{"title":"Performance evaluation of dynamic cell zooming algorithms in omni-directional and sector-based cells","authors":"Khin Cho Tun, K. Kunavut","doi":"10.1109/JCSSE.2014.6841860","DOIUrl":"https://doi.org/10.1109/JCSSE.2014.6841860","url":null,"abstract":"This paper evaluates and highlights the performance of three dynamic cell zooming algorithms applied in both omni-directional and sector-based networks. A possible framework compatible with dynamic cell zooming algorithms for user's location detection is presented. The performance of each cell zooming algorithm is simulated in terms of power saving and possible outage in a full-day operation. According to simulated results, there is no significant difference between the performance of each algorithm and others at low traffic hours, but their performances are different at high traffic hours. From an overall comparison, the continuous cell zooming algorithm illustrates the best performance in terms of power saving, followed by fuzzy algorithm and then discrete algorithm. However, in terms of possible outage, the continuous algorithm is very sensitive to user movement and it shows a very high possible outage ratio. Meanwhile, the outage is totally removed in the discrete and fuzzy algorithms according to their concept. The dynamic cell zooming algorithms show a larger power saving in sector-based network since it hosts a more detailed plan to perform cell zooming.","PeriodicalId":331610,"journal":{"name":"2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"61 28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121779354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Siriyon Phutthachan, B. Suntisrivaraporn, D. Surangsrirat
{"title":"A framework for mapping Thai drugs using a pharmaceutical ontology extension of Snomed CT","authors":"Siriyon Phutthachan, B. Suntisrivaraporn, D. Surangsrirat","doi":"10.1109/JCSSE.2014.6841887","DOIUrl":"https://doi.org/10.1109/JCSSE.2014.6841887","url":null,"abstract":"This paper presents the design of ontology-based knowledge representation for pharmaceutical products. Managing different drug-coding systems for the local Thai drugs is a challenge. Thus, in order to easily and efficiently manage the pharmaceutical product in Thailand, we propose the use of existing systematized nomenclature of medicine, clinical terms (Snomed CT) in conjunction with our proposed pharmaceutical Thai medicine ontology (OTM). Moreover, we implement a drug semi-automatic mapping system that measures similarity between definitions in the ontology and local drugs. Which is then used to recommend for mappings to Snomed CT. An evaluation by means of user satisfaction was proved the framework to be useful.","PeriodicalId":331610,"journal":{"name":"2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130374425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic search for cloud providers with security conformance to cloud controls matrix","authors":"Jakarin Thaweejinda, T. Senivongse","doi":"10.1109/JCSSE.2014.6841882","DOIUrl":"https://doi.org/10.1109/JCSSE.2014.6841882","url":null,"abstract":"Prospective cloud consumers consider several quality attributes of cloud providers when selecting a cloud service. Security is a major quality attribute that is often used to differentiate between service offers from different cloud providers. Cloud Security Alliance has published the Cloud Controls Matrix (CCM) which contains security best practices and principles which cloud providers should follow to provide secure cloud services. This paper presents a semantic search framework for discovering cloud services which conform to the security controls in the CCM. In this framework, a security ontology is constructed from the CCM, and based on this security ontology, provider profiles can be built. A provider profile which presents relevant evidence of conformance to CCM security controls is then searched and ranked against a cloud consumer's query. Cloud consumers then can determine and compare the degree of conformance of the cloud services to the CCM. In an experiment, the semantic search gives the search results that should be more useful to the consumers than normal text search.","PeriodicalId":331610,"journal":{"name":"2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123138393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tool for generating test module for JavaScript based on statement coverage criteria","authors":"Pannawat Janthong, T. Suwannasart","doi":"10.1109/JCSSE.2014.6841890","DOIUrl":"https://doi.org/10.1109/JCSSE.2014.6841890","url":null,"abstract":"JavaScript is the most popular language for client-side web application development. Some open-source tools provide frameworks for building JavaScript automation test. Developers can create and maintain automate test scripts with these tools. However, they will waste a lot of time to create and maintain test scripts because these are manual activities. This research presents a tool for generating unit test modules for JavaScript to meet statement coverage criteria. The tool can generate test cases by analyzing and instrument source code, generate test cases with random data based on type of parameters, execute the test cases, evaluate coverage, regenerate as well as re-execute until it reaches a target level of statement coverage, and then provide coverage report.","PeriodicalId":331610,"journal":{"name":"2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121660414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of a cooperative-bloom filter-assisted query protocol for data access in Bangkok scenario","authors":"Kiattikun Kawila, K. Rojviboonchai","doi":"10.1109/JCSSE.2014.6841866","DOIUrl":"https://doi.org/10.1109/JCSSE.2014.6841866","url":null,"abstract":"Vehicular ad hoc network (VANET) is challenging to deliver a query message for a requesting data efficiently when the topology of network keeps changing frequently and has many partitions. Many routing algorithms suffer from path breaks. Our work focuses on communication between vehicles to roadside unit stations by requesting data only one-hop communication from the requesting node. Routing algorithms are not needed to create data transfer path. We present a cooperative-bloom filter-assisted query protocol for data access in VANET, COBRA-Q. The COBRA-Q utilizes the movement of vehicles to achieve transfer of the request data within one-hop communication. The COBRA-Q uses bloom filter technique to keep and compress car traveling history records. In this paper, we evaluate the performance of our proposed protocol by simulation in ns-3. The real vehicle density and the real urban area in Bangkok are used. The simulation results show that the COBRA-Q can effectively access data in terms of percentage of success rate and overhead of using query message.","PeriodicalId":331610,"journal":{"name":"2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132467844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei Yi, Z. Sun, Hui Xu, Jietao Diao, Nan Li, Mingqian Wang
{"title":"Dual RAID: A scheme for high reliable all flash array","authors":"Wei Yi, Z. Sun, Hui Xu, Jietao Diao, Nan Li, Mingqian Wang","doi":"10.1109/JCSSE.2014.6841870","DOIUrl":"https://doi.org/10.1109/JCSSE.2014.6841870","url":null,"abstract":"Flash-based solid state disks (SSDs) are replacing hard disk drives owing to its high performance and low energy consumption. For both high reliability and large capacity, redundant array of independent disks (RAID) is commonly used in storage system. In all flash arrays, the HDDs in RAID are substituted by SSDs and it gains improvements in bandwidth and IOPS (Input/output Operations per Second) by leaps and bounds owing to SSDs high performance. However, the error mode of SSD is different from HDD. The uncorrectable page errors in SSD are a great threat especially when a disk fails. For high reliability, we proposed a Dual-RAID scheme to protect data at disk level and block level respectively. To correct the disk failure, the proposed scheme adopts RAID-5 between disks. For recovering uncorrectable page errors, a redundant array of independent NANDs (RAIN) scheme is applied to SSD by exploiting its multi-channel structure. Although the redundancy overhead of the proposed scheme is about the same as RAID-6, the dual-RAID scheme achieves better performance and higher reliability. The experiment shows that the proposed scheme improves performance 35% on totally random trace in comparison to RAID 6 scheme.","PeriodicalId":331610,"journal":{"name":"2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"388 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131976460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of university students' behaviors in sharing information on Facebook","authors":"Suwimon Vongsingthong, N. Wisitpongphan","doi":"10.1109/JCSSE.2014.6841856","DOIUrl":"https://doi.org/10.1109/JCSSE.2014.6841856","url":null,"abstract":"Online social networks, particularly Facebook has become one of the most popular platforms for students to make connections, share information, and interact with each other. In modern socializing society, many distinct patterns can be deduced from the observations. These specific traits provide direct benefit to businesses as students can sometimes act as spokesman for their merchandises on social media without extra investment. In this paper, the implications of Facebook “share” with respect to commercial gain are analyzed based on students' behaviors. An interaction matrix of “share” interaction and profile data are composed as a dataset which are clustered into six eligible groups of commercial segment: dining, itinerary, pets, entertainment, games, and gifts/varieties. Pervasive classification algorithms: KNN, Decision Tree, NaïveBayes and SVM are applied to explore the opportunity of target products. According to our findings, SVM outperforms the others with accuracy of 87.95 % due to its distinctive characteristic in handling imbalanced data. The classification results reveal that the merchandises that have high potential in the campus are entertainment CDs, itinerary and pets. This valuable result can also be expediently applied to new-coming students.","PeriodicalId":331610,"journal":{"name":"2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133556170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. A. Khan, Hassan Pervaz, A. Latif, Ayesha Musharraf, Sāniyā
{"title":"Unsupervised identification of malaria parasites using computer vision","authors":"N. A. Khan, Hassan Pervaz, A. Latif, Ayesha Musharraf, Sāniyā","doi":"10.1109/JCSSE.2014.6841878","DOIUrl":"https://doi.org/10.1109/JCSSE.2014.6841878","url":null,"abstract":"Malaria in human is a serious and fatal tropical disease. This disease results from Anopheles mosquitoes that are infected by Plasmodium species. The clinical diagnosis of malaria based on the history, symptoms and clinical findings must always be confirmed by laboratory diagnosis. Laboratory diagnosis of malaria involves identification of malaria parasite or its antigen/products in the blood of the patient. Manual diagnosis of malaria parasite by the pathologists has proven to become cumbersome. Therefore, there is a need of automatic, efficient and accurate identification of malaria parasite. In this paper, we proposed a computer vision based approach to identify the malaria parasite from light microscopy images. This research deals with the challenges involved in the automatic detection of malaria parasite tissues. Our proposed method is based on the pixel based approach. We used K-means clustering (unsupervised approach) for the segmentation to identify malaria parasite tissues.","PeriodicalId":331610,"journal":{"name":"2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"398 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129198751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hannan Bin Liaqat, Qiuyuan Yang, A. M. Ahmed, Zhenzhen Xu, Tie Qiu, Feng Xia
{"title":"A social popularity aware scheduling algorithm for ad-hoc social networks","authors":"Hannan Bin Liaqat, Qiuyuan Yang, A. M. Ahmed, Zhenzhen Xu, Tie Qiu, Feng Xia","doi":"10.1109/JCSSE.2014.6841837","DOIUrl":"https://doi.org/10.1109/JCSSE.2014.6841837","url":null,"abstract":"In an ad-hoc social network (ASNET), users normally require scheduling popular data packet first. However, ASNET users have some limitations due to the scarce bandwidth and unreliability in wireless connection. Traditional algorithms use First In First Out (FIFO) order for scheduling, which is not suitable in ASNETs and cannot work properly with congested environments. To overcome the above mentioned problems, in this paper, we introduce a social popularity aware scheduling algorithm in the context of ad-hoc social networks, namely Pop-aware. Pop-aware provides solution after calculating the traffic load of intermediate node and assigns priority to incoming flow using degree centrality (social property). It provides fairness in received service to each flow using the active service rate concept. Experimental results show that the performance of Pop-aware is better as compared against existing schemes, in terms of average throughput, packet loss rate and average delay.","PeriodicalId":331610,"journal":{"name":"2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131911167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kornkanok Khaoampai, Kamonluk Suksen, K. N. Nakorn, K. Rojviboonchai
{"title":"DecaFriend: Serverless indoor localization system on mobile phone platform","authors":"Kornkanok Khaoampai, Kamonluk Suksen, K. N. Nakorn, K. Rojviboonchai","doi":"10.1109/JCSSE.2014.6841863","DOIUrl":"https://doi.org/10.1109/JCSSE.2014.6841863","url":null,"abstract":"Mobile phone is now becoming a necessary gadget in our daily life. Mobile applications have been proposed to advance the function of mobile phone. Location service application is a kind of mobile application that provides location information such as current location of the mobile phone. GPS is the popular technology for location service on mobile phone because many models of mobile phone are embedded with GPS sensor. Although GPS can provide high accuracy over outdoor scenario, GPS cannot provide good accuracy in indoor environment because the GPS signal from GPS satellites is blocked by the structure of building. The indoor localization systems have been proposed to address the above-mentioned problem. Many indoor localization systems require costly back-end server to process location. Moreover, the devices need to connect to the back-end servers to request the service. In this paper, we propose a serverless indoor localization system for mobile phone platform. The proposed system does not need any support from back-end server. The localization is processed on mobile phone. The system is developed as an Android application, utilizing Wi-Fi signal to determine the current location of mobile phone and uses mobile ad hoc network to disseminate the current location to other users in the system. The proposed system achieves accuracy up to 83.43% when the system is deployed in the two-floors building, which is the experimental site.","PeriodicalId":331610,"journal":{"name":"2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133088087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}