2016 International Conference on Information and Communication Technology (ICICTM)最新文献

筛选
英文 中文
A conceptual model of virtual banking strategies in achieving customers' loyalty of Malaysian perceptive 马来西亚感知实现客户忠诚度的虚拟银行策略概念模型
2016 International Conference on Information and Communication Technology (ICICTM) Pub Date : 2016-05-16 DOI: 10.1109/ICICTM.2016.7890796
Jacqueline Tham, A. Khin
{"title":"A conceptual model of virtual banking strategies in achieving customers' loyalty of Malaysian perceptive","authors":"Jacqueline Tham, A. Khin","doi":"10.1109/ICICTM.2016.7890796","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890796","url":null,"abstract":"There has been many studies carried out on virtual banking adoption, but studies carried out in Malaysia to enhance the virtual banking strategy adoption are limited. Therefore, the objective of this study is to conduct the conceptual model of virtual banking strategies and to find out the key determinants of virtual banking strategies in achieving customers' loyalty in Malaysian perceptive by using Technology Acceptance Model (TAM), Theory of Reasoned Action (TRA) and Diffusion of Innovation (DOI) theories to adopt virtual banking strategies to meet customers need with the advancement in payment system and technology. Results from pilot study shown that banking strategy which being used to test the independent variables in this study is significant in affecting customer loyalty among local banks in Malaysia and correlation test on Equation 1 and 2 suggest the instruments as a measure tool is well suited for this study. This research can be useful for future researchers in this virtual banking domain. However, result may differ with a larger sample size conducted for this study.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133566299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Discovering “interesting” keyword patterns in Hadith chapter documents 在圣训章节文档中发现“有趣的”关键字模式
2016 International Conference on Information and Communication Technology (ICICTM) Pub Date : 2016-05-16 DOI: 10.1109/ICICTM.2016.7890785
Zuraini Zainol, P. Nohuddin, Mohd T. Hamid Jaymes, S. Marzukhi
{"title":"Discovering “interesting” keyword patterns in Hadith chapter documents","authors":"Zuraini Zainol, P. Nohuddin, Mohd T. Hamid Jaymes, S. Marzukhi","doi":"10.1109/ICICTM.2016.7890785","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890785","url":null,"abstract":"True Muslims around the world believe in Al Quran and Hadith. Al Quran is the principal religious text of Islam, a revelation from Allah. Hadith is also one of the fundamental sources of Islamic references and guidance for the Muslims after the Holy Book, Al-Quran. Hadith is referred to a report, statement, act, story, narration or discourse. Hadith, originally in Arabic, covers a wide range of issues among Muslims such as spiritual, economic, political and social, administration of inheritance of wealth, etc. Since Muslims come from many races and use different languages, Muslim scholars have translated the chapters into various languages so that Muslims around the world can understand the meaning of it. This paper investigates the frequent patterns that can be found in the chapters of Hadith. By using the technique of Association Rule Mining (ARM), frequent patterns and interesting relationships that can benefits Muslim scholars in making full use of Hadith in assisting them in their daily Islamic life and practice.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115577453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Proposed conceptual framework of Dengue Active Surveillance System (DASS) in Malaysia 马来西亚登革热主动监测系统(DASS)的概念框架建议
2016 International Conference on Information and Communication Technology (ICICTM) Pub Date : 2016-05-16 DOI: 10.1109/ICICTM.2016.7890783
M. Othman, M. Danuri
{"title":"Proposed conceptual framework of Dengue Active Surveillance System (DASS) in Malaysia","authors":"M. Othman, M. Danuri","doi":"10.1109/ICICTM.2016.7890783","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890783","url":null,"abstract":"This paper introduces Dengue Active Surveillance System (DASS) framework for an early warning system of the outbreak. Dengue and dengue hemorrhagic fever are emerging as major public health problems in most Asian countries such as Malaysia. Effective prevention and control programs will depend on improved surveillance. A new approach to active surveillance outlined with emphasis on the inter-epidemic period. The objective is to develop an early warning surveillance system (framework) that can predict epidemic dengue to improve current passive surveillance system available in Malaysia. Basically, the framework introduced data harvesting process from multiple sources as input, data pre-processing using data aggregator and filtering engine, storing large data in repository, analytic engine for analysis and processing the large data, and presentation of the information to the users. The data harvested from two major sources such as weather or flood information, and social media such as build development and dengue symptom using system API, SOAP and others. The data aggregator will aggregate the data from three different types of data such as structured, semi-structured and unstructured data to be stored into the semi-structured database such as MongoDB and NoSQL. The data parse to the filtering engine for filtering and cleaning the data sources using suitable keywords prior to store it in the large data repository. After that, the large data will be processed and analyzed using algorithm or mathematical calculation to determine the expected dengue cases. Then, the processed information will be presented to the users in a form of web or mobile application and other method, for example, short message service (SMS). Finally, the system accuracy will be evaluated based on the comparison study with the traditional passive system.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124571630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Queue analysis at toll plazas (inbound): A basic model for traffic systems towards a study of the effect on toll plazas with different arrival patterns 收费广场(入站)排队分析:研究不同到达模式对收费广场影响的交通系统基本模型
2016 International Conference on Information and Communication Technology (ICICTM) Pub Date : 2016-05-16 DOI: 10.1109/ICICTM.2016.7890766
Khairani Abdul Majid, Zaharin Yusoff, A. Jemain
{"title":"Queue analysis at toll plazas (inbound): A basic model for traffic systems towards a study of the effect on toll plazas with different arrival patterns","authors":"Khairani Abdul Majid, Zaharin Yusoff, A. Jemain","doi":"10.1109/ICICTM.2016.7890766","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890766","url":null,"abstract":"In studying traffic congestions at toll plazas, a basic model for traffic systems is introduced, which will hopefully contribute towards a longer term solution with the means for explaining and predicting congestions. It is targeted that this can then be followed by a more specific operations research approach, based on a simulation and queuing theory model, with a study on different arrival patterns, generating queue models, and constructing a Markov chain from the queuing systems, which would then provide a better insight towards a more sustainable solution.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116431776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Vision-based egg grade classifier 基于视觉的鸡蛋分级器
2016 International Conference on Information and Communication Technology (ICICTM) Pub Date : 2016-05-16 DOI: 10.1109/ICICTM.2016.7890772
Mohd Zin Zalhan, Sameon Sera Syarmila, Ismail Mohd Nazri, Ismail Mohd Taha
{"title":"Vision-based egg grade classifier","authors":"Mohd Zin Zalhan, Sameon Sera Syarmila, Ismail Mohd Nazri, Ismail Mohd Taha","doi":"10.1109/ICICTM.2016.7890772","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890772","url":null,"abstract":"Digital image processing techniques (DIP) have been widely used in various types of application recently. A variety of these techniques are now being used in many types of application area such as object classification, intelligent system, robotics, biometrics system, medical visualization, military, law enforcement, image enhancement and restoration, industrial inspection, artistic effect and human computer interfaces. This paper proposes the implementation of digital image processing techniques to classify three different categories of commercial eggs. The proposed system consists of the study on different types and sizes of commercial eggs, real size measurement of these eggs using Coordinate Measure Machine (CMM) and camera, classification algorithm and the development of vision based egg classification system. Image processing techniques such as image filtering and image enhancements have been applied in the system. Results have shown that the proposed system has been able to successfully classify three categories of commercial eggs with accuracy of more than 96%.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126649749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Interactive evaluation system for Final Year Project (FYP) 最后一年项目(FYP)互动评估系统
2016 International Conference on Information and Communication Technology (ICICTM) Pub Date : 2016-05-16 DOI: 10.1109/ICICTM.2016.7890801
R. Chik, Muhammad Rafi’i
{"title":"Interactive evaluation system for Final Year Project (FYP)","authors":"R. Chik, Muhammad Rafi’i","doi":"10.1109/ICICTM.2016.7890801","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890801","url":null,"abstract":"The goals of this system is to develop an automated and interactive evaluation system to assist Final Year Project (FYP) assessors during the events of project evaluations. The system will enable the assessors to key in the student's marks into the application and the results will be produced automatically by the system in real time. This could support a paper-less process and environment. The system was developed using PHP and testing was done to gather user's response towards the proposed system. Results from the user testing show a favorable results toward the proposed system which means the system is able to do what is supposed to do. The proposed system has met the user requirements although more improvements could be introduced which will be taken into consideration for future work in this research.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122710412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Establishing of knowledge based framework for situational awareness using Nonaka's and Endsley's models 运用Nonaka和Endsley模型建立基于知识的态势感知框架
2016 International Conference on Information and Communication Technology (ICICTM) Pub Date : 2016-05-16 DOI: 10.1109/ICICTM.2016.7890775
W. Yusof, O. Zakaria, Zuraini Zainol
{"title":"Establishing of knowledge based framework for situational awareness using Nonaka's and Endsley's models","authors":"W. Yusof, O. Zakaria, Zuraini Zainol","doi":"10.1109/ICICTM.2016.7890775","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890775","url":null,"abstract":"Up to this moment, there is no knowledge based framework with situational awareness using the combination of two models: Nonaka and Endsley. These models can assist our research in terms of collecting and transforming appropriate tacit knowledge into enhancing the existing explicit knowledge. The existing explicit knowledge can be found from training module (doctrines) or any relevant documents. However, tacit knowledge is not easily extracted due to being stored implicitly into the mind of the experienced staff. Therefore, this paper explains the structured way on how to collect appropriate tacit knowledge from the experienced staff.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"12 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120894263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A review on License Plate Recognition system algorithms 车牌识别系统算法综述
2016 International Conference on Information and Communication Technology (ICICTM) Pub Date : 2016-05-16 DOI: 10.1109/ICICTM.2016.7890782
Muayad Ali Hamood Bakhtan, Munaisyah Abdullah, Aedah Abd Rahman
{"title":"A review on License Plate Recognition system algorithms","authors":"Muayad Ali Hamood Bakhtan, Munaisyah Abdullah, Aedah Abd Rahman","doi":"10.1109/ICICTM.2016.7890782","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890782","url":null,"abstract":"License plate recognition(LPR)system contributed to facilitate the human work and make it easier. It is an image processing technology, which uses number plate to identify the vehicles. This paper aims to investigate in the existing LPR research by categorizing existing methods by analyzing the pros/cons of these features, and comparing them in terms of the algorithms that involve and recognition performance. We focus on the recent studies and their limitations, since each country has a different environment and format of licence plate.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122700950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Anomaly-based NIDS: A review of machine learning methods on malware detection 基于异常的NIDS:恶意软件检测的机器学习方法综述
2016 International Conference on Information and Communication Technology (ICICTM) Pub Date : 2016-05-16 DOI: 10.1109/ICICTM.2016.7890812
Raffie Z.A Mohd, M. Zuhairi, Akimi Z.A Shadil, H. Dao
{"title":"Anomaly-based NIDS: A review of machine learning methods on malware detection","authors":"Raffie Z.A Mohd, M. Zuhairi, Akimi Z.A Shadil, H. Dao","doi":"10.1109/ICICTM.2016.7890812","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890812","url":null,"abstract":"The increasing amount of network traffic threat may originates from various sources, that can led to a higher probability for an organization to be exposed to intruder. Security mechanism such as Intrusion Detection System (IDS) is significant to alleviate such issue. Despite the ability of IDS to detect, some of the anomaly traffic may not be effectively detected. As such, it is vital the IDS algorithm to be reliable and can provide high detection accuracy, reducing as much as possible threats from the network. Nonetheless, every security mechanism has its weaknesses that can be exploited by intruders. Many research works exists, that attempts to address the issue using various methods. This paper discusses a hybrid approach to network IDS, which can minimize the malicious traffic in the network by using machine learning. The paper also provides a review of the available methods to further improve Anomaly-based Network Intrusion Detection System.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133061320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Determining an appropriate search grid pattern and positioning it for search and rescue operations (SAR) in forest areas 确定合适的搜索网格模式,并为森林地区的搜救行动(SAR)定位
2016 International Conference on Information and Communication Technology (ICICTM) Pub Date : 2016-05-16 DOI: 10.1109/ICICTM.2016.7890767
N. Zailan, Syed Nasir Alsagoff Syed Zakaria, Zaharin Yusoff, Syahaneim Marzuki
{"title":"Determining an appropriate search grid pattern and positioning it for search and rescue operations (SAR) in forest areas","authors":"N. Zailan, Syed Nasir Alsagoff Syed Zakaria, Zaharin Yusoff, Syahaneim Marzuki","doi":"10.1109/ICICTM.2016.7890767","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890767","url":null,"abstract":"Search and Rescue (SAR) is an operation conducted to find and return to safety the survivors of an emergency incident, where the search may have to be conducted in difficult areas such as in mountains, deserts, forests or at sea. A SAR operation typically requires a search grid for the identified search area, and a search pattern to conduct a search that covers the grid, together forming a search grid pattern. There is also a need to position the search grid pattern at the actual search area in order to place the search team members for them to conduct the search pattern accordingly. This paper presents a study on determining an appropriate search grid pattern for forest areas and a technique to position it at the search area.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121371584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信