{"title":"Analysis of Change Data Capture Method in Heterogeneous Data Sources to Support RTDW","authors":"H. Chandra","doi":"10.1109/ICCOINS.2018.8510574","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510574","url":null,"abstract":"The need for rapid decision-making on the organization, causing the importance of developing a real time data warehouse (RTDW) system. In addition, what needs to be considered is how to keep the Extract, Transform, Load (ETL) process done, would not interfere the performance of the operational database being used. One of the methods that can be used is change data capture. Nevertheless, research that has been done so far only tests each method on one type of data source only. This leads to the quality of method that is claimed to be the best on one type of data source being tested, not necessarily running equally well on different types of data sources. Nowadays, the data sources that companies use for many operations are usually coming from different sources. The proposed research will identified which change data capture method is the best from three types of methods in three database application for each type of data source to be tested, that supports the RTDW system-making process. Then there will be a simulation of query execution test in a certain number and period, to test the methods and get the best quality comparison between various change data capture methods available. Finally, an integration scheme design will be created to build the data warehouse system needed to make strategic decisions with real time data and analysis of the results at the level of data structures to identify which variables influence the quality of change data capture method on certain types of data sources. From the results of research conducted proved that the best change data capture method is different for each type of data source tested in the same environment.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126901870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shiladitya Bhattacharjee, Lukman bin AB Rahim, M. N. Zakaria, Izzatdin Bin Ab. Aziz
{"title":"A Protocol for Selecting the Strongest and Authentic Hotspot in any Wireless Infrastructure","authors":"Shiladitya Bhattacharjee, Lukman bin AB Rahim, M. N. Zakaria, Izzatdin Bin Ab. Aziz","doi":"10.1109/ICCOINS.2018.8510579","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510579","url":null,"abstract":"The legacy of wireless communication lacks of unified interlink among the wireless connection, mobile cellular linkages and wireless hotspots. Nevertheless, the existing literature does not suggest any hotspot selection protocol which selects hotspot based on signal strength, detects the fake hotspots and checks their authenticity. Therefore, we have proposed a hotspot selection protocol, which can select the strongest as well as the authentic hotspot before establishing any connection. The proposed scheme relies on the intelligent user hot-spot allocation to act as cells within a super-cell. A user moving into a cell has the option to either connect directly with the Base Station (BS) or base Access Point (AP) as a hotspot or to another hotspot (master) within existing cell as a slave device after checking the authenticity of the network to be connected. The proposed protocol works with the intelligent user hot-spot allocation to act as cells within a super-cell which improves QoE demands and fairness metrics. Experimental results show that how our proposed technique is efficient to make such decision during hotspots selection.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134256848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Atypical Approach for Uncovering the Essence of Emotions in Consumer Reviews","authors":"Sudhir N. Dhage, A. Shama","doi":"10.1109/ICCOINS.2018.8510587","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510587","url":null,"abstract":"Reviews stationed on disparate portals of E-commerce and civil networks voice emotions of the consumer experiencing it. This convenient material available works as an absolute sufficient advice demanded by the audience willing to purchase the product or service. Underlying methods discover whether the speaker is satisfied or dissatisfied about a product but fails to imprison the reflection of human emotions. The momentous act of emotions in web reviews and its impact which is often undervalued is explored in this research article. The notion is to detect emotions from customer written text by utilizing the Emotion Revelation Framework (ERF). Analysis of ERF on Customer Review Dataset(CRD) caters to associations on what factors to focus upon for prosperity. An accuracy in terms of F1- score is obtained around 66% making use of CRD dataset.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130995768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pragmatic Ontology Design Pattern for Contextual Integration","authors":"Yew Kwang Hooi, M. Fadzil Hassan, M. A. Sharifff","doi":"10.1109/ICCOINS.2018.8510570","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510570","url":null,"abstract":"Critical systems require continuous collection and integration of knowledge from the environment. The challenge is effective integration of knowledge in a dynamic environment. This work proposes a knowledge model that is adaptable to changes. However, there is a lack of ontology structure and reasoning that reacts immediately to availability of a new piece of information in real-time. This paper presents a novel ontology design pattern that facilitates automatic integration of knowledge through event detection and context analysis. Theoretical analysis and a use case are used to assess the model. The work claims a contribution towards developing mechanism for ontology pragmatics and addressing challenges of the smart computing.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116246811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Readiness of Mobile Learning among Working Adults in Malaysia","authors":"Amy Mei Yin Ling, W. F. Wan Ahmad, A. S. Hashim","doi":"10.1109/ICCOINS.2018.8510590","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510590","url":null,"abstract":"Living and high educational costs make the working adults to postpone their interest in continuing their studies. Besides that, traffic jams, heavy workloads, chasing for the deadline to deliver their commitments and lack of time are some of the factors that make the working adults no motivation in pursuing their studies. Some of the working adults prefer to choose part-time distance learning mode where teaching and learning process are conducted virtually but incomplete facilities that have been provided by learning institution cause the adults learners to expereince isolation due to lack of communication and interaction with their classmate, lecturers, and higher institution. Virtual learning requires the best conditions in terms of accessibility, mobility, and user-friendliness so that learning process could be conducted without being worried about time and place.. Nowadays Mobile learning or m-learning has become famous because mobile devices are known for its portability, easy to carry and many are able afford to a buy mobile phone. M-learning can be realized independently of place and time. This research is design to determine the readiness of working adults in using mobile learning. A total number 97 working adult voluntarily took part in an online survey. The survey was separated into three sections where section A is personal information; section B mobile phone; and section C: Readiness of using mobile learning. The survey was meant to determine working adults' knowledge, perceptions and readiness regarding M-learning. The result showed sufficient knowledge, positive perspective and welcome the integration of the mobile learning in education among the participants.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126241921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gunasekar Thangarasu, Kayalvizhi Subramanian, P. Dominic
{"title":"An Integrated Architecture for Prediction of Heart Disease from the Medical Database","authors":"Gunasekar Thangarasu, Kayalvizhi Subramanian, P. Dominic","doi":"10.1109/ICCOINS.2018.8510589","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510589","url":null,"abstract":"A database is a collection of data organized for storage, access and retrieval. With increasing growth in big data, especially in healthcare and biomedical communities, the techniques to analyze the medical data tends to benefit the patients by detecting the disease early. However, with the advent of incomplete data in such medical datasets, the quality tends to reduce. In addition to this, each region has its own unique disease characteristics, which further reduces the prediction quality. To overcome the difficulty in processing the medical datasets with incomplete data, the proposed method initially reconstructs the missing or incomplete data. To improve the processing capability of automated disease prediction in an uncertain environment, an integrated architecture is proposed. It controls the processing capability of medical datasets in an uncertain environment. This integrated diagnostic model generates the hesitant fuzzy based decision tree algorithm using genetic classification. The architecture is designed to process both the structure and unstructured data sets. The new and innovative prediction methods are projected in this research to predict heart disease from the medical database in a faster manner.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127346013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Influence of Interaction on Students Academic Performance: Case of Saudi Public University","authors":"Ahmed Omer Ahmed Ismail, A. Mahmood","doi":"10.1109/ICCOINS.2018.8510577","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510577","url":null,"abstract":"This paper focuses on the influence of interactions on students’ academic performance (SAP) in blended and traditional learning delivery. Its objective is to determine the effect of the three types of interactions on SAP in Saudi Public University. The method used was a survey study with a total sample size of 216 participants of experimental group and control group. The results have shown that the influence of interactions on SAP is significant. The predictors of interaction processes were contributed in improving SAP by explained variance of (BL=37% to TL=41%), (BL=83% to TL=66%) and (BL=53% to TL=41%) of student, instructor, and content interactions in blended learning compared to traditional learning respectively.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125247870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kamariah Abu Saed, N. Aziz, A. Ramadhani, Noor Hafizah Hassan
{"title":"Data Governance Cloud Security Assessment at Data Center","authors":"Kamariah Abu Saed, N. Aziz, A. Ramadhani, Noor Hafizah Hassan","doi":"10.1109/ICCOINS.2018.8510612","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510612","url":null,"abstract":"Data and information are very important as it contains company’s identity and all business transaction. Every employee from higher position to the lowest position are responsible for the security of the data. Data should be treated as company asset and must be taken care of properly. Data governance will guide all employees in managing the data and make sure the security of data. Lack of awareness and poor data governance can lead to data breach and business disaster. By implementing data governance, every data in the company will have ownership, and access level. It will make the data more secured as the access level will be limited. This study intended to use extensive literature review for questions development and in-depth interview for data collection. The target respondents for this study must have expert knowledge in cloud security area. Finally, a data governance security assessment focusing on IaaS in cloud data center will be proposed and tested in HPC3 (High Performance Cloud Computing Center).","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126888249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial Bee Colony Algorithm for t-Way Test Suite Generation","authors":"A. K. Alazzawi, Helmi Md Rais, S. Basri","doi":"10.1109/ICCOINS.2018.8510601","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510601","url":null,"abstract":"Exhaustive testing is a very strenuous undertaking due to its numerous combinations. Consequently, searching for and sampling an optimal test suite from viable groups of test cases (TC) has turned out to be a central concern. To tackle this matter, the use of t-way testing (Where t represents the strength of the interaction) has become well known. In order to facilitate future development and summarize the realization so far, the major objective of this paper is to portray an important comparison of the introduced optimization algorithms (OA) as a base of the t-way test suite generation strategy, and to suggest a new strategy focusing on the Artificial Bee Colony (ABC) Algorithm, known as Artificial Bee Colony Strategy (ABCS). The experimental results showed that ABCS can compete against the existing (both AI-based and computational-based) strategies in terms of generating the optimum test case.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133027985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Process Mining – the Enhancement of Elements Industry 4.0","authors":"Michal Halaška, R. Šperka","doi":"10.1109/ICCOINS.2018.8510578","DOIUrl":"https://doi.org/10.1109/ICCOINS.2018.8510578","url":null,"abstract":"The paper is focused on the importance of business processes and its management in the concept of fourth industrial revolution and the introduction of group of emerging techniques supporting this field. In fact, the whole concept of the Industry 4.0 is laying on business processes. The management of the processes will have a significant impact on the value added, effectiveness and efficiency of organizations involved in the Industry 4.0. The process-centric approach is necessary not only for management of the manufacturing processes, but also for the management of non-manufacturing processes. The newly emerging group of techniques used in business process management as well suited tools for the management of the processes at the operational level is called process mining and we believe it might enhance Industry 4.0 in many of its aspects. The paper is structured as follows. In the first sections, we introduce the concept of Industry 4.0 and demonstrate the importance of processes for the concept. In next section, we introduce the group of techniques called process mining and in the closing section we demonstrate the usability of process mining. Finally, we present and discuss our results supporting the advantages of process mining and their suitability for Industry 4.0 idea.","PeriodicalId":168165,"journal":{"name":"2018 4th International Conference on Computer and Information Sciences (ICCOINS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116649511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}