Loading...

Proceedings of

International Conference on Advances in Computing and Information Technology ACIT 2014

Date
05-Jan-2014
Location
Bangkok , Thailand
Authors
76
ISBN
978-981-07-8859-9

30 Articles Published

1. RECONSTRUCTION OF LATTICE-LIKE OBJECTS ON MOBILE DEVICES

Authors: THOMAS HUNZIKER

Abstract: Smart phones and tablet computers are typically equipped with a camera and a powerful processor, and together with the right computer vision software they can support engineers and other professionals in a broadrange of tasks. Creating 3D models of real world objects is one job that can be very time consuming for humans if carried out manually, whereas with an adequate image processor the task can be completed very efficiently. In this paper we focus on the recognition of lattice-like objects made up of elements from a certain set of basic components. We propose a procedure incorporating a 2D detection of object parts, a 3D reconstruction, and a 3D model composition. The efficiency of the procedure is demonstrated by means of a prototype in the form of an Android app, accomplishing a 3D recognition and rendering of molecular models.

Keywords: computer vision, pattern recognition, 3D modeling, bundle adjustment

Pages: 1 - 5 | DOI: 10.15224/978-981-07-8859-9-0

2. CMMI, PRINCE2 AND PMBOK – THE BIG THREE

Authors: NIDA WAHEED

Abstract: Project management’s PRINCE2 is a widely used methodology. It is flexible and offers set of procedures to implement and manage a project. PMBOK provides principles and tools that can be used by project managers for successful handling of projects. This paper presents a study of project management’s methodology PRINCE2, CMMI and a guide to project management PMBOK. Research was done to identify their weaknesses and issues and areas where they can complement each other were highlighted. This way they can be used in a more efficient way to fulfill the needs of any industry.

Keywords: CMMI, PRINCE2, PMBoK

Pages: 6 - 9 | DOI: 10.15224/978-981-07-8859-9-02

3. ON THE SCALABILITY OF SIMULATING CLOUD SYSTEMS

Authors: ALBERTO NUNEZ , MANUEL NUNEZ , MERCEDES G. MERAYO , SERGIO NUNEZ

Abstract: Simulation of cloud computing systems remains to be a challenge due to the high number of issues that hamper this task. Basically, the main issue for achieving simulations of cloud systems is two-fold. First, the enormous amount of time required to execute those simulations. Second, the large amounts of memory required for simulating the high number of elements that constitute the model. In most cases, those systems contain thousands of computing nodes, tens of storage nodes, communication networks, and communication switches, whereof the algorithms required for modelling and simulating all those elements require huge amounts of CPU power. In this paper we present a complementation for INET, a framework used for modelling and simulating networks in cloud systems models.

Keywords: Simulation, Modelling of Cloud Systems

Pages: 15 - 19 | DOI: 10.15224/978-981-07-8859-9-04

4. ON THE SCALABILITY OF SIMULATING CLOUD SYSTEMS

Authors: ALBERTO NUNEZ , MANUEL NUNEZ , MERCEDES G. MERAYO , SERGIO NUNEZ

Abstract: Simulation of cloud computing systems remains to be a challenge due to the high number of issues that hamper this task. Basically, the main issue for achieving simulations of cloud systems is two-fold. First, the enormous amount of time required to execute those simulations. Second, the large amounts of memory required for simulating the high number of elements that constitute the model. In most cases, those systems contain thousands of computing nodes, tens of storage nodes, communication networks, and communication switches, whereof the algorithms required for modelling and simulating all those elements require huge amounts of CPU power. In this paper we present a complementation for INET, a framework used for modelling and simulating networks in cloud systems models.

Keywords: Opportunistic Networks, Resource Management

Pages: 15 - 19 | DOI: 10.15224/978-981-07-8859-9-04

5. POST-DISASTER RESOURCE MANAGEMENT USING PEER-TO-PEER OPPORTUNISTIC NETWORKS

Authors: DEBANJAN DAS DEB , SOMPRAKASH BANDYOPADHYAY

Abstract: During large-scale disasters, it is often found that services that are relied for everyday communications become non-functional. This becomes a barrier and a key challenge in effective transmission of information related to the disaster through electronic media in executing relief operations. In these situations, portable devices like the smart phones come in handy and are effective in storing offline information during post disaster management operations. Effective utilization of these mobile databases through coordination will provide a platform for executing disaster relief operations. In this paper, we have proposed a scheme in which a virtual opportunistic network is formed by these mobile agents, that effectively addresses the resource management and post disaster relief operations. Through direct and indirect coordination between agents in those situations, different static nodes in an area will become aware of the geographical location of other nodes. Aggregation of such struct

Keywords: Opportunistic Networks, Resource Management

Pages: 20 - 24 | DOI: 10.15224/978-981-07-8859-9-05

6. A PARALLEL IMPLEMENTATION FOR GRAPH PARTITIONING HEURISTICS

Authors: LEONARDO ROGERIO BINDA DA SILVA , RONEY PIGNATON DA SILVA

Abstract: The Graph Partitioning Problem (GPP) has several practical applications in many areas, such as design of VLSI ( Very-large-scale integration) circuits, solution of numerical methods for simulation problems that include factorization of sparse matrix and partitioning of finite elements meshes for parallel programming applications, between others. The GPP tends to be NP-hard and optimal solutions for solving them are infeasible when the number of vertices of the graph is very large. There has been an increased used of heuristic and metaheuristic algorithms to solve the PPG to get good results where exceptional results are not obtainable by practical means. This article proposes an efficient parallel solution to the GPP problem based on the implementation of existing heuristics in a computational cluster. The proposed solution improves the execution time and, by introducing some random features into the original heuristics, improve the quality of the created partitions.

Keywords: graph partitioning; parallel computing; grasp algorithms, heuristics

Pages: 25 - 29 | DOI: 10.15224/978-981-07-8859-9-06

7. THE USE OF ARTIFICIAL INTELLIGENCE IN COGNITIVE DECISION MAKING – A REVIEW

Authors: V. PRAVEEN KUMAR , V.S.S KUMAR

Abstract: Many problems of the real world vary with number of parameters affecting the system and their computations become a difficult task. Artificial neural networks (ANN) can learn and be trained on a set of input and output data belonging to a particular problem. The field applications of Artificial Intelligence have increased dramatically in the past few years. ANN is built from a large number of processing elements that individually deal with pieces of a big problem. If new data of the problem are presented to the system, the ANN can use the learned data to predict outcomes without any specific programming relating to the category of events involved. A large variety of possible ANN applications now exist for non ¬computer specialists. Therefore, with a very modest knowledge of the theory behind ANN, it is possible to tackle complicated problems in a researcher's own area of specialty with the ANN techniques. ANN learning occurs through training to a set of input and output data, where the

Keywords: Artificial neural networks, Information technology, Automation, Neural systems.

Pages: 30 - 33 | DOI: 10.15224/978-981-07-8859-9-07

8. SOFTWARE INTERNATIONALIZATION : INCORPORATING USERS’ TRANSLATIONS

Authors: JAUHAR ALI

Abstract: Internationalized software, which support localization by allowing users to choose the user interface language of their choice, has a lot wider audience than a single-language software. Providing resource files for multiple languages is expensive and not scalable for large number of languages. This limits the availability of software products to only those communities who speak major languages. In this study, we investigate the idea of allowing users to create user interface translation of software and share them with other users. We believe that such an approach is scalable as it does not incur any extra cost.

Keywords: internationalization, localization, user interface

Pages: 34 - 37 | DOI: 10.15224/978-981-07-8859-9-08

9. SMART CITIES - SIX DIMENSIONS (A SCHOLARSTICAL ARTICLES REVIEW)

Authors: R. RAMASWAMY , SOMAYYA MADAKAM

Abstract: Right now, one of the most upcoming concepts in the field of Information Technology (IT) is 'Smart City'. Smart Cities are basically built up by Internet of Things (IoT) technologies. The vision of the smart city concept is to improve the capabilities and simplify numerous problems of the city through optimized energy consumption, carbon emission mitigation, maximum recycling, smart transportation, intelligent security and 24×7 services for inhabitants. This article is emphasizing the vital role of smart cities in the world and then smart city six axes or dimensions.

Keywords: smart city, smart people, smart governance, smart living, smart environment, smart mobility, smart economy

Pages: 38 - 41 | DOI: 10.15224/978-981-07-8859-9-09

10. ROUND OFF ERROR PROPAGATION IN SIMULATION OF RC CIRCUIT SUBTITLE : SIMULATION OF RC CIRCUIT

Authors: SHREYAS FADNAVIS

Abstract: Electrical devices often use RC, LC or RLC circuit to design power amplifiers, filters and mixers etc. Complex iterative algorithms are used for the simulation of these circuits. . This paper illustrates numerical experiments on growth of rounding off error in simulation of simple RC circuit using fourth order Runge-Kutta method (RK) and the Runge-Kutta-Fehlberg with adaptive step size control method (RKF). Our analysis indicates that in simulations with RK method, round off error grows ~ 80% with 10-15 iterations and ~96-98% within 100 iterations with different step sizes and double precision. In the simulations with RKF method round off error grows to 70% with 10-20 iterations and ~80% within 100 iterations. It does not exceed 80% for 1000 of iterations for single and double precision. This indicates that growth of round off error in RKF method is less and it should be used to minimize round off error.

Keywords: Simulation of RC circuit, Round off error, Runge Kutta methods

Pages: 42 - 46 | DOI: 10.15224/978-981-07-8859-9-10

11. SOFTWARE POWER ANALYSIS FOR EMBEDDED DSP SOFTWARE

Authors: K.S.GURUMURTHY , K.S.GURUMURTHY

Abstract: Power is a major design constraint for low power applications. Its consumption during the execution of the software program is an important issue in designing low power embedded devices. This so called software power can be reduced in many ways. By manipulating the instructions in a code, software related power could be reduced. This work brings about the efficient scheme for instruction level software power analysis for TMS320C6713 DSP processor. This is achieved by measuring the average instantaneous current drawn and hence power dissipated by the processor as it repeatedly executes the set of instructions.

Keywords: manipulating, instructions, code, software, power, reduced

Pages: 47 - 50 | DOI: 10.15224/978-981-07-8859-9-11

12. QUANTUM DOT CELLULAR AUTOMATA: A REVIEW

Authors: K.S.GURUMURTHY , PRAMEELA KUMARI N

Abstract: Shockley’s transistor invented in 1952 has shrunk immensely as the years pass by, making the electronic computers very compact and one of the most powerful devices of the century. However advancements in Microelectronics as per Moore's law, face huge technical barriers in the future of transistor based computation due to the limitations posed at the nanoscale size. In view of this the International Technology Roadmap for Semiconductors (ITRS) has indicated several new technologies that are likely to replace the transistor based computation in the near future. Some of these include Resonant Tunneling Diodes (RTDs), Single Electron Tunneling (SET), Quantum Cellular Automata (QCA), and Tunneling Phase Logic (TPL). Among these, QCA seems to be the most promising emerging technology, as a viable alternative to CMOS. In this paper an effort has been made to present the review of the work carried out in QCA till date, from the time of its invention in 1940.

Keywords: technical, barriers, future, transistor base

Pages: 51 - 55 | DOI: 10.15224/978-981-07-8859-9-12

13. TECHNICAL, BARRIERS, FUTURE, TRANSISTOR BASE

Authors: MAJID AHMADI , SHERVIN ERFANI , SOKE ONYEMELUKWE

Abstract: Security of On-demand routing protocols are of utmost significance in Mobile Ad-hoc Networks (MANETs), which form a transient network and are not using the existing infrastructure or centralized administration.Performance evaluation of Dynamic Source Routing (DSR) protocols is performed as a precursor for improving secure routing schemes in ad-hoc networks. Simulation results for determining efficiency in terms of throughput, delay and routing overhead are given.

Keywords: Mobile Ad-hoc Network (MANET), Dynamic Source Routing (DSR), On-Demand Distance Vector (AODV), Ad-Hoc Network Performance

Pages: 56 - 59 | DOI: 10.15224/978-981-07-8859-9-13

14. CORPUS-BASED TEXT RETRIEVAL AND ADAPTATION FOR LEARNING SYSTEM

Authors: NIKOLAY KARPOV

Abstract: The algorithm to adapt lexical complexity in the news article which can be used as materials for learning language presented in the paper. We consider words substitution retrieval according to wordnet-based and corpus-based semantic relatedness. Two corpus-based similarity measures empirically tested: Vector Space Model and Distributional Semantic Model. This language processing algorithm has created as a client-server application. It retrieves appropriate text from Web-resource. Next it performs adaptation procedure.

Keywords: distance learning, foreign language, distributional semantic model, contextual proximity.

Pages: 60 - 65 | DOI: 10.15224/978-981-07-8859-9-14

15. MEASURING TEST CASE REUSABILITY BASED ON SIMPLICITY AND INDEPENDENCE

Authors: JIRAPUN DAENGDEJ , MOHAMMAD RAVA

Abstract: Test Case reuse is known as a prominent solution for reducing the cost of testing while increasing the test reliability and productivity. There are many methodologies presented that concentrate on generating reusable test cases, however there are very few that concentrate on measuring how reusable a test case is based on internal and external characteristics. This research investigated several metrics for measuring test case reusability and selected two that were most prominent. The two metrics are then combined and result a measurement model for measuring test case reusability. The prominent characteristic of this model is that it can serve as a template for test case reusability as it will allow for further metric factors to join and expand upon it.

Keywords: Test Case, Reusability, Metric, Independence, Simplicity.

Pages: 66 - 71 | DOI: 10.15224/978-981-07-8859-9-15

16. EFFECT OF USING DIFFERENT QOS PARAMETERS IN PERFORMANCE OF AODV, DSR, DSDV AND OLSR ROUTING PROTOCOLS IN MANET

Authors: AYOOB A.AYOOB , GHAIDAA M. ABDULSAHIB , MUAMER N. MOHAMMED , NORROZILA SULAIMAN , OSAMAH I. KHALAF

Abstract: Many routing protocol methods have been proposed in Mobile Ad-Hoc Network but still the challenges are to improve the routing performance. In small or medium ad hoc networks flat protocols can be used but in case of large networks more complicated routing protocols are needed to be used in order to be suitable with them. Since the Ad-hoc networks have many constrains in bandwidth and battery life so the routing protocol which is used must be done its work correctly without using much resources of network by its overhead traffic. This paper, focus on investigation the performance analysis of four important routing protocols in mobile Ad hoc networks such as AODV (Ad- Hoc On-Demand Distance Vector), DSR (Dynamic Source Routing Protocol), DSDV (Destination Sequenced Distance-Vector), and OLSR (Optimized Link State Routing Protocol). The analysis of performance is made on QoS parameters such as the basis packet delivery ratio, throughput, and end-to-end delay, the simulator used is NS-2.

Keywords: Mobile Ad-hoc Network, Routing Protocols Metrics Analysis, AODV, DSDV, DSR, OLSR Simulation.

Pages: 72 - 76 | DOI: 10.15224/978-981-07-8859-9-16

17. SOFTWARE FOR AUTOMATED SOC DESIGN BASED ON HARDWARE/SOFTWARE CODESIGN CONCEPT

Authors: ADIWIJAYA , ARIF SASONGKO , GANDEVA BAYU , MAMAN ABDUROHMAN , RICKY RAWUNG

Abstract: Productivity gap on SoC design is a challenge to address in design method research area. Main research topics in this area address this problem using many schemes and methods. Software for automation in a system design and implementation is one solution to address design time efficiency. The second one is parallelism concept in hardware/software co-design. This approach addresses both design time efficiency and flexibility. This paper proposes an automated SoC design software with respect to parallelism and automation concept. Hardware/software co-design is an implementation of parallelism concept. In the traditional design, the main concept is hardware design and then software design. In this paper we did both design in parallel mode. The result showed that the proposed method can reduce much more time than before.

Keywords: productivity gap, SoC design, hardware/software, codesign

Pages: 77 - 81 | DOI: 10.15224/978-981-07-8859-9-17

18. ICON AND USER INTERFACE DESIGN FOR MOBILE BANKING APPLICATIONS

Authors: BURAK MERDENYAN , ONUR CIKRIKCILI , ORKUN KOCYIGIT , REIHANEH BIDAR

Abstract: Mobile banking has entered the industry as a novel remote method for related activities. Usable and reliable user interfaces for mobile banking application should be designed by implementing user-centered designmethodologies. Visual components such as icons would reduce the possible interaction problems. The aim of this study is designing icons and user interfaces for mobile banking applications with the actual users’ participation. The process consists of task analysis, an icon design survey, final icon design, and evaluation, and the installation of the mobile banking application with the icons. Financial experts attended to the task analysis while the icons were designed with the potential users. Another group of participants tested the understandability of the final icons. Three screen layouts were designed with the implementation oficons, and the user interface was completed. It is crucial to encourage clients for the use of mobile banking services by improving the usability of th

Keywords: mobile banking, participatory design, icon, user interface design

Pages: 82 - 86 | DOI: 10.15224/978-981-07-8859-9-18

19. PATTERN GENERATION FORM NEURON IMAGE ANALYSIS THROUGH CLUSTERING TECHNIQUES

Authors: A.CLEMENTKING , P.RADHAKRISHNAN , RANI CLEMENTKING

Abstract: The computation process is aimed to optimise the process to increase the efficiency according to the applications. The operational management techniques are generally used for the process optimization and find the maximum level with minimum efforts. The maximization process is used various process in computing process. The maximization and load balancing approach is cognitive process. Cognitive process is involved in theneuron activation and execution of human behaviour. The combination of neuroscience, Supercomputing and nano technologies is involved in the cognitive computing. But the design architecture involved the computational approach to increase the speed of computing while neurons are communicated one with another at a instance .The activation process based on the selection of neuron which are expected to activate in theinstance of time. This work attempted to increase neuron activation process through cluster techniques to identify similar process neuron from the Magnetic Res

Keywords: Neuron Activation Management, Cognitive computing, neuron processing, clustering, MRI analysis

Pages: 87 - 90 | DOI: 10.15224/978-981-07-8859-9-19

20. A PHYSICAL MEASUREMENT-BASED SYBIL NODES DETECTION MECHANISM IN VANETS

Authors: JOOSEOK SONG , DONGXU JIN , FEI SHI

Abstract: In traffic safety applications of Vehicular Ad-hoc Networks (VANETs), security is a very important issue. Sybil attack is a particular attack where the attacker illegitimately claims multiple identities. In the past, several approaches have been proposed to solve this problem. They are categorized into PKI-based, infrastructure-based, observer-based, and resource-testing-based schemes. In this paper, existing protocols are analyzed, and a novel scheme for detecting the Sybil nodes in VANETs is presented, reducing the effect of a Sybil attack. The proposed Sybil nodes-detection scheme, Physical Measurement-Based Sybil Nodes Detection Mechanism in VANETs (PMSD), takes advantage of physical measurements of the beacon message instead of key-based materials, which not only solves the Sybil attack problem, but also reduces the overhead of detection. The proposed scheme has no fixed infrastructure, which makes it easier to implement. The simulation results show a 95% detection rate of Sybil n

Keywords: VANETs, Sybil Attack, Physical Measurement, Security

Pages: 91 - 96 | DOI: 10.15224/978-981-07-8859-9-20

21. A PHYSICAL MEASUREMENT-BASED SYBIL NODES DETECTION MECHANISM IN VANETS

Authors: JOOSEOK SONG , DONGXU JIN , FEI SHI

Abstract: In traffic safety applications of Vehicular Ad-hoc Networks (VANETs), security is a very important issue. Sybil attack is a particular attack where the attacker illegitimately claims multiple identities. In the past, several approaches have been proposed to solve this problem. They are categorized into PKI-based, infrastructure-based, observer-based, and resource-testing-based schemes. In this paper, existing protocols are analyzed, and a novel scheme for detecting the Sybil nodes in VANETs is presented, reducing the effect of a Sybil attack. The proposed Sybil nodes-detection scheme, Physical Measurement-Based Sybil Nodes Detection Mechanism in VANETs (PMSD), takes advantage of physical measurements of the beacon message instead of key-based materials, which not only solves the Sybil attack problem, but also reduces the overhead of detection. The proposed scheme has no fixed infrastructure, which makes it easier to implement. The simulation results show a 95% detection rate of Sybil n

Keywords: VANETs, Sybil Attack, Physical Measurement, Security

Pages: 91 - 96 | DOI: 10.15224/978-981-07-8859-9-20

22. A RFID YOKING PROOF PROTOCOL TO PRESERVE AN OFFLINE VERIFICATION USING THE COMMITMENT DISCLOSURE

Authors: JOOSEOK SONG , HYOUNGMIN HAM

Abstract: A RFID (Radio Frequency Identification) yoking-proof provides a verification manner that a pair of RFID tags is scanned simultaneously by one reader device to guarantee the physical proximity of multiple objects. However, the previous studies provide the verification that requires the online verifier. The connectivity between a reader and a verifier limits the practicality of a yoking proof. In this paper, we propose an offline yoking proof protocol to preserve the offline verification that does not require the online verifier. In addition, the protocol for a pair of tags is easily extended to the one for multiple tags without additional expensive devices. Our analysis shows that the proposed protocol provides offline verification securely and effectively.

Keywords: Anonymity, Privacy, RFID, Verification, Yoking proof

Pages: 97 - 101 | DOI: 10.15224/978-981-07-8859-9-21

23. CLASSIFICATION OF CLUSTERING SCHEMES IN VANETS

Authors: JOOSEOK SONG , INHWAN KIM

Abstract: The emergence of Vehicular Ad-hoc Networks (VANETs) provides drivers and passengers with safer and more convenient services. However special characteristics of VANETs such as high mobility, movement constraint, and signal blocking hinder the wide propagation of it. One good way to alleviate those unique characteristics of VANETs is clustering. Even though there are many clustering techniques, few investigations to understand them are conducted. In this paper, we examine some cluster based approaches in VANETs carefully and classify them into two categories based on the property of cluster; that is, stationary cluster and mobile cluster. Finally, the advantages and disadvantages of both will be illustrated. We hope that researchers who design the new clustering mechanism in VANETs could facilitate this classification to make theirs more suitable for their purpose.

Keywords: Clustering, classification, survey, VANETs, Computer Networks and Data Communication

Pages: 102 - 105 | DOI: 10.15224/978-981-07-8859-9-22

24. DETECTION AND CLASSIFICATION OF A MOVING OBJECT IN A VIDEO STREAM

Authors: ASIM R. ALDHAHERI , ERAN A. EDIRISINGHE

Abstract: In this paper we present a new method for detecting and classifying moving objects into humans and vehicles from a video surveillance scene. In this approach, the moving objects are firstly detected from the background using a background subtraction technique. Background subtraction algorithms are implemented in a MATLAB environment. A comparison for all the algorithms was made to determine which background subtractionalgorithm performs better with the proposed classifying algorithm. The algorithms were then tested using more than a video and many frames of the video was tested. Secondly, edge detection of moving objects was performed using Canny or Prewitt operations, while bounding boxes were implemented over the moving objects. Edge detection and bounding boxes were used before the classification step to simplify the classification.Finally, classifying the moving object into humans and vehicles was accomplished by finding the height-width ratio of the bounding box around the moving

Keywords: background subtraction, classification, moving object detection.

Pages: 106 - 111 | DOI: 10.15224/978-981-07-8859-9-23

25. VULNERABILITY OF WEB-STORAGE IN HTML5 FOR WEB AND MOBILE APPLICATION

Authors: JAEHO CHOI , SCOTT UK-JIN LEE

Abstract: HTML5 is not a new version of the existing mark-up language, but a new paradigm for developing web and mobile applications where various new concepts are introduced to improve compatibility and usability. Web-Storage is the one of new features in HTML5 that enables effective client-side storage and retrieval of the frequently used data. However, it has significant security problems which need to solve for providing safe web and mobile environment. Currently, there is lack of analysis and research to detect and prevent attacks on web storage and this can causes critical security threats to web and mobile application developed using HTML5. In this paper, we are going to practically study and analyze possible attacks on web storage as a first step towards ensuring the safety of web and mobile applications based on HTML5.

Keywords: vulerability, HTML5, web-storage

Pages: 112 - 115 | DOI: 10.15224/978-981-07-8859-9-24

26. CRIME MAPPING SYSTEM FOR THE ROYAL MALAYSIA POLICE

Authors: MOHD HANIZAN MOHD WASLI , NALINI DHARMARAJAN , NOREHAN ABDUL MANAF , WAN ADILAH WAN ADNAN

Abstract: Crime mapping is the process of producing a geographical representation of crime levels, crime types or the locations of particular incidents. This paper aims to develop a data model for the crime mapping system. The development of a prototype includes the creation of spatial database to cope with the spatial and temporal features which exist in the crime mapping system. The data which was used was collected from police reports from the Kajang Police Department. This data was for crime cases which were reported and opened for investigation between February and March 2013. Classification of the type of crime was based on the index crime which is published in the Malaysia’s National Key Result Area Report 2010. Based on the visualized data on the crime map, and with manipulation of date range or the type of crime on the system, theadministration is able to plan for resource allocations and possibly the restructuring of resources either permanently or temporarily. This system could be imp

Keywords: crime, crime mapping, spatial database

Pages: 116 - 120 | DOI: 10.15224/978-981-07-8859-9-25

27. COMPARATIVE STUDY OF THE THREE DIFFERENT E-LEARNING MANAGEMENT TOOLS: A BASIS FOR DEVELOPMENT OF KNOWLEDGE BASED MANAGEMENT SYSTEM

Authors: BARTOLOME T. TANGUILIG , LORENA W. RABAGO , MARMELO V. ABANTE

Abstract: The Internet had been experiencing considerable improvements recently. Being involved in such rapid modernism, the Internet therefore attained the significant aspects which have the capabilities of providing an even more extensive approach on how society preserves and develop knowledge. Considering these facts, the internet had been utilized by lecturers specifically those within the fields of higher education to convey information with ease. The Internet is used to deliver initiatives with regards to learning aspects and indeed this has created a more sophisticated approach in teaching. Utilizing the internet for teaching, along with other technological mediums is then referred to as E-Learning. Nowadays, E-Learning has been traversing the conceptual path of innovation with haste, due to this certain instance, educational institutions haveto be able to adapt to the fast evolving environment in which it is involved in. A variety of teaching and learning techniques; specifically reorien

Keywords: E-Learning, Moodle, Claroline, Blackboard, mapping, LMS

Pages: 121 - 129 | DOI: 10.15224/978-981-07-8859-9-26

28. SENTIMENT ANALYSIS USING NAIVE BAYES WITH BIGRAMS

Authors: ADNAN RASHID HUSSAIN , MOHD ABDUL HAMEED , S. FOUZIA SAYEEDUNNISSA

Abstract: With the rapid growth of reviews, ratings, recommendations and other forms of online expression, online opinion has turned into a kind of virtual currency for businesses looking to market their products, identify new opportunities and manage their reputations. Sentiment analysis extracts, identifies and measures the sentiment or opinion of documents as well as the topics within these documents. The Naïve Bayes algorithm performs a boolean classification i.e. it classifies a document as either positive or negative according to its sentiment. We have already seen by Sayeedunnisa et al [1], that the application of Naïve Bayes trained on high value features, extracted from a bag-of-words model, yields an accuracy of 89.2%. This paper studies the application of Naïve Bayes technique for sentiment analysis by including training of bigram features to improve accuracy and the overall performance of the classifier. We also evaluate the impact of selecting low vs. high value features, calculated

Keywords: Naïve Bayes, Information Gain, Sentiment Analysis, Social Network, Twitter, Cloud Computing

Pages: 130 - 133 | DOI: 10.15224/978-981-07-8859-9-61

29. RAPID VISUAL SCREENING, FEMA 154, BUKIT TINGGI

Authors: A. MASOUMI VERKI , M. RASTEGARAN , S. B. BEHESHTI AVAL

Abstract: The collapse probability of structures is determined through two approaches of probability of exceedance in terms of EDP-Based and IM-Based approaches. Pertaining to characteristics of structure and types of excitations, these two values may evaluate the probability of collapse in lower and upper estimation. In this study, through combining these two estimations, a precise measure of collapse probability is exhibited. To evaluate collapse capacity of structures and implementation of probabilistic scheme in structure performance assessment, incremental dynamic analysis (IDA) and fragility curves are used. The systematic view of two approaches of collapse probability consists of engineering demand (EDP-Based) and intensity measure (IM-Based) are considered in series forms. The study results show that the combination of these two aforementioned schemes exhibit comprehensive vision of collapse probability of structures which are very important in performance evaluation of structures.

Keywords: Collapse Probability of Structures, Incremental Dynamic Analysis (IDA), Fragility Curves, Performance Evaluation, Engineering Demand Parameter (EDP), Intensity Measure Parameter (IM), Series Combinatio

Pages: 5 - 9 | DOI: 10.15224/978-981-07-8859-9-28

30. PRODUCTION OF PARTICLE REINFORCED ALUMINUM MATRIX COMPOSITES USING RANDOM ROTATION OF MOLD

Authors: BIMAL SARANGI , S. C.PANIGRAHI

Abstract: Production of particle reinforced composites is still in the development stage and investigations are in progress to devise techniques to uniformly distribute the reinforcing particles in the matrix so as to get the best properties. The cause of non-uniform distribution is the density difference and non-wetting behavior of the liquid metal and the particles. Random rotation of the mold is used in the present study to distribute redmud particles in an aluminum matrix. Red mud is a waste produced in the production of alumina and unless disposed properly cause environmental problems. A laboratory ball mill used for mineral processing was modified to suit the requirement. The castings were made in the ball mill with the molds rotating randomly. The microstructure of the samples showed uniform distribution of particles in the matrix. Variants in the mold designs tried and microstructures obtained are reported in the paper. It is observed that upto 25% of redmud can be added to aluminium suc

Keywords: Aluminium matrix composite, redmu

Pages: 54 - 56 | DOI: 10.3850/978-981-07-8859-9_38

Popular Proceedings

ICETM 2023

9th International E-Conference on Engineering, Technology and Management

ESSHBS 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ASET 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022

8th International E- conference on Engineering, Technology and Management

ACSEE 2019

8th International Conference on Advances in Civil, Structural and Environmental Engineering