of this paper is to present the experimental study on finding the effective range of m values for web services’ QoS data. The study aimed at identifying range of m values that successfully generated Gaussian membership functions. As proposed by previous work, the experiment was carried out upon the m values in the range of 1.4 to 2.6. The works involved the datasets of three QoS parameters. The results showed that two of the datasets has the effective range of 1.7 to 2.6, while another one was 1.6 to 2.6. Paper ID : Poster_17_1569882423 Title : Electronic Content Management Systems Use and Implementation in Highly Integrated Businesses Authors : Noreen Izza Arshad, Mazlina Mehata, Mohamed Imran Mohamed Ariff Abstract Many organizations have invested large amounts of money in implementing Electronic Content Management Systems (ECMS), which refers to the technologies used to manage, store, and deliver business-related information across the organization. However, research indicates that many ECMS implementations fail to yield the kind of information sharing that is useful for business process executions. From the IS literature point of view, this is not because of the technologies, but it is due to ways ECMS is implemented and used which is not aligned with organization’s way of doing business. Therefore, this paper explores how organizations that emphasize high integration and low standardization of business processes termed as Coordination use and implement ECMS to support its business operations. We suggest guidelines that explain the ways ECMS should be used and implemented in Coordination organizations that include (1) ways to use ECMS for sharing business process-related information, (2) ECMS infrastructure, (3) ways to manage content and (4) administration of ECMS. These findings are grounded in the analysis of qualitative data from one case study. The finding is significant for business and IT managers because it will guide them with ways to use ECMS and gain more benefits from these types of systems 114 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : Poster_18_1569882611 Title : Understanding the Ways Organizational Learning Drives Information Technology (IT) Infrastructure Authors : Noor Hafizah Hassan, Noreen Izza Arshad, Jafreezal Jaafar, Emy Elyanee Mustapha Abstract Many businesses today are struggling to find a better and substantive IT capability to achieve its competitive advantage. Therefore, this study aims to explore how organizational learning orientation may be the driver that may strengthen organizational IT capability. In the context of this study, organizational learning orientation involves commitment to learning, shared vision, open-mindedness, and intraorganizational knowledge sharing. This study will further explore how these four organization learning orientation may positively or negatively drives organizations’ IT capability. Drawing upon dynamic capability theory and Resource-Based View (RBV) theory, four hypotheses are developed to better understand how organizations strategized its IT capability with the right learning orientation. Questionnaires and interviews will be adopted as data collection method and further analyzed with Structural Equation Modeling (SEM). As a result, a validated research model will be empirically validated and presented in the future stages of this research. page | 115 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : Poster_19_1569882573 Title : Effects of the Smart Board on Students’ Achievement in Moral Education Authors : Loh Wai Ling, Termit Kaur Ranjit Singh, Wan Fatimah Wan Ahmad Abstract In this era of globalization, Malaysia is recognized as one of the pioneers in introducing Smart board among schools in the region of Southeast Asia. The aim of this study is to investigate whether the use of Smart board in Moral Education improved students’ achievement. The study examined the achievement of the Form 4 students in a school in the Kinta district in Perak Darul Ridzuan, Malaysia comparing scores between students whose teachers used the Smart board for instruction and those whose teachers did not. A total number of 50 students are involved in the study. They are divided into two experimental and control groups. A pre-test and post-test was conducted. The findings show slightly higher achievement among students in the Smart board group as compared to students not using it, thus exhibiting the advantage of using the Smart board instruction. The resultant dataset after comparing a pre-post test supports the idea that students whose teachers used the Smart board with a new Moral Education smart board courseware show greater post-test to pre-test achievement gains than students whose teachers did not use the SB. 116 | page The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Paper ID : Poster_20_1569872553 Title : Predicting BottomHole Flowing Pressure Using Artificial Neural Network Authors : Paras Memon, Suet Peng Yong, William Pao, Jion Sean Pau Abstract This paper presents the application of Surrogate Reservoir Model (SRM) for predicting Bottom-Hole Flowing Pressure (BHFP) on an initially undersaturated reservoir. SRM is recently introduced technology that is used to replicates the results of numerical simulation model. High computational cost and long processing time limits our ability to perform compre-hensive sensitivity analysis and quantify uncertainties associated with reservoir because reservoir model contain large number of grids in its geological structure that usually takes considerable amount of time for a single simulation run. And also making hundred and thousands is considered as a cumbersome process and sometimes impractical. SRM is considered as as a solution tool to tackle this issue. SRM uses Artificial Neural Network (ANN) and data mining techniques for the reservoir simulation and modeling. In this paper, the results of SRM for predicting BHFP is presented and a reservoir simulation model has been presented using Black Oil Applied Simulation Tool (BOAST). To build any SRM, it requires small number of runs to train the model. Once we train the SRM, it can generate hundred and thousands of simulation runs in a matter of seconds. As a part of this system, it is proposed to develop a SRM extraction based on ANN to enhance the realization run time. page | 117 The 2nd International Conference on Computer and Information Sciences A Conference of World Engineering, Science & Technology Congress (ESTCON) Notes 118 | page