{"title":"Handling imbalance visualized pattern dataset for yield prediction","authors":"M. M. Noor, S. Jusoh","doi":"10.1109/ITSIM.2008.4631657","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631657","url":null,"abstract":"The prediction of the yield outcome in a non close loop manufacturing process can be achieved by visualizing the historical data pattern generated from the inspection machine, transform the data pattern and map it into machine learning algorithm for training, in order to automatically generate a prediction model without the visual interpretation needs to be done by human. Anyhow, the nature of manufacturing process dataset for the bad yield outcome is highly skewed where the majority class of good yield extremely outnumbers the minority class of bad yield. Comparison between the undersampling, over- sampling and SMOTE + VDM sampling technique indicates that the combination of SMOTE + VDM and undersampled dataset produced a robust classifier performance capable of handling better with different batches of prediction test data sets. Furtherance, suitable distance function for SMOTE is needed to improve class recall and minimize overfitting whilst different approach on the majority class sampling is required to improve the class precision due to information loss by the undersampling.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126781122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing low speed network performance for voice over internet protocol","authors":"Y. Bandung, C. Machbub, A. Langi, S. Supangkat","doi":"10.1109/ITSIM.2008.4631962","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631962","url":null,"abstract":"In this paper, we optimize low speed networks access for designing an efficient Voice over Internet Protocol network, especially in 64 kbps, 128 kbps, and 256 kbps bandwidth capacities. We draw some analytical approach based on Extended E-model to quantify some levels of quality of service. Using the model, those levels are determined by network parameters such as delay, jitter, packet loss level, network utilization, and bandwidth capacity and by implementation configuration such as voice coder, packetization scheme, and size of jitter buffer. Our objective is to find maximum number of calls in some given bandwidth capacities while maintaining a certain level of the quality of service. Using numeric estimation, we found that the optimum solution for some given bandwidth capacities can be achieved by applying G.723.1 5.3 kbps voice coder, packet loss level less than 1%, jitter less than 80 ms, and utilization network less than 80%.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122941547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Handwritten Jawi words recognition using Hidden Markov Models","authors":"Remon Redika, K. Omar, Mohammad Faidzul Nasrudin","doi":"10.1109/ITSIM.2008.4631723","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631723","url":null,"abstract":"Handwritten Jawi recognition is a challenging task because of the cursive nature of the writing. In manuscript writings, words are writer-dependent. The recognition task of Jawi Manuscript still opens problem due to the existence of many difficulties, such as the variability of character shape, overlap and presence of ligature in manuscript words. This paper describes a technique of Jawi word recognition using Hidden Markov Model (HMM). The technique of segmentation-free method used to transform word image into sequences of frames. The geometrical features are extracted using sliding window from each observation frame sequence. Besides, baseline parameters of Jawi word are use in the calculation of black pixel density. Vector Quantization clusters these features and assigns them into symbols that will be used as HMM input. Experiments have been conducted on 579 images of 100 words lexicon of Syair Rakis manuscript, and the recognition rate has reached 84 percent recognition.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"438 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114584262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Shoaib, Jameel Amar, Akshat Chingtham, Tejbanta Singh
{"title":"Enhancements in query evaluation and page summarization of The Thinking Algorithm","authors":"M. Shoaib, Jameel Amar, Akshat Chingtham, Tejbanta Singh","doi":"10.1109/ITSIM.2008.4632050","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4632050","url":null,"abstract":"This paper explores a unique way in which the thinking algorithm adds an extra logical substrate to a Web search query using artificial intelligence. Instead of just going after keyword searching, the algorithm tries to assess the motives of the user behind entering a query. The algorithm tries to find the reasons as to why a user has entered a particular query by adding this question with every query: ldquoSitting in a particular region, why has the person entered such a query?rdquo The compounded uniqueness level applies the concept of geo-location searches. The algorithm allots competency level to the user from the query term using topic trees. The query parsers and indexers in the algorithm are more magnetized into extracting meaningful information from queries and web pages than just indexing the words present in a web page. Clustering the search results help to resolve the ambiguity in a userpsilas query.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117038749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The decomposition concept in handling the space allocation problem","authors":"S. D. Chandrakaisan, A. Khader","doi":"10.1109/ITSIM.2008.4632019","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4632019","url":null,"abstract":"The space allocation problem particularly in academic institutions is well known as a complex, difficult and time consuming task. In this paper, we discuss the application of the decomposition concept in handling the combinatorial optimization problem such as the university space allocation problem. In applying the decomposition, we introduce the bin and tuple concept. This method is found to simplify the entire problem and ease the problem solving process. combined local search memetic algorithm is applied on the simplified problem. Combined local search refers to combination of optimum local searches for genetic operators in Memetic Algorithm. Nevertheless, without any restriction, other algorithms can be used on the simplified problem.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128509534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Playability Heuristics Evaluation (PHE) approach for Malaysian educational games","authors":"H. M. Omar, A. Jaafar","doi":"10.1109/ITSIM.2008.4632053","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4632053","url":null,"abstract":"Heuristics evaluation is one of the common techniques being used for usability evaluation. The potential of HE has been explored in games design and development and later playability heuristics evaluation (PHE) is generated. PHE has been used in evaluating games. Issues in games usability covers forms of game usability, game interface, game mechanics, game narrative and game play. This general heuristics has the potential to be further explored in specific domain of games that is educational games. Combination of general heuristics of games (tailored based on specific domain) and education heuristics seems to be an excellent focus in order to evaluate the usability issues in educational games especially educational games produced in Malaysia.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128656222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decision fusion for frontal face verification","authors":"Rosmawati Nordin, Md. Jan Nordin","doi":"10.1109/ITSIM.2008.4631679","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631679","url":null,"abstract":"It has been established that the combination of a set of classifiers designed for a given pattern recognition problem may achieve higher recognition/classification rates than any of the classifiers taken individually. One of the contributing factor for the improvement is the rule applied to get a unified decision and the diversity of the classifiers. Principal Components Analysis (PCA) and Linear Discriminant Analysis (LDA) are two popular approaches in face recognition and verification. The authors will demonstrate a verification performance in which the fusion of both methods produces an improved rate compared to individual performance. Tests are carried out on FERET (Facial Recognition Technology) database using a modified protocol. A major drawback in applying LDA is that it requires a large set of individual face images sample to extract the intra-class variation. Performance is presented as the rate of verification when false acceptance rate is zero, in other words, no impostors allowed. Results using fusion of three verification experts show improvement compared with the best individual expert.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130343968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Infrastructure requirements analysis in developing intelligent system for k-farmer community","authors":"Hanim Risidi, R. Abdullah","doi":"10.1109/ITSIM.2008.4631685","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631685","url":null,"abstract":"Agriculture is a knowledge-intensive business, which offers farmers with a large volume of knowledge. However, often farmer do not use this facility to manage their knowledge. Knowledge management (KM) in agriculture promotes an integrated approach to the creation, capture, accessing and use of farmer domain knowledge of product, services and processes. New technologies expected can help farmers to achieve better knowledge management. In this paper, we have proposed the infrastructure requirement analysis in developing intelligent system for knowledge farmer community. Knowledge management initiative among farmers expected to produce more gain in their farm productions as well as return on investment (ROI). Thus, helps the community to become more productive and knowledgeable.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130490138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessment of NNARX structure as a global model for self-refilling steam distillation essential oil extraction system","authors":"M. Rahiman, M. Taib, Y.M. Salleh","doi":"10.1109/ITSIM.2008.4632020","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4632020","url":null,"abstract":"This paper investigates the performance of neural network autoregressive with exogenous input (NNARX) model structure and evaluates the training data that provide robust model on fresh data set. The system under test is a self-refilling steam distillation essential oil extraction system. Two PRBS signals with different probability band were tested at different operating points and conditions. A total of three data sets will be used to evaluate the model. NNARX model was estimated by means of prediction error method with Levenberg-Marquardt algorithm. It is expected that the training data that covers the full operating condition will be the optimum training data. All data are separated into training and testing data by interlacing technique. For each data, the model order selection is based on ARX structure and MDL information criterion. These data are cross-validated between each other and the validation results are presented and concluded. The model performance is based on the R2, adjusted-R2, RMSE and NMSE. The histogram is also used to evaluate the distribution of the one-step-ahead residuals. Overall results have shown that the NNARX model trained with data of full operating condition is the most robust when it is validated on a fresh data set.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114340110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elia Nadira Sabudin, Siti Zarina Mohd Muji, Mohd Helmy Abd Wahab, A. Johari, Norazman Bin Ghani
{"title":"GSM-based notification speed detection for monitoring purposes","authors":"Elia Nadira Sabudin, Siti Zarina Mohd Muji, Mohd Helmy Abd Wahab, A. Johari, Norazman Bin Ghani","doi":"10.1109/ITSIM.2008.4631934","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631934","url":null,"abstract":"This paper presents the design of GSM-based black box system for speed detection. The idea is clear that the current existing black box system only notify the driver through alarm systems and information is recorded in the black box. However, this could be impractical for the authorized personnel to check every public transports. With the rapid development of GSM application in monitoring purposes, the current system can be integrated to facilitate the authorized personnel and to ease the monitoring process as well. The purpose of this research is to design and integrate a new black-box system integrated with GSM notification system to send alert information to traffic authorized personnel or Transport Department through Short Message Services (SMS). The scope of this research is primarily concerned on express buses which prone to accident.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116361287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}