Loading...

Proceedings of

4th International Conference on Advances in Information Processing and Communication Technology IPCT 2016

Date
19-Aug-2016
Location
Rome , Italy
Authors
56
ISBN
978-1-63248-099-6

20 Articles Published

1. BEHAVIOUR PROFILING IN HEALTHCARE APPLICATIONS USING THE INTERNET OF THINGS TECHNOLOGY

Authors: ABDELRAHMAN ABUARQOUB , MOHAMMAD HAMMOUDEH

Abstract: This position paper advocates applying the monitoring pogwer of IoT to build profiles of user behaviour using the large volumes of collected data. The desired system exploits sensor data mining approaches to profile user behaviour patterns in smart environments. Sensor data is mined to extract relationships of interest between environmental variables (context) and the user, building in this way behaviour profiles. The capability of applying knowledge to manipulate user’s environment is expected take monitoring beyond the simple alert-mode of operation to long term profiling of user’s behaviour. After a brief literature review to prove the suitability of IoT as a low-cost unsupervised profiling platform, we give the details of our proposal and the objectives that needs to be met before user behaviour profiling across inter-spaces is possible.

Keywords: IoT, behaviour profiling, smart spaces, sensor networks, remote healthcare monitoring.

Pages: 1 - 4 | DOI: 10.15224/978-1-63248-099-6-25

2. HOW CUSTOMER AFFECT AGILE TRANSITION AND ADOPTION PROCESS?

Authors: MINA ZIAEI NAFCHI , TAGHI JAVDANI GANDOMANI

Abstract: Software teams and companies are continually leaving plan driven methods and replacing them by Agile methods in software development. One of the most important reasons for this process is gaining more quality in software products. This process as a multi-dimensional process encompasses several factors, enablers, challenges, and obstacles. Conducting a large scale qualitative research study revealed various hidden aspects of the above process. This paper presents the role of customers as one of the most critical roles in Agile transition and adoption. This study showed that customers significantly influence the change process and can be considered as both successful and failure factors in the transformation.

Keywords: Agile software development, Agile transition process, Agile transition and adoption, Agile customer, Customer involvement, Grounded Theory

Pages: 5 - 7 | DOI: 10.15224/978-1-63248-099-6-26

3. BRAIN REGION EXTRACTION USING MRI IMAGE PROCESSING TO AID NEUROLOGY SYSTEM OF PATIENT

Authors: VANDANA JAGDISH SHAH

Abstract: For patient presenting with symptoms of tumour should be diagnosed properly. Since treatment may not cure at the later stage, researchers must aim to produce maximal benefit to the patient with minimal burden, taking quality of survival into account as well as the duration. CT scan images are limited by the resolution of the imaging. In the field of medical resonance image (MRI) processing the image segmentation is an important and challenging problem in an image analysis. The main purpose of segmentation in MRI images is to diagnose the problems in the normal brain anatomy and to find the location of tumour. This paper proposes a novel algorithm for segmentation of MRI images to extract the exact area of the brain as preprocessing steps of location of the tumour. Neuroradiological research consists of several brain extraction algorithms which are useful for several post- automatic image processing operations like segmentation, registration and compression. The result of proposed algor

Keywords: Image segmentation, clustering, k-means clustering, fuzzy c means clustering, brain extraction algorithm.

Pages: 8 - 12 | DOI: 10.15224/978-1-63248-099-6-27

4. NOVEL BPSK-OFDM-SSB MODULATION SYSTEM USING DCT AND DHT

Authors: BYEONGJAE KIM , HEUNG-GYOONRYU

Abstract: In this paper, we propose and evaluate OFDM(Orthogonal Frequency Division Multiplexing)-SSB(Singe Side Band) for improving spectral efficiency. The proposed system is based on OFDM system using DCT(Discrete Cosine Transform) and DHT(Discrete Hilbert Transform). This proposed system transmits a BPSK (binary phase shit keying) modulation signal through a single sideband. Therefore, spectrum efficiency can be improved into 2 times than the conventional DSB(double sided band) communication system. Conclusively, the proposed system can transmits two different BPSK signal with each different single sideband in DSB band.

Keywords: SSB; OFDM; DHT; DCT;

Pages: 13 - 15 | DOI: 10.15224/978-1-63248-099-6-28

5. COMPARISON OF DEEP CONVOLUTIONAL NEURAL NETWORK STRUCTURES THE EFFECT OF LAYER COUNTS AND KERNEL SIZES

Authors: B. MELIS OZYILDIRIM , SERKAN KARTAL

Abstract: Deep learning algorithms have become popular methods for pattern recognition due to their advantages over traditional methods such as providing deep representations of data, high-level semantic features. Deep convolutional neural network is one of the deep learning technique used in computer vision. Deep convolutional neural network consists of alternating convolution and pooling layers, and feedforward layers after them. It has not a fixed structure hence determining the optimal structure such as number of convolution and pooling layers, kernel size of these layers is crucial for faster and high performance implementations. Hence, in this work different convolutional neural network structures were established and tested on recognition of 28x28 MINST handwritten digits. According to the test results, kernels should cover at least 2 neighbor pixels of the current pixel from each side. Moreover, increasing the number of layers provide better results at the same time leads to decreases in

Keywords: convolutional neural network, deep learning, kernel size, convolutional layer count

Pages: 16 - 19 | DOI: 10.15224/978-1-63248-099-6-29

6. INTERNET OF THINGS IN MARKETING AND RETAIL

Authors: ALEKSANDRA LABUS , MARIJANA DESPOTOVIC-ZRAKIC , NATASA DURDEVIC , ZORICA BOGDANOVIC

Abstract: Internet of Things (IoT) is predicted to be one of the main raising megatrends in technology. Combined with current and expected ubiquity and pervasiveness of connected smart devices it gives ground to application in many areas, including marketing. Potential of sensors and actuators for context relevant, personalized, real-time, interactive communication with consumers and shoppers is seen as a driver of traffic and transaction, facilitator of movement along the path to purchase, able to enhance their experience. At the same time, they can serve to improve logistics and infrastructure for more effective retail business and store management. This paper reviews and organizes potential applications of IoT technologies and solutions for effective marketing at retail from the angle of manufacturers and retailers as well as from the angle of consumer/shopper facing or infrastructure and process related initiatives. We propose a model that indicates the potential that IoT has vs standard ind

Keywords: Internet of Things, marketing, context-aware computing, mobile marketing, geo-targeting, personalization

Pages: 20 - 24 | DOI: 10.15224/978-1-63248-099-6-30

7. A DELAY-BASED TCP FOR DATA CENTER NETWORKS

Authors: WAN-CHEN CHANG , YI-CHENG CHAN

Abstract: Internet of Things (IoT) is predicted to be one of the main raising megatrends in technology. Combined with current and expected ubiquity and pervasiveness of connected smart devices it gives ground to application in many areas, including marketing. Potential of sensors and actuators for context relevant, personalized, real-time, interactive communication with consumers and shoppers is seen as a driver of traffic and transaction, facilitator of movement along the path to purchase, able to enhance their experience. At the same time, they can serve to improve logistics and infrastructure for more effective retail business and store management. This paper reviews and organizes potential applications of IoT technologies and solutions for effective marketing at retail from the angle of manufacturers and retailers as well as from the angle of consumer/shopper facing or infrastructure and process related initiatives. We propose a model that indicates the potential that IoT has vs standard ind

Keywords: networks, TCP, Incast

Pages: 25 - 29 | DOI: 10.15224/978-1-63248-099-6-31

8. KNOWLEDGE EXTRACTION FOR INFOMATION FUSION

Authors: ADANG SUWANDI AHMAD , CATHERINE OLIVIA SEREATI

Abstract: The important thing in doing planning and mission execution is to gain data and information from observation result. From data and the information which have been collected, can be design an appropriate strategy, reviewed from various perspectives to minimize the loss in mission execution. Therefore an appropriate method should be used to perform Knowldege Extraction for any information obtained from these observations. Fusion Information based on Cognitive Artificial Intelligence (CAI) is intended to produce a complete information processing and fast as a basis for planning and mission execution. This paper will explain the process of infomation fusion based on CAI, for doing Knowledge Extraction, so it can take appropriate conclusions for the results of observations made.

Keywords: Information Fusion, Knowledge Extraction, Cognitive Artificial Intelligence

Pages: 30 - 33 | DOI: 10.15224/978-1-63248-099-6-32

9. COLLABORATIVE TRUST FRAMEWORK BASED ON HY-IDS, FIREWALLS AND MOBILE AGENTS TO ACHIEVE EFFECTIVE SECURITY MECHANISMS IN CLOUD ENVIRONMENT

Authors: AHMED EDDAOUI , BOUCHRA MARZAK , HICHAM TOUMI , MOHAMED TALEA

Abstract: The cloud has emerged as a successful computing paradigm allowing users and organizations to rely on external providers for storing and processing their data and making them available to others. Undoubtedly, security is one of the significant concerns in cloud computing. However, one of the major security concerns is to protect against network intrusions that affect confidentiality, availability and integrity Cloud resources and offered services. In this paper, we present a new framework, that allows collaboration between Hybrid Intrusion Detection System (Hy-IDS), Firewalls and Mobile Agents. Deploying security mechanisms in cloud computing environment to detect and stop intrusion attempts through our framework. However, the security mechanisms unfolds in four phases: using mobile agents in a virtual environment to collect malicious data in order to detect intrusions. Then, generation of appropriate response actions local and remote from malicious data, which were collected in the fir

Keywords: cloud computing, confidentiality, firewall, Mobile Agents, security

Pages: 39 - 43 | DOI: 10.15224/978-1-63248-099-6-34

10. SEEU STUDY PROGRAMS CURRICULA IN LINKED OPEN DATA

Authors: KALTRINA UKALLI , BUJAR RAUFI , FLORIJE ISMAILI , XHEMAL ZENUNI

Abstract: WWW is moving from a Web of hyper-linked documents to a Web of linked data. Linked Open Data goes beyond borderlines by linking all the freely published RDF data in freely accessible datasets connected with each other to form the so called LOD cloud. This paper is focused on the evolution of the Linked Open Data platform of the SEE University curricula, from a research experiment to a data hub for the open content of the university. Based on Linked Data principles, loud.seeu.edu.mk is used to publish and access data about academic programs and courses offered in the university. It exposes as well a SPARQL endpoint in order to provide recommendations of resources based on user queries.

Keywords: Semantic Web, Linked Data, Linked Open Data, Ontology, Study Program Curricula, Protégé.

Pages: 44 - 48 | DOI: 10.15224/978-1-63248-099-6-35

11. A TRACEABILITY TOOL FOR MODEL-BASED DEVELOPMENT DEALING WITH UNCERTAINTIES

Authors: AKIRA FUKUDA , GO HIRAKAWA , KENJI HISAZUMI , RYOICHI NAGATSUJI , TSUNEO NAKANISHI

Abstract: An architecture that considers a system life cycle from the designing stage to the operational stage is needed for solving problems in large-scale, complicated system developments. It is necessary to establish traceability among design assets, development assets, and operational assets through a life cycle of the system in order to introduce this process into an actual development situation. In this paper, we introduce the MetaIndexTools, a traceability tool for model-based development that can deal with uncertainties and consider the life cycle of the system.

Keywords: Life cycle–oriented, uncertainty, model-based developme

Pages: 49 - 53 | DOI: 10.15224/978-1-63248-099-6-36

12. A TRACEABILITY TOOL FOR MODEL-BASED DEVELOPMENT DEALING WITH UNCERTAINTIES

Authors: AKIRA FUKUDA , GO HIRAKAWA , KENJI HISAZUMI , RYOICHI NAGATSUJI , TSUNEO NAKANISHI

Abstract: An architecture that considers a system life cycle from the designing stage to the operational stage is needed for solving problems in large-scale, complicated system developments. It is necessary to establish traceability among design assets, development assets, and operational assets through a life cycle of the system in order to introduce this process into an actual development situation. In this paper, we introduce the MetaIndexTools, a traceability tool for model-based development that can deal with uncertainties and consider the life cycle of the system.

Keywords: Life cycle–oriented, uncertainty, model-based developme

Pages: 49 - 53 | DOI: 10.15224/978-1-63248-099-6-36

13. INSTITUTIONAL EFFECTIVENESS PREDICTION USING DATA MINING TECHNIQUES

Authors: AGRON CAUSHI , BLERTA ABAZI - CAUSHI , BUJAR RAUFI , FLORIJE ISMAILI , XHEMAL ZENUNI

Abstract: The development of Information Technology has generated large amount of data in various areas. Organizations are deploying different analytic techniques to evaluate rich data sources in order to extract useful information within the data and utilize this in further decision making. In this paper the different approaches to IS development as well as how the investment in technology and IS contribute to increase the student headcount are investigated. Moreover, a considerable amount of work is done in classifying and building models for university classification according to the investment of the institutions in IT services and their risk management. Examinations about educational technology services with emphasis in e-learning technologies are done as well.

Keywords: Educational Data mining, information extraction, decision making.

Pages: 54 - 58 | DOI: 10.15224/978-1-63248-099-6-37

14. CONVERTING A PIXEL GRAPHIC INTO TOOLPATH FOR MACHINING ON A CNC MILLING MACHINE

Authors: ISMAIL HAKKI SANLITURK , MIKAIL OLAM , NIHAT TOSUN

Abstract: For being able to manufacture of a 2D shaped object that drawn as a pixel graphic on a PC, an algorithm has been developed in this study, that extracts machining coordinates from the graphic and drives motors of a CNC router machine. CNC router has been directly driven by using this algorithm, without needing G and M codes.

Keywords: pixel, graphic, toolpath, machining

Pages: 59 - 61 | DOI: 10.15224/978-1-63248-099-6-38

15. MX/G/1 QUEUEING SYSTEM WITH BREAKDOWNS AND REPAIRS

Authors: DJAMIL AISSANI , DJAMILA ZIREM , MOHAMED BOUALEM

Abstract: We consider an MX/G/1 queuing system with breakdown and repairs, where batches of customers are assumed to arrive in the system according to a compound poisson process. While the server is being repaired, the customer in service either remains the service position or enters a service orbit and keeps returning, after repair the server must wait for the customer to return. The server is not allowed to accepte new customers until the customer in service leaves the system. We find a stability condition for this system. In the steady state the joint distribution of the server state and queue length is obtained, and some performance mesures of the system, such as the mean number of customers in the retrial queue and waiting time, and some numerical results are presented to illustrate the effect of the system parameters on the developed performance measures.

Keywords: batch arrival, break down, repair.

Pages: 62 - 65 | DOI: 10.15224/978-1-63248-099-6-39

16. HARALICK TEXTURE FEATURES BASED ON BAG OF VISUAL WORDS FOR A SPINE MRI IMAGES

Authors: ENTESAR B. TALAL , KHAWLAH H. ALI

Abstract: This paper explores statistical features of texture based image descriptors that make use of the spatial gray level of bag of visual words model to efficiently improve classification performance for two types of spine MRI images, which is normal and abnormal(which is may be a cancer). At first, texture is characterized through second order statistical measurements based on the gray-level co-occurrence matrix introduced by Haralick. By this method it is possible to compute, four features which are designed to perform texture: contrast, correlation, homogeneity, and energy for spine MRI images, and then construct a bag of visual word (BoW) to encode feature vector into visual words. Features of these types are used to classify two categories of spine MRI image: normal and abnormal, then, classify them by using SVM, which is works efficiently. Experiment results on spine MRI show significant improvement of classification.

Keywords: gray level co-occurrence matrix, visual words, K-means, classification

Pages: 66 - 70 | DOI: 10.15224/978-1-63248-099-6-60

17. OPTIONS OF EVALUATION OF IDENTIFICATION QUESTIONS IN MARKETING RESEARCH

Authors: OTAKAR UNGERMAN , SVETLANA MYSLIVCOVA

Abstract: Marketing research is one of the basic methods how to identify changes in economy. Many methods are used to collect data and these methods are accompanied by the identification ques-tions. These identification questions aim to categorize respondents according to selected crite-ria. Sociodemographic characteristics are used in the research of individuals, whereas charac-teristics identifying companies are used in the research of legal entities. The theoretical part of this paper deals with explanation of the role of the identification question in the research and with statistical methods used to evaluate these questions. First, ways how to process data using descriptive statistics are introduced. The second main part deals with the data processing using mathematical statistics, testing of statistical hypothesis. In the following practical part the quan-titative research made using questionnaire is presented. The aim of the evaluation is to verify a hypothesis of existence of statistical

Keywords: identification question, marketing research, mathematical statistics

Pages: 71 - 75 | DOI: 10.15224/978-1-63248-099-6-61

18. PROCESSING OF BIG DATA WITH HADOOP ENVIRONMENT IN THE DISTRIBUTED SYSTEM

Authors: A.V.BOGDANOV , THUREIN KYAW LWIN

Abstract: In this paper, we would like to examine about cloud computing, Big data and Hadoop environment. The main focus of issues is big data with Hadoop are associated in distributed system. Applications of Big data are benefit to organizations of many large and small industries. In this article, we introduced with Hadoop analytics and cloud computing solutions, application, and testing real time in distributed system. We discussed about the various possible solutions of cloud computing and Hadoop for lage data sets. Cloud computing is a very vital role in database system, applications and the related infrastructure with technologies, controls and the big data tools. Bigdata applications and Cloud computing advantages are represented to the most important in distributed computing process.

Keywords: Cloud Computing, Big Data, Analytics, Algorithms, Tactical Environment, Hadoop, Hadoop Distributed File System (HDFS) HDFS, Virtual server, JAVA, Map Reduce

Pages: 76 - 78 | DOI: 10.15224/978-1-63248-099-6-70

19. SURVEY ON COVERT STORAGE CHANNEL IN COMPUTER NETWORK PROTOCOLS: DETECTION AND MITIGATION TECHNIQUES

Authors: MUAWIA A. ELSADIG , YAHIA A. FADLALLA

Abstract: Due to the rapid growth in number of different protocols over the internet, internet protocols have become an ideal vehicle for covert communications. They represent a high bandwidth for such communications. Moreover, new high-speed network technology has significantly amplified the network’s covert channel capacity. Certainly, a covert channel bandwidth of only one bit size can easily allow transmission of a system bin code which can lead to tremendous risk. This paper presents a brief overview of network protocols-based covert channels, and surveys some recent and relevant work on covert channels detection and elimination techniques along with their achievements and limitations. In sum, the covert channel countermeasures—detection, elimination, mitigation, and capacity reduction—are still real challenges and lag behind an acceptable level of network security. Therefore, the research door is wide open for more contributions in this field.

Keywords: covert channel, security; detection, prevention, elimination, capacity reduction, network protocols.

Pages: 79 - 85 | DOI: 10.15224/978-1-63248-099-6-71

20. NUMERICAL MODELING AND HEURISTIC ALGORITHMS FOR NANOGENERATOR BEHAVIOR ANALYSIS

Authors: A. DIB, A. HASSAM , K. SRAIRI AND L. SAIDI

Abstract: Recently, the desire for a self-powered micro and nanodevices has attracted a great interest of using sustainable energy sources. Further, the ultimate goal of nanogenerator is to harvest energy from the ambient environment in which a self powered device based on these generators is needed. With the development of nanogenerator-based circuits design and optimization, the building of new device simulator is necessary for the study and the synthesis of electromecanical parameters of this type of models. In the present article, both numerical modeling and optimization of piezoelectric nanogenerator based on zinc oxide have been carried out. They aim to improve the electromecanical performances, robustness, and synthesis process for nanogenerator. The proposed model has been developed for a systematic study of the nanowire morphology parameters in stretching mode. In addition, heuristic optimization technique, namely, particle swarm optimization has been implemented for an analytic modelin

Keywords: Numerical modeling, Heuristic Algorithms, Nanogenerator, Particle Swarm Optimization, Electrical potential

Pages: 86 - 90 | DOI: 10.15224/978-1-63248-099-6-78

Popular Proceedings

ESSHBS 2017 - 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ICETM 2023 - 2023

9th International E-Conference on Engineering, Technology and Management

ASET 2017 - 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017 - 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017 - 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017 - 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022 - 2022

8th International E- conference on Engineering, Technology and Management

SEM 2019 - 2019

9th International Conference on Advances in Social Science, Economics and Management Study