Loading...

Proceedings of

International Conference on Advances in Computer and Information Technology ACIT 2013

Date
05-May-2013
Location
Kuala Lumpur , Malaysia
Authors
115
ISBN
978-981-07-6261-2

44 Articles Published

1. A HIGH CAPACITY IMAGE STEGANOGRAPHY METHOD USING LORENZ CHAOTIC MAP

Authors: LEYLA ROOHI , REZZA MOIENI , SUBARIAH IBRAHIM

Abstract: This paper proposed a high payload image steganography method based on modulus parts of Kekre’s Advanced Multiple LSB Algorithm (KAMLA) and Lorenz chaotic map. In the proposed method a 256 by 256 color image is embedded in a 512 by 512 cover image with acceptable imperceptibility. Experimental results showed that proposed algorithm sustains a higher confidentiality and still can provide high capacity as compared to KAMLA hiding algorithm.

Keywords: image, steganography, chaos, Lorenz, payloaod

Pages: 1 - 5 | DOI: 10.15224/978-981-07-6261-2-01

2. DESIGNING SPATIAL INFORMATION DATABASES INTEGRATION MODELLING USING Z SPEC

Authors: MUSTAFA MAN

Abstract: Theoretically Formal Specification (FS) approach can reduce the overall software development time. FS can be used to provide an unambiguous and precise supplement to natural language descriptions. Focus to this point, it can be rigorously validated and verified leading to the early detection of specification errors or debugs during software development process. Correcting errors at the early development stage is much cheaper than modifying a delivered system. FS could be verified and validated in order to explore the consequences of this specification and potentially find mistakes. Prior to these, we have greater confidence on the testing of such system against the actual user requirement specification. This paper proposes the use of Z spec approach in designing Spatial Information Databases Integration Model (SIDIM) as a case study of artificial reefs (AR) assessment project. This model serves as a basis for the integration task, and declarative rule languages for specifying integrati

Keywords: SIDIM, Database Integration, Z Specification, Spatial Information System.

Pages: 6 - 11 | DOI: 10.15224/978-981-07-6261-2-02

3. INTERACTIVE MULTIMEDIA FOR LABORATORY SESSION OF BRIGHT-FIELD MICROSCOPY TECHNIQUE

Authors: NURUL HIDAYAH MAT ZAIN , NOOR IZANI NOOR JAMIL , NURLIDA BASIR

Abstract: E-learning should be pedagogically-driven rather than technologically-driven. Technology that is applied in conjunction with pedagogical concepts can create an effective student-centered environment and enhance learning outcomes. The objective of this study is to develop an interactive multimedia in order to achieve the intended learning outcomes and to enhance self-regulated learning. An interactive multimedia on bright-field microscopy technique was developed in the CD-ROM which included various elements; text, images, animations, video, and audio. We conducted an experiment with thirty first-year biomedicine students in Universiti Sains Malaysia attended a 3-hour fixed laboratory session for conventional teaching and learning for bright-field microscopy technique. At the end of the session, all students were given the first set of questionnaires. After the conventional lab session, the same students were provided with multimedia teaching and learning materials and then were given th

Keywords: e-learning, educational technology, interactive multimedia, teaching and learning, bright-field micr

Pages: 12 - 17 | DOI: 10.15224/978-981-07-6261-2-03

4. SEGMENTATION OF DIABETIC RETINOPATHY RETINAL EYE IMAGE USING ANT COLONY OPTIMIZATION ALGORITHM

Authors: SELVARAJAN S , VIJAYALAKSHMI

Abstract: Ant colony optimization is a technique for optimization that was introduced in the early 1990’s. The inspiring source of ant colony optimization is the foraging behavior of real ant colonies. This behavior is exploited in artificial ant colonies for the search of approximate solutions to discrete optimization problems, to continuous optimization problems, and to important problems in telecommunications, such as routing and load balancing. Diabetic is one the important cost related problems. And also it gives the numerous eye problems for humans like Diabetic retinopathy. In this work a new method have been proposed to segment the eye affected by diabetic retinopathy. Segmentation is one of the important modules of any image processing technique. In this work we have proposed the Ant Colony Optimization (ACO) algorithm to segment the Human eye. The performance of the proposed system has been verified and validated with another standard algorithm. This technique is a Novel technique to s

Keywords: Segmentation, Diabetic Retinopathy, Ant Colony Optimization.

Pages: 18 - 22 | DOI: 10.15224/978-981-07-6261-2-04

5. A TRAFFIC SIGNATURE SENSITIVE TO CLIENT MACHINES

Authors: KAZUMASA OIDA

Abstract: A robust authentication strategy requires a user to provide not only a password but also something the user has. Generally, “what you have” authentication methods require additional hardware to strengthen security. However, such devices are not widely used today. This paper proposes another “what you have” authentication approach, in which a user machine is identified by analyzing video traffic flowing from an authentication server to the user machine. This scheme is inexpensive and resistant to machine and credential theft. Experimental results demonstrate that the traffic signature used in this paper is responsive to a small difference between two user machines.

Keywords: traffic signature, user authentication, two-factor authentication, video stream

Pages: 23 - 27 | DOI: 10.15224/978-981-07-6261-2-05

6. THE IMPACT OF QUALITY FACTORS OF WEB-BASED INFORMATION SYSTEM ON THE EMPLOYEE TASK PERFORMANCE: A PILOT STUDY

Authors: KAMAL M. H. ALHENDAWI

Abstract: In the recent years, evaluating the effectiveness of Web-based Information System (WBIS) is increasingly needed as it highly contributes to organizations, particularly on the employee task performance. This study is one of the fewest in Palestine in the field of WBIS assessment in which the effectiveness of WBIS is conceptualized and assessed in terms of employee task performance. It aims at investigating the effects of quality factors: service quality and information quality on the employee task performance. The data of the pilot study is collected from 39 of WBIS users in UNRWA. In the context of statistical inferential and analytical tests, correlation and regression analysis are used to analyze the data. The findings indicate that there are strong correlations between service quality, information quality and employee performance. Also, the findings indicate there are significant relationships between study factors. Therefore, it is expected that this study would contribute to empir

Keywords: Web-based Information System (WBIS), IS Effectiveness, service quality, information quality, task performance.

Pages: 28 - 32 | DOI: 10.15224/978-981-07-6261-2-06

7. CLASSIFICATION OF BIRD SPECIES BASED ON BIOACOUSTICS

Authors: ARTI V. BANG

Abstract: This paper presents a study of automatic detection and recognition of bird species based on bioacoustics. The energy distribution in different frequency bands varies quite significantly among different birds’ sounds. Energy in various frequency bands is extracted using wavelet packet transform and k-nearest neighbor algorithm is used for classification. In our experiment, classification accuracy of 91% is achieved for the classification of eight bird species. A total of 307 bird sound files are used to train/test the system.

Keywords: Bioacoustics, Syllables, Wavelet Packet Transform, k-nearest neighbor.

Pages: 33 - 37 | DOI: 10.15224/978-981-07-6261-2-07

8. VEDEPSO ALGORITHM FOR DESIGNING UNIQUE LIBRARY OF DNA STRANDS

Authors: KRISHNA VENI SELVAN , MOHD SAUFEE MUHAMMAD , SHARIFAH MASNIAH WAN MASRA

Abstract: Combinatorial optimization happens when there are two or more objectives to be optimized in solving a problem. The DNA words or oligonucleotides designing are one of a multi-objective combinatorial optimization problem. In this paper, the designations implied minimizations of H-measure, similarity, hairpin and continuity functions subjected to a predefine range of melting temperature and GC-content. A novel multi-swarm optimization approach is introduced to design a library of DNA strands. This approach is called vector evaluated differential evolution particle swarm optimization (VEDEPSO). The results obtained from the VEDEPSO algorithm is evaluated using Pareto dominance technique. A list of selected non-dominated solutions is shown as the final results from the research.

Keywords: oligonucleotides; differential evolution; particle swarm optimization; Pare

Pages: 38 - 41 | DOI: 10.15224/978-981-07-6261-2-08

9. LOAD-BASED FUZZY LOGIC APPROACH TO CLUSTER-HEAD ELECTION FOR WIRELESS SENSOR NETWORKS

Authors: CHONG ENG TAN

Abstract: The lifetime of Wireless Sensor Networks(WSNs) were limited by the fact that sensor nodes are battery-powered and communication is the main source of energy consumption. Once deployed, the entire network lifetime shows a strong dependency on the battery lifetime of individual nodes. Therefore, WSNs can only subsiston while the battery power is adequate. One of the popular solutions in overcoming this handicap is by using the clustering technique where cluster-heads will be appointed among the sensor nodes with the network divided into several groups.Cluster-heads are responsible to aggregate data collected by its cluster member and transmit it back to the base station.In this paper, we proposed protocol of a centralized cluster-headelection mechanism using fuzzy logicsince it is capable of exhibitingthe situations from the real-world more closely. This protocol uses node’ energy, node’s centrality and distance as the fuzzy descriptor to elect cluster-head. To justify the efficiency of

Keywords: Wireless Sensor Network, Cluster, Clustering

Pages: 42 - 46 | DOI: 10.15224/978-981-07-6261-2-09

10. AUTOMATIC COMPUTER ESTIMATION OF HISTOLOGICAL FUHRMAN GRADE IN KIDNEY CANCER

Authors: BARTOSZ SWIDERSKI , JAROSLAW KUREK

Abstract: The paper presents an automatic approach to assessment of the stage of development of the kidney cancer on the basis of Fuhrman grades. The stage of advancement level of cancer is usually associated with 4 Fuhrman grades. Our approach to Fuhrman grade assessment is composed of few steps. The first one is extraction of the numerical features from the microscopic image of the histological slides of the biopsy of kidney by using mathematical morphology. The next step is the features selection providing descriptors of the best class separating abilities. The last one is application of the automatic classifiers and data mining techniques to assign the actually available samples to one of four classes.

Keywords: features selection, neural networks, classification system, kidney cancer, data mining

Pages: 47 - 50 | DOI: 10.15224/978-981-07-6261-2-10

11. COLOUR HISTOGRAM BASED COLPOSCOPY CERVICAL IMAGE CLASSIFICATION

Authors: H. RANGANATHAN

Abstract: n this paper colposcopy cervical image classification based on colour histogram and K Nearest Neighbor (KNN) is presented. The classification is achieved by extracting colour histogram features from the cervix. To extract the colour histogram features, the colour space of the given image is converted from RGB to CIE colour space because of its perceptual uniformity. KNN classifier is used to classify the cervical images into normal and abnormal images. The performance with overall sensitivity of 94.71% and accuracy of 93.75 % is achieved using k-NN classifier. The performance is evaluated using 240 images collected from the hospital.

Keywords: Colposcopy, Histrogram,colorspace KNN classifier, cervicalcancer

Pages: 51 - 53 | DOI: 10.15224/978-981-07-6261-2-11

12. DATABASE INTEGRATION VIA MEDIATOR APPROACH FOR INTEGRATED APPLICATIONS WITH NFC TECHNOLOGY

Authors: ABDULLAH EMBONG , MD YAZID MOHD SAMAN

Abstract: Automated application using the integration of Near Field Communication (NFC) technology via mobile phone seems to be cost effective without the need to invest on expensive device reader. Some of the applications that utilized NFC technology have been explored and its data sources need to be managed. This paper proposed a suitable approach to integrate databases for application using NFC technology. Mediator approach was chosen as a bridge for application using NFC technology and data sources. Five components in mediator based: user layer, presentation layer, mediator layer, wrapper layer and database layer. Two core components in mediator approach are mediator and wrapper. S-Library is an example application using NFC technology. Three different data sources which are library database, book supplier database, student information system database as an example different data sources. The conceptual integration of these three different data sources using mediator approach is explained an

Keywords: Database Integration, Near Field Communication (NFC), Mediator Approach

Pages: 54 - 58 | DOI: 10.15224/978-981-07-6261-2-12

13. UNCERTAINTY ISSUES IN AUTOMATED WEB SERVICE SELECTION

Authors: B. SARAVANA BALAJ , G. SAMBASIVAM , M.S. SALEEM BASHA

Abstract: Present world is an era of automation, machines have been granted the power of decision making, so is the case in Information Science. Recent developments in web services have shown the capability of semantic web in decision making through automated Discovery and Selection. Though automated web service discovery is a huge achievement in information Science but there lies the uncertainty factor which hampers the accuracy of decision making thus making it difficult to deliver exact service. In this paper we proposed an experimental system to identify uncertainty issues related to automated Web Service processing and shown how these uncertainties can be reduced through Web Content Mining and User Preference Mining. The paper is concluded with the discussion of possible future enhancement in Web modeling standards for handling uncertainty Issues.

Keywords: Web service, Uncertainity Issues, Information retrieval, User Preference

Pages: 59 - 63 | DOI: 10.15224/978-981-07-6261-2-13

14. MINING EDUCATIONAL DATA : A REVIEW ON STUDENTS’S PATTERN OF BEHAVIOURS & PERFORMANCES

Authors: MASITA ABD JALIL , MOHD YAZID MD. SAMAN , WAN AEZWANI WAN ABU BAKAR

Abstract: The main focus of lower or higher education institutions is to provide the quality education to its students. One way to achieve the highest level of quality education system is through discovering the hidden knowledge that relied in huge educational datasets. There is an increasing trend in using data mining in education. This new emerging field, called Educational Data Mining (EDM), concerns with developing methods that discover knowledge from data originating from educational environments. Examples of educational domain are discovering knowledge for prediction regarding enrollment of students in a particular course, alienation of traditional classroom teaching model, detection of unfair means used in online examination, detection of abnormal values in the student’s result sheet, prediction about student’s performance and analyzing a pattern of student’s class attendance and student’s class absenteeism. The main objective of this paper is to study and compare the use of several data

Keywords: Educational Data Mining (EDM), Knowledge Database and Discovery (KDD), Student’s Behaviour, Student’s

Pages: 64 - 69 | DOI: 10.15224/978-981-07-6261-2-14

15. DESIGN AND IMPLEMENTATION OF AN ADVANCED WEB-BASED DAIRY FEEDING DECISION SUPPORT SYSTEM

Authors: FATIMAH SIDI , MARZANAH A. JABAR, , NILOOFAR YOUSEFI

Abstract: one of the most important issues in dairy farm is feed management which aims to manage available and required feed. There are several problems associated with managing cattle feed such as how to best satisfy feed deficits or how to utilize extra feed available. Since early 70s, feed planning decision support systems have been developed to help farmers addressed issues. However, many of those systems have failed because of several reasons such as being designed for specific geographical region, missing dairy farm’s production variables (e.g. milk yield per cow) or using very complex model which is hard to understand and handle. The objective of our research is to proposed an advanced web-based decision support system to address issues of feed management on the basis of stock inputs (required feed estimated based on stock numbers) and basic pasture (available feed for cattle). The system then provides a solution for 12 months feed planning which can be reviewed and improved if required.

Keywords: decision support system, web-based decision making , Knowledge management, dairy resource management

Pages: 70 - 74 | DOI: 10.15224/978-981-07-6261-2-15

16. THE STUDY OF RELATIONSHIP BETWEEN WHITENESS AND TEMPERATURE OF RICE

Authors: CHANON JANGKAJIT , CHATCHAI KHUNBOA

Abstract: The whiteness of rice is a key factor for making a decision to increase or decrease the power of Milling Roller in polishing process which can be impacted to the using of electric power and rice\'s temperature. Using more electric power will give more whiteness of rice, but there will be more broken rice too. However, estimating the whiteness needs to use the standard device and needs to be controlled to get the accurate value. In addition, this activity delays the process to set the whiteness value stably. So, to faster estimate the whiteness of rice, this research has developed the prototype device to study the temperature of rice from polishing process plus with the whiteness of rice occurred during the polishing process using the image processing to compare and estimate the whiteness by the standard device. The result from the experiment found that the prototype device has the similar performance to the standard device. It is also faster in measurement and can be used in polishing

Keywords: rice, whiteness temperature.

Pages: 75 - 78 | DOI: 10.15224/978-981-07-6261-2-16

17. ANIMAL TRACKING USING CHECKPOINT METHOD IN WIRELESS SENSOR NETWORK

Authors: CHATCHAI KHUNBOA

Abstract: A small node of wireless sensor with low power consumption is helpful to study the animal behavior and walking. In addition, this system is also capable of tracking movement of animals to prevent loss by using checkpoint method. We propose a simple checkpoint method. In this methodology, we installed multiple base station nodes as wireless sensor fences in farm. Thus, when our animals such as cow come near by a base station, nodes will exchange information such as node id to the base station. Our experiment study shows that the design of the 13 developing nodes can work efficiently with our tracking methodology.

Keywords: Wireless Sensor Network; Animal Tracking.

Pages: 79 - 82 | DOI: 10.15224/978-981-07-6261-2-17

18. A MODEL OF TUTOR AGENT IN COLLABORATIVE E-LEARNING ENVIRONMENT

Authors: TEH NORANIS MOHD ARIS , SALISU MUHAMMAD SANI

Abstract: A collaborative e-learning environment is made up of participants that are remotely placed, who for their diverse social or geographical reasons could not be able to attain their educational goals in the same physical environment. In such collaborating environments, students need to interact and communicate with each other, share their common experiences and solve common problems. This may sometimes results to many collaboration conflicts that may require the intervention by a teacher. Managing such web integrated environments by a human teacher will no doubt be tedious, less efficient and at the same time consuming. The aim of this paper is to introduce a multi-agent approach to model the tutor component by substituting the human teacher with an intelligent tutor agent in order to improve the supervision and mediation against collaboration conflicts tasks of the teacher in such environment.

Keywords: Tutor agent, ITS, e-learning

Pages: 209 - 213 | DOI: 10.15224/978-981-07-6261-2-44

19. AN ADAPTIVE ZERO-WATERMARKING APPROACH FOR TEXT DOCUMENTS PROTECTION

Authors: MUHAMMED N. KABIR , OMAR TAYAN , YASSER M. ALGINAHI

Abstract: This paper presents a new approach to addresses the problems associated with text documents protection, such as copyright protection and content verification. This problem has not been investigated much for text media and most of the work available in literature is based on multimedia forms. Therefore, due to the large amount of text documents available and with the extensive use of the Internet to distribute such documents it becomes essential to protect and secure information delivered through the Internet. Few techniques have been proposed to attain this goal; however, they are not sufficient to protect sensitive documents such as the Holy Quran. This paper presents a new adaptive approach based on zero-watermarking for highly-sensitive documents in order to achieve content verification and authentication without physically modifying the cover-text in anyway. Finally, this work is anticipated to open new research directions in text and multimedia watermarking.

Keywords: security; protection; text-documents; zero- watermarkin

Pages: 205 - 213 | DOI: 10.15224/978-981-07-6261-2-43

20. SEMANTIC SIMILARITY MEASURE FOR GRAPH-BASED SENTENCES

Authors: NUR AZZAH ABU BAKAR , SITI SAKIRA KAMARUDDIN , YUHANIS YUSOF

Abstract: Graphical text representation method attempts to capture the syntactical structure and semantics of documents. As such, they are the preferred text representation approach for a wide range of problems namely in natural language processing, information retrieval and text mining. In a number of these applications, it is necessary to measure the similarity between knowledge represented in the graphs. In this paper, we present semantic similarity measure to compare graph based representation of sentences. The proposed method incorporates computational linguistic method to obtain syntactical information prior to representation with graph. Word synonyms are embedded in the graph representation to support semantic matching. In this paper, we present our idea and initial results on the feasibility of the proposed similarity measurement method.

Keywords: semantic similarity measure, graph based text representation, sentence similarity, word synonyms

Pages: 201 - 204 | DOI: 10.15224/978-981-07-6261-2-42

21. A REQUIREMENTS MODEL FOR REQUIREMENTS MANAGEMENT TOOL TO SUPPORT SMALL AND MEDIUM PROJECTS

Authors: AZIDA ZAINOL , SAAD MANSOOR

Abstract: Presently, there are many requirements management tools available in the market. However, these tools are expensive, complicated, and difficult to learn as well as too sophisticated for small and medium projects. Thus, this paper attempts to describe a model of a requirements management tool that is suitable for small and medium projects (RMT-SMP) as well as suits for the Malaysia software industry. The model is known as requirements model which provides a complete guidance to designer and engineers. The research method involves the process of identifying and gathering the elements for the requirements management tool. After that, the elements are analyzed in the requirements analysis and modeling phase. In this phase, the requirements are identified and documented using UML and requirements specification. The requirements model which consists of several UML diagrams are developed to visualize the requirements for the tool. The requirements model is verified by using a prototype. The p

Keywords: Software requirements, software engineering, requirements model, requirements management, requirements management tool

Pages: 196 - 200 | DOI: 10.15224/978-981-07-6261-2-41

22. AN APPROACH FOR MODEL BASED PROGRAMMING USING LABVIEW

Authors: ANANDITA CHAKRABORTY , KOCHALEEMA K H , USHA D , V K AGRAWAL

Abstract: The purpose of this paper is to present a detailed description of model based programming (MBP) approach for addressing problems associated with designing complex control systems. Text-based programming tools are pooled with lengthy paths in designing the complex system. With this view in consideration, the concept of graphical programming language is evolved. The graphical languages provide simplicity which can be easily manipulated by the user in an interactive way. These languages use specific spatial grammar for program construction. Lab VIEW being a graphical programming language supports system design platform. Such a platform provides engineers with the tools needed to create and put forth measurements and control system. With its built-in engineering-specific libraries of software functions and hardware interfaces, one can program mathematical model instead of writing text codes. The above said lesson is illustrated by considering a case study i.e., design of Automatic Gain Con

Keywords: Model Based Programming, Automatic Gain Controller, Embedded Systems.

Pages: 191 - 195 | DOI: 10.15224/978-981-07-6261-2-40

23. A HYBRID COMPETITIVE GENETIC ALGORITHM MODELS IN STOCK MARKET PREDICTION

Authors: V. SHANTHI , M.P. RAJAKUMAR

Abstract: Stock market prediction (SMP) plays an important role in the modern era for any economy which is on the development phase. Genetic Algorithm (GA) is an evolutionary algorithm that is useful for solving problems which are too complex in nature. This paper surveys different GA models that have been experimented in stock market prediction with special enhancement techniques used with them to improve the prediction accuracy. The classification is made in terms of GA with two layer, multilayer, neural network variants and modified evolutionary algorithms. Through the surveyed paper it is shown that the performance of GA excels when integrated with other machine learning algorithms.

Keywords: classification, enhancement technique, genetic algorithm, prediction accuracy

Pages: 187 - 190 | DOI: 10.15224/978-981-07-6261-2-39

24. PROMOTE THE USE OF PUBLIC INFORMATION FOR THE KNOWLEDGE SERVICE PLATFORM OF LOD (LINKED OPEN DATA) LINKAGE FOCUSED ON ROK\'S PUBLIC SERVICES EXPORT

Authors: HI-YEOB JOO , HYEOG-IN KWON , YUN-BIN NA

Abstract: In this paper, embodied conceptual schematization for the ‘public service export platform’ building that based on ROK\'s public information. For a more effective use of public information, suggested by linkage of LOD (Linked Open Data). In also, before the gathering of data, for beneficiaries, requirements analysis should precede and existing data reprocessing or missing data should be re-collection. Through this process, would like to propose that it is possible to build more effective knowledge service platform.

Keywords: LOD, Knowledge Service Platform, Public Information, Public Servic

Pages: 182 - 186 | DOI: 10.15224/978-981-07-6261-2-38

25. AN AUTOMATED CONTENT-BASED IMAGE RETRIEVALSYSTEM FORMARINE LIFE IMAGES

Authors: AHSAN RAZA SHEIKH , LYE. M.H , M. F. AHMAD FAUZI , SARINA MANSOR

Abstract: Content based image retrieval (CBIR) has been an active and fast growing research area in both image processing and data mining. Thedynamic nature of CBIRcomplements the drawbacks of Text Based Image Retrieval (TBIR).Malaysia has been recognized with a rich marine ecosystem. Challenges of these images are low resolution, translation, and transformation invariant. In this paper, we have designed anautomated CBIR system to characterize the species for future research.We compared various image descriptors and the combination of multiple features. Our results show that the combination of shape and colour features yields higher precision and recall value. We also proposed segmentation as pre-processing step for our CBIR system. For the automated segmentation, we use the saliency and the region growing methods. Our findings show that the region-growing method has better accuracy.

Keywords: Content-based image retrieval, Region Growing, FD, Zernike Moment, PHOG, Image segmentation

Pages: 177 - 181 | DOI: 10.15224/978-981-07-6261-2-37

26. AN IMAGE ENCRYPTION APPROACH USING QUANTUM CHAOTIC MAP

Authors: A. AKHAVAN , A. AKHSHANI , S-C. LIM , S. BEHNIA , Z. HASSAN

Abstract: The topic of quantum chaos has begun to draw increasing attention in recent years. Dissipative quantum maps can be characterized by sensitive dependence on initial conditions,like classical maps. By using significant properties of quantum chaotic map such as ergodicity, sensitivity to initial condition and control parameter, one-way computation and random like behavior, we present a new scheme for image encryption. Based on all analysis and experimental results, it can be concluded that, the proposed scheme is efficient and secure. Although the chaotic map presented in this paper aims at image encryption, it is not just limited to this area and can be widely applied in other information security fields.

Keywords: novel, encryption

Pages: 171 - 176 | DOI: 10.15224/978-981-07-6261-2-36

27. ENVIRONMENTAL FACTORS INFLUENCING REQUIREMENT ENGINEERING IN GLOBAL SOFTWARE DEVELOPMENT: A REVIEW

Authors: HUMA HAYAT KHAN , MOHD. NAZ’RI BIN MAHRIN , SURIAYATI BT CHUPRAT

Abstract: Today’s software organizations have to operate in an environment which is highly networked. With this it has an increase concern not only for integrating various technologies but also for economic, environmental and social aspects. Environmental factors are considered to be very influential while performing requirement engineering (RE) process in global software development (GSD) paradigm. Our focus in this study is towards environmental aspects of RE in GSD paradigm where the teams are geographically distributed from each other. In specific we want to explore the environmental factors which may impact the software RE process in GSD paradigm. The information used for this identification is taken from the literature by performing systematic literature review (SLR). In order to have unique identification of each of the environmental factor, Grounded theory’s constant comparison and memoing steps are adopted. The initial list of environmental factors may leads to progressive enhancement f

Keywords: Environmental factors, Global Software Development (GSD), Requirement Engineering (RE), Systematic Literature Review (SLR).

Pages: 166 - 170 | DOI: 10.15224/978-981-07-6261-2-35

28. SIMULATED ANNEALING ALGORITHM-BASED SUBCARRIER ALLOCATION FOR MULTIUSER OFDM RELAY SYSTEMS

Authors: WEI-CHEN PAO , YUNG-FANG CHEN

Abstract: Resource allocation for multiuser OFDM relay systems is investigated in this paper. The separate power limits for the base station and the relay station is considered. The resource fairness problems for each user are also presented, including the subcarrier fairness and the proportional end-to-end throughput fairness. This paper introduces a hierarchical scheme to combine the maximum end-to-end throughput and minimum transmit power. The set of the switching levels for the modulation types is applied in this paper. The simulated annealing algorithm is introduced. The methods of the neighborhood search is discussed and compared with two heuristic allocation algorithms. Owing to the characteristic of the relay system, unbalanced throughput among hop links happened. This paper proposed a suitable bit loading approach using water-filling method applied to load bits optimally for each user under the power constraint and the fairness constraints. Each user’s hop links are guaranteed to have t

Keywords: multihop relay, resource allocation, fairness problem, simulated annealing algorithm

Pages: 161 - 165 | DOI: 10.15224/978-981-07-6261-2-34

29. AN EFFICIENT AND SCALABLE SEARCH MECHANISM IN UNSTRUCTURED PEER TO PEER NETWORK

Authors: MD. SOHRAB MAHMUD , MD.NASIM AKHTAR , S.M.G. MORTUZA AZAM

Abstract: Peer-to-peer (P2P) network systems gain a huge popularity due to their scalability and reliability in architectures and search facilities. Basically, most of the real world P2P network is unstructured. Due to their unstructured nature it is often impossible to pre-define the searching criteria. As a solution, flooding scheme is used in most cases. But one major limitation of flooding is its query overhead and unnecessary use of bandwidth. In this paper, we propose a novel mechanism to improve the search efficiency in unstructured P2P networks. The method is based on feedback biased walk. Instead of keeping only the feedback report a peer keeps measuring its rank among the neighbors, this algorithm maintains another rank index for a peer that indicates the reliability to make a successful query hit through that peer. Cumulative Feedback-biased Walk (CF-walk) removes the limitations of unstructured P2P networks based on flooding point and cache based searching, improves the hit rate in c

Keywords: P2P Networks, Unstructured P2P, Feedback- biased walk, Scalable, Rank based

Pages: 157 - 160 | DOI: 10.15224/978-981-07-6261-2-33

30. AN APPROACH FOR SELECTING OPTIMAL INITIAL CENTROIDS TO ENHANCE THE PERFORMANCE OF K-MEANS

Authors: MD. MOSTAFIZER RAHMAN , MD. SOHRAB MAHMUD , MD.NASIM AKHTAR

Abstract: Clustering is the process of grouping data into a set of disjoint classes called cluster. It is an effective technique used to classify collection of data into groups of related objects. K-means clustering algorithm is one of the most widely used clustering techniques. The main puzzle of K-means is initialization of centroids. Clustering performance of the K-means totally depends upon the correctness of the initial centroids. In general, K-means randomly selects initial centroids which often show in poor clustering results. This paper has proposed a new approach to optimizing the designation of initial centroids for K-means clustering. We propose a new approach for selecting initial centroids of K-means based on the weighted score of the dataset. According to our experimental results the new approach of K-means clustering algorithm reduces the total number of iterations, improve the time complexity and also it has the higher accuracy than the standard k-means clustering algorithm.

Keywords: clustering, K-means algorithm,Weighted Score, Data analysis, Initial centroids, Improved K-means

Pages: 152 - 156 | DOI: 10.15224/978-981-07-6261-2-32

31. A MULTI-AGENT SYSTEM FOR COMPUTATIONAL PROBLEM SOLVING -A REVIEW

Authors: MARYAM RAJABI , TEH NORANIS MOHD ARIS

Abstract: Computational problem solving is taken into account as the first step before source code development. However, novice students face difficulties in understanding problem statements and transforming them to computational problem solving techniques. This requires the understanding of fundamental programming concepts. It is very important to cater this problem from the beginning before writing the source codes. This article reviews current studies on the designed environments for problem solving and the possibility to propose a new architecture for computational problem solving utilizing multi-agent technology.

Keywords: Multi-Agent, Computational Problem Solving, Computer Programming.

Pages: 147 - 151 | DOI: 10.15224/978-981-07-6261-2-31

32. GENSRS: GENERATION OF SOFTWARE REQUIREMENTS SPECIFICATION FROM USE CASE DIAGRAM AND SEQUENCE DIAGRAM

Authors: MOHAMMED RIYAD ABDULLAH , ROSZIATI IBRAHIM

Abstract: The reverse engineering process used to recover the requirements, and the experience gained during the study are reported. The object oriented software development is used because objects are more natural and classes of objects can be reused. The phase in OOSD is requirements analysis, design, implementation and testing. Software Requirements Specification (SRS) is a detailed description for functional and non-functional requirements of the system to be developed. GenSRS is a tool that is able to generate Software Requirements Specification (SRS) automatically according to system’s requirements. In this paper, the focus is only two specific diagrams, use case diagram and sequence diagram. These diagrams are used for editing and drawing diagrams and also to check the correctness as well as consistency between diagrams. The systems’ requirements are transformed using use case diagram and sequence diagram to generate SRS and save on TXT file.

Keywords: Software Requirements Specification (SRS), Requirements Engineering (RE), Natural Language (NL), Natural Language Syntax and Semantics (NALASS)

Pages: 142 - 146 | DOI: 10.15224/978-981-07-6261-2-30

33. TEACHING AL-QURAN VIA MULTIMEDIA INSTRUCTIONAL DESIGN: AN EMPIRICAL RESEARCH

Authors: DAW ABDULSALAM ALI DAW , OMAR IBRAHIM MASSOUD HAMMZA , QAIS FARYADI

Abstract: This empirical research will develop an effective multimedia instructional design called Al-Furqan courseware to teach the Holy-Quran to students’ in primary schools. The research scope will involve the teaching of the Holy-Quran to Libyan students’ who are in the 5th grade at primary school in Malaysia. The main objective of this study is to illustrate an effective learning method that could assist Libyan students to learn the Holy-Quran effectively and efficiently, to the extent that they are able to read, write and memorize it. This research will utilize the ADDIE model as a concept in teaching the Holy-Quran to Libyan students. The study will apply instructional design models to teach the Holly-Quran. Even there are many teaching aid exist in Malaysia. However, this research will use them as a support to develop the Multimedia instruction to teach the Holly-Quran.

Keywords: ADDIE, Holy-Quran, Primary School, Multimedia Instruction, learning, teaching, education

Pages: 135 - 141 | DOI: 10.15224/978-981-07-6261-2-29

34. INTRUSION DETECTION SYSTEM IN IPV6 NETWORK BASED ON DATA MINING TECHNIQUES – SURVEY

Authors: REDHWAN M. A. SAAD , SELVAKUMAR MANICKAM , SURESWARAN RAMADASS

Abstract: The new internet protocol IPv6 is designed to replace the old internet protocol IPv4. Having the IPv4 address depleted on February 2011, the future of the computer networks and the internet depended on IPv6.The network security is increasingly becoming an important issue. As with any new technology, the initial stages of IPv6 implementation are obligatory to be exploited by cybercriminals. Now Intruders are considered as one of the most serious threats to the internet security. Data mining techniques have been successfully utilized in many applications. Many research projects have applied data mining techniques to intrusion detection. Furthermore different types of data mining algorithms are very much useful to intrusion detection such as Classification, Link Analysis and Sequence Analysis. Moreover, one of the major challenges in securing fast networks is the online detection of suspicious anomalies in network traffic pattern. Most of the current security solutions failed to perform t

Keywords: Network Security, IPv6 Security, Intrusion Detection, Denial of Service, Data mining.

Pages: 130 - 134 | DOI: 10.15224/978-981-07-6261-2-28

35. MAP BUILDING FOR CLUTTERED ENVIRONMENT

Authors: ARASH TOUDESHKI , ABD RAHMAN RAMLI , HABIBU RABIU , M. HAMIRUCE MARHABAN , SITI A AHMAD , YUNUSA ALI S

Abstract: This paper presents a novel approach to scene localization and mapping in indoor environments from the concept of the Image Bag of Words (BOW) technique, where a group of native feature descriptors represents images and are subsequently transformed to a separate set of image words. This approach uses the famed algorithm called Scale invariant Feature Transform (SIFT). To extract distinctive invariant feature for reliable matching, we normalized the images as illumination changes affect the feature extraction. To achieve robust and efficient matching the environment is modelled. Clustering is shown to be appropriate for quantizing these descriptors into clusters based on selected threshold. In this work, we developed an efficient SLAM using images captured from a highly cluttered background. The result indicates a promising trend in using the camera for SLAM implementation.

Keywords: mage Bag of words (BOW), Scale Invariant Feature Transform (SIFT), Clustering, Simultaneous Localization and mapping (SLAM), Images, Environment

Pages: 125 - 129 | DOI: 10.15224/978-981-07-6261-2-27

36. THE BOUNDARY ITERATIVE-DEEPENING DEPTH-FIRST SEARCH ALGORITHM

Authors: ANG LI-MINN , K.P. SENG , L.S. YEONG , LIM KAI L , S. I. CH’NG

Abstract: Boundary searches were introduced in pathfinding aiming to find a middle-ground between memory intensive algorithms such as the A* search algorithm and the cycle redundancy of iterative-deepening algorithms such as the IDA*. Boundary search algorithms allocate a small memory footprint during runtime to store frontier nodes between each iteration to reduce redundancy, while expanding nodes in the same manner as iterative-deepening algorithms. The boundary search algorithm fringe search is an informed search algorithm derived from the IDA* for use in known environments. This paper proposes the boundary iterative-deepening depth-first search (BIDDFS) algorithm, which fills the gap made by the fringe search for uninformed search algorithms. The BIDDFS is optimised to perform blind searches in unknown environments, where simulation experiments found that it is up to more than 3 times faster than standard uninformed iterative-deepening algorithms.

Keywords: pathfinding, uninformed search, iterative- deepening, boundary search

Pages: 119 - 124 | DOI: 10.15224/978-981-07-6261-2-26

37. PERFORMANCE EVALUATION OF CHANNEL EQUALIZATION FOR NONLINEAR CHANNELS USING ANFIS

Authors: AMIRA A. ELBIBAS , ISSMAIL M. ELLABIB , YOUSEF HWEGY

Abstract: Recently, more attentions are paid on the quality of the data transmission and the speed of the digital communication systems. Limitations can face the rate of data transmission over the communication channel because of the effect of the linear and nonlinear distortion. Different equalization techniques are applied to alleviate these effects. In this paper, an equalizer based on the AdaptiveNeuro-Fuzzy Inference System (ANFIS) is proposed for digital channel equalizer. For the performance evaluation, the proposed equalizer is compared with other classical equalizer. The experimental work demonstrates the significant improvement of the performance using ANFIS equalizer over theRadial Basis Function and Least Mean Square equalizers.

Keywords: ANFIS, Channel equalizer, digital communication, inter-symbols interference

Pages: 115 - 118 | DOI: 10.15224/978-981-07-6261-2-25

38. ADOPTION OF BLOOM TAXONOMY IN AUTOMATED QUESTION ANSWERING IN E-LEARNING SYSTEM

Authors: ANBUSELVAN SANGODIAH , LIM EAN HENG , ROHIZA BT AHMAD , WAN FATIMAH BT WAN AHMAD

Abstract: At present, with the growing demand of knowledge economy, fast popularization and development of the World Wide Web, a lot of people are turning to e-learning via web particularly in educational institutions. There are plenty of e-learning systems nowadays and these systems provide functionalities ranging from some simple tools to manage and search a lot of teaching materials to knowledge sharing through online forum discussion. While the online forum discussion promotes exchanging ideas between instructors and students, however due to the job demand of instructors at their workplace and at times being away from their workplace would often result in responses to the students’ questions were not being responded in time. To address the problem, automated response systems in forum discussion have been developed where the system would take the responsibility to respond to questions posed by student in forum discussion in the absence of instructors thus reducing the workload of instructors

Keywords: -E-learning, ontology, Bloom Taxonomy, forum

Pages: 110 - 114 | DOI: 10.15224/978-981-07-6261-2-24

39. ELECTION ROOT NODE OF FLOODING TIME SYNCHRONIZATION PROTOCOL BY VALUE OF NEIGHBOR NODE

Authors: CHATCHAI KHUNBOA , RONNACHAI SIVASR

Abstract: Wireless sensor networks (WSNs) applications, that are similar to that of other distributed systems, and a time-synchronization protocol has been developed. The time synchronization of WSNs is required for coordination and data consistency. To improve accuracy for WSNs by controlling the root node is still a problem. The Flooding Time Synchronization Protocol (FTSP) is a one of protocol for synchronization. FTSP utilizes a simple election process based on minimum node IDs. In this paper, we propose (FTSP) a new election root node method by neighbor node (NB). We analyzed the time synchronization error by calculating the average of the pairwise differences of the reported global times by a new root election. The time average was reduced suggesting FTSP based on neighbor node is more advantages than lower ID and neighbor node method conferred significantly better accuracy than lower ID method.

Keywords: time synchronization; wireless sensor network; Flooding Time Synchronization Protoco

Pages: 107 - 109 | DOI: 10.15224/978-981-07-6261-2-23

40. MULTIPLE ANTENNAS FOR UNDERGROUND-TO-ABOVEGROUND COMMUNICATION IN WIRELESS UNDERGROUND SENSOR NETWORKS

Authors: CHATCHAI KHUNBOA , TANAWAT DANGDRAGOOL , WASU CHAOPANON

Abstract: Receive Signal Strength Indicator (RSSI) is one of performance metrics in wireless communications. The value indicates whether receiver could receive a packet. Since signal can reflex and refract from soil surface, underground nodes may not be able to communicate with aboveground nodes. One way solving this problem is to control the antenna orientation where antenna’s radiation pattern is in an appropriate direction. Therefore, in this work, we develop two types of sensor nodes which are 2-and 3-antenna nodes to improve RSSI values for underground-to-aboveground communications. Results show RSSI values of 2-and 3- antenna have better than those of 1-antenna sensor node approximately 0.85 and 1.43 dBm for manual installation and 2.64 and 6.97 dBm for random installation respectively.

Keywords: Multiple antennas, Wireless Underground Sensor Networks, Antenna orieantation

Pages: 103 - 106 | DOI: 10.15224/978-981-07-6261-2-22

41. PIEZOELECTRIC IN ENERGY HARVESTING SYSTEMS FOR WIRELESS SENSOR NODES

Authors: CHATCHAI KHUNBOA , THONGCHAI CHOTWATTANAKANKUL

Abstract: The purpose of this study is to develop mechanical energy harvesting systems using piezoelectric materials for a wireless sensor node. This system is composed of piezoelectric material for mechanical energy harvesting, a power management circuit, an energy storage and a wireless sensor node. Testing shows that a sensor node can transmit a packet every 2.77 seconds or sleep 16.24 seconds interval with a piezoelectric plate attached with a 10-gram mass at the tip. Therefore, the piezoelectric plate is capable of providing the power for a sensor node.

Keywords: Energy Harvesting Systems, Piezoelectric, Wireless Sensor Node

Pages: 98 - 102 | DOI: 10.15224/978-981-07-6261-2-21

42. A REVIEW STUDY ON THE ASME CRITERIA FOR EVALUATING DATA INTEGRATION APPROACHES

Authors: MD YAZID MOHD SAMAN , MUSTAFA MAN , TG. ALIFF FAISAL TG. AHMAD

Abstract: This paper provides an evaluation of some existing data integrations approaches according to the Patrick Ziegler’s ASME criteria for evaluating. These criteria for evaluating identify the characteristics of integrated approaches and investigate the existing of data integration approaches for their support for user-specific perspectives. Through this review, this paper aims to identify some potential implementation methods and architectures that support for a truly user-specific perspective in the context of the structured, semistructured, and unstructured data integration approaches

Keywords: Information integration, Data integration, Data integration approaches, User-Specific Perspectives.

Pages: 94 - 97 | DOI: 10.15224/978-981-07-6261-2-20

43. TEXT CATEGORIZATION OF INDONESIAN LANGUAGE TEXT DOCUMENTS USING BRACEWELL ALGORITHM

Authors: AINI RACHMANIA , JAFREEZAL JAAFAR

Abstract: With the Internet fast progressing, the number of news documents increases significantly and the demand for easy navigation around the news becomes pivotal. The online news domain needs a classifier that is able to classify news articles accurately at a low cost computation. Apart from that, because it is always updated, the classifier also needs to be able to detect new topic. This paper presents the topic identification and category classification method which enable categorization of news articles and identification of topic as new news arise. During the training phase, keywords are extracted from each document. Then, a document is classified to a predefined category. Lastly, the topic of the document is identified. Testing was conducted on Indonesian news corpus. The result shows that the classifier was able to classified Indonesian text documents with a satisfactory accuracy level as high as 93.84%.

Keywords: text categorization, indonesian text documents, information retrieval, news domain, classsification, Bracewell Algorithm

Pages: 89 - 93 | DOI: 10.15224/978-981-07-6261-2-19

44. FUZZY-BASED INTRUSIONTOLARENCE FOR WEBSERVICES

Authors: DAVOUD MOUGOUEI , MARYAM ESHRAGHI EVARI , WAN NURHAYATI WAN AB. RAHMAN

Abstract: Identifying threats in the stage of requirements engineering is a big and complex challenge for web services development.The challenge even grows when the massive number of security faults grows. In addition, security threats existing in a web service may increase the risk of security failure. An Electronic Portfolio System (EPS) is introduced as a web service to serve as our running example in this paper. To overcome the security threats in the target EPS, the web service has to be flexible and tolerant. EPS should tolerant in presence of inevitable security threats. This study presents a fuzzy-based approach to establish security requirements of the EPS as a web service and make a fault tolerant model for the security requirements of the service. For this purpose, we have applied a goal-based modeling approach. The approach develops an intrusion tolerant model for security requirements. The model is developed based on the formally described model of security faults (SFM). In order to

Keywords: fuzzy syntax; RELAX; goal-based modeling intrusion tolerance; web service security.

Pages: 83 - 88 | DOI: 10.15224/978-981-07-6261-2-18

Popular Proceedings

ESSHBS 2017 - 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ICETM 2023 - 2023

9th International E-Conference on Engineering, Technology and Management

ASET 2017 - 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017 - 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017 - 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017 - 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022 - 2022

8th International E- conference on Engineering, Technology and Management

SEM 2019 - 2019

9th International Conference on Advances in Social Science, Economics and Management Study