{"title":"A Study on Radio Interference Estimation Method for Wireless Relay Network Link Scheduling","authors":"Y. Taniguchi","doi":"10.1109/ICAIET.2014.55","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.55","url":null,"abstract":"In time division multiple access (TDMA) based wireless networks, graph coloring based link scheduling mechanisms are often considered to assign time slots to links. A graph coloring based link scheduling mechanism requires a radio interference estimation method to make a conflict graph from a wireless network topology, and the protocol method is usually used among radio interference estimation methods. In this paper, we propose a radio interference estimation method for wireless relay networks, where the network topology is a tree. Through simulation experiments, we show that the accuracy of radio interference estimation with our proposed method is improved compared to that with the protocol method.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132314458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Present & Future Paradigms of Cyber Crime & Security Majors - Growth & Rising Trends","authors":"Vinit Kumar Gunjan, Amit Kumar, A. A. Rao","doi":"10.1109/ICAIET.2014.24","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.24","url":null,"abstract":"Cybercrime is all about the crimes involved with the environment where ever a network is involved and the steps implemented to control or overcome this cyber-security. The work culture of all the sectors are moving towards digitalization and cloud based systems in order to increase the work efficiency with more accuracy, In addition to this a majority of individuals are fond of using social networking sites and email servers in many ways directly or indirectly. Cybercrime is a type of crime where technical expertise is required not only to crack it but in order to make a user secure or to apply any preventive majors. In this paper we have described about the basics of this dreadful crime, recent research & development in the field of cyber security, the types of crimes and a small survey with an IT company. Our aim with this research is to check the awareness level of cybercrime and security majors and to suggest necessary steps which can really be helpful in making the cyber environment secure, robust and trustworthy.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131994670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Norjansalika Janom, Normazalila Abu Bakar, N. Arshad, S. S. Salleh, Syaripah Ruzaini Syed Aris, N. Mastuki
{"title":"Microsourcing Job Provider Maturity Model","authors":"Norjansalika Janom, Normazalila Abu Bakar, N. Arshad, S. S. Salleh, Syaripah Ruzaini Syed Aris, N. Mastuki","doi":"10.1109/ICAIET.2014.45","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.45","url":null,"abstract":"Microsourcing is an emerging outsourcing practice by organization to an undefined (and generally large) network of people in a form of an open call. It is considered as a new entrepreneurial evolution in digital economy value creation. Because of the challenges and competition faces by organization nowadays, organization approved the need to provide services with higher added value and less cost. One way to achieve that is using microsourcing to accomplish tedious tasks at faster rate. However in Malaysia, the concept is fairly new and still in a formative stage. Due to that, organization's awareness, interest and willingness to participate in microsourcing initiatives need to be investigated and evaluated. This research is aim to produce the multiperspectives micro sourcing maturity integration model that able to assess the maturity level of organization to participate in microsourcing initiative. In this study, the characteristics of viable microsourcing maturity model and the significance factors contributing to implementation success have been identified. The analysis and results can be used as a road map to prepare an action plan for a successful microsourcing implementation in Malaysia.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123843844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zazaleena Zakariah, Norjansalika Janom, N. Arshad, S. S. Salleh, Syaripah Ruzaini Syed Aris
{"title":"Crowdsourcing: The Trend of Prior Studies","authors":"Zazaleena Zakariah, Norjansalika Janom, N. Arshad, S. S. Salleh, Syaripah Ruzaini Syed Aris","doi":"10.1109/ICAIET.2014.30","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.30","url":null,"abstract":"Crowdsourcing is view as major changes in current economy as it has revolutionary effects on organizations. Unlike previous outsourcing trends that practices closed inter-organizational relationships subject to the long-term legal contract, these new crowdsourcing practices take place in an open and virtual context, characterized with small and short-term deals. Crowdsourcing has been recognized as new industry that able to uplift the economy and bring significant benefits to business and people in general. Although the phenomenon of crowdsourcing is fairly new and still in a formative stage, the indications and predictions are optimistic. Under the recent Malaysian government initiatives called Digital Malaysia, various crowdsourcing efforts and programs have been introduced. This paper reports on the review of prior studies pertaining crowdsourcing from a general view.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122266149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Orphan Defects: Chance Finding?","authors":"D. S. S. Prasad, S. Kanakadandi","doi":"10.1109/ICAIET.2014.22","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.22","url":null,"abstract":"At least 5% and at most 25% defects escape the rigorous to routine testing practices of various software products. Defects imply various holes in the test suite creation as well as selection. We implemented hybrid distance based algorithms to derive defect to test case mapping that yielded two metrics - Test Coverage Metric and Test Sufficiency Metric. In addition to these two metrics, we stumbled upon a set of defects that are not mapped to any test cases which were named as 'orphan defects (OD)'. Finding orphan defects contrasts the testing team's belief that they have created a comprehensive test suite with total coverage, we have coined the term 'chance finding' to empaahsize that it is serendipitous finding while analyzing various defects, both internal and custoemr reported. These defects have been further analyzed for any associated features and presented to the user for validation and adding required test cases. Upon using this procedure, one of the industry partners has brought down the orphan defects by about 90% over three patch releases and test coverage and sufficiency have been improved considerably.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126657239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vehicle Tracking Using Particle Filter for Parking Management System","authors":"K. Teo, R. Chin, N. K. Rao, F. Wong, W. L. Khong","doi":"10.1109/ICAIET.2014.40","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.40","url":null,"abstract":"Increment of on-road vehicles has urged public venues to provide visitors with a larger area of parking space. As the parking area grew larger for example in a hyper mall, a well-organized parking management system is necessary to assist drivers in locating parking position. Besides, it can also help the management team to monitor vehicle flow in the parking lot. Vehicle tracking plays an important role to the parking management system, as accurate tracking result will lead to a more efficient management system. Among commercially available sensors, video sensor has been commonly deployed in the parking area due to its ability in obtaining a wide range of vehicle information. However, images captured using video sensors are limited under situations where vehicles are undergoing occlusion and maneuvering incidents. This will cause tracking error therefore affecting the performance of the parking management system. Particle filter has been proven as one of the promising techniques to track vehicle under disturbances. Therefore, particle filter is proposed to track vehicle under occlusion and maneuvering incidents in this study. Experimental results show that the particle filter is able to track a target vehicle under different disturbances.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114633890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Design and Compilation of a Facial Spoof Database on Various Textures","authors":"S. Parveen, S. M. S. Ahmad, M. Hanafi, W. Adnan","doi":"10.1109/ICAIET.2014.38","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.38","url":null,"abstract":"Face biometrics plays an important role in various authentication applications. However, one of the main design challenges for an accurate face biometrics is detecting spoof artificial artifacts. The development of robust anti-spoofing algorithm requires for rigorous system training and testing on facial database that includes various possible spoof specimen which reflects different variations of spoofing attacks. Currently, the databases which are used to test face anti-spoofing algorithms are limited in terms of texture variations. Therefore, in this paper, our focus is to introduce a face spoofing database which is compiled from various types of spoofing textures. Our database was collected from 30 different subjects and fake faces were recaptured on various forms which include four different types of paper-based textures and three different digital display devices. All images were collected using a high precision camera device. This database would provide a more realistic and challenging platform for facial anti-spoofing research.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"371 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116540115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utilization of Genetic Algorithm for Optimal EEG Channel Selection in Brain-Computer Interface Application","authors":"I. H. Hasan, A. Ramli, S. A. Ahmad","doi":"10.1109/ICAIET.2014.25","DOIUrl":"https://doi.org/10.1109/ICAIET.2014.25","url":null,"abstract":"Brain-Computer Interface (BCI) research has provoked an enormous interest among researchers from different fields since it is an important element in assistive technology. The most popular approach is a non-invasive method, using Electroencephalogram (EEG) analysis which acquires signals from 32 to 64 electrodes' recordings and translate them to a movement using various computing algorithm which can be used in wheelchair navigation, or control robot movements. However, it will be time consuming and an exhausting experience if the single command translation from large number of electrodes is used. The aim of this project is to develop an algorithm that can choose optimal four electrodes for signal recording, and convert one thought into multiple commands with the chosen electrodes. Using sample datasets, the EEG signal is analyzed to determine the most suitable scalp area for P300 detection, while optimization with genetic algorithm (GA) is developed to select best four channels. After 30 GA runs, the optimal four sets of electrodes are chosen based on their coefficient of determination or r2 values, where higher values contributes to higher repetition rates. Using signals from the chosen four electrodes, a success rate of 75-80% is received.","PeriodicalId":225159,"journal":{"name":"2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131791041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}