N. A. Abdullah, Raja Hafiz Raja, Ahmad Kamaruddin, Z. Razak, M. Y. B. M. Yusoff.
{"title":"An authoring toolkit design for educational game content","authors":"N. A. Abdullah, Raja Hafiz Raja, Ahmad Kamaruddin, Z. Razak, M. Y. B. M. Yusoff.","doi":"10.1109/ITSIM.2008.4631574","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631574","url":null,"abstract":"A new way of teaching using multimedia presentations or game-based technologies are urgently needed in order to engage and sustain students’ learning interests in their learning materials. To achieve that, teachers should be able to produce interactive multimedia learning materials (e.g. educational games) themselves. However, current authoring tools such as Adobe Flash and Macromedia Director are too complex to use by teachers with no computing backgrounds. We would like to address this issue by proposing a simple to use authoring toolkit that will enable teachers to create their own educational game contents. The proposed toolkit operates by using games templates i.e. akin to producing presentation slides using Microsoft Power Point. In this paper, we present the framework in designing such toolkit. Based on this framework, an authoring tool will be developed to enable teachers in Malaysia to author educational game content for teaching basic Jawi words for the primary school children.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"114 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128435942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Hema, M. Paulraj, Sazali Yaacob, A. H. Adom, R. Nagarajan
{"title":"Functional link PSO neural network based classification of EEG mental task signals","authors":"C. Hema, M. Paulraj, Sazali Yaacob, A. H. Adom, R. Nagarajan","doi":"10.1109/ITSIM.2008.4631976","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631976","url":null,"abstract":"Classification of EEG mental task signals is a technique in the design of Brain machine interface [BMI]. A BMI can provide a digital channel for communication in the absence of the biological channels and are used to rehabilitate patients with neurodegenerative diseases, a condition in which all motor movements are impaired including speech leaving the patients totally locked-in. BMI are designed using the electrical activity of the brain detected by scalp EEG electrodes. In this paper five different mental tasks from two subjects were studied, combinations of two tasks are used in the classification process. A novel functional link neural network trained by a PSO algorithm is proposed for classification of the EEG signals. Principal component analysis features are used in the training and testing of the neural network. The average classification accuracies were observed to vary from 80.25% to 93% for the 10 different task combinations for each of the subjects. The proposed network has an average training time of 0.16 sec. The results obtained validate the performance of the proposed algorithm for mental task classification.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115316526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New direction in project management success: Base on smart methodology selection","authors":"I. Attarzadeh, S. H. Ow","doi":"10.1109/ITSIM.2008.4631556","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631556","url":null,"abstract":"Modern project management is a well-understood discipline that can produce predictable, repeatable results. The methodologies of modern project management are highly analytic, usually requiring automated tools to support them on large projects. Like most other disciplines, it is learned through both practice and study. Project management encompasses many different skills, such as understanding the interdependencies among people, technologies, budgets, and expectations; planning the project to maximize productivity; motivating others to execute the plan; analyzing the actual results; and reworking and tuning the plan to deal with the realities of what really happens as the project is executed. In order to manage a project and bring it to a successful completion, its project manager must have a complete understanding of the methodologies being used for the management of different parts of the project. Managers prefer specific project methodology, while resist and face difficulties for an opportunity to manage another project with different methodology as they don’t know how much commonality exists between the preferred and the new required methodology.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115479047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An evaluation of malaysian ICT sectors’ readiness for telecommuting","authors":"K. Subrahmanyam, S. Ibrahim, Allan A De Lara","doi":"10.1109/ITSIM.2008.4632058","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4632058","url":null,"abstract":"There have been many variations of telecommuting throughout the years, of course none as high-tech as what we are witnessing today. From the past research it is evident that there are many conditions in which remote working may or may not be successful and these conditions vary in different environments. This paper will present the findings of a study carried out in Klang Valley, Malaysia focusing on ICT organizations and evaluates their readiness for telecommuting. The data is gathered through electronic surveys and from the analysis of the data, it was found that telecommuters face less stress and are more productive than traditional office workers. It was also found that the perceived practicality of telecommuting was dependent on the size of company.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124396149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Balafar, A. Ramli, M. Saripan, R. Mahmud, S. Mashohor, Hakimeh Balafar
{"title":"MRI segmentation of Medical images using FCM with initialized class centers via genetic algorithm","authors":"M. Balafar, A. Ramli, M. Saripan, R. Mahmud, S. Mashohor, Hakimeh Balafar","doi":"10.1109/ITSIM.2008.4631864","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631864","url":null,"abstract":"Image segmentation is a critical stage in many computer vision and image process applications. Accurate segmentation of medical images is very essential in Medical applications but it is very difficult job due to noise and in homogeneity. Fuzzy C-Mean (FCM) is one of the most popular Medical image clustering methods. We noticed that for some images, FCM is sensitive to initialization of centre of clusters. This article introduced a new method based on the combination of genetic algorithm and FCM to solve this problem. The genetic algorithm is used to find initialized centre of the clusters. In this method, the centre is obtained by minimizing an object Function. This object Function specifies sum of distances between each data and their cluster centres. Then FCM is applied with to the case. The experimental result demonstrates the effectiveness of new method by able to initialize centre of the clusters.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124457734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ILC-CMAS Model, summary of research findings and implication for Content Creation and Management Automation System (CMAS)","authors":"Choo Wou Onn, H. Zaman, Chue Wen Yeen","doi":"10.1109/ITSIM.2008.4631612","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631612","url":null,"abstract":"Content Creation and Management Automation System (CMAS) is a fully web-based application that consists of two modules, namely content creation and management. The content creation module comprises five sub modules which are storyboard template for content writing, a quality control standard tool to maintain quality of the created content, a multimedia database for storing multimedia data, drawing tool and search tool. For the management module, the CMAS consists of management tools used for assigning tasks and duty to each of the employees and workload planning for the employees. It also includes with bulletin board, forum, chat room and email functions to establish a strong communication between the experts and the management staff. This would generate up-to-date reports on the achievement of each of the employees and file-sharing tool. ILC-CMAS Model is the instructional design model created for the research and development of CMAS. In this paper, we will discuss about ILC-CMAS Model research findings and implication of CMAS system. With the development and testing of CMAS, we are confident that CMAS help to increase efficiency and effectiveness in the process of content development and the storyboarding management process of the development for multimedia software as compared with the conventional method.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121268399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid nearest neighbour and progressive improvement approach for Travelling Salesman Problem","authors":"Sandeep Dhakal, R. Chiong","doi":"10.1109/ITSIM.2008.4631549","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631549","url":null,"abstract":"The Travelling Salesman Problem (TSP), one of the most famous combinatorial optimisation problems, has been widely studied for half a century now. The state-of-the-art solutions proposed in recent years seem to have focused on the nature-inspired algorithms. While good performance has been reported for many of these algorithms, they are considerably expensive in terms of computation. In this paper, we describe a hybrid solution based on the nearest neighbour algorithm and the progressive improvement algorithm. The nearest neighbour algorithm is a simple search that quickly yields a short tour for TSP, but its solution is usually not optimal. The progressive improvement algorithm, on the other hand, is an improvement strategy that needs to search through a lot of solutions that are near to the current solution, and derives a better one. We conduct experiments with this hybrid approach based on some major cities and towns in Borneo Island. Our experiments show that the hybrid approach is able to produce optimal or near-optimal results consistently for up to 100 cities/towns.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"38 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124844311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biometric template protection using watermarking with hidden password encryption","authors":"Md. Rajibul Islam, Md. Shohel Sayeed, A. Samraj","doi":"10.1109/ITSIM.2008.4631572","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631572","url":null,"abstract":"For quite a few years the biometric recognition techniques have been developed. Here, we briefly review some of the known attacks that can be encountered by a biometric system and some corresponding protection techniques. We explicitly focus on threats designed to extract information about the original biometric data of an individual from the stored data as well as the entire authentication system. In order to address security and privacy concerns, we present a biometric authentication scheme that uses two separate biometric features combined by watermark embedding with hidden password encryption to obtain a non-unique identifier of the personage. Furthermore, to present the performance of the authentication system we provide experimental results. The transformed features and templates trek through insecure communication line like the Internet or intranet in the client-server environment. Our projected technique causes security against attacks and eavesdropping because the original biometric will not be exposed anywhere in the authentication system.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124846448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Object-oriented framework for cross-layer communication","authors":"Y. Hiranaka, T. Taketa","doi":"10.1109/ITSIM.2008.4631999","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631999","url":null,"abstract":"The layered structure of network processing is an effective formalism for constructing software systems. However, it has weakness in the efficiency of the total network system. Recently, cross-layer communications among network objects are expected to be a savior, which patches the lack of functionality in the layered structure. This paper describes the necessary conditions which must be met for implementing the cross-layer communication, a proposed object-oriented framework for it, an abstract oriented representation of data, and its evaluation relating to the data efficiency. Also, some application examples are shown.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125578266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving blocking probability in the optical WDM networks","authors":"Shilpi Garg, Shubham Agrawal","doi":"10.1109/ITSIM.2008.4631959","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631959","url":null,"abstract":"While a session request is assigned to a wavelength-routed optical WDM networks, which are circuit-switched in nature, the challenge of routing and wavelength assignment (RWA) is to calculate the optimal path between two nodes, and further is to assign an available set of wavelengths along this path. An algorithm called Total wavelengths and Expected available wavelengths (TEW) proposed by Pavarangkoon et. al. in order to achieve effective routing and wavelength assignment formulates a link weight function and considers this as the main factor for route selection. This function is calculated by using a determination factor of the number of wavelengths that are being used currently and are supposed to be available after a certain time. However, this algorithm tends to overload paths with smaller weights and higher utilization while lightly loaded paths with slightly lower capacities may remain unused. In this paper, propose an improvement to the TEW algorithm by incorporating the frequency of usage of the paths in the weight function and running Dijkstra’s shortest path algorithm to choose paths that have more total and expected available wavelengths and less frequency of usage. The proposed algorithm is called as Countered Total wavelengths and Expected available wavelengths (CTEW) algorithm. The impact of the proposed algorithm on blocking probability is investigated by means of computer simulation and by comparing it with TEW algorithm. The results show that the proposed algorithm can achieve better performance in terms of blocking probability.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126650855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}