Loading...

Proceedings of

International Conference on Advances in Computing, Electronics and Communication ACEC 2013

Date
13-Oct-2013
Location
zurich , Switzerland
Authors
38
ISBN
978-981-07-7965-8

19 Articles Published

1. ENTERPRISE ARCHITECTURE MODEL: AN APPROACH PROPOSITIONA CASE STUDY OF INFORMATION SYSTEMS IN THE HOSPITALITY INDUSTRY

Authors: CARLOS AZEVEDO , MARIO ROMAO , PAULA SERDEIRA AZEVEDO

Abstract: This paper discusses the role of enterprise architecture representation, in the context of ERP (Enterprise Resource Planning) information systems, as an instrument for an organization to reflect on itself and develop its business strategies and respective alignment with Information Systems. The paper proposes a representation model of enterprise architecture, as a tool for recommending good practices, and it emerges from a case study undertaken in the context of and investigation on advantages and limitations of ERP systems in the hospitality industry.The proposed approach is also inspired on other academic or market propositions suitable for the objectives of the investigation. It consists on a set of items representing the steps that must be taken by top managers and IS managers.

Keywords: Enterprise Architecture; Information Systems; Hospitality and Tourism.

Pages: 1 - 6 | DOI: 10.15224/978-981-07-7965-8-01

2. ENERGY COMPARISON OF DIFFERENT NOC ROUTERS

Authors: ANUPAM JAMATIA , BIMAN DEBBARMA , S. N. PRADHAN

Abstract: Energy consumption in an SOC is increasing as the level of integration is increasing. NOC routers are responsible for consuming major part of the energy consumed by the system. This paper shows a comparison of energy consumption among different routing techniques.

Keywords: NOC, routing, energy, packet injection rate.

Pages: 12 - 14 | DOI: 10.15224/978-981-07-7965-8-03

3. PREDICTED AND OBSERVED ANALYSIS OF MICRO PHOTOVOLTAIC STAND-ALONE POWER PLANT

Authors: S. BHAKTA , S. BHATTACHARJEE

Abstract: Due to global energy crisis and environmental reasons, the importance of renewable energy and its popularity are increasing day by day. Amongst the all renewable energy resources, solar photovoltaic (PV) plants are extensively adopted in many countries for power generation. The paper presents the annual performance prediction of a 1.2 kWp PV power plant along with some monitored results from such existent power plant

Keywords: PV power plant, load profile, solar radiation, PV power production

Pages: 15 - 19 | DOI: 10.15224/978-981-07-7965-8-04

4. TECHNOLOGY ENHANCED INTERACTION FRAMEWORK : ISSUES IN EVALUATING A NEW SOFTWARE DESIGN FRAMEWORK AND METHOD

Authors: KEWALIN ANGKANANON , LESTER GILBERT

Abstract: A Technology Enhanced Interaction Framework has been developed to support designers and developers designing and developing technology enhanced interactions for complex scenarios involving disabled people. A literature review showed that while there have been many studies concerned with methods for evaluating software designs few studies addressed ways to evaluate software design methods. Issues of motivation, time, and understanding when validating and evaluating the Technology Enhanced Interaction framework were identified through a literature review and questionnaires and interviews with experts. The advantages and disadvantages of a range of experimental design approaches to sourcing scenarios, gathering requirements and designing solutions were considered. Future work will consist of the implementation of a motivating user evaluation approach involving both self-evaluations by designers and expert evaluations that learns the lessons from others’ experiences of software method eval

Keywords: interaction framework, software design, evaluation

Pages: 20 - 24 | DOI: 10.15224/978-981-07-7965-8-05

5. TECHNOLOGY ENHANCED INTERACTION FRAMEWORK : ISSUES IN EVALUATING A NEW SOFTWARE DESIGN FRAMEWORK AND METHOD

Authors: KEWALIN ANGKANANON , LESTER GILBERT

Abstract: A Technology Enhanced Interaction Framework has been developed to support designers and developers designing and developing technology enhanced interactions for complex scenarios involving disabled people. A literature review showed that while there have been many studies concerned with methods for evaluating software designs few studies addressed ways to evaluate software design methods. Issues of motivation, time, and understanding when validating and evaluating the Technology Enhanced Interaction framework were identified through a literature review and questionnaires and interviews with experts. The advantages and disadvantages of a range of experimental design approaches to sourcing scenarios, gathering requirements and designing solutions were considered. Future work will consist of the implementation of a motivating user evaluation approach involving both self-evaluations by designers and expert evaluations that learns the lessons from others’ experiences of software method eval

Keywords: interaction framework, software design, evaluation

Pages: 20 - 24 | DOI: 10.15224/978-981-07-7965-8-05

6. PERFORMING VENUE INFORMATION RETRIEVAL FROM RECORDED SOUNDTRACKS-AN ACOUSTIC FEATURE EXTRACTION APPROACH

Authors: FRANCIS F. LI

Abstract: Keywords and descriptors are important metadata for multimedia content. Such metadata are associated with the programme, and are generated to facilitate indexing, search, clustering, archiving, semantic analysis and many other potential applications. Information about performing or recording venues provides a useful cue for content search and authentication, but is difficult to obtain form the media content. This paper proposes to determine the recording venues from extracted room acoustic features contained in the soundtracks. Room acoustic decay curves are obtained via maximum likelihood estimation from recording. The decay curve is a statistical description of the impulse response of a room, and provides a good discriminator for recording venues. Machine learning is then performed on the estimated decay curves to make the decision. This paper presents the rationale of the method, describes the algorithms and validates the method by simulations.

Keywords: acoustic feature, recording venue, maximum liklihood estimation, machine learning, media content

Pages: 31 - 35 | DOI: 10.15224/978-981-07-7965-8-07

7. CLOUD COMPUTING, SECURITY ISSUES AND POTENTIAL SOLUTION BY USING ICMETRICS OR BIOMETRICS BASED ENCRYPTION

Authors: MASUDUR RAHMAN , WAH MAN CHEUNG

Abstract: Cloud computing is the emerging field of computer networking which is providing the opportunities to use hardware, infrastructure or application as a service over the cloud. Many organisations are considering cloud computing as cost effective, secure and suitable solution for their needs. However security concerns are involved with using cloud service provided by the third party. In this paper, we investigate the cloud computing, study on security awareness of the cloud service provides, critical security threats involved with cloud computing, good practices to ensure the security within cloud and the possibility of using ICMetrics or Biometrics based encryption to provide efficient security within cloud computing environment.

Keywords: Cloud computing, cloud computing threats and risks, good security practice for cloud computing, ICMetrics.

Pages: 36 - 41 | DOI: 10.15224/978-981-07-7965-8-08

8. RANDOM OR PSEUDO-RANDOM TESTING OF DOWNLOAD SERVICES FOR GEODATA

Authors: JAN RUZICKA , JIRI ARDIELLI

Abstract: The paper discuss one of problems that appear when testing download services (web feature service, WFS) for geodata. The paper follows results of performance tests of download services of Czech Office of Surveying, Mapping and Cadaster (COSMC) according to INSPIRE requirements. Methodology of testing used for performance tests of download services of COSMC was based on expected user behavior, but generally the performance tests of geoweb services are based on randomly generated inputs. The paper compares these two approaches for download services

Keywords: performance testing, spatial data, download service, INSPIRE

Pages: 42 - 45 | DOI: 10.15224/978-981-07-7965-8-09

9. INTELLIGENT INTRUSION DETECTION APPROACH FOR SCADA SYSTEM PROTECTION

Authors: J. JIANG , S. L. P YASAKETHU

Abstract: In traditional intrusion detection systems (IDS) used for critical infrastructure protection, such as SCADA (Supervisory Control and Data Acquisition) systems, intrusion alerts are analyzed by human analysts (security analysts). They evaluate the alerts and take decisions accordingly. Nevertheless, this is an extremely difficult and time consuming task as the number of alerts generated could be quite large and the environment may also change rapidly. This makes automated detection techniques more efficient for intrusion detection than human analysts. This paper we describes a new European Framework-7 funded research project, CockpicCI, and introduce an intelligent rick detection and analysis technique for Critical Infrastructures (CI). Results show that the proposed OCSVM (One Class Support Vector Machine) based intrusion detection approach can be effectively used to detect both known and unknown attacks.

Keywords: Critical infrastructures, Anomaly detection and Cyber-security.

Pages: 52 - 56 | DOI: 10.15224/978-981-07-7965-8-11

10. DETECTION OF EPILEPTIC SEIZURES USING LABVIEW

Authors: NAGESHWAR V , Y.PADMASAI

Abstract: A significant portion of the population (0.5% - 0.8%) suffers from epilepsy. This study is an effort to predict seizures in epileptic patients. Electroencephalogram (EEG) continues to be an attractive tool in clinical practice due to its non-invasive nature and its real time depiction of brain function. The Short time Fourier Transform (STFT) is used for time frequency analysis of signals. In the present analysis, the authors adopted an effective technique for the denoising of EEG signals corrupted by non-stationary noises using Undecimated Wavelet Transform (UWT) which is implemented through Laboratory Virtual Instrumentation Engineering Workbench LabVIEW platform This Technique has overcome some of the short comings of the STFT by performing a multi - resolution analysis of signals. In the Wavelet Transform, high frequency components are analyzed with a sharp time resolution than low frequency components. This is the most desirable property, especially in analyzing fast transient wav

Keywords: Electroencephalogram, Epilepsy and wavelet transform, LabVIEW.

Pages: 61 - 65 | DOI: 10.15224/978-981-07-7965-8-13

11. DIABETES MANAGEMENT FOR UNDER SERVED POPULATIONS: A MOBILE TECHNOLOGY SOLUTION

Authors: BANDER ALKHUDAIRI

Abstract: In the Kingdom of Saudi Arabia (“KSA”), geographic isolation, culture, and a unequal distribution of healthcare resources have created severe shortages in healthcare access. A large part of KSA\'s rural population, including women and children, expatriate workers and those with disabilities lacks access to any institutional care, lack information about healthy behaviors, and lack finances to pay for care. These factors have combined to produce an alarming growth in chronic disease among these populations in the KSA, particularly Type II Diabetes. In emerging markets like the KSA that have poorly distributed healthcare resources, but DO have widespread mobile connectivity and high mobile device penetration, an immediate solution to this challenge is mobile health. The principal aim of this study is to explore the potential for “mHealth” to impact chronic disease (diabetes) for patients in Saudi Arabia. This paper examines the role of an mHealth diabetes management app in addressing the

Keywords: Health, Saudi Arabia, remote populations, diabetes

Pages: 57 - 60 | DOI: 10.15224/978-981-07-7965-8-12

12. DATA LEAK PREVENTION USING A NEW HYBRID SECURITY MODE

Authors: KAMRAN MOROVATI , SANJAY KADAM

Abstract: This paper introduces a new security model which reduces the risk of unauthorized data disclosure in an organization’s network. This model will protect confidential information against unauthorized disclosure. The model is effective at preventing intentional and/or unintentional data propagation (e.g. by a disgruntled employee or by means of malware, etc.). The proposed model is a combination of traditional cryptographic-based security methods and Meta-data embedding. The model uses the public key infrastructure cryptosystem and document watermarking technique to attach auxiliary security features (e.g. hash value) into the sensitive documents in order to prevent users from disclosing them without authorization.

Keywords: Data Leakage Prevention, Public Key Infrastructure, Digital Certificate, Document Watermarking, Security Models.

Pages: 66 - 70 | DOI: 10.15224/978-981-07-7965-8-14

13. ARABIC TEXT CATEGORIZATION USING ROCCHIO MODEL

Authors: ABDUELBASET GOWEDER , KILIAN STOFFEL , MOHUMMED ELBOASHI

Abstract: Automatic text categorization is considered an important application in natural language processing. It is the process of assigning a document to predefined categories based on its content. In this research, some well-known techniques developed for classifying English text are considered to be applied on Arabic. This work focuses on applying the well-known Rocchio (Centroid-based) technique on Arabic documents. This technique uses centroids to define good class boundaries. The centroid of a class c is computed as center of mass of its members. Arabic language is highly inflectional and derivational which makes text processing a complex task. In the proposed work, first Arabic text is preprocessed using tokenization and stemming techniques. Then, the Rocchio Algorithm is adopted and adapted to be applied to classify Arabic documents. The implemented algorithm is evaluated using a corpus containing a set of actual documents. The results show that the adapted Rocchio algorithm is applicab

Keywords: Rocchio algorithm, Centroid-based Algorithm, Text Mining, Machine Learning, Arabic Text Categorization, Arabic Text Classification.

Pages: 71 - 78 | DOI: 10.15224/978-981-07-7965-8-15

14. NOVEL FIRST RESPONDER SCRIPT AS A TOOL FOR COMPUTER FORENSICS

Authors: ALEKSANDAR RISTESKI , MARJAN STOILKOVKSI , MITKO BOGDANOSKI

Abstract: The computer forensics as a branch of digital forensic pertaining to legal evidence found in computers and digital storage media. In order forensic acquisition to be more reliable it must be performed on computers that have been powered off. This type of forensics is known as ‘traditional’ or \'dead\' forensic acquisition. However, this type of forensic cannot be used to collect and analyze the information which is not on the hard disk, or encrypted data. The disadvantages of the dead forensics can be overcome handling a live forensics acquisition process. There are many commercial and freeware tools which can be used to provide information based on live forensics acquisition. The problem with this tools is that in many cases the examiner cannot explain the script functionality and generated results and information. Because of this reason there is a increased need for developing and using script which can be easy explained and adapted to any analysis which should be made by the examine

Keywords: computer forensics, script, response, examiners, analysis, Linux

Pages: 79 - 83 | DOI: 10.15224/978-981-07-7965-8-16

15. DESIGNING AND BUILDING HIGH VOLTAGE POWER SUPPLIES

Authors: MUHSIN TUNAY GENCOGLU

Abstract: High voltage researches and testing is more lively than ever and a lot of activity is expanded on the World in a great number of high voltage laboratories. For present industry production to perform fast advances toward more reliable, longer life, cost-effective power supplies, a better understanding and application of tests for electrical performance, mechanical, thermal, and environmental tensions must be imposed by the statement of work and applicable specifications. This study shows the summary which outlines many requirements and specifications that are either unnoticed or taken for granted during the evaluation and production of high voltage power supplies (HVPS). The study contains the design summary, production and manufacture of prototype of the HVPS. Also high voltage guidelines to minimize failures were researched in the study.

Keywords: high voltage, power supply, designing

Pages: 84 - 88 | DOI: 10.15224/978-981-07-7965-8-17

16. APPLICATION OF MEDICAL INFORMATICS IN ONLINE MEDICAL DATABASE SYSTEM AND INTERNATIONAL MEDICAL CARD USING SINGLE WINDOWS INFORMATION SERVICE SYSTEM IMC-SWISS

Authors: JITENDER SOLANKI

Abstract: The medical informatics is a combination of information technology and health care. It deals with the resources, devices, and methods to optimize the acquisition, storage, retrieval and use of information in medical science.It is also known as health informatics.The online medical database system is such a database where all type of health activities will be stored in online database and this can be access by card. In this paper it proposes the how this card uses for access medical related activities. It is just like ATM card but it deals only health issue. The name of the card is International Medical Card (IMC). It is a example of medical informatics in which all detail of health are stored in the online database and can access by International Medical Card (IMC).

Keywords: International medical card, Online database, Patients, Doctors, Pathology laboratory,

Pages: 98 - 106 | DOI: 10.15224/978-981-07-7965-8-20

17. APPLICATION OF MEDICAL INFORMATICS IN ONLINE MEDICAL DATABASE SYSTEM AND INTERNATIONAL MEDICAL CARD USING SINGLE WINDOWS INFORMATION SERVICE SYSTEM IMC-SWISS

Authors: JITENDER SOLANKI

Abstract: The medical informatics is a combination of information technology and health care. It deals with the resources, devices, and methods to optimize the acquisition, storage, retrieval and use of information in medical science.It is also known as health informatics.The online medical database system is such a database where all type of health activities will be stored in online database and this can be access by card. In this paper it proposes the how this card uses for access medical related activities. It is just like ATM card but it deals only health issue. The name of the card is International Medical Card (IMC). It is a example of medical informatics in which all detail of health are stored in the online database and can access by International Medical Card (IMC).

Keywords: International medical card, Online database, Patients, Doctors, Pathology laboratory,

Pages: 98 - 106 | DOI: 10.15224/978-981-07-7965-8-20

18. TECHNOLOGY ENHANCED INTERACTION FRAMEWORK : ISSUES IN EVALUATING A NEW SOFTWARE DESIGN FRAMEWORK AND METHOD

Authors: KEWALIN ANGKANANON , LESTER GILBERT , MIKE WALD

Abstract: A Technology Enhanced Interaction Framework has been developed to support designers and developers designing and developing technology enhanced interactions for complex scenarios involving disabled people. A literature review showed that while there have been many studies concerned with methods for evaluating software designs few studies addressed ways to evaluate software design methods. Issues of motivation, time, and understanding when validating and evaluating the Technology Enhanced Interaction framework were identified through a literature review and questionnaires and interviews with experts. The advantages and disadvantages of a range of experimental design approaches to sourcing scenarios, gathering requirements and designing solutions were considered. Future work will consist of the implementation of a motivating user evaluation approach involving both self-evaluations by designers and expert evaluations that learns the lessons from others’ experiences of software method eval

Keywords: interaction framework, software design, evaluation

Pages: 20 - 24 | DOI: 10.15224/978-981-07-7965-8-05

19. REAL TIME DIGITAL ANALYSIS AND MEASUREMENT

Authors: C. MASCARENAS-PEREZ-INIGO , M. BAKKALI

Abstract: We present in this paper a powerful low-cost method for real-time digital signal analysis and measurement based Discrete Fourier Transform. This measurement system needs understanding the mathematical background and the computational implementation, using the adequate cables, connectors, as well as having knowledge and experience for interpreting the results obtained. This paper tries to understand the fundamental concepts in DFT-based measurements, providing a better comprehension of the measured parameters, procedures, and interpreting the resulting data. We attempt to make this paper summarized as much as possible; at the same time, to treat the most important aspects showing the different stages implemented into the system developed.

Keywords: Signal Analysis, Signal Measurement, DFT, FFT, Leakage, Window, Averaging.

Pages: 25 - 30 | DOI: 10.15224/978-981-07-7965-8-06

Popular Proceedings

ESSHBS 2017 - 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ICETM 2023 - 2023

9th International E-Conference on Engineering, Technology and Management

ASET 2017 - 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017 - 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017 - 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017 - 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022 - 2022

8th International E- conference on Engineering, Technology and Management

SEM 2019 - 2019

9th International Conference on Advances in Social Science, Economics and Management Study