{"title":"Image Retrieval Techniques, Analysis and Interpretation for Leukemia Data Sets","authors":"S. Rajendran","doi":"10.1109/SNPD.2011.46","DOIUrl":"https://doi.org/10.1109/SNPD.2011.46","url":null,"abstract":"The research was carried out to build a patient management system and decision support system (considering certain types of Leukaemia as the domain) for the Hematology Department of Hospital Kuala Lumpur (HKL), Malaysia. The objective of this paper is to describe the techniques used for syntactical and contextual Image retrieval for leukemic images. The system contains an image database containing digitized specimens which belong to classes of lymphocytic, myelocytic and megakaryocytic disorders and a class of healthy leukocytes. The developed system is based on open source. Pages were designed and developed using Java server pages and Java with MySQL as the database for the domain and image repository. Several Java-based tools were used for image processing, neural network based pattern classification and recognition.","PeriodicalId":336771,"journal":{"name":"2011 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125470851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of Touch-Typing Practices in Computer Literacy and Evaluation of Its Continuity","authors":"C. Matsuyama, Toyoshiro Nakashima, N. Ishii","doi":"10.1109/SNPD.2011.30","DOIUrl":"https://doi.org/10.1109/SNPD.2011.30","url":null,"abstract":"In the computer literacy with a PC at the Japanese university, it was clarified that a touch-typing skill was considerably improved by the touch-typing practice which was given to the first-year students for 15 to 20 minutes. These data was accumulated for seven years from 2002. In addition, it is discussed about how much change in achievement degree was observed for the students who continued this practice to the second-year from the first-year. Furthermore, the authors mentioned the relations between the actual values measured from the touch-typing practices and the self-evaluation of the effect made by the students themselves.","PeriodicalId":336771,"journal":{"name":"2011 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130620787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Mukherjee, Musaab Hasan, B. Chowdhury, M. Chowdhury
{"title":"Security of RFID Systems - A Hybrid Approach","authors":"S. Mukherjee, Musaab Hasan, B. Chowdhury, M. Chowdhury","doi":"10.1109/SNPD.2011.40","DOIUrl":"https://doi.org/10.1109/SNPD.2011.40","url":null,"abstract":"The use of RFID (Radio Frequency Identification) technology can be employed for tracking and detecting each container, pallet, case, and product uniquely in the supply chain. It connects the supply chain stakeholders (i.e., suppliers, manufacturers, wholesalers/distributors, retailers and customers) and allows them to exchange data and product information. Despite these potential benefits, security issues are the key factor in the deployment of a RFID-enabled system in the global supply chain. This paper proposes a hybrid approach to secure RFID transmission in Supply Chain Management (SCM) systems using modified Wired Equivalent Encryption (WEP) and Rivest, Shamir and Adleman (RSA) cryptosystem. The proposed system also addresses the common loop hole of WEP key algorithm and makes it more secure compare to the existing modified WEP key process.","PeriodicalId":336771,"journal":{"name":"2011 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134408595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Crash Undergraduate Course in Global Software Engineering","authors":"O. Shata","doi":"10.1109/SNPD.2011.26","DOIUrl":"https://doi.org/10.1109/SNPD.2011.26","url":null,"abstract":"Teaching Software Engineering must adopt new approaches to respond to the rapid globalization of software development. This puts pressure on instructors to select focused course contents to prepare students for working in global environments. This paper presents an innovative approach to teaching Software Engineering and which emphasizes the learning of project managements skills as well as the most important software development concepts in an environment which simulates a geographically distributed environment. Our approach is to synchronize class teaching with the development of real-world software projects in a setting designed to simulate geographically distributed working environments. The theoretical part of the course is Object-Oriented-centric, whereas the practical part is the larger part and is facilitated through two projects and which are designed to simulate real-world environments with global customers where students from different courses collaborate to play different roles. The projects give students skills in using the Agile and Spiral models.","PeriodicalId":336771,"journal":{"name":"2011 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"99 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131039968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Text Similarity over Chinese Research Papers Using MapReduce","authors":"Fan Xu, Qiaoming Zhu, Peifeng Li","doi":"10.1109/SNPD.2011.29","DOIUrl":"https://doi.org/10.1109/SNPD.2011.29","url":null,"abstract":"This paper proposes a novel method to detect text similarity over Chinese research papers using MapReduce paradigm. Our approach differs from the state-of-the-art methods in two aspects. First, we extract the key sentences from Chinese research papers by using some heuristic features and then generate 2-tuple, (document id, key phrase), as the representation of the documents. Second, we design 2-phrase MapReduce algorithm to verify the effectiveness of the generated 2-tuple. For evaluation, we compare the proposed method with other approaches on synthetic corpus. Experimental results review that our method much outperforms the state-of-the-art ones on running time performance while guarantee the Jaccard similarity coefficient.","PeriodicalId":336771,"journal":{"name":"2011 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130853778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Application Layer Protocol Identification Method Based on Semisupervised Learning","authors":"Huazhi Yang, Peifeng Li, Qiaoming Zhu, Lan Xu","doi":"10.1109/SNPD.2011.28","DOIUrl":"https://doi.org/10.1109/SNPD.2011.28","url":null,"abstract":"Application layer protocol identification problem is the premise and foundation of network security monitoring, intrusion detection and other network control system. With the gradual development of network applications, new application layer protocol will produce, therefore bringing the difficulty to identify and update protocols. Although current supervised-based learning method can overcome low accuracy and high time complexity issue of traditional method, yet it is limited by the number of labeled data and also cannot adapt to the rapid updating of the application layer protocols, and it is restricted in further promotion. Accordingly, we propose a semi-supervised learning method to solve the above two issues. Firstly, we adopt Affinity Propagation (AP)clustering algorithm to cluster the mixed data which contains a small labeled data and large unlabeled data. Secondly, we use the labeled data to map the clustering result to specific network application. Evaluation shows that the proposed method is effective in both specific network applications and new protocol identification.","PeriodicalId":336771,"journal":{"name":"2011 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"35 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120913020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Clustering and Ranking Based Approach for Multi-document Event Fusion","authors":"Peifeng Li, Qiaoming Zhu, Xiaoxu Zhu","doi":"10.1109/SNPD.2011.19","DOIUrl":"https://doi.org/10.1109/SNPD.2011.19","url":null,"abstract":"A complete event description is usually scattered over several sentences and documents, so that how to mine a complete event from several documents or event mentions is an issue currently. This paper proposes an event fusion approach to merge a set of event mentions which distributed over several HTML files into a complete event. Firstly it introduced plain features and structured features into the similarity calculation and applied the hierarchical clustering algorithm to cluster event mentions. Then it proposed an event fusion approach based on a ranking model to merge those argument instances with highest ranking rate in each cluster to form a complete event. The experimental result showed that our approach was effective and could achieve higher accuracy than the baseline.","PeriodicalId":336771,"journal":{"name":"2011 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131140357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Abnormal Crowd Behavior Detection Using Topological Methods","authors":"Nan Li, Zhimin Zhang","doi":"10.1109/SNPD.2011.21","DOIUrl":"https://doi.org/10.1109/SNPD.2011.21","url":null,"abstract":"In this paper we present a novel framework for abnormal behavior detection in crowded scenes. For this purpose, the theory of topological simplification on the dense field is extended to the sparse particle motion field, which is used to describe the dynamics of the crowd. We propose two new methods for analysis of boundary point structure and extraction of critical point from the particle motion field. Both methods can be used to describe the global topological structure of the crowd motion, which is the kernel idea of our work. Various types of abnormal behaviors, including crowd formation/dispersal, crowds splitting/merging, can be detected by monitoring the changes of the topological structure. The advantage of our method is that each kind of abnormal event can be described as a specific topological structure change, therefore we do not need a complex classifier to detect these anomalies. Experiments are conducted on known datasets and results show that our method is effective in detecting and locating these kinds of abnormal behaviors.","PeriodicalId":336771,"journal":{"name":"2011 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126673801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building Trust in Online Customers","authors":"George M. Coles, W. Smart","doi":"10.1109/SNPD.2011.31","DOIUrl":"https://doi.org/10.1109/SNPD.2011.31","url":null,"abstract":"Although significant progress has been made towards securing the Internet environment, many consumers remain reluctant to participate in making on-line purchases. Cyber-crime continues to have a negative influence upon the uptake and acceptance of E-Commerce by consumers. As a result commercial website operators are faced with the problem of overcoming user distrust in the systems. The main argument put forward in this paper is that a consumer's trust depends more upon traditional marketing strategies than it does upon their beliefs in the security of on-line systems. In many cases these issues have been overlooked by web developers and vendors alike. The main conclusions of the study indicate that website design can have a positive effect on aconsumer's willingness to purchase from a website. Much responsibility for reinforcing trust in consumers lies with web developers. This can be achieved by making efforts to educate and engender trust in visitors through the overall design and informational content of the website itself and through the careful selection and combination of website design components.","PeriodicalId":336771,"journal":{"name":"2011 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132809032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Approach for a Fault Tolerant Mobile Agent System","authors":"M. A. J. Jamali, Hamid Entezari Shabestar","doi":"10.1109/SNPD.2011.44","DOIUrl":"https://doi.org/10.1109/SNPD.2011.44","url":null,"abstract":"Improving the survivability of mobile agents in the presence of agent server failures with unreliable underlying networks is a challenging issue. In this paper, we address a fault tolerance approach of deploying cooperating agents to detect agent failures as well as to recover services in mobile agent systems. Three types of agents are involved, which are the actual agent, the supervisor agent and the replicas. We introduce a failure detection and recovery protocol by employing a message-passing mechanism among these three kinds of agents. Different failure scenarios and their corresponding recovery procedures are discussed. We choose Fatomas approach as a basic method. Message complexity of this approach is O (m^2). Cooperative agents haven't been considered in this approach. We are going to improve this message complexity in a system of cooperative agents.","PeriodicalId":336771,"journal":{"name":"2011 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128302143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}