Loading...

Proceedings of

International Conference on Advances In Computing, Electronics and Electrical Technology CEET 2014

Date
03-Aug-2014
Location
Kuala Lumpur , Malaysia
Authors
116
ISBN
978-1-63248-005-7

38 Articles Published

1. MAMMOGRAPHIC MASS CLASSIFICATION BY USING A NEW NAïVE BAYESIAN CLASSIFIER

Authors: MURAT KARABATAK

Abstract: Mammography is considered as the most effective method for breast cancer screening. It is effective, but it suffers from the low positive predictive value of breast biopsy resulting from mammogram interpretation leads to approximately 70% unnecessary biopsies with benign outcomes. Recently, several computer-aided diagnosis (CAD) systems have been proposed to reduce the high number of unnecessary breast biopsies. Thus, in this paper, we propose a decision support system for helping the physicians in their decision to perform a breast biopsy on a suspicious lesion seen in a mammogram or to perform a short term follow-up examination instead. To accomplish this aim, we used a weighted Bayesian classifier. Naïve Bayesian (NB) is known to be the simple classifier and there have been so many applications in the literature. We conduct several experiments to evaluate the performance of the weighted NB on mammographic mass classification database. The experiments were realized with 5-fold cross

Keywords: NB classifier, Weighted NB classifier, Mammographic Mass Classification, Performance evaluation tests.

Pages: 119 - 123 | DOI: 10.15224/978-1-63248-034-7-48

2. REAL-TIME MOVING OBJECT TRACKING USING MULTI-CHANNEL UWB ISAR

Authors: JIWOONG YU , JONAS MATUZAS , MIN-HO KA , SE-YEON JEON , TAE-YUN LEE

Abstract: Real-time moving object tracking using radar is a technology in high demand because of the penetration properties of radar signals and the advantage in the aspect of security, when compared to conventional optical systems. In this research, an ultra-wideband impulse signal was used to achieve high resolution in inverse synthetic aperture radar images. It is possible to track the position of moving objects in real-time by using one transmitting antenna and multi receiving antenna.

Keywords: UWB, ISAR, real time, tracking, multi-channel

Pages: 140 - 144 | DOI: 10.15224/978-1-63248-034-7-52

3. MULTI-SCHEDULING TECHNIQUE FOR REAL-TIME SYSTEMS ON EMBEDDED MULTI-CORE PROCESSORS

Authors: ABDULKADIR YASAR , KAYHAN M. IMRE

Abstract: Recent studies have shown that today's embedded systems require not only real-time ability but also general functionality for running non-real-time applications. In order to provide these two functionalities together on the same system, several techniques and frameworks have been proposed. Integrating different type operating systems on a multi-core processor is one of the most favourable approaches for system designers. However, this heterogeneous approach has some drawbacks. This paper introduces Multi-scheduling method for multi-core hardware platforms without running heterogeneous operating systems concurrently. In this technique, there are two schedulers in single operating system. One is for real-time applications and the other is for general or non-real-time applications. In Multi-scheduling approach, real-time and non-real-time applications run in the same operating system environment so the implementation and maintenance of the system become easier than heterogeneous approache

Keywords: Multi-core, Multi-Scheduling, Embedded Systems, Real-time, Scheduling, Operating System, Symmetric- multiprocessing

Pages: 6 - 10 | DOI: 10.15224/978-1-63248-005-7-28

4. QUERY OPTIMIZATION METHODS FOR IMPROVE QUERY EXECUTION TIME USING SQL TECHNOLOGIES

Authors: AHMED KHALAF ZAGER ALSAEDI

Abstract: Generally, the query optimizer cannot be accessed directly by users: once queries are submitted to database, and parsed by the parser, they are then passed to the query optimizer where optimization occurs. Each different way typically requires different processing time. The purpose of query optimization, which is an automated process, is to find the way to process a given query in minimum time. According to the basic operation of query such as scanning, aggregation, join. we present a four type of query a cross different size of tables to explain query performing through execution time to improve query execution time during optimization

Keywords: Query optimization, Query execution time, SQL server 2012 technologies

Pages: 17 - 20 | DOI: 10.15224/978-1-63248-005-7-30

5. QUANTUM-INSPIRED EVOLUTIONARY ALGORITHM TO SOLVE GRAPH COLORING PROBLEM

Authors: MOZAMMEL H. A. KHAN

Abstract: Graph Coloring Problem (GCP) bears an enormous significance to the researchers in the field of soft computing. In this paper, we demonstrate a Quantum-Inspired Evolutionary Algorithm (QEA) to solve GCP. We use two dimensional arrays of Q-bits called Q-bit individual to produce binary individual. Q-gate operation is applied as a variation operator on Q-bit individuals. In traditional evolutionary algorithm (EA) for GCP, k-coloring approach is used and the EA is run several times for decreasing value of k until lowest possible k is reached. In our QEA, we start with the number of colors equal to the theoretical upper bound of the chromatic number, which is maximum out-degree + 1, and during evolution some colors are made unused to reduce the number of color in each generation. As a result, solution is found in a single run. We test 36 datasets from DIMACS benchmark and compare the result with several recent works. For five datasets, our algorithm obtains better solution than other.

Keywords: quantum-inspired evolutionary algorithm (QEA), graph coloring problem (GCP), combinatorial optimization, Q- bit representation, Q-gate.

Pages: 17 - 25 | DOI: 10.15224/978-1-63248-005-7-31

6. A REVIEW OF NON –INVASIVE JAUNDICE DETECTION USING OPTICAL TECHNIQUE IN NEONATES

Authors: NURASHLIDA ALI , SITI ZARINA MOHD MUJI , ZUHAIRIAH ZAINAL ABIDIN

Abstract: This paper, introduced a non-invasive jaundice detection using optical technique. Jaundice is a condition when baby skin, eyes and other tissues became yellow. The yellow came from bilirubin pigment that bound with albumin before breakdown. If too many breakdowns of hemoglobin in one time, liver couldn’t excreted all bilirubin. For babies, bilirubin will cause brain damage if its too high more than 10mg/dL inside them. It happened when bilirubin became toxic dice and go to the brain that cause death. There are two techniques of detection bilirubin namely invasive technique and non-invasive technique. The differences of this technique are invasive technique was painful then non-invasive technique and it have to take some blood to be analyzed. Both methods used the principle of Lambert law as references and guide to measure bilirubin inside babies

Keywords: Neonatal Jaundice, Wavelength, Bilirubin, Non- invasive.

Pages: 26 - 28 | DOI: 10.15224/978-1-63248-005-7-32

7. IMPLEMENTATION OF AN EMBEDDED SYSTEM HANOI FOR TOWER OF HANOI PUZZLE

Authors: A S ZAFORULLAH MOMTAZ , NAHIDA SULTANA CHOWDHURY , S M SALIM REZA

Abstract: This paper provides a Natural algorithm that is capable enough to solve TOH puzzle. In this research work an embedded system is implemented named as Hanoi which functionalities are based on NA. In practical state this Hanoi capable to provide solution for multiple towers and multiple disks problem by using minimum number of operations and minimum cost path. In this paper, provided solution is for six towers and five disks have been shown

Keywords: Arduino Uno R3, Natural Function, Natural Algorithm, Robotic Arm

Pages: 29 - 33 | DOI: 10.15224/978-1-63248-005-7-33

8. A SENTIMENT ANALYSIS MODEL USING ONTOLOGY-ENRICHED CONCEPTUAL GRAPH AND OPERATIONAL RULES

Authors: THO THANH QUAN , TUNG THANH NGUYEN

Abstract: This paper presents a sentiment analysis model which combines conceptual graph enriched by domain ontology which expert-specified operational sentiment rules.Whereas conceptual graph and domain ontology allows automatic shalow parsing of natural sentences, operatioanal sentiment rules allows the sentiment system captures the linguistic knowledge provided by experts and integrates this knowledge seamlessly into the sentiment analysis process. We found that domain ontologies are extremely helpful when applied in specific domains. In the meantime, operational sentiment rules make our system achieve better performance as compared to data mining techniques.

Keywords: Sentiment analysis, conceptual graph, domain ontology, operational sentiment rules.

Pages: 34 - 38 | DOI: 10.15224/978-1-63248-005-7-34

9. MULTIPLE OBJECTS TRACKING UNDER OCCLUSIONS: A SURVEY

Authors: H.A. ALI, M.A. MOHAMED , M.S. DIAB, M.S.EL-SAYED

Abstract: long term occlusion is a most important challenge in any multiple objects tracking system. This paper presents a literature survey of an object tracking algorithms in a fixed camera situation that have been used by others to address the long term occlusion problem. Based on this assessment of the state of the art, this paper identify what appears to be the most promising algorithm for long term occlusion that was succeeds in handling interacting objects of similar appearance without any strong assumptions on the characteristics of the tracked objects. But this algorithm failed to handle objects of too complex shapes and appearance, and the tracking results was affected by successfully of background subtraction. This paper presents a proposed solution to these failed points.

Keywords: object trackingt; long-term occlusion; background subtraction

Pages: 39 - 45 | DOI: 10.15224/978-1-63248-005-7-35

10. AN EXPLORATORY RESEARCH ON FACTORS INFLUENCING INDIVIDUALS’ ADOPTION OF INTERNET BANKING IN TURKEY

Authors: BURAK MERDENYAN , MICHELLE YEO SOOK CHIN , ONUR CIKRIKCILI , Y. BATU SALMAN

Abstract: Understanding the primary determinants of internet banking (IB) adoption has become crucial both for banks and clients. The factors that influence the use of this technology in Turkey were discussed within the framework of a widely used model; Technology Acceptance Model (TAM). Trust and self-efficacy were added as external variables to improve the strength of the modified model. We designed a questionnaire and used it to survey randomly selected sample of active IB users in Istanbul. It was collected 469 valid responses. The inner relationships between all variables were examined. It was found that the perceived usefulness, perceived ease of use, and self-efficacy have a positive and strong association with the intention to use IB services. This study contributes the literature by validating TAM to predict IB adoption, and the findings would encourage designing innovative marketing and management banking strategies.

Keywords: internet banking, technology acceptance model, trust, self-efficacy, adoption

Pages: 46 - 50 | DOI: 10.15224/978-1-63248-005-7-36

11. PREDICTION OF PERFORMANCE OF CLUSTER COMPUTING SYSTEM WITH DIFFERENT CONFIGURATIONS OF NODES

Authors: DAULET AKHMEDOV , DAULET MURATOV , FARIDA ABDOLDINA , SULEIMEN YELUBAYEV , TIMUR BOPEYEV

Abstract: This article considers results of performance test of experimental model of cluster hybrid computing system based on GPU accelerators in Linpack. It was created six variants of configuration of cluster system. These variants differ from each other by count of nodes, GPU accelerators in each node and amount of random access memory. It was carried out qualitative analysis of test results using approximation methods. As a result it was created simulation model for determination of dependence of real performance (Tflops) of cluster system on count GPU accelerators in the node. The simulation model allows to estimate optimal value of cost-performance ratio in dependence on characteristics of electronic components of cluster computing system.

Keywords: parallel computing, high-performance computing, cluster computing system, GPU accelerator, CUDA technology.

Pages: 51 - 55 | DOI: 10.15224/978-1-63248-005-7-37

12. BIO-DIGITAL DEVICE IMPACT ON A CONSTANT LOAD COGNITIVE TEST OF CHILDREN WITH PHYSICAL AND NEUROLOGICAL IMPAIRMENTS

Authors: AUSTEN W. RAINER , FARSHID AMIRABDOLLAHIAN , HOCK C. GAN , RAY J. FRANK , ROB SHARP

Abstract: In this paper we extend on our earlier work utilizing maximum consecutive success as a measure used in the context of testing motor skills, for children with physical and neurological impairment. Here we verify a change in the “ceiling” of performance that takes place as the cognitive load is increased. In the results we see two groups establish themselves in terms of the ones capable of achieving the test objectives and the ones that engage but are not successful. In this study, we compare results for two different tests, one of motor skills and the second of categorization assessment and find agreement between the two using our approach. Working on our main hypothesis that it is possible to provide better fit of devices to PNI children, the results provide initial suggestions that cognitive test success depend on a combination of motor skill and cognitive ability which is not completely separable. Ranking of bio-digital devices ideally need to be done using the target application or

Keywords: disabled children, non-hand held device, motor- skill test, cognitive test, streak

Pages: 56 - 62 | DOI: 10.15224/978-1-63248-005-7-38

13. MODEL OF ENERGY SAVINGS ACHIEVABLE WITH LOCATION-AWARE NODE-TO-NODE TRANSMISSION IN UBICOMP.

Authors: M. KALEEM GALAMALI , NAWAZ MOHAMUDALLY

Abstract: Tracking Location in mobile environment has been a subject of research for quite long and significant progress has been reached. [1-16]. The next stage has been to make use of this Location-awareness to devise new functionalities and application and also to improve ways of doing existing activities like transmission change from omnidirectional, whole area coverage to directed location-aware and adapted transmission. A big area missing in MAUC is the software engineering approaches into metrics development, metrics gathering and modelling which can be used for prediction and better gearing of future investments of resources. The particular area of concern here is about energy consideration in Ubicomp. How much energy savings can be achieved? Is there any pattern that the trend of energy savings follow under different sets of conditions? Can these conditions be controlled to achieve a particular desirable energy savings trend? How to gather information on probabilities of saving less tha

Keywords: MAUC-Mobile and Ubiquitous Computing

Pages: 81 - 86 | DOI: 10.15224/978-1-63248-005-7-41

14. DEVELOPMENT OF THE MAXIMUM-STREAK MEASURE FOR EVALUATING THE SUITABILITY OF NON-HANDHELD DEVICES IN COGNITIVE TESTS OF PHYSICALLY AND NEUROLOGICALLY IMPAIRED(PNI) CHILDREN

Authors: AUSTEN W. RAINER , FARSHID AMIRABDOLLAHIAN , HOCK C. GAN , RAY J. FRANK , ROB SHARP

Abstract: This study examines an objective measure for discriminating between different degrees of performance in a child’s use of multiple non-hand-held devices when undertaking a simple competence test: the maximum streak of successfully, making a binary (YES / NO) response in the test. The paper reports encouraging results for the maximum consecutive success (streak) measure in its ability to inform on device suitability for a particular child. Our results show that different devices influence success streak, while performance of children vary when using different devices, based on severity of impairment. While this is in line with our main hypothesis, that a suitable match between device and impairment is necessary, our results provide a first candidate measure that can be potentially useful to personalizing a device to a particular user and his/her capabilities.

Keywords: disabled children, non-hand held device, motor- skill test, cognitive test, streak

Pages: 87 - 93 | DOI: 10.15224/978-1-63248-005-7-42

15. DATA DRIVEN IDENTIFICATION OF IDDM PATIENT MODEL

Authors: ARPITA BHATTACHARJEE , ASHOKE SUTRADHAR

Abstract: Prerequisite to the better living of an insulin dependent diabetes mellitus (IDDM) or type-1 diabetic patients is the closed loop blood glucose regulation via subcutaneous insulin infusion and continuous glucose monitoring system (SC-SC route). Closed loop control for blood glucose level in a diabetic patient necessarily uses an explicit model of the process. A fixed parameter full order or reduced order model does not characterize the inter-patient and intra-patient parameter variability. This paper deals with a real time implementation of online identification of frequency domain kernels from the input output data of an IDDM patient. The data-driven model of the patient is identified in real time by solving Volterra kernels up to second order using adaptive recursive least square (ARLS) algorithm with a short memory length of M=2. The frequency domain kernels, or the Volterra transfer function (VTF) are computed by taking the FFTs on respective time domain kernels for a specific leng

Keywords: diabetes mellitus, identification, nonparametric model, Volterra kernels, hardware realization

Pages: 94 - 98 | DOI: 10.15224/978-1-63248-005-7-43

16. MODEL OF ENERGY SAVINGS ACHIEVABLE WITH LOCATION-AWARE TRANSMISSION IN UBICOMP USING RELAYS

Authors: M. KALEEM GALAMALI , NAWAZ MOHAMUDALLY

Abstract: The field of Ubiquitous computing has opened several new directions of research. Much achievements have been reached [1-16]. Much research has been done concerning energy management in the field of Ubicomp. No doubt that effective use of relays can help reduce amount of energy required for transmission since energy required varies to the square of distance. Presence of relays in an environment can also help a lot in location tracking of nodes present in a topography. What is missing in this field is a way to model and predict amount/proportion of energy saved and metrics concerned, from a software engineering perspective, when applying relays in a ubicomp topography. This paper is a follow-up of 2 previous papers titled Model of Energy Savings achieved with Location-Aware Node-to-Node transmission in Ubicomp” and “Model of energy savings achieved with Location-Aware Node-to-Node transmission in Ubicomp using Location Refresh Intervals

Keywords: MAUC-Mobile and Ubiquitous Computing, SD- Standard Deviation, PV-Peak Value, PCSME- %CBR spending more energy.

Pages: 99 - 109 | DOI: 10.15224/978-1-63248-005-7-44

17. LIQUID COOLING SYSTEM IN A PERSONAL HYBRID COMPUTING SYSTEM BASED ON GRAPHICS PROCESSORS

Authors: DAULET AKHMEDOV , DAULET MURATOV , FARIDA ABDOLDINA , SULEIMEN YELUBAYEV , TIMUR BOPEYEV

Abstract: Article presents a structural scheme of a personal hybrid computer system (PHCS) based on graphics processors with liquid cooling system. Here are presented the results of experiments to determine the effectiveness of the liquid cooling system. Results of measurements the level of acoustic noise from PHCS, temperature of heating the PHCS components in case of using the system of air and liquid cooling in normal mode and at maximum load are presented in this paper

Keywords: parallel computing, high-performance computing, hybrid computing system, GPU accelerator, CUDA technology, air cooling system, liquid cooling system

Pages: 110 - 113 | DOI: 10.15224/978-1-63248-005-7-45

18. MATHEMATICAL MODELING OF 2D PROCESSES VIA THE METHOD OF HURWITZ-RADON MATRICES

Authors: DARIUSZ JACEK JAKOBCZAK

Abstract: Applied science and mechanics need mathematical methods for 2D processes modeling using the set of data points. A novel method of Hurwitz-Radon Matrices (MHR) is used in 2D curve modeling. Proposed method is based on the family of Hurwitz-Radon matrices which possess columns composed of orthogonal vectors. Two-dimensional process is modeled via different functions: sine, cosine, tangent, logarithm, exponent, arc sin, arc cos, arc tan and power function.

Keywords: process modeling, Hurwitz-Radon matrices, coefficient of MHR method, mathematical modeling

Pages: 114 - 117 | DOI: 10.15224/978-1-63248-005-7-46

19. WIRELESS RELAY COMMUNICATION WITH CODING

Authors: SALIM KAHVECI

Abstract: Wireless communications performance is badly affected by channel fading issue. Some diversity techniques are used to reduce the impact of fading by conveying data over multiple independent fading channel paths and combine them at the receiver side. Cooperative diversity is a novel communication technique where multiple terminals use their resources in cooperative manner to form a virtual array that realizes spatial diversity gain in a distributed fashion. Cooperative relay system can obtain reliable communications, capacity gain and energy saving by mutual relaying among users of wireless network.

Keywords: cooperative communication, coding, error probability

Pages: 118 - 121 | DOI: 10.15224/978-1-63248-005-7-47

20. TRADITIONAL VS AGILE METHODOLOGY: AN ANALYSIS ON CHALLENGES FACED IN TESTING PERSPECTIVE

Authors: BALAJI SUNDRAMURTHY , M. SUNDARA RAJAN , RONALD S. CORDOVA

Abstract: There are numerous methodologies available for developing and testing software. The methodology we choose depends on factors such as the nature of project, the project schedule, and resource availability. Although most software development projects involve periodic testing, some methodologies focus on getting the input from testing early in the cycle rather than waiting for input when a working model of the system is ready. Those methodologies that require early test involvement have several advantages, but also involve tradeoffs in terms of project management, schedule, customer interaction, budget, and communication among team members. Agile Testing is a set of timesaving techniques specifically designed to make the work of agile testing teams easier and more productive. It is an empowering process that produces great results and has a simple mission: Get the best possible testing results with the least amount of work. These challenge- and solution-based techniques do not require maj

Keywords: Traditional methodology, Agile methodology, Test-Driven development

Pages: 126 - 130 | DOI: 10.15224/978-1-63248-005-7-49

21. A HYBRID OF AUTOMATED AND MANUAL TESTING IN AN AGILE ENVIRONMENT

Authors: MUHAMMAD DHIAUDDIN MOHAMED SUFFIAN , ROSNISAABDULLRAZAK

Abstract: Software testing refers to the process of verifying as well as validating the successful functioning of particular software. Manual and Automated testing are example of testing that is adopted in an Agile environment. There are many misconceptions in an agile environment regarding both manual and automated testing. Some practitioners believe that automated testing is the bee’s knees and exists as a replacement for manual testing while others believe that manual testing is a simple set of step-by-step tasks that anyone can run through to check an expected output. Therefore, this belief has created a divide in the testing community between manual and automated testing. In this paper, we will discuss more on combination of both manual and automated testing in Agile Environment. A case study shows that the combination yields better results.

Keywords: Software Testing, Manual Testing, Automated Testing, and Agile Environment.

Pages: 131 - 135 | DOI: 10.15224/978-1-63248-005-7-50

22. JIRA IN AGILE SCRUM TO IMPROVE CYCLE-TIME REDUCTION – A SPECIAL REFERENCE TO SOFTWARE TESTING

Authors: ROSNISA ABDULL RAZAK

Abstract: Important task, but one that few teams do effectively. In this Scrum methodology is an Agile management method approach toward software development as it progresses incrementally and repetitively. JIRA helps project team member tracking and managing the requirements, test cases and bugs that emerge during a project is a critically paper we will discuss, implementation of JIRA as part of Test Management tool in Agile Scrum project to improve cycle-time reduction

Keywords: JIRA, Agile Scrum Development Life Cycle, Test Management Tool, Improve cycle Time Reduction.

Pages: 136 - 140 | DOI: 10.15224/978-1-63248-005-7-51

23. ANDROID NATIVE MOBILE APPLICATION FUNCTIONAL TEST AUTOMATION CALABASH-ANDROID AUTOMATED TESTING TECHNOLOGY

Authors: FAIRUZ MARIMAN , LOKE MUN SEI

Abstract: Mobile application has become very popular and widely used. Hence, the need and importance of mobile application testing has significantly increased before the mobile application gets to go to market on time and within budget. This paper discusses on the challenges faced in testing a native mobile application, and how Calabash-Android automated testing technology is used to help in automating Android mobile application testing. The sample illustrated in this paper is running on a mobile device emulator.

Keywords: est automation, mobile application testing, Calabash, Android, native application, emulator

Pages: 141 - 144 | DOI: 10.15224/978-1-63248-005-7-52

24. NUMERICAL STUDY ON THZ-WAVE GENERATION AND DETECTION OF FIELD-EFFECT TRANSISTOR

Authors: CAIXIA DU , JIN HE , JIN YANG , MANSUN CHAN , WANNING DENG , WEI ZHAO , WEN WU , WENPING WANG , XUEHAO MOU , YUN YE

Abstract: A numerical study on the FET-based THz wave generation and detection is presented in this paper. The numerical method is derived directly from the hydrodynamic equations and implemented in Matlab coding. Simulation results are compared with the existing theories, proving the validity of the developed numerical method and providing useful data that the THz detection theory cannot yield.

Keywords: THz-wave, FET, Hydrodynamic Equations, Numerical Simulation

Pages: 145 - 149 | DOI: 10.15224/978-1-63248-005-7-53

25. AN ANALYTIC POTENTIAL SOLUTION TO GE/SI CORE/SHELL FIELD EFFECT METAL-OXIDE-SEMICONDUCTOR STRUCTURE

Authors: CAIXIA DU , JIN HE , JIN YANG , MANSUN CHAN , WANNING DENG , WEI ZHAO , WEN WU , WENPING WANG , XUEHAO MOU , YUN YE , LINING ZHANG

Abstract: Radial core/shell hetero field effect metal-oxide-semiconductor structures, especially Ge/Si core/shell structure, have recently been extensively studied both experimentally and theoretically, promising novel electronic and optoelectronic devices. An analytic electrostatic potential solution to this hetero-structure is developed in this letter. The analytical expression of the electrostatic potential is derived out from the basic Poisson Boltzmann equation in the core/shell layers under classical device physics. Potential and electric field distribution across the radial of the core/shell structure are analyzed and discussed in the detail, much different from their single component counterpart. The analytic solution presented in this letter has provided useful insight for device scientists and integrated circuit engineers to understand the device physics and further develop compact circuit models of nano-wire field effect transistors with the Ge/Si core/shell hetero-structure for possi

Keywords: CMOS scaling, nanowire device, integrated circuit, hetero-junction structure, device physics, simulation and modeling

Pages: 150 - 153 | DOI: 10.15224/978-1-63248-005-7-54

26. ADVANCED PERSISTENT THREAT ATTACK DETECTION: AN OVERVIEW

Authors: IBRAHIM GHAFIR , VACLAV PRENOSIL

Abstract: With the webs explosive growth in power and popularity has come a concomitant increase in both the number and impact of cyber criminals. For years businesses have striven to keep malware, spam and unwanted intruders at bay with varying degrees of success. Cyber criminals and spies in turn created more advanced means to breach the security measures. APTs are a new and more sophisticated version of known multistep attack scenarios and they are targeted specifically to achieve a specific goal, most often espionage. The financial loss caused by APT attacks can be very big. Moreover, these APTs form a problem for the current detection methods because these methods depend on known signatures of attacks and APTs make heavy use of unknown security holes for attacks. In this paper we present an overview of the current researches about APT attack detection. In addition, we provide a classification of these researches into three groups which are previous research findings on APT attack, Analyzing

Keywords: Advanced Persistent Threat, targeted attacks, intrusion detection, network security, cyber criminals.

Pages: 154 - 158 | DOI: 10.15224/978-1-63248-005-7-55

27. LIMITED MEMORY QUASI-NEWTON METHODS FOR NONLINEAR IMAGE RESTORATION

Authors: FARZIN MODARRES KHIYABANI

Abstract: Variational models of unconstrained optimization problems have been extremely successful in a wide variety of restoration problems, such as image restoration. In this paper, we present an efficient limited memory quasi-Newton (QN) technique to compute meaningful solutions for large-scale problems arising in some image restoration problems. Numerical experiments reveals the effectiveness of the proposed method particularly for images of large size.

Keywords: Large-scale optimization, Image restoration, Quasi- Newton methods, Limited memor

Pages: 159 - 163 | DOI: 10.15224/978-1-63248-005-7-56

28. NON-STANDARD APPROACHES OF EVOLUTIONARY ALGORITHMS IN THE EXPLORATION-EXPLOITATION DILEMMA

Authors: OSWALDO E. VELEZ-LANGS

Abstract: This critical-reflexive paper is based on the known problem presented in the Exploration-Exploitation Dilemma (EED) when working with Evolutionary Algorithms (EAs) and focusing on proposals that put forward, in this case, both a traditional ap-proach as well as more recent approaches that manage population solutions (individu-als) differently than the standard EAs, that is: The Learnable Evolutionary Model (LEM) and the Distribution Estimation Algorithms (DEA).

Keywords: Exploration-Exploitation Di- lemma, Evolutionary Algorithms, Learnable Evolution Model, Estimation of Distribution Algorithms

Pages: 164 - 168 | DOI: 10.15224/978-1-63248-005-7-57

29. EVALUATION OF ADAPTABILITY BETWEEN QUAD AND RZLSR ROUTING SCHEME IN MASNET

Authors: ANNASARO VIJENDRAN , J.VIJI GRIPSY

Abstract: In recent times, Routing in Mobile ad hoc and sensor networks has provided a challenging and interesting research area due to its impact on numerous science and engineering applications. The principle challenges in MASNETs are frequent changes in network topology, its reliance on battery power and inadequacy of base stations. This research provides a secure multipath algorithm which promotes the nodes in MASNet to execute on-demand discovery by forming set of paths. An Adaptive Secure Multipath Routing (ASMR) is formed with an adaptive behaviour on route discovery and route maintenance phase. In the first phase of route discovery process, in order to obtain efficiency, security and reliability in multi-path routing for MASNETs, propose a routing mechanism, which allows nodes in MASNet to perform an on-demand discovery and generation of a set of paths, based on Dynamic MPR (DMPR) protocol. In route maintenance phase, two algorithms namely QUAD and RZLSR were proposed in a new way using

Keywords: Multipath Routing, Protocol, Security, QUAD, RZLSR, MPR, DMPR, ASMR

Pages: 169 - 173 | DOI: 10.15224/978-1-63248-005-7-58

30. PRINCIPLES OF RECURSIVE RESIDUE NUMBER SYSTEM COMPUTATION

Authors: A.L. STEMPKOVSKY , D.V. TELPUKHOV , E.S. BALAKA , R.A. SOLOVYEV , T.Y. ISAEVA , V.M. AMERBAEV

Abstract: New method is proposed which is based on the idea of expressing system of residue numbers of traditional Residue Number System (RNS) using lower dimension system of sub-moduli. This new recursive data representation allows eliminating some of the known drawbacks of RNS arithmetic. Despite the constraints imposed on moduli sets, the proposed method provides speed gain, as experiments show, and it can be used in parallel high speed computing devices.

Keywords: Residue Number System, Residue arithmetic, Chinese Remainder Theorem

Pages: 174 - 179 | DOI: 10.15224/978-1-63248-005-7-59

31. A SOFTWARE TOOL FOR EVALUATING THE EFFECT OF PROXIMITY MEASURES ON CLUSTERING METHODS

Authors: FETHULLAH KARABIBER , AHMET ELBIR , VECDI EMRE LEVENT

Abstract: In this study, commonly used proximity measures, in other words, distance and similarity functions are reviewed. An interactive software tool with graphical user interface is developed to examine the effect of proximity measures on the performance of clustering methods. The software named ClustProX allows the users to select a data set, to apply a clustering method and to observe the performance of the results. Xie-Beni and Kwon indices are used to evaluate the performance of the implemented clustering methods with different proximity measures and the number of clusters. In this way, the users will be able to choose an appropriate proximity function and the number of clusters to improve accuracy of clustering.

Keywords: proximity, distance, similarity, clustering, cluster validation

Pages: 180 - 183 | DOI: 10.15224/978-1-63248-005-7-96

32. ENSEMBLE SELECTION USING SIMULATED ANNEALING WALKING

Authors: HEDIEH SAJEDI , ZAHRA SADAT TAGHAVI

Abstract: Pruning an ensemble of classifiers is one of the most significant and effective issues in ensemble method topic. This paper presents a new ensemble pruning method inspired by upward stochastic walking idea. Our proposed method incorporates simulated annealing algorithm and forward selection method for selecting models through the ensemble according to the probabilistic steps. Experimental comparisons of the proposed method versus similar ensemble pruning methods on a heterogeneous ensemble of classifiers demonstrate that it leads to better predictive performance and small-sized pruned ensemble. One of the reasons of these promising results is more time which our method spends for finding the best models of ensemble compared with rivals

Keywords: ensemble method, simulated annealing algorithm, forward selection method.

Pages: 184 - 188 | DOI: 10.15224/978-1-63248-005-7-97

33. ASPIRE: BUILDING A SENTIMENT LEXICON FROM RATINGS OF SOCIAL REVIEWS

Authors: HAMIDREZA KESHAVARZ-MOHAMMADIAN , MOHAMMAD SANIEE ABADEH

Abstract: Finding semantic orientation and intensity of sentiment phrases and words is a substantial task of opinion mining. The problem is to give a score to each sentiment phrase, so that different expressions of opinions in different platforms, like social networks, can be processed. There have been several attempts to do this task, and this paper aims to score each sentiment phrase based on its occurrence in reviews with different overall ratings. The idea is that if a sentiment phrase occurs more in 5-starred reviews than in 3-starred ones, it should be more positive and more intense. The results support this idea. Each sentiment phrase in the corpus is given a score based on a weighted average of their frequency in reviews with different ratings. When a sentiment phrase gets a high score, it means it is more likely to be positive and more likely to be intense. And if a sentiment phrase gets a low score, it means that it is negative. This score sets the threshold of negativity and positivit

Keywords: Opinion Mining; Sentiment Analysis; Sentiment Lexicon Generation; Word Polarity; Sentiment Words

Pages: 189 - 193 | DOI: 10.15224/978-1-63248-005-7-98

34. DISTRIBUTED DATA CLUSTERING IN PEER-TO-PEER NETWORKS: A TECHNICAL REVIEW

Authors: HEDIEH SAJEDI , RASOOL AZIMI

Abstract: Clustering as one of the main branches of data mining, has gained an important place in the different applied fields. On the other hand, Peer-to-Peer (P2P) networks with features such as simplicity, low cost communication, and high availability resources, have gained a worldwide popularity in the present days. In P2P network, high volumes of data are distributed between dispersed data sources. In such distributed systems, sending data to a central site is not possible, due to processing, storage and handling costs. This issue makes the need for specific methods for distributed data clustering in P2P networks. This paper makes a technical review of distributed data clustering approaches in P2P network, to understand the research trends in this area.

Keywords: eer to Peer Networks, Distributed Data Mining, Distributed Data Clustering

Pages: 194 - 198 | DOI: 10.15224/978-1-63248-005-7-113

35. ADAPTIVE VISUALIZATION FRAMEWORK FOR USER-INTERACTION WEB-BASED ELEARNING SYSTEMS

Authors: NEDHAL A. M. AL-SAIYD

Abstract: Human-computer interaction requires a software user interface to facilitate the communication to the user. The user interface plays a significant role in the user acceptance of software systems design. In Webbased e-learning systems, the need for adaptive personalization is increased because it is of particular importance in Web-based data accessing, providing relevant information and e-lectures effectively, and improving user performance and satisfaction. In this paper, we propose a framework for adaptive visualization for the interface of Web-based e-learning system. The important characteristics; that consist of user's preferences, background knowledge levels, needs, cognitive abilities, interface layout diversity, and interface structure are identified. These characteristics have a significant impact on the model to make the interface flexible, consistent, less complex, and more practical. The design is based on using weighting probabilistic scheme and artificial intelligence reaso

Keywords: Adaptive Visualization, Adaptive User Interface, Adaptive Intelligent Learning, Personalization, Usability, Adaptive Knowledge-Based Visualization, Similarity- Based Visualization

Pages: 199 - 204 | DOI: 10.15224/978-1-63248-005-7-25

36. PLATOON SIMULATION OF VEHICLE ROBOTS ACCORDING TO VEHICLE FOLLOWING MODEL

Authors: C. USHIDA , E. KITA , K. ASAHINA , T. TAMAKI , Y. WAKITA

Abstract: Vehicle platoon is one of important techniques both for improving the traffic safety and for increasing the traffic network capacity. Vehicle platoon system allows vehicles to drive at the same velocity and to accelerate or brake simultaneously. In this study, we will present the velocity control algorithm of the vehicles in the vehicle platoon and then, apply it to the velocity control of the vehicles in the vehicle platoon of vehicle robots. Vehicle robot can observe the distance by the ultrasonic sensor and the velocity data through Bluetooth communication. The experimental result is compared with the numerical simulation in order to confirm the validity of the model. The experimental result agrees relatively well with the computer simulation.

Keywords: Vehicle platoon, Multi-leader vehicles model, LEGO Mindstorm.

Pages: 205 - 207 | DOI: 10.15224/978-1-63248-005-7-117

37. DEVELOPMENT OF UNAUTHORIZED CELL-PHONE USAGE SNIFFING SYSTEM USING EMBEDDED SYSTEM

Authors: LAWAL , W. , OGUNTI , E.O. , OLUWAJOBI , F.I

Abstract: The advent of wireless technology and advances in telecommunications has brought great advantage to the human society and helped to contribute to globalization. While this is laudable, the unauthorized use of this phone has contributed to some of the social vices seen in the society, such as examination malpractices, computer hacking, interference with sensitive health equipment, and organized crime within and outside correctional facilities. In a bid to curbing some of these excesses, a good mechanism is required to detect indiscriminate use of mobile phone in public places to avoid public indiscipline. In this work, a mobile phone sniffer is designed using appropriate computer aided design (CAD) tools multism 11.0.The code is written and embedded using Intel 8051 Microcontroller series. The sniffer can detect signals of all brands of mobile phones in an active mode and inform about the detected signals through a blinking Light Emitting Diode (LED) and a Buzzer.

Keywords: mobile phone sniffer, active mode, computer hacking, correctional facilities, multiple sniffers and embedded system

Pages: 208 - 212 | DOI: 10.15224/978-1-63248-005-1-121

38. AN INVESTIGATION OF SOCIAL ENGINEERING TECHNIQUES TOWARDS GRAPHICAL PASSWORD AUTHENTICATION

Authors: MOHD ZALISHAM JALI , NASER MARWAN OSHROK LABAN

Abstract: Recently, social engineering has been considered as one of the main processes to break through the information security. Social engineering technique is the way to get unauthorized information and penetrating accounts through the use of non-technical methods rely on the skills of the hacker in the ability to deceive others and persuade them to get as much information. Nowadays, social engineering techniques are considered the most ways that are used to attack and steal the information all over the world, for that it is becoming necessary to study this kind of attacks and find methods that protect the information from the attacks such as graphical password. The main aim of this paper is to thoroughly explain social engineering methods. In addition, the paper will also present a study conducted to compare the graphical password types (click-based and choice-based graphical password) towards passwords guessing, a branch of social engineering methods. To achieve this goal a survey was cond

Keywords: graphical passwords, social engineering authentication, knowledge-based.

Pages: 11 - 16 | DOI: 10.15224/978-1-63248-005-7-29

Popular Proceedings

ESSHBS 2017 - 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ICETM 2023 - 2023

9th International E-Conference on Engineering, Technology and Management

ASET 2017 - 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017 - 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017 - 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017 - 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022 - 2022

8th International E- conference on Engineering, Technology and Management

SEM 2019 - 2019

9th International Conference on Advances in Social Science, Economics and Management Study