Loading...

Proceedings of

International Conference on Advances in Computing, Communication and Information Technology CCIT 2014

Date
02-Jun-2014
Location
London , United Kingdom
Authors
111
ISBN
978-1-63248-010-1

42 Articles Published

1. BIG DATA ANALYTICS ON CLOUD-TECHNICAL, NON-TECHNICAL AND SECURITY ISSUES

Authors: ALHAJI IDI BABATE , ALI GARBA JAKWA , WADA ABDULLAHI

Abstract: Technology is increasingly being used by organizations as a tool for resource management in our complex social system. This paper presents an investigation on the technical issues and practical applications associated with Big Data analytics on cloud as a new and evolving computing technology. Big data analytics on clouds is a strategy empowered by later developments in technologies that drives almost every part of our present day social order, including mobile services, retail, manufacturing, financial services, life sciences, and physical sciences. The argument put forward was how Big Data becomes more adopted in the mainstream, the technical and non-technical security issues associated with it might increase and might hinder the growth of Big Data analytics on the Cloud computing environment. Therefore, we address and highlight the main security issues in Big Data analytics on cloud with a special focus on how and what to do to secure an efficient protection on the loss of confident

Keywords: loud computing, big data analytics, online, transaction

Pages: 1 - 8 | DOI: 10.15224/978-1-63248-010-1-01

2. PERCEPTIONS TOWARDS THE USAGE OF COLLABORATIVE LEARNING IN TEACHING AND LEARNING PROCESSES AT MALAYSIA POLYTECHNIC

Authors: FAAIZAH SHAHBODIN , HANIPAH HUSSIN , MOHD HAFIEZ AHMAD , NORASIKEN BAKAR

Abstract: It is difficult for a graduate to get employed, due to fierce competition within today’s career market. Most employers are primarily looking for good soft skills over academic achievements as selection criteria for selecting new employees. This paper shares the preliminary findings on the perceptions of students and lecturers on the use of Collaborative Learning in teaching and learning processes at Malaysia Polytechnic. In this study, two sets of questionnaires were distributed to 145 lecturers and 356 diploma students from Politeknik Ibrahim Sultan, Politeknik Merlimau, Politeknik Tuanku Syed Sirajuddin, Politeknik Kota Kinabalu, and Politeknik Sultan Idris Shah. All collected data was analysed using SPPS 19 software. The results show that even though lecturers used the collaborative learning method in their teaching and learning processes, the evaluation was only on the output product. The students felt that it was unfair for all members to get the same marks, and that the lecturers

Keywords: Collaborative Learning (CL), Employability, Soft skills

Pages: 9 - 12 | DOI: 10.15224/978-1-63248-010-1-02

3. MAPPING OF PERSONALIZED LEARNING ENVIRONMENT (PLE) AMONG MALAYSIAN’S SECONDARY SCHOOL

Authors: AHMAD NAIM CHE PEE @ CHE HANAPI , CHE KU NURAINI CHE KU MOHD , FAAIZAH SHAHBODIN

Abstract: Integrating informal and formal learning by using social media in education context of the pedagogical approach is called as Personalized Learning Environment or PLE. This paper reports on the implementation of Personalized Learning Environment (PLE) among Malaysian’s secondary school. The purpose of this paper is to highlight (a) Personalized Learning Environment (PLE), (b) Why use PLE, (c) Elements in PLE, (d) Frameworkin PLE and (e) Issues with PLE. Several surveys were developed to explore the learning needs and goals as well as to construct the vision of PLE implementation. PLE is using a variety of social media in teaching students to become effective self-regulated learners. Besides that, it may help the students acquire basic and complex personal knowledge, management skills such as for creating, managing, and sustaining

Keywords: Personalized Learning Environment; E-Learning; Framework; Social Media

Pages: 13 - 16 | DOI: 10.15224/978-1-63248-010-1-03

4. READINESS FACTORS ON MIGRATING TO IPV6

Authors: ASPALILLA MAIN , NIN HAYATI MOHD YUSOFF , NURUL AZMA ZAKARIA , ROBIAH YUSOF

Abstract: IPv6 was created in the 1990s by the Internet Engineering Task Force (IETF), as a next generation network layer protocol, to overcome the limitations of IPv4. However, organizations that plan to implement IPv6 should really be ready for deployment with proper planning; because non-preparation may contribute towards slowing down the migration process. Based on literature from previous research, this study discusses that organization readiness contributes to a slowing down of the migration process, and to identify the factors that influence an organization’s readiness towards IPv6 migration. The findings reveal that the level of organization readiness contributes to the speed of the migration process. The factors that influence organization readiness are migration cost, infrastructure (including hardware and software), knowledge, technical staff skills, and IPv6 awareness from all levels of personnel within the organization.

Keywords: IPv6, Migration, Readiness

Pages: 17 - 20 | DOI: 10.15224/978-1-63248-010-1-04

5. AVOIDANCE FACTORS AGAINST ONLINE ADVERTISEMENTS

Authors: MOHD ASYIEK BIN MAT DESA , MUHAMMAD HELMI BIN ABU BAKAR , MUHIZAM BIN MUSTAFA

Abstract: This study explains the factors related to the avoidance of an advertisement by consumers. Factors that contribute to the avoidance of advertisements are important, as they lead to helping designers to design better and more effective advertisements. The results of this study have affirmed the factors related to the avoidance of advertisements by consumers. These factors are a good guidance for stakeholders, such as designers, educators, students, etc., to design better advertisements. These factors also serve as a direction for stakeholders to take, in order to increase the effectiveness of information delivery to consumers.

Keywords: Avoidance, Visual Complexity, Orientation

Pages: 21 - 24 | DOI: 10.15224/978-1-63248-010-1-05

6. HYBRID ‘A+AGPD+C’ MODEL : PHENOMENON THREE DIMENSIONAL FORM FOR ILLUSTRATION DRAWING PAINTING MANUALLY

Authors: KASRAN , JIDDIN , MARIA , MOHAMMAD , MD. NASIR , IBRAHIM , MOHAMAD FAISAL AHMAD , MOHAMAD RUSDI , MOHD NASIR

Abstract: This study employed model process of line drawing painting manually using a hybrid context 'Art' and 'Architecture Graphic Presentation Drawing' and courseware (A + AGPD+C). Model process will propose in courseware prototype. This hybrid model was designed to assist difficulties in producing a quality visual object among undergraduate student. Interview, observation and imitation were used in the visualization process. The organization of Line Visual Art (LVA) was analyzed based on art elements: appearance, line, shape, form, texture and color in order to form three dimensional illustration line drawing objects manually (3DiLDom). The model process consists of the best technique drawing painting in (3DiLDOm) by Subject Matter Expert (SME) and mimesis Modeling. This study helps in the development of students’ drawing ability using line techniques. The courseware can be used by students, lecturers, and communities in improving their understanding of drawing and to work independently. Thi

Keywords: Hybrid, Dimensional, line, Architectural Graphics Presentation Drawing Instructional Learning Design

Pages: 25 - 30 | DOI: 10.15224/978-1-63248-010-1-06

7. APPLICATIONS OF THE RELATIVE NEIGHBOURHOOD GRAPH

Authors: GODFRIED T. TOUSSAINT

Abstract: The relative neighborhood graph of a collection of objects assigns an edge to a pair of objects (A, B), provided that no other object is closer to both A and B, than A and B are to each other. This graph was originally proposed for the purpose of extracting the low-level visual perceptual structure of two-dimensional dot patterns. During the past thirty-four years the relative neighborhood graph has been applied to a multiplicity of different disciplines, and sometimes to several problems within a single discipline. This paper provides a review of some of these applications, including: wireless network communications, archaeological network analysis, grid typification in cartography, data mining for geographic information systems, shape analysis, image morphology, polygon decomposition, the extraction of primal sketches in computer vision, the reduction of the size of the training set in instance-based machine learning, the design of non-parametric decision rules, support-vector machin

Keywords: relative neighbourhood graph, Gabriel graph, minimum spanning tree, Urkuhart graph, Delaunay triangulation, proximity graphs, graph theory, computational geometry, image morphology, primal sketch, visual perception, shape analysis, artificial intelligence, support vector machines, machine learning, statistics, wireless networks

Pages: 31 - 39 | DOI: 10.15224/978-1-63248-010-1-07

8. ESTIMATION OF HURST EXPONENT AND FILTERING GAUSSIAN EFFECT ON FRACTIONAL BROWNIAN MOTION

Authors: DANLADI ALI , V.V. GNATUSHENKO

Abstract: In this work, four different sets of data traffic have been generated from fractional brownian motion (fBm) to estimate true values of Hurst exponent boundaries in order to determine the degree of self-similarity in terms of long range dependence (LRD). One-dimensional multilevel wavelet decomposition and filtering algorithm is applied to filter fractional Gaussian noise (fGn) in the fBm generated. Autocorrelation function (ACF) and fast Fourier transform (FFT) energy spectrum is used to validate the result of the filtering effect. The result of the filtering process revealed that fGn in the fBm is de-noised successfully as the coefficient of ACF grow above zero and energy rate in the FFT- spectrum increases tremendously.

Keywords: fBm, ACF, FFT, LRD Hurst exponent and self-similarity.

Pages: 40 - 44 | DOI: 10.15224/978-1-63248-010-1-08

9. MIXED METHOD FOR REDUCING THE ORDER OF A LINEAR DISCRETE TIME INTERVAL SYSTEM

Authors: KRANTHI KUMAR DEVEERASETTY , S. K. NAGAR

Abstract: The paper proposes a mixed method for reducing the order of discrete time interval systems. The numerator and denominator of the reduced order model is obtained by forming table and combining factor division method and Cauer second form. Bilinear transformation (z = p+1) is used during the process of higher order discrete interval systems before applying reduction method. The proposed method shows that it is well suited to reduce both denominator and numerator interval discrete polynomials. The proposed method is compared with the existing methods of discrete interval system reduction. A numerical example has been discussed to illustrate the procedure. Accuracy of the system stability has been verified by using step response.

Keywords: Cauer second form, discrete interval systems, α table, β table, factor division, mixed method.

Pages: 49 - 53 | DOI: 10.15224/978-1-63248-010-1-10

10. THE EFFECTS OF DESIGN ELEMENTS ON LOCATION-BASED GAMIFICATION: A CASE STUDY OF THE CHENGCHI ADVENTURE APP

Authors: SHARI S. C. SHANG , VINCENT Y. C. LAI

Abstract: The rapid growth in the use of location-based gamification by enterprises will provide the motivation for the proposed research. In this research, I first focus on the positive consequences of the incredible growth of this trend, and show that it is worthy of analysis. Second, I attempt to address the negative aspects of the trend by examining the questions raised and difficulties encountered when enterprises use location-based gamification. Third, I identify the design elements of location-based gamification and define brand experience and brand loyalty. Fourth, I outline hypotheses regarding the relationships between the design elements of location-based gamification and brand experience, and between brand experience and brand loyalty. The objective of the proposed research is to help enterprises to better understand the use of location-based gamification to enhance brand experience and brand loyalty.

Keywords: location-based, gamification, experience, loyalty, design element

Pages: 54 - 59 | DOI: 10.15224/978-1-63248-010-1-11

11. THREADS AND COMPUTER PERFORMANCE IN OPENMP

Authors: ARSEN KURTI , ERMELA CEKANI HYSA , IGLI TAFA

Abstract: In our days we want to run multiple jobs in the same time in the system. Most of computers systems have multiple processors or multiple execution cores. This makes the concurrency higher. I choose the theme about threads because I wanted to know more about the basic unit of software that operating systems deal with “threads”. In this article I am going to describe these threads and I am going to do an experiment to explain better how they affect the load of CPU and the performance too.

Keywords: multi processors, threads, CPU performance

Pages: 60 - 66 | DOI: 10.15224/978-1-63248-010-1-12

12. PERFORMANCE EVALUATION OF RAISED-COSINE WAVELET FOR MULTICARRIER APPLICATIONS

Authors: KOO ANOH , O OCHONOGOR , RAA ABD-ALHAMEED , SMR JONES , TT MAPOKA , YAS DAMA

Abstract: Wavelets are alternative building kernels of the multicarrier systems, such as the orthogonal frequency division multiplexing (OFDM). The wavelets can be designed by changing the parent basis functions or constructing new filters. Some two new wavelets are considered for multicarrier design; one is designed using raised-cosine functions while the other was constructed using ideal filters. The spectrums of raised-cosine wavelet filters are controlled by a roll-off factor which leads to many distorting sidelobes. The second family of wavelet, which the raised-cosine wavelet is compared to, have no distorting sidelobes. It will be shown that raised-cosine wavelets are less suitable for multicarrier design in multicarrier environment, in terms of BER when compared to the wavelet constructed from the ideal filter.

Keywords: raised-cosine; ideal filter; OFDM; multicarrier system;

Pages: 67 - 71 | DOI: 10.15224/978-1-63248-010-1-13

13. SOFTWARE DEVELOPMENT ISSUES AND CHALLENGES IN DIGITALIZING AN EXISTING HEALTH SYSTEM FOR TUBERCULOSIS PATIENTS: A CASE STUDY IN MALAYSIA

Authors: ABDULLAH ZAWAWI TALIB , LEE HENG WEI , MOHD AZAM OSMAN , MUSTAFA KAMAL RAZAK , STEVEN CHAN YEW CHOONG , WONG POH LEE

Abstract: Tuberculosis (TB) is second only to HIV/AIDS as the greatest killer worldwide due to a single infectious agent, and is one of the top killers among infectious diseases in Malaysia. In Malaysia, the TB incidences are increasing every year. Although the TB treatment success rate is increasing, the number is still not very promising compared to those in neighbouring countries. A study showed that patients treated without close observation by the hospital have a substantially higher risk of adverse outcome. The study also showed that a large proportion of unsuccessful treated cases could be identified and prevented at an earlier stage if the patients are closely observed by the hospital. As a result, we initiated a project called “Wellness Community: M-Health for TB patients” in an effort to enable the hospital to closely monitor and communicate with TB patients by utilizing information and communications technology. We developed a prototype of M-Health system which deploys push and pull t

Keywords: mobile technology, online messaging, tuberculosis, agile software development

Pages: 72 - 76 | DOI: 10.15224/978-1-63248-010-1-14

14. LEXICAL ONTOLOGY MODEL BASED ON SBVR REPRESENTATIONS

Authors: BRONIUS PARADAUSKAS , GINTARE KRISCIUNIENE , LINA NEMURAITE , RITA BUTKIENE

Abstract: The paper presents a model of lexical ontology, based on SBVR representations, which is related to domain ontology used for semantic search in Lithuanian Internet corpus. The advantage of using SBVR based lexical ontology is the support of various relations among different types of meanings and representations, considering phrases instead of single words, and possibility of transformations to (and from) ontologies. We make an assumption that such ontology model is capable to encompass features contained in current lexical ontologies, and may be used in semantic search and Natural Language Processing techniques.

Keywords: ontology, semantic roles, lexical ontology, SBVR, OWL 2, FrameNet, VerbNet, WordNet

Pages: 77 - 81 | DOI: 10.15224/978-1-63248-010-1-15

15. JAMMING ATTACK IN SMART GRID WITH DYNAMIC GAMING THEORY

Authors: JINGHUAN MA , LINGYANG SONG , YUTING LIU , ZHU HAN

Abstract: As the current power grid system is upgrading to smart grid, it becomes more vulnerable to security attacks such as Denial-of-Service attacks. One type of such attacks is jamming attack. In this paper, we analyze the scenario in which the attacker can jam specific signal channels in order to change the electricity prices to create the opportunity for profit, and the defender protect a limited number of channels. Based on the electricity marketing model, we propose multi-act dynamic game between the attacker and the defender, in which both of them will take the optimal strategy to maximize their own profits. We construct the gaming process and discuss the prosperities of the outcome. Simulation results confirm the optimality and prosperities of the proposed scheme.

Keywords: smart grid, jamming, dynamic games

Pages: 82 - 86 | DOI: 10.15224/978-1-63248-010-1-16

16. OPTIMIZING SPANNING TREE PROTOCOL USING PORT CHANNEL FOR GREENER SWITCHING

Authors: APARAJIT P UTPAT , CHANDAN N BHAGWAT , SHOBHA G , Y.NAVANEETH KRISHNAN

Abstract: Redundant design in layer 2 networks gives rise to problems such as mislearning of MAC addresses, broadcast storms and multiple frame copies. To prevent this IEEE 802.1d Spanning tree protocol is used. Spanning tree protocol removes the redundant links by disabling the ports to which the redundant links are connected. When the active link goes down the spanning tree protocol has to be executed again to place a redundant connection as active link. This causes convergence issues. Port Channels allows grouping of several Ethernet links to create one logical connection. In this paper we have used the redundant links between switches as port channels thereby making the switch to believe that there is only one connection instead of multiple physical connections to a switch thereby spanning tree protocol is never executed. Experimental analysis also showed that using port channels to eliminate layer 2 loops causes increase in bandwidth, enables load balancing and faster convergence between th

Keywords: Redundant, Greener Switching, spanning tree protocol, convergence, Port Channel, switches, load balancing, Power.

Pages: 87 - 90 | DOI: 10.15224/978-1-63248-010-1-17

17. ONLINE MULTIPLE INTELLIGENCE TEACHING TOOLS (ON-MITT) FOR EDUCATORS

Authors: NORASIKEN BAKAR , SHARIFAH NADIYAH RAZALI

Abstract: The theories of Multiple Intelligence (MI) used in this paper which cater to students’ intelligence are able to enjoy learning in class and have a positive academic achievement. Nowadays, educators are faced with the younger generation that is not only highly skilled in ICT but also constantly exposed to a source of information and a variety of media. In this situation, all educators should equip themselves with ICT skills more than students and use all existing platforms and mediums. Educators must always be well prepared to make changes to the teaching and learning environment. Thus, innovation is necessary to make effective teaching and learning in classroom. Online Multiple Intelligence Teaching Tools (On-MITT) provides several tools to facilitate educators in preparing teaching materials that utilizes interpersonal, visual-spatial and verbal-linguistic intelligences. With only few steps in preparing teaching activities, educators can create creative and interesting teaching materi

Keywords: Multiple Intelligence, Interpersonal, Visual-Spatial, Verbal-Linguistic, Online Learning

Pages: 91 - 94 | DOI: 10.15224/978-1-63248-010-1-18

18. PERFORMANCE EVALUATION OF TEXTURE BASED IMAGE SEGMENTATION USING GLCM

Authors: INDERPAL SINGH

Abstract: This paper presents image segmentation and texture analysis algorithms on synthetic and real images. This research work demonstrates the considerable variability in an image understanding system performance based on different choices of image segmentation and texture analysis algorithms used. This research work includes results of a segmentation method to extract the object based on color and texture features of color images. Image segmentation denotes a process of partitioning an image into distinct regions. Based on the color segmentation result, and the texture variances between the background image and the object, we extract the object by the gray level co-occurrence matrix for texture segmentation. The GLCMs broadly represent the joint possibility of occurrence of grey-levels for pixels with a given spatial relationship in a defined region. Finally, the segmentation result is improved by mathematical morphology methods

Keywords: Image segmentation, Texture analysis and GLCM

Pages: 95 - 98 | DOI: 10.15224/978-1-63248-010-1-19

19. A NEW TREND FOR FACE RECOGNITION FEATURES

Authors: B. M. NASEF , I. E. ZIEADAN

Abstract: This paper introduces a new trend for face recognition features. It is based on dividing the face into four horizontal and five vertical regions [16]. Each region is divided into an optimum number of eight vertical and seven horizontal partitions. One approach using average per partition features and another using histogram per region features are considered. Algorithms to find the minimum of Euclidean distance (ED) between a test image and a matching DB registered image are discussed. Both algorithms achieved 100% recognition rate (RR) with ORL and Yale databases. A new definition for RR that is termed inclusive recognition rate (RRi) is suggested. RRi supports testing images belonging to DB subject's images or not.

Keywords: Face features, Face partitions, Face recognition, Face regions, Image identification

Pages: 99 - 103 | DOI: 10.15224/978-1-63248-010-1-20

20. TEST CASES REDUCTION THROUGH PRIORITIZATION TECHNIQUE

Authors: AVINASH GUPTA , DHARMENDER SINGH KUSHWAHA , DUSHYANT KUMAR SINGH , NAYANEESH MISHRA

Abstract: Regression testing is a costly and time taking affair. Because of time and resource constraints it is not possible to run all the test cases of the regression test suite. Prioritization of test cases provides a way to run highest priority test cases in the first phase. It helps to improve the percentage of fault detected in given time and is found to work better with feedback mechanism. History Based approach is one of the methods to prioritize the test cases based on the feedback of each test case. The feedback for each of the test cases is obtained from the history of each of the test cases in terms fault detection, number of executions and other such factors. This paper proposes the prioritization of test cases for the modified lines of code. The results establish that number of sessions required for running the test cases reduces by almost 33%.

Keywords: Feedback in prioritization, Prioritization, History Based, percentage of Fault detection, Test Suite

Pages: 104 - 108 | DOI: 10.15224/978-1-63248-010-1-21

21. EEG-BASED CLASSIFICATION OF IMAGINED FISTS MOVEMENTS USING MACHINE LEARNING AND WAVELET TRANSFORM ANALYSIS

Authors: ALI M. BANIYOUNES , EMAD A. AWADA , MOHAMMAD H. ALOMARI

Abstract: Electroencephalography (EEG) signals represent the brain activity by the electrical voltage fluctuations along the scalp. In this paper, we propose a system that enables the differentiation between imagined left or right fist movements for the purpose of controlling computer applications via imagination of fist movements. EEG signals were filtered and processed using a hybrid system that uses wavelet transform analysis and machine learning algorithms. Many Daubechies orthogonal wavelets were used to analyze the extracted events. Then, the Root Mean Square (RMS) and the Mean Absolute Value (MAV) were calculated to the wavelet coefficients in two detail levels. Support Vector Machines (SVMs) and Neural Networks (NNs) were applied to the feature vectors and optimized by carrying out an intensive learning and testing experiments. Optimum classification performances of 84.5% and 82.1% were obtained with SVMs and NNs, respectively. Compared with the related research work reported in the lite

Keywords: BCI, Data Mining, Machine Learning, SVMs, NNs, DWT, Feature Extraction

Pages: 109 - 113 | DOI: 10.15224/978-1-63248-010-1-22

22. ENCRYPTION ON DATA IN CLOUD ENVIRONMENT

Authors: CHENGLIANG WANG , MUHAMMAD SAJID KHAN

Abstract: In this research paper, an encryption technique has been developed which consists of indexing and searching. The scheme does not need to inculcate the decryption steps, the users no longer need to decrypt the data during search operation. The proposed method makes the search operation more efficient and fast. Besides, it guarantees the protection and security of data.

Keywords: datastorage, indexing, searchable encryption, cloud computing

Pages: 114 - 116 | DOI: 10.15224/978-1-63248-010-1-23

23. A DIGITAL BATIK TOOL SUPPORTING CHILDREN IN UNDERSTANDING AND CONSTRUCTING TRADITIONAL BATIK PATTERNS WITHIN A MUSEUM CONTEXT

Authors: HEIDI SCHELHOWE , HESTIASARI RANTE , MICHAEL LUND

Abstract: Batik is a method of drawing using canting and cap to create intricate designs on textiles, generally cotton, dyeing it whereas patterned areas are covered with wax so that they will not receive color. In a deeper meaning, batik is not only the pattern on clothes, but it is more about technique and process. In Indonesia, the technique is an ancient method, which has been practiced since prehistoric times. Nowadays the technique has been improved but still left some constraints during the process and consumes a lot of time. This phenomenon causes that young people and young children are not really keen in learning how to make batik using the traditional technique, even though they love to wear batik clothes. Some batik museums in Indonesia provide huge collections and conduct regular workshop of making batik. However, the lack of opportunity to teach and transfer the skills of making batik is still problematic. This paper shares the preliminary concept of a digital tool designed to supp

Keywords: batik, digital media, game-based learning, museum, software

Pages: 117 - 121 | DOI: 10.15224/978-1-63248-010-1-24

24. GLUCOSE-INSULIN REGULATOR FOR TYPE 1 DIABETES USING HIGH ORDER NEURAL NETWORKS

Authors: AGUSTÍN RODRÍ´IGUEZ-HERRERO , CARLOS E. CASTAÑEDA , GEMA GARCÍA-SAÉZ , M. ELENA HERNANDO , ONOFRE OROZCO

Abstract: this paper a Glucose-Insulin regulator for Type 1 Diabetes using artificial neural networks (ANN) is proposed. This is done using a discrete recurrent high order neural network in order to identify and control a nonlinear dynamical system which represents the pancreas’ beta-cells behavior of a virtual patient. The ANN which reproduces and identifies the dynamical behavior system, is configured as series parallel and trained on line using the extended Kalman filter algorithm to achieve a quickly convergence identification in silico. The control objective is to regulate the glucose-insulin level under different glucose inputs and is based on a nonlinear neural block control law. A safety block is included between the control output signal and the virtual patient with type 1 diabetes mellitus. Simulations include a period of three days. Simulation results are compared during the overnight fasting period in Open-Loop (OL) versus Closed-Loop (CL). Tests in Semi-Closed-Loop (SCL) are made f

Keywords: dentification, Recurrent Neural Networks, Extended Kalman, Diabetes, Artificial Pancreas, insulin, glucose

Pages: 122 - 129 | DOI: 10.15224/978-1-63248-010-1-25

25. USING SBVR PROFILE FOR INTEGRATING BUSINESS VOCABULARY WITH BPMN PROCESS MODELS

Authors: EGLE MICKEVICIUTE , RIMANTAS BUTLERIS , SAULIUS PAVALKIS

Abstract: Creation of business vocabulary is the first step in business modelling and development of its supporting information systems. Current CASE tools still lack this capability. The goal of the paper is to allow integrating business vocabulary and business rules with business process models in CASE tools by providing UML profile for this purpose. The idea is demonstrated by a prototype implementing the proposed UML SBVR profile, and a business process example for illustrating the advantages of using SBVR vocabulary in the modelling.

Keywords: business vocabulary, business process, business rule, SBVR, BPMN, UML profile

Pages: 130 - 135 | DOI: 10.15224/978-1-63248-010-1-26

26. COMPARE PROCESS OF SOME CLUSTERING ALGORITHMS OF DATA MINING

Authors: JAMAL MBARKI , SIDI YASSER EL JASOULI

Abstract: The aim of this paper is to create a process that compare time response of some clustering algorithms in data Mining , the subset of this experimentation is a data set stored in Teradata . In this paper, we present a novel hierarchical clustering algorithm called CHAMELEON that measures the similarity of two clusters based on a dynamic model. We present also k Means as representative of Partitioned ones, and DBSCAN as part of Density Based.

Keywords: —component; data mining; Clustering ; response time

Pages: 136 - 140 | DOI: 10.15224/978-1-63248-010-1-27

27. SIMULATION-BASED FAULT DETECTION FOR HYDRAULIC ELEMENTS

Authors: A. CHATZINIKOLAOU , C. ANGELI

Abstract: The purpose of performance monitoring and fault diagnostics are to detect and distinguish faults occurring in machinery in order to increase the level of maintenance and improve safety conditions. In fluid power systems, it is necessary for safety reasons to detect faults in an early phase by establishing a suitable diagnostic system. The diagnostic system presented in this paper compares simulation results and data acquired from an actual system in a suitable environment and the residuals are evaluated for the fault detection process. The final fault diagnosis process is achieved by interaction of modelling information, on-line measured values of the system variables and stored knowledge

Keywords: Modelling, Simulation, Fluid power systems, Fault detection

Pages: 141 - 145 | DOI: 145

28. MOBILE DEVICE USABILITY: TOWA

Authors: AHMED S. ALAWAJI

Abstract: The increasing trend of using smartphones and mobile applications led to more competition among smartphone manufacturers and companies to attract mobile customers. Mobile users use phones to perform all types of tasks ranging from home and work related tasks to phone calls. Due to the cost and time needed to launch a new mobile application product, a lot of companies neglect the use of comprehensive usability testing method to gather the users’ feedback before introducing the new product. In fact, mobile application products should be tested by real users to discover usability problems before the application is launched into market. A novel usability testing method for mobile devices has been proposed in this work to gather more accurate feedback from the users throughout the testing phase. The proposed method combines think-aloud protocol and field study to identify usability problems while gathering the users’ feedback. The results show a comprehensive analysis of the testing method

Keywords: experience, user interface

Pages: 146 - 151 | DOI: 10.15224/978-1-63248-010-1-29

29. ANALYSIS OF ROUTING PROTOCOLS OVER VANET THROUGH THE USING MATLAB SIMULATOR

Authors: FIHRI MOHAMMED , OTMANI MOHAMED

Abstract: VANET is a Vehicular Ad hoc Network; it is a new network technology where the cars are used as mobile nodes to form a communication network. In VANET, routing protocols have a significant role in terms of the performance because they determine the way of sending and receiving packets between mobile nodes. In this paper, we examine and analyze the performance of Ad-hoc On-Demand (AODV), Dynamic Source Routing (DSR) and Destination-Sequenced Distance Vector (DSDV) routing in terms of Packet Delivery Ratio, Average End to End Delay, Latency and Throughput. The objective of this study is to find the best routing protocol over all circumstances. Based on our validated results, AODV performs the best among all evaluated protocols.

Keywords: VANET; AODV; DSR; DSDV; MATLAB

Pages: 152 - 156 | DOI: 10.15224/978-1-63248-010-1-30

30. REACTIVE PROTOCOL IN VANET

Authors: P.GEETHARANI

Abstract: The Dynamic Source Routing protocol (DSR) is a simple and efficient Routing protocol designed specifically for use in multi-hop wireless mobile nodes networks called Ad hoc networks. DSR allows the network to becompletely self-organizing and self-configuring, without the need for any existing network infrastructure or administration. This paper describe the design of our own implementation of DSR protocol using DSR VANET draft in NS2 simulator environment and provide a summary of some the simulation and tested implementation results for the protocol.

Keywords: Ad Hoc networks, DSR, node, VANET,N

Pages: 157 - 160 | DOI: 10.15224/978-1-63248-010-1-31

31. FAULT DIAGNOSIS FOR PHOTO-VOLTAIC POWER CONVERTER BASED ON MODEL OBSERVERS

Authors: ABDELKADER BOUSSELHAM , ZHAOHUI CEN

Abstract: As a key part of Photo-Voltaic (PV) power system, the power converters are easy to degrade and age because of its uninterrupted operations and instability of PV power output, it is essential to monitor conditions of the power converters and diagnosis faults in real-time to avoid fatal failures and improve the reliability. In this paper, a novel model-observer is proposed to monitor the states of power converters, and diagnosis component faults. Residual vectors generated from the proposed model observer can be used for fault detection and isolation. Finally, simulations on the PV buck converter are performed to test and validate the effectiveness of the proposed method

Keywords: Fault diagnosis, Photo-Voltaic, model observer, buck

Pages: 161 - 165 | DOI: 10.15224/978-1-63248-010-1-32

32. ENERGY-EFFICIENT METHOD FOR COOPERATIVE SPECTRUM SENSING IN COGNITIVE RADIO NETWORKS

Authors: GHEORGHE FLOREA , RADU DOBRESCU

Abstract: Energy detection is one of the popular spectrum sensing technique for cognitive radio. Better performance can be obtained by cooperative detection, but only when cognitive radios did not have different geographic locations and channel environment. To avoid this drawback, the paper presents an improved energy-based weighted cooperative spectrum sensing method which allows to achieve higher detection probability, to reduce the number of cognitive nodes involved in the detection procedure and to use efficiently the channel resources

Keywords: cognitive radio, cooperative spectrum sensing, energy detection, optimization

Pages: 166 - 170 | DOI: 10.15224/978-1-63248-010-1-33

33. AN ALGORITHM TO DETECT INCONSISTENCIES IN ACCESS CONTROL POLICIES

Authors: MUHAMMAD AQIB , RIAZ AHMED SHAIKH

Abstract: Inconsistency in access control policies exists when two or more than two rules defined in the policy set lead to the contradictory decisions. It makes it difficult for the system to decide which rule is applicable to the current scenario and hence make the system vulnerable to the unauthorized use. Different inconsistency detection methods have been proposed by researchers. However, those suffer from various limitations. In this article, we propose an algorithm that detects the inconsistencies in the policies using decision trees and returns the inconsistent rules with contradictory attribute values

Keywords: access control, inconsistency detection, policy validation

Pages: 171 - 175 | DOI: 10.15224/978-1-63248-010-1-34

34. A STUDY OF SOCIAL MEDIA GRATIFICATION OF CUSTOMER RESONANCE ON PURCHASE INTENTION

Authors: SHARI S. C. SHANG , AMBER Y. J. SIE

Abstract: In recent years, social networks have become incredibly popular and gradually been an interpersonal communication platforms—away from traditional face-to-face and word-of-mouth interaction toward new forms of online communication referred to as electronic word-of-mouth such as user-generated content. Messages resonate when information is shared among individuals. We want to have a better understanding of the use and gratification that users obtain from social networks when topics resonate with them. The purpose of this study is to investigate what drives people to share or reply to content on social networks while customers’ resonance arises and understand the impact of customer resonance on purchase intention.

Keywords: Social networks, customer resonance, e- commerce, purchase intention

Pages: 176 - 180 | DOI: 10.15224/978-1-63248-010-1-35

35. A STUDY OF ADVANTAGES OF APP DEVELOPMENT

Authors: SHARI S. C. SHANG

Abstract: The application (apps) on smartphones exhibit many kinds of innovation. With the powerful features of Smartphones, people can easily access the internet, social networking, email, and instant messaging. The introduction of the App stores has broken the barriers of big investments in hardware and software for software development and made software development simple and easy with only a few people or even a single person doing the work and quickly reaching users directly around the world. These unique features of app innovation make us to explore whether the first-mover advantages exist in app development, and if the first-mover advantages can be sustained. This exploratory research reviewed literature about first-mover advantages in products, services, and e-commerce innovation. First-mover advantages often arise from sources as follows: technological leadership, resources preempting, switching costs, network externalities, and pricing advantages. With the objective to understand wheth

Keywords: First-mover advantage, apps, app store

Pages: 181 - 185 | DOI: 10.15224/978-1-63248-010-1-36

36. INVESTIGATIONS ON ROUTING PROTOCOLS IN MOBILE GRID ENVIRONMENT

Authors: L.NIRMALA DEVI

Abstract: Grid computing has recently migrated from traditional high performance and distributed computing to pervasive and utility computing based on the advanced capabilities of the wireless networks and the lightweight, thin devices. As a result the emergence of a new computing paradigm which evolved is the Mobile Grid. This paper presents the simulation results in order to choose the best routing protocol to give the highest performance. When implement the routing protocols in the target mobile grid application. The simulations comparing three ad hoc routing protocols named DSDV, DSR and AODV. The simulations have shown that the conventional routing protocols like DSR have a dramatic decrease in performance when mobility is high. However the AODV and DSDV are perform very well when mobility is high

Keywords: lightweight, devices, result, emergence, computing paradigm

Pages: 186 - 190 | DOI: 10.15224/978-1-63248-010-1-37

37. PROVIDING FAULT TOLERANCE IN GRID COMPUTING SYSTEMS

Authors: TORKI ALTAMEEM

Abstract: In grid computing, resources are used outside the boundary of organizations and it becomes increasingly difficult to guarantee that resources being used are not malicious. Also, resources may enter and leave the grid at any time. So, fault tolerance is a crucial issue in grid computing. Fault tolerance can enhance grid throughput, utilization, response time and more economic profits. All mechanisms proposed to deal with fault-tolerant issues in grids are classified into: job replication and job checkpointing techniques. These techniques are used according to the requirements of the computational grid and the type of environment, resources and virtual organizations it is supposed to work with. Each has its own advantages and disadvantages which forms the subject matter of this paper.

Keywords: Fault tolerance, Grid computing, Checkpointing, Job replication.

Pages: 191 - 195 | DOI: 10.15224/978-1-63248-010-1-106

38. PROVIDING FAULT TOLERANCE IN GRID COMPUTING SYSTEMS

Authors: TORKI ALTAMEEM

Abstract: In grid computing, resources are used outside the boundary of organizations and it becomes increasingly difficult to guarantee that resources being used are not malicious. Also, resources may enter and leave the grid at any time. So, fault tolerance is a crucial issue in grid computing. Fault tolerance can enhance grid throughput, utilization, response time and more economic profits. All mechanisms proposed to deal with fault-tolerant issues in grids are classified into: job replication and job checkpointing techniques. These techniques are used according to the requirements of the computational grid and the type of environment, resources and virtual organizations it is supposed to work with. Each has its own advantages and disadvantages which forms the subject matter of this paper.

Keywords: Fault tolerance, Grid computing, Checkpointing, Job replication.

Pages: 191 - 195 | DOI: 10.15224/978-1-63248-010-1-106

39. THE STUDY OF BUSINESS PERFORMANCE AND MULTI-OBJECTIVE DECISION SUPPORT SYSTEM FOR THE TAIWAN BANKING INDUSTRY

Authors: W. WEN

Abstract: Business performance and multi-objective decision support systems play a critical role forsurviving in a strongly competitive global market. Accurate business performance evaluation is akey to strength enterprises competition. In this paper, we collect the financial indices of therelevant literatures for analyzing the relationship among the indices. Four different abilities are commonly considered when analyzing the financial health of a company--liquidity/Debt-paying, financial structure/Stability, activity/efficiency, and profitability. Each one has different indices for measurement. In total, there are 11 indices included (e.g. Current ratio, Quick Ratio, Debt to Total Assets Ratio, Permanent Capital to Fixed Assets Ratio, Accounts Receivable Turnover, Average Accounts Receivable Collection, Fixed Asset Turnover Ratio, Total Asset Turnover Ratio, Return on Assets, Return on Equity, Net Profit Ratio). In order to select better performance indices, we adopt structural equationmodel (S

Keywords: Accounts Receivable Collection, Fixed Asset Turnover Ratio, Total Asset Turnover Ratio, Return on Assets, Return on Equity,

Pages: 196 - 196 | DOI: 10.15224/978-1-63248-010-1-107

40. THE RESEARCH OF INTERFERENCE RESISTANCE OF CHIPS OF CONTACTLESS IDENTIFICATION

Authors: ILIPOV MARLEN , ISKAKOVA AYMAN

Abstract: The effect of noise and noise interference resistance of wideband signals is described. probabilistic description Interference resistance contactless identification chip is submitted

Keywords: the chips of contactless identification, the probability, the signal

Pages: 197 - 199 | DOI: 10.15224/978-1-63248-010-1-109

41. DESIGN AND EVALUATION OF BANDWIDTHPERFORMANCE IN A COOPERATE NETWORK

Authors: S. K. SINGH

Abstract: In this work we developed a corporate network consists of two separate building with four departments on different virtual local area network (VLAN) for the security purpose. We achieved this design using OPNET technology which really helped us to revealed the traffic characteristics of network just like in a real life network, the central idea of this was focused on the choice of likely bandwidth suitable for a corporate network design, this work categorically suggested that larger bandwidth is more preferable which is capable of handling large traffic volume of traffic compared to the narrow bandwidth which usually suffers from bottle neck that limits the number of the throughput at the destination

Keywords: VLAN, Bandwidth, IP address, Traffic and OPNET technology

Pages: 200 - 204 | DOI: 10.15224/978-1-63248-010-1-110

42. PREDICTIVE MODELING OF DATA DELAY IN A CORPORATE NETWORK BASED ON INPUT CHARACTERISTICS BY APPLYING SIMULATION MODEL

Authors: V.V. GNATUSHENKO , ALI DANLADI

Abstract: Achieving excellent network quality of service (QoS) is the fundamental aim of any internet service provider (ISP), in view of this, a model of a corporate network has been developed, simulated and implemented using optimized network engineering tool (OPNET) technology in the simulation area of 10,000m2 office topology, to monitor the effect of data delay in a network based on the input characteristics; 50, 100, 150 and 200 host users to predict the network performance. The result shows that the network with the less number of host users has the better network performance, which implies that; the more the number of the host users the higher the data delay. The data delay predicted in the network with 50, 100, 150 and 200 host users are 0.004801/s, 0.006826/s, 0.006969/s and 0.019697/s respectively. The modeling result predicts that the input characteristics have an influence over network performance as well as capacity utilization.

Keywords: Corporate network, local area network, delay, model, traffic monitoring and host users.

Pages: 205 - 211 | DOI: 10.15224/978-1-63248-010-1-111

Popular Proceedings

ICETM 2023

9th International E-Conference on Engineering, Technology and Management

ESSHBS 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ASET 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022

8th International E- conference on Engineering, Technology and Management

ACSEE 2019

8th International Conference on Advances in Civil, Structural and Environmental Engineering