Skip to main content

Über dieses Buch

This 4-Volume-Set, CCIS 0251 - CCIS 0254, constitutes the refereed proceedings of the International Conference on Informatics Engineering and Information Science, ICIEIS 2011, held in Kuala Lumpur, Malaysia, in November 2011. The 210 revised full papers presented together with invited papers in the 4 volumes were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on e-learning, information security, software engineering, image processing, algorithms, artificial intelligence and soft computing, e-commerce, data mining, neural networks, social networks, grid computing, biometric technologies, networks, distributed and parallel computing, wireless networks, information and data management, web applications and software systems, multimedia, ad hoc networks, mobile computing, as well as miscellaneous topics in digital information and communications.



Information and Data Management

Risk Management Determinants in Vendor Selection of IT Tender Evaluation Process

This study reports on the determinants of Information Technology tender activity focusing on vendor selection process. The evaluation process in the selection of vendors is crucial because this is the phase where risks occur frequently. A survey is conducted among government agencies, government-linked companies and private sectors which are involved in IT procurement. Sixty percent of the population responded. A factor analysis is performed and four risk categories are extracted with a total of 11 determinants identified. The four categories of risks are vendor financial stability, hazards, operation and strategic. Determinants for vendor financial stability include pricing and the determinants for operation are performance, and deliverable. Meanwhile, reporting, customer demand, business enabler and supply chain are the determinants for strategic and agreement, security and support are the determinants for hazard. This study contributes towards new knowledge by proposing a risk management model for vendor selection in IT Tender Evaluation process.

Syaripah Ruzaini Syed Aris, Haryani Haron, Nor Azlin Murat

A Survey on Data Integration in Bioinformatics

The need for data integration is widely acknowledged in bioinformatics. There are several huge biological databanks now available across the world in different formats. To characterize or apply data mapping between several data sources requires integration of all related data fields. The problem of integration may be addressed using a variety of approaches; some are widely used and some are less so, having failed to achieve the basic requirements of data integration. In this paper, we discuss three techniques for data integration: the federated database system approach, the data warehousing approach and the link-driven approach. While each approach has its strengths and weaknesses, it is important to identify which approach is best suited to a given user’s needs. We also discuss some database systems which use these three different approaches to solving the problem of data integration.

Cheo Thiam Yui, Lim Jun Liang, Wong Jik Soon, Wahidah Husain

Structural Approach to the Formation of Information Culture of Individuals

The article explores the issues of formation of information culture of the individuals. Various views, approaches to the concept of information culture are studied and a new structural approach is proposed in the article. Knowledge and capabilities related to structural elements of individual information culture – reception, storage, protection, as well as processing and presentation of information are explored. Necessity of comprehensive development of these knowledge and capabilities for formation of information culture in people is justified.

Rasim Alguliev, Rasmiya Mahmudova

Smart Card Based on Hash Function

With the ongoing new trends adopted for hacking smart card, there is need of updating the technology used in smart card, and particularly the math techniques used in it. The potential for counterfeiting and fraud may pose significant financial risks to institutions issuing payment obligations in these systems and to other participants in these areas. The world-wide use of public key algorithms to maintain electronic cash security, in smart card should be modified. However, public key algorithms use many computation resources, and make electronic cash schemes inefficient for Smart cards to compute. Furthermore, the denominations of electronic cash are fixed, and the electronic cash spending date is hard to record. It will cause the lack of flexibility while applying. This paper proposes a new electronic cash scheme that utilizes trapdoor hash function technology. The proposed scheme not only allows users to apply for desired denominations of electronic cash and to record transaction dates, but also decreases calculation costs. This is also an efficient procedure capable to be used in today’s smart card.

Zulkharnain, Ali Sher

RDF Data Models in Oracle

This contribution deals with the RDF data model and its implementation in the Oracle system. After reminding the RDF and RDFS models the reader is informed about the possibilities how to define these models in the Oracle system, how to input data into the database, how to define the rule base and to fulfill it with further rules. The indexes, data types, the usage of the RDF and RDFS bases for a modified command "select" which provides information from RDF data and rules follow. Finally, a demonstration example is given.

Zdenka Telnarova

Order Processing in Supply Chain Management with Developing an Information System Model: An Automotive Manufacturing Case Study

Nowadays, high competitive market needs fast, effective, high responsiveness, online interactive, 24 hours 7 days availability and easy to follow up order processing. Consequently, there is a need for a model in which interdisciplinary approaches for understanding the range of Supply Chain Management (SCM) Information System (IS) capabilities are provided. In this study, an integrated model of SCM IS was developed that is supported by empirical evidence specific to SCM IS implementations. The developed model integrates and enriches theories of competitive strategy, supply chain management and inter-organizational information systems. Then, a case study of an automotive manufacturing industry was conducted to demonstrate the proficiency of the proposed model. As a result, better understanding of capabilities of implemented supply chain management information systems and expected future capabilities could be identified by practitioners and decision makers. Finally, findings of this study are listed together with some future works.

Mohammad Reza Khoei, Misam Kashefi, Pezhman Ghadimi, Amir Hossein Azadnia, Mat Rebi Abdul Rani, Morteza Lalmazloumian

Spatial Information Databases Integration Model

The integration process of the various information in various database types require a thorough understanding to carry out data extraction process. The data extraction process here is in terms of the scheme and the structure for scattered and distributed locations. The Spatial Information Databases Integration Model (SIDIM) is a model which covered the integration processes such as pre-integration, scheme comparison, algorithm development process and intermediary software (middleware) and post-integration. Emphasis are administered in algorithm development by using hybrid approach based on CLARANS approach’s, combination with abstract visualization and Catch Per Unit Effort (CPUE) to enable to achieve processed data or information that is located in different database type in order to obtain data in quick, trusted and reliable manner. SIDIM will become a new engine to process information in various database types without changing any of existing organization system. To verify the model credibility, case studies which are related to fishing industry in Malaysia and artificial reef project are being made as a foundation for SIDIM efficiency testing.

Mustafa Man, Mohd. Shafry Mohd Rahim, Mohammad Zaidi Zakaria, Wan Aezwani Wan Abu Bakar

Web Applications and Software Systems

A Framework of Hybrid Semantic Speech Query via Stemmer for Quran Documents Results

The single query has a lack of words reference to provide more related words for documents result retrieval. The study covers those available words in the dictionary which related to the single word. Therefore it also means that single word is assigned for many words from single query as multi-relevant queries in the dictionary. Hence, the single query is speech query to be converted to words in the query. Cross language information retrieval (CLIR) system investigates the Quran system results performance using looping referred semantic words and stemmers are known as stemming looping semantic query (SLSQ). The query however is based on the speech to be input and converted into text. Therefore, this study is conducted with the purpose to introduce the framework which covers speech, semantic and stemmers approach against the queries and vice versa. Furthermore, it is also conducted to investigate the performance SLSQ based on total retrieve and relevant to maximize words than single word. It also found that looping semantic words technique in dictionary contributes to better approach in using looping referred words in the dictionary for its better performance for Quran document results.

Mohd Amin MohdYunus, Roziati Zainuddin, Noorhidawati Abdullah

A Semantic Layer for a Peer-to-Peer Based on a Distributed Hash Table

Peer to Peer Distributed Hash Table (DHT) facilitates access to specific data when their identifiers or keys are known accurately in advance. However, in practice, users searching for resources stored in P2P systems possess only partial information for identifying these resources (e.g. keywords, metadata, queries in XQuery...). In this paper, we propose the use of multidimensional data analysis to ensure semantic indexing of metadata. The aim is to confer the semantic aspect to P2P DHT in order to respond to broad queries. Our system takes the form of a semantic layer that can be superimposed on top of any P2P DHT infrastructure .This layer is subdivided as areas through a Hilbert curve which has the merit of a good preservation of the locality and semantic affinity. Digital libraries are presented as a formal context to illustrate our system.

Mohammed Ammari, Dalila Chiadmi, Laila Benhlima

Design and Development of a Ubiquitous Cancer Care System: A Collaborative Communication among Cancer Community

Communication among cancer community (specifically patients, parents, and medical practitioners) has not been pervasively-supported. In response to that, this paper reports on a study that ensures communication among cancer community is supported with a ubiquitous communication model. The model is proposed to provide an alternative for the community to communicate; discussing among patients, parents, and medical practitioners. In particular, the system is important because the treatments for cancer mostly take a long time, and the entities in the community are normally closed, which leads to frequent communications. Furthermore, most of topics communicated among cancer community are only understood by themselves. Hence, the paper aims at discussing the design and development of respective prototype. An appropriate model is formed first; then the prototype development follows. The prototype is discussed at length in this paper. At the end, initial feedbacks from the cancer community prove that the designed prototype works well in supporting the communication among cancer community in a ubiquitous environment.

Ariffin Abdul Mutalib, Norlaily Hashim

ICA-WSS: A QOS-Aware Imperialist Competitive Algorithm for Web Service Selection

One of the most important works in technology of web service is web service composition. In the recent years numerous studies to develop methods to build composite web services is carried out but making composite web service yet is a complex issue. In this paper a QOS-aware method based on imperialist competition algorithm for web services selection is proposed. In this method called ICA-WSS, web service selection is done based on QOS parameters. ICA-WSS takes an abstract process and a set of all candidate web services and tries to find an optimal combination based on QOS parameters. In comparison to QQDSGA without considering QOE parameters, ICA-WSS finds better combination in term of value of objective function. Experimental results endorse that ICA-WSS is an efficient algorithm with good convergence for solving problem of web service composition.

Shahriar Lotfi, Khalil Mowlani

Flexi-adaptor: A Nobel Approach for Adapting Web Content for Mobile Devices

Mobile internet browsing usually involves a lot of horizontal and vertical scrolling, which makes web browsing time-consuming and in addition user may be interested in a section of a web page, which may not fit to the mobile screen. This requires more scrolling in both directions. In this paper, we propose to address this problem by displaying the block title and hide the block body contents from a large web page while maintaining their semantics, which displays only the condensed information. The Flexi-adaptor, reduces unnecessary information by allowing its users to see the most relevant blocks of the page and provides the block title. The Flexi-adaptor categorized each object of the web page as menu, block title and main content. Assign a weight to each object of the block by analyzing the object elements. It uses depth first traversal algorithm to select blocks, and delivers them to handheld devices. The proposed solution improves web content accessibility and delivers the target contents to the users.

Rajibul Anam, Chin Kuan Ho, Tek Yong Lim


Performance Evaluation of the Developed Automatic Musical Note Translating System

The automatic musical note translating system refers to the ability of a computer to translate the captured or recorded melody into musical note automatically and instantly. This paper presents the development of such system, whereby a musician can compose music directly without any extra process or procedure, in real-time environments. In this automatic translating system, the information of the captured or recorded melody from microphone or musical instrument is first analyzed through digital signal processing (DSP) to extract its fundamental frequency. The extracted fundamental frequency is then compared with the predefined frequency of musical notes in the computer. The matched musical note frequency will be distinguished at the developed musical stave interface instantly. The performance of the developed automatic musical note translating system will be evaluated with different sampling rates. Results show that the optimized sampling rate to provide most accuracy in the developed system is 44100 Hz.

Chooi Ling Si Toh, Chee Kyun Ng, Nor Kamariah Noordin

Motion Tweening for Skeletal Animation by Cardinal Spline

Motion tweening (Inbetweening) is the process of generating intermediate frames between keyframes to create an illusion of motion. Motion tweening is a key process to generate computer based animations. This paper presents a simple and efficient method of tweening of motion data for skeletal animations. The proposed method generates smooth animation using cubic Cardinal spline. Keyframes are taken as control points and spline interpolation is performed to generate the in between frames smoothly. In order to facilitate the input, the keyframes can be manually specified or automatically detected from the motion data.

Murtaza Ali Khan, Muhammad Sarfraz

Preliminary Investigation on the Use of Augmented Reality in Collaborative Learning

This paper presents the result of the study for collaborative Augmented Reality (AR) based system. AR technology has been investigated for use as a medium for enhancing collaboration by adding virtual information to the real world and supporting the interaction in real time. However, this technology is still in its infant state especially in the education field. More studies are needed so as to provide the value information to this field. The main focus of this study is to investigate the potential of AR spaces such as markers in providing communication cues and supporting collaboration in learning environment. The techniques used in the study are through questionnaire, observation and think aloud protocol. Results from the study shows that AR supports the natural means of communication and interaction. This preliminary study strengthens the conjecture that AR has the potential to be used as a shared medium in collaborative learning.

Wannisa Matcha, Dayang Rohaya Awang Rambli

Ad Hoc Networks

Development of 6LoWPAN Adaptation Layer with Fragmentation and Reassembly Mechanisms by Using Qualnet Simulator

This paper presents the development of 6LoWPAN adaptation layer with fragmentation and reassembly mechanisms by using Qualnet simulator. The developed adaptation layer is based on 6LoWPAN working group specifications and is added into the current existing Qualnet libraries. The IPv6 protocol stacks, however, are not currently supported and provided by Qualnet simulator. Thus, a modified version of IPv4 based addressing scheme to emulate the IPv6 protocol stacks for developing the 6LoWPAN adaptation layer has been successfully implemented and validated in Qualnet simulator. This developed adaptation layer has also been examined over the IEEE 802.15.4 standard WSN environment. The performance of the developed 6LoWPAN is evaluated and compared to WSN in terms of packet delivery ratio, throughput, average end-to-end delay and total average energy consumption.

Chiaw Wei Chan, Gee Keng Ee, Chee Kyun Ng, Fazirulhisyam Hashim, Nor Kamariah Noordin

Mobile Computing

Performance Evaluation of Switching between Routing Protocols in Mobile Ad Hoc Networks

Ad-hoc networks employ routing protocols so that out-of-range nodes can communicate with each other via intermediate nodes. The innate dynamicity and complexity of mobile ad-hoc networks has resulted in numerous routing protocols for ad-hoc networks being proposed. Furthermore, numerous variants and hybrids of these existing protocols continue to be reported in literature. This diversity appears to be inherent to the field and it seems unlikely that there will ever be a ‘one-size-fits-all’ solution to the ad-hoc routing problem.

However, typical deployment environments for routing protocol for ad-hoc networks still force the choice of a single fixed protocol and the resultant compromise can easily lead to sub-optimal performance, depending on current operating conditions. In our work we try to address this problem by switching between protocols that best suits the current working environment. Details about the current network environment are obtained by sensing the network. The protocols chosen for conducting the switching operation are AODV (reactive) and DSDV (proactive). We measure the performance of such an implementation and compare the results with their monolithic counterparts to see if such a switching is feasible.

Annapurna P. Patil, K. Rajani kanth, Desai Neel, N. Ganesh, P. Amala

Miscellaneous Topics in Digital Information and Communications

Processing of Multidimensional Range Query Using SIMD Instructions

Current main stream CPUs provide SIMD (Single Instruction Multiple Data) computational capabilities. Although producers of current hardware provide other computational capabilities like multi-cores CPU, GPU or APU, an important feature of SIMD is that it provides parallel operations for one CPU’s core. In previous works, authors introduced an utilization of the SIMD instructions in some indexing data structures like B-tree. Since multidimensional data structures manage n-dimensional tuples or rectangles, the utilization of these instructions seems to be straightforward in operations manipulating these n-dimensional objects. In this article, we show the utilization of SIMD in the R-tree data structure. Since the range query is one of the most important operation of multidimensional data structures, we suppose the utilization of SIMD in range query processing. Moreover, we show properties and scalability of this solution. We show that the SIMD range query algorithm is up-to 2× faster then the conventional algorithm.

Peter Chovanec, Michal Krátký

A Comparative Evaluation of Web Service Discovery Approaches for Mobile Computing

Nowadays, with the advancement in mobile technologies, the use of web services has seen an explosion in interest for mobile computing environment. However, the heavyweight nature of conventional web services to be deployed on mobile devices brings new challenges in mobile computing in the coming future. Web services technology and mobile computing domains are converging at their intersection which leads to Mobile Web Services (MWS) which enables the service access in users’ mobile device. As the numbers of web services are increasing dramatically, the web service discovery becomes more important to discover the usable web services in effective and efficient manner. This paper discusses an overview of mobile challenges in MWS recent research, and a summary of the issues. Moreover, current approaches of Mobile Web Services Discovery are classified and these approaches are compared to some criteria. The results of this study will help researchers to deliver more applicable solutions with the most appropriate approaches for Mobile Web Services Discovery.

Nor Azizah Saadon, Radziah Mohamad

Planning and Project Control with EXCEL Software in Asalouyeh 5 th Olefin Project

Project management is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements. Motivating and preparing the necessities for team working, planning, supervising, resource and cost control to accomplish the project in the specified time are some of the main duties of project management in all over the world. Project management is known as a professional and important job. Planning and project control technique can be a very effective method to be used in project management. This technique uses three managerial fields which are scope, time and cost to achieve its goals. In this paper we state main concepts of project management; also we have demonstrated the application of EXCEL software in planning and project control, especially application of this software in Work Breakdown Structure (WBS) and Weight Factor calculation. In order to gain a better realization, these concepts have been surveyed in Morvarid Petrochemical Company. Morvarid.P.C is the executive of 5


olefin plan that produces liquid Ethylene to feed west Ethylene line in second phase of Asalouyeh petrochemical zone.

Adnan Keshvari, Hamed Mirzapour, Jalil Ebrahimpour, Nikzad Manteghi

Partial Plagiarism Detection Using String Matching with Mismatches

In recent years, many documents are created as an electronic one and are distributed. Although those costs were reduced remarkably, the copy of a document could also be created easily. Spreading of plagiarism or violation of copyright is the big issue which controls production of a valuable document. Therefore, the system which detects plagiarism is very important. Many plagiarism detection systems have aimed to detect a document chiefly similar to query. However, it is not easy to detect a partially similar document. When the document with the possibility to plagiarize or to be plagiarized is not given, the detection of a similar document by mutual comparisons of all documents is more difficult. We propose the method that detects partial copies from documents without query. Some partial copies were detected from test documents.

Tetsuya Nakatoh, Kensuke Baba, Yasuhiro Yamada, Daisuke Ikeda

A Surveillance System for a Farm

This paper proposes a smart surveillance system to be able to identify person concerned or animal in order to prevent the crops stolen. Until now most of surveillance system use a method that records images by surveillance camera or sensor network. This kind of surveillance system has limitation not to identify person or not. The limitation bothers a farm supervisor. To overcome the problem, we detect moving object using codebook and distinguish whether to human or noise by using Adaboost algorithm. Also, this system transmits image information to the supervisor. But even though detected object is person, it is not easily distinguishable whether person concerned or dubious one. That is why because of low resolution of images. To make unnecessary emergency alarm not ring, we adopt smart card technology.

A-Ram Kim, Sang-Yong Rhee, Seung-Joon Seok, Hong-Chang Lee, Young-Baek Kim

Privacy in Health Information Systems: A Review

Privacy is a pivotal issue in today’s society, where a major concern is to prevent the leakage and abuse of sensitive and confidential information about individuals. It is especially critical in Health Information Systems (HIS) since these systems contain a lot of sensitive information about their patients. In this paper we discuss the overall view of privacy concept in online applications and in HIS, since most HISs are mostly online based. The differences between privacy and security are also discussed, as are some related works in this area and suggestions on how users can protect their privacy. We hope that this paper can be a reference for researchers in this area to give them a good understanding of the concept.

Salah Bindahman, Nasriah Zakaria

The Genetics Lab: An Innovative Tool for Assessment of Intelligence by Mean of Complex Problem Solving

The purpose of this paper is to present the important characteristics of the intelligence measurement tool called “The Genetics Lab”. This tool, based on web technologies, allows one to assess general intelligence using complex simulations. It has been developed and evaluated to measure cognitive skills of students in Luxembourg. Behind the tool itself, we propose a generic and clear architecture that can be used as groundwork for other evaluation solutions. Previous tools have been affected by various technical weaknesses. The Genetics Lab brings a major contribution by providing a clear architecture and an efficient implementation to address these common issues. To achieve this, we will explore in depth the main fields of e-assessment such as traces, instructions, scoring, localized and multilingual content. The proposed tool is reusable and highly adaptive. It also makes data collection resulting from the user’s test a flawless and one-step process.

Cyril Hazotte, Hélène Mayer, Younes Djaghloul, Thibaud Latour, Philipp Sonnleitner, Martin Brunner, Ulrich Keller, Eric Francois, Romain Martin

Energy Efficient Mutually Exclusive Path Finding Protocol for Wireless Networks

We study the multipath routing in wireless sensor networks with energy efficiency as an important QoS factor. Multipath routing reduces the need for frequent route updates, balance the traffic load and increase the data transfer in wireless sensor networks. Our proposed protocol attempts to find two mutually exclusive paths and the experimental results show that the overall performance is improved avoiding collision and transferring data efficiently compared to flood based approach.

Anita Kanavalli, G. P. Bharath, B. N. Nuthan Prasad, P. Deepa Shenoy, K. R. Venugopal, L. M. Patnaik

Conceptual Design System for Monitoring Electrical Loads

This paper presents design the computerized system for measuring, monitoring and recording all electrical values for the loads (Current, Voltage, Power and power factor PF). The system consists of Current and Voltage Sensors, Phase Detector, Level Converter Circuit, and PIC. In addition, this paper exposes algorithm for monitoring, recording and controlling over the power delivered or dissipated by the load. This designed system has major advantages: improved accuracy, reliability distance monitoring and controlling. In addition the recording in Database (storing in Database) all events (energy variations) in the electrical load supports us to make a good decisions according to energy managements and error handling. The use of the PC and window system facilitate and provide the user all comfort for monitoring and reporting all electrical values of the Load.

Murad Ahmed Ali Taher, Ali Abdo Mohammed Al-Kubati

Part of Speech Tagging Approach to Designing Compound Words for Arabic Continuous Speech Recognition Systems

Misrecognition of small words is one of the factors that lead to suboptimal performance in automatic continuous speech recognition systems. In general, errors generated from small words are much more than errors in long words. Therefore, compounding some words (small or long) to produce longer words is welcome by speech recognition decoders. In this paper, we present a novel approach to artificially generate compound words using part of speech tagging. For this purpose, we consider two Arabic pronunciation cases that usually occur together without any silence: a noun followed by an adjective, and a preposition followed by any other word. To collect the candidate compound words, we use Stanford Arabic tagger to tag all words in our Baseline transcription corpus. Using Sphinx 3, we test the proposed method on a 5.4 hours speech corpus of modern standard Arabic. The results show significant improvement, with the word error rate being reduced by 2.39%.

Dia AbuZeina, Moustafa Elshafei, Wasfi Al-Khatib

A Discriminative Non-linear Manifold Learning Technique for Face Recognition

In this paper we propose a novel non-linear discriminative analysis technique for manifold learning. The proposed approach is a discriminant version of Laplacian Eigenmaps which takes into account the class label information in order to guide the procedure of non-linear dimensionality reduction. By following the large margin concept, the graph Laplacian is split in two components: within-class graph and between-class graph to better characterize the discriminant property of the data.

Our approach has been tested on several challenging face databases and it has been conveniently compared with other linear and non-linear techniques. The experimental results confirm that our method outperforms, in general, the existing ones. Although we have concentrated in this paper on the face recognition problem, the proposed approach could also be applied to other category of objects characterized by large variance in their appearance.

Bogdan Raducanu, Fadi Dornaika

Investigation of Collaborative Interaction Using ITB-Based Setting vs. Computer-Based Setting

This paper aims to propose an affordable and new design of interactive table (ITB) and examines collaboration of students when using ITB-based setting compared with a traditional technology of computer-based setting. The evaluation results show that when students working collaboratively with 2 types of shared displays (ITB and desktop computer), most of them will exhibit the off-task behaviors in which settings and also show their attitude and satisfaction after direct experiences while working collaboratively with both settings. Both results will show the effectiveness of ITB-based setting beyond computer-based setting. The outcome of this research study has showed the potential of ITB that might be a new affordable collaborative tool to support teaching and learning in academic activity.

Thawanrat Puckdeepun, Jafreezal B. Jaafar, Mohd Fadzil B. Hassan, Fawnizu Azmadi B. Hussin

Point-to-Point Communication on Gigabit Ethernet and InfiniBand Networks

This paper presents the measurements of the MPI point-to-point communication performances on Razi and Haitham clusters by using SKaMPI, IMB and MPBench benchmark programs. These measurements were done on clusters with identical configurations in order to compare and analyze the MPI implementation performance over different interconnect technology; Gigabit Ethernet and InfiniBand. The comparison and analysis of the results from all benchmark programs used were then provided. It revealed that different MPI benchmark programs rendered different results for different interconnect. The results for both technologies were then compared to the experiment’s results that were done on cluster with Opteron quad-core processor. The comparison concluded that besides type of interconnect, the architecture of the clusters itself might also affected the results.

Roswan Ismail, Nor Asilah Wati Abdul Hamid, Mohamed Othman, Rohaya Latip, Mohd Azizi Sanwani

Detecting Unknown Anomalous Program Behavior Using API System Calls

This paper presents the detection techniques of anomalous programs based on the analysis of their system call traces. We collect the API calls for the tested executable programs from Microsoft detour system and extract the features for our classification task using the previously established n-gram technique. We propose three different feature extraction approaches in this paper. These are frequency-based, time-based and a hybrid approach which actually combines the first two approaches. We use the well-known classifier algorithms in our experiments using WEKA interface to classify the malicious programs from the benign programs. Our empirical evidence demonstrates that the proposed feature extraction approaches can detect malicious programs over 88% which is quite promising for the contemporary similar research.

Md. Rafiqul Islam, Md. Saiful Islam, Morshed U. Chowdhury

Taxonomical Classification of Closely Related Reads of Genus Bacillus

The genus Bacillus contain spore-forming gram-positive/variable rod-shaped bacteria. Species of the Bacillus genus have long believed to have medical, veterinary and agricultural importance. In agricultural biotechnology and its applications, discriminating short environmental Bacillus DNA fragments into its various species members plays a crucial role in the pipeline of agronomic trait discovery and insect control. We here constructed a classification model for this challenging task based on consensus decision-making of support vector machines and BLAST hit strategies. We first took advantage of both the hexamer signatures of Bacillus genomes and the Bacillus species-specific toxin signatures to build the attribute space. We then explored and filtered the otherwise high dimensional attribute space with a weighted version of principal component analysis to mitigate computational cost and avoid possible overfitting of the classification model for discriminating Bacillus species. Our extensive experimental results showed that our method can perform well on differentiating Bacillus species.

Wenmin Wang

System Level Performance Analysis Design Patterns

Performance analysis is a set of heterogeneous computer-aided tools that evaluate performance of a system at different levels of abstraction, complicating the performance analysis task. Through the extraction of a common object model, we seek to simplify the performance analysis task. This shared feature can be encapsulated in a design pattern. Several design patterns are identified at the system level of the performance modeling hierarchy. These provide a framework for constructing the semantics and composition properties inherent in the data modeled. The definition of design patterns for modeling such data allows commonly recurring patterns to be identified and added to the system library. These may be extended by allowing users to customize each design in a flexible and efficient manner to model the specific design at hand.

Carolyn Pe Rosiene

Synthesizing 3D Face Shapes Using Tensor-Based Multivariate Statistical Discriminant Methods

We have implemented methods to reconstruct and model 3D face shapes and to synthesize facial expressions from a set of real human 3D face surface maps. The method employed tensor-based statistical shape modelling and statistical discriminant modelling methods. In the statistical shape modelling approach, new face shapes are created by moving the surface points along the appropriate expressive direction in the training set space. In the statistical discriminant model, new face shapes, such as facial expressions, can be synthesized by moving the surface points along the most discriminant direction found from the classes of expressions in the training set. The advantage of the tensor-based statistical discriminant analysis method is that face shapes of varying degrees can be generated from a small number of examples available in the 3D face shape datasets. The results of the reconstructions and synthesis of three-dimensional faces are illustrated in the paper.

Jacey-Lynn Minoi, Carlos Eduardo Thomaz, Duncan Fyfe Gillies

Automotive Camera Integration: Technologies and Limits

Future automobiles will be equipped with hundreds of processors. Some will control vehicle functions (i.e. anti-lock brakes, traction control, and engine management). Others will continuously monitor the vehicle surroundings and extract and Interpret relevant Information to enhance safety. Integrated digital cameras are an important feature for next generations of customer products. From low light sensing pixel technology, to high speed video sensors, to SOCs (System on A Chip) with sophisticated image processing algorithms, OEMs is constantly looking to put the latest advances in imaging into products for our customers. Key specifications of such cameras are resolution, sensitivity, power consumption, manufacturing and packaging costs—as well as the overall size. Drivers are passionate about imaging technology and that passion drives the innovation that makes no limit in imaging driving solutions. The recent improvements of CMOS image sensors would allow a further miniaturization. The main points in image sensor development are how to make their advantages even better and how to reduce their noise and sensitivity disadvantages.

Hadj Hamma Tadjine, Karsten Schulze

Parallel versus Perpendicular Plots: A Comparative Study

A comparison study between parallel and perpendicular (scatter plot) plot visualization techniques are addressed. Comparison discussion focuses on the disadvantage and advantages of the two techniques and a GOMS analysis of the related tasks based on a system called the PaCQ interface.

Raja Jamilah Raja Yusof, Roziati Zainuddin, Zulkifli Mohd Yusoff

Intelligent Guard: A Novel Approach toward Software Protection

Developing a software product is an extremely big deal, and can be a huge investment of cost and time. So, software piracy protection is a main concern of software-development companies. This paper presents an intelligent protection system, through using an intelligent guard delivered with the software . The guard itself is protected by a one-time-use key that resides on a USB device, and observes the environment to see whether there are suspicious operations like debugging. To get information about suspicious operations, it relies on the OS. Upon finding one or more such operations, the guard will send a signal to the software, which makes it to call disposer functions. To prevent the possibility of code reverse engineering, the program in IL, is saved encrypted, and is decrypted prior to every execution. All these operations are managed by the guard. To install and execute the software, the guard must be installed, in advance.

Arash Salehpour, Mohammad Etemad, Morteza Mokhtari Nazarlu

Mining Data Stream from a Higher Level of Abstraction: A Class Window Approach

All present techniques for mining data stream can detect concept drift, outlier and pattern by using separate techniques directly on data stream and an applicable single technique from a higher level of abstraction for detecting all these has not been developed. The aim here is to develop a technique which can detect concept drift, outlier and pattern using a single model. In order to achieve this goal, we are switching from the traditional thinking of applying all techniques directly on data stream. Here, we have focused on the class labels of the data which is found using classification. This technique gives us a higher level of abstraction of the data and consumes a lower amount of memory. Moreover, we are proposing the idea to keep track of very old data using a bit table. Our technique can also store the timestamp of the pattern or drift.

Abdullah-Al-Mamun, Md. Anowarul Abedin, Md. Al Arman, M. A. Mottalib, Mohammad Rezwanul Huq

Development of Water Quality Monitoring System Prototype for Fresh Water Fish Culture

The common way to monitor water quality in fresh water fish culture is to use intermittent monitoring that requires users to collect data manually. It is a tedious work for them and there is a possibility that the data are not taken in a day. Not taking the reading in a day can create a problem in fresh water farming especially if water source comes from river. Fish will die in a few hours if the water is heavily polluted and this will cause thousands of dollars in losses to fish farmer. The present project proposes continuous monitoring of water quality for fresh water fish. Temperature sensor, pH sensor, and dissolved oxygen sensor are the sensors that are critically important in a fresh water fish monitoring system. Wireless technology and Internet facilities that are adopted in the system have made the system more robust and more reliable. The system is much better than intermittent monitoring because users can access data regardless of where they are.

M. Razzemi, Z. Abdul Halim, M. Kusairay Musa, K. Hasbullah

A Dynamic Timestamp Discrepancy against Replay Attacks in MANET

Mobile Ad hoc NETworks (MANETs), like traditional networks, are vulnerable to a wide range of Denial-of-Service (DoS) attacks. A Replay attack is one of them that degrade severely the MANET performance. A replay attacker performs this attack by interception and retransmission of the valid signed messages. The validation of signed messages is verified by a timestamp discrepancy fixed by sender and receiver nodes.

In this paper, we propose an enhancement of the timestamp concept, to avoid replay attack, characterized by two properties. The first is dynamic because it depends on the communication duration between sender and receiver nodes. The second is rigid because it estimates approximately the maximum date when the signed message should arrive to receive node.

Nourddine Enneya, Aziz Baayer, Mohammed ElKoutbi


Weitere Informationen

Premium Partner