{"title":"Mapping Computer Science research in Bangladesh","authors":"S. Banshal, Khushboo Singhal, A. Uddin, V. Singh","doi":"10.1109/SKIMA.2014.7083526","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083526","url":null,"abstract":"This paper represents a scientometric-based analysis of Computer Science research in Bangladesh. The paper reports our analytical results from Scopus data for the last 25 years. The results present detailed statistics about the research output, the growth of research publications, citation-based impact analysis and collaboration patterns. It also tries to identify the top institutions and authors and preferred publication sources. We also did a text-based research theme analysis for the 25 year period and present the thematic research areas and their trends during the period.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"43 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77205333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GraATP: A graph theoretic approach for Automated Theorem Proving in plane geometry","authors":"M. Mahmud, Swakkhar Shatabda, M. N. Huda","doi":"10.1109/SKIMA.2014.7083537","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083537","url":null,"abstract":"Automated Theorem Proving (ATP) is an established branch of Artificial Intelligence. The purpose of ATP is to design a system which can automatically figure out an algorithm either to prove or disprove a mathematical claim, on the basis of a set of given premises, using a set of fundamental postulates and following the method of logical inference. In this paper, we propose GraATP, a generalized framework for automated theorem proving in plane geometry. Our proposed method translates the geometric entities into nodes of a graph and the relations between them as edges of that graph. The automated system searches for different ways to reach the conclusion for a claim via graph traversal by which the validity of the geometric theorem is examined.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"35 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84935694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs","authors":"Muhammad Shakil Pervez, Dewan Md. Farid","doi":"10.1109/SKIMA.2014.7083539","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083539","url":null,"abstract":"Intrusion is the violation of information security policy by malicious activities. Intrusion detection (ID) is a series of actions for detecting and recognising suspicious actions that make the expedient acceptance of standards of confidentiality, quality, consistency, and availability of a computer based network system. In this paper, we present a new approach consists with merging of feature selection and classification for multiple class NSL-KDD cup 99 intrusion detection dataset employing support vector machine (SVM). The objective is to improve the competence of intrusion classification with a significantly reduced set of input features from the training data. In supervised learning, feature selection is the process of selecting the important input training features and removing the irrelevant input training features, with the objective of obtaining a feature subset that produces higher classification accuracy. In the experiment, we have applied SVM classifier on several input feature subsets of training dataset of NSL-KDD cup 99 dataset. The experimental results obtained showed the proposed method successfully bring 91% classification accuracy using only three features and 99% classification accuracy using 36 features, while all 41 training features achieved 99% classification accuracy.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"40 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84672371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A case-based framework for self-healing paralysed components in Distributed Software applications","authors":"Tanim Hasan, A. Imran, K. Sakib","doi":"10.1109/SKIMA.2014.7083514","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083514","url":null,"abstract":"Self-healing is the ability of the software to detect faulty modules at execution time and replace or recover those without affecting other components. This paper proposes a framework for self-healing of Distributed Software System (DSS). Monitoring component is used to detect and record failures of DSS. Healing system will replace the paralysed components with healthy ones which will be initiated from the information given by Monitoring system to the proposed Reviver process. A failed case table is required to match the real life failures with it for identification of the solution. Distance between the failed case table and the recorded failures need to be calculated using exclusive OR since the solution closest to the fail can then be determined. Afterwards, the minimum distance between those is used to resolve the failure. This recovery is achieved through replacement of the faulty modules with redundant components in the DSS. Performance evaluation shows a desirable time consumption of less than the standard 0.7 seconds for component replacement in all the experimental iterations.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"74 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85877100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fahimul Haque, Sheri Jahan Chowdhury, Sheikh Shazeed Ahsan, Zamiur Rahman, M. Z. Ali
{"title":"Fiber to the Antenna: Solution in integrated optical and wireless networks","authors":"Fahimul Haque, Sheri Jahan Chowdhury, Sheikh Shazeed Ahsan, Zamiur Rahman, M. Z. Ali","doi":"10.1109/SKIMA.2014.7083549","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083549","url":null,"abstract":"Fiber to the Antenna (FTTA) solution in integrated optical and wireless networks brings significant benefits offering speed and mobility in communications. However, there are some unavoidable issues that field engineers constantly experience while implementing physical components of FTTA systems at cell sites. In this paper, we study FTTA architecture, physical components, benefits and its implementation issues very closely. The implementation issues with power, environmental protection, surge protection etc. are analyzed thoroughly with currently available solutions in the market. Some constructive ideas on resolutions to those issues are also analyzed. Our analysis in this paper can be useful for planning a better implementation process without having major issues in the near future. This paper is a result of an undergraduate senior research project.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"5 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86619340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rubaida Easmin, Shamira Tabrejee, Lamisha Rowshon, Alim Ul Gias, Md Miraj Kobad Chowdhuryy, S. Khaled
{"title":"In silico analysis of salt responsive survival associated motifs in rice promoter","authors":"Rubaida Easmin, Shamira Tabrejee, Lamisha Rowshon, Alim Ul Gias, Md Miraj Kobad Chowdhuryy, S. Khaled","doi":"10.1109/SKIMA.2014.7083535","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083535","url":null,"abstract":"In stressed condition, several specific transcription factors bind to corresponding regulatory elements or motifs resulting in the expression of appropriate genes, which helps the plant to survive in that condition. Till now, several motifs have been identified though computationally validating those motifs is a major research concern. Considering this, we present an in silico method to validate the presence of such motifs in the promoter of rice genes, which could be associated with the survival of rice in saline environments. For this, we present a statistical approach that consists of three consecutive steps: finding overrepresented oligomers in sensitive variety, identifying the potential motif from the overrepresented oligomers and validating oligomers in the promoters of up regulated genes of tolerant variety using the motif of the sensitive one. In our experiment, we have initially identified 5 potential pentamers and then the most represented one (ACGAC) was used to validate previously described motifs overrepresented in promoters of genes in different abiotic stress tolerant rice to justify their association with survival. Ultimately, our method has shown promises to better identify motifs in promoters of genes up regulated during salt stress according to their likelihood to be associated with the plant survival.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"207 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75876605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md Mahfuzur Rahman Siddiquee, N. Haider, R. Rahman
{"title":"A fuzzy based recommendation system with collaborative filtering","authors":"Md Mahfuzur Rahman Siddiquee, N. Haider, R. Rahman","doi":"10.1109/SKIMA.2014.7083524","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083524","url":null,"abstract":"Recommendation of items is a popular utility in today's social networks and ecommerce sites. The task becomes more critical when high level of accuracy is required. This paper analyzes the improvement in recommendation of movies using Fuzzy logic. The user's choice similarity and acceptance rate is calculated with different similarity measurement approaches, e.g., Euclidean Distance, Manhattan Distance, Pearson Coefficient and Cosine Similarity. To calculate user's choice similarity we take the K most similar users and find the average rating of the target movie given by the similar users. To find acceptance rate, we need to find similar movies to the target movie. To do that, we consider the movies that have the highest number of matching genres against the genres of target movie. Then we consider K most similar movies and calculate the average rating of those similar movies given by the target user. We calculate expected rating using those two parameters and then decision making is made using Mamdani inference systems. We also report performance results of various models based on different similarity measurement techniques, and membership functions with type and number variations.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"22 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84274088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compact triple C shaped microstrip patch antenna for WLAN, WiMAX & Wi-Fi application at 2.5 GHz","authors":"D. Dutta, A. Hira, Fahim Asjad, T. Haider","doi":"10.1109/SKIMA.2014.7083568","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083568","url":null,"abstract":"In the rapid progress of commercial communication applications, the development of compact antenna has an important role. This paper presents the analysis on the performance of single band compact triple C shaped microstrip patch antenna for WLAN, WiMAX and Wi-Fi applications with center frequency at 2.5GHz. The microstrip antenna has a planar geometry and consists of a ground plane, a substrate, a compact patch as radiator. Different specifications of the proposed antenna are measured through computer simulation in free space. The antenna has an impedance bandwidth of 2500 MHz (2487MHz to 2512 MHz). The proposed antenna provides excellent SWR of 1.04 and return loss -32.80 dB while excited by a 50 O microstrip feed line. All simulation results are performed using the CST Microwave Studio.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"31 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89972995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation on EBG structures: A critical analysis to optimize the performance of asymmetric couple-line bandpass filter","authors":"S. Parvez, N. Sakib, M. N. Mollah","doi":"10.1109/SKIMA.2014.7083529","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083529","url":null,"abstract":"EBGSs, Electromagnetic Band Gap Structures, have been developed into the most prominent framework by virtue of their superior efficacy, less intricacy in fabrication, and unified integration with the monolithic microwave integrated circuits (MMICs). In this letter, a certain number of advanced designs of EBGS are introduced and characterized with some rigorous parametric studies. This epistle regards the planar-EBG frameworks in the fashion of conventional uniform circular, square, and annular ring patterns. By the same token, optimum Filling Factor has been investigated by exclusively analysing the traditional frequency response of band pass filter from three imperative aspects such as: initial stop band analysis, pass band analysis, and conclusive stop band analysis. In like manner, the parametric comparison has been demonstrated in view of the initial frequency response, selectivity, 3dB cut-off frequency, 3dB pass bandwidth, insertion loss at 2nd harmonics, and the insertion loss at 3rd harmonics to figure out the optimum filling factor for certain planar-EBG patterns.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"52 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80935291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image processing based Feature extraction of Bangladeshi banknotes","authors":"Z. Ahmed, S. Yasmin, M. Islam, R. Ahmed","doi":"10.1109/SKIMA.2014.7083521","DOIUrl":"https://doi.org/10.1109/SKIMA.2014.7083521","url":null,"abstract":"Counterfeit currency is a burning question throughout the world. The counterfeiters are becoming harder to track down because of their rapid adoption of and adaptation with highly advanced technology. One of the most effective methods to stop counterfeiting can be the widespread use of counterfeit detection tools/software that are easily available and are efficient in terms of cost, reliability and accuracy. This paper presents a core software system to build a robust automated counterfeit currency detection tool for Bangladeshi bank notes. The software detects fake currency by extracting existing features of banknotes such as micro-printing, optically variable ink (OVI), water-mark, iridescent ink, security thread and ultraviolet lines using OCR (Optical Character recognition), Contour Analysis, Face Recognition, Speeded UP Robust Features (SURF) and Canny Edge & Hough transformation algorithm of OpenCV. The success rate of this software can be measured in terms of accuracy and speed. This paper also focuses on the pros and cons of implementation details that may degrade the performance of image processing based paper currency authentication systems.","PeriodicalId":22294,"journal":{"name":"The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)","volume":"18 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89415179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}