{"title":"An Algorithm for Automatically Updating a Forsyth-Edwards Notation String Without an Array Board Representation","authors":"Azlan Iqbal","doi":"10.1109/ICIMU49871.2020.9243487","DOIUrl":"https://doi.org/10.1109/ICIMU49871.2020.9243487","url":null,"abstract":"We present an algorithm that correctly updates the Forsyth-Edwards Notation (FEN) chessboard character string after any move is made without the need for an intermediary array representation of the board. In particular, this relates to software that have to do with chess, certain chess variants and possibly even similar board games with comparable position representation. Even when performance may be equal or inferior to using arrays, the algorithm still provides an accurate and viable alternative to accomplishing the same thing, or when there may be a need for additional or side processing in conjunction with arrays. Furthermore, the end result (i.e. an updated FEN string) is immediately ready for export to any other internal module or external program, unlike with an intermediary array which needs to be first converted into a FEN string for export purposes. The algorithm is especially useful when there are no existing array-based modules to represent a visual board as it can do without them entirely. We provide examples that demonstrate the correctness of the algorithm given a variety of positions involving castling, en passant and pawn promotion.","PeriodicalId":344064,"journal":{"name":"2020 8th International Conference on Information Technology and Multimedia (ICIMU)","volume":"98 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115507744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Syarifah Bahiyah Rahayuab, Siti Faradilah Aslah, A. Azahari, Arniyati Ahmad, N. Kamarudin
{"title":"PRELIMINARY STUDY: KNOWLEDGE SHARING IN COLLABORATIVE E-COMMERCE","authors":"Syarifah Bahiyah Rahayuab, Siti Faradilah Aslah, A. Azahari, Arniyati Ahmad, N. Kamarudin","doi":"10.1109/ICIMU49871.2020.9243423","DOIUrl":"https://doi.org/10.1109/ICIMU49871.2020.9243423","url":null,"abstract":"Recent technological advancement in internet speed has contributed to the growing number of collaborative e-commerce. Interaction between businesses cause intensive information sharing via knowledge transfer and collaboration. Thus, protection of information in e-commerce requires significant measures to adequately mitigate the impact to business, customer and society. This paper reviews the elements related to knowledge sharing in collaborative e-commerce. Intensive literature reviews are discussed and analyzed to discover issues and challenges face by e-commerce collaborators in sharing knowledge. The result shows trade secret is applicable in developing and maintaining trust partnership in collaborative e-commerce. Next future work is to measure knowledge sharing awareness among collaborators of e-commerce. There is an opportunity to investigate this paper further in the legal perspective","PeriodicalId":344064,"journal":{"name":"2020 8th International Conference on Information Technology and Multimedia (ICIMU)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128460245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework for Sustainable Non-Profit Crowdsourcing Applications","authors":"Hazleen Aris, Farahidayah Mahmud","doi":"10.1109/ICIMU49871.2020.9243357","DOIUrl":"https://doi.org/10.1109/ICIMU49871.2020.9243357","url":null,"abstract":"Due to the nature of the crowdsourcing applications that relies on the crowd participation to be successful, sustaining the volume of participating crowd is imperative. This is of particular concern in non-profit crowdsourcing applications where monetary rewards are not usually offered. To ensure this, factors that influence crowd to participate in non-profit crowdsourcing application need to be identified and means to address these factors when developing the crowdsourcing applications need to be devised. While existing work on the influencing factors are seen, the means to address the factors when developing the crowdsourcing applications are still absent. This research therefore extends the existing work on factors that influence the crowd participation in non-profit crowdsourcing applications by coming out with the framework containing the components that address the identified factors. A total of 11 components were included in the framework as a result of the analysis made on the identified influencing factors, which are divided into process and entity components. Preliminary evaluation performed by identifying the presence of the components in two selected nonprofit crowdsourcing applications known to be successful shows the relevance of the components in addressing the factors that influence crowd participation. The presence of the framework will be able to serve as a guide for the non-profit crowdsourcing application developers to develop applications that would be able to sustain crowd participation and hence, contributing to the survival of the applications.","PeriodicalId":344064,"journal":{"name":"2020 8th International Conference on Information Technology and Multimedia (ICIMU)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124594380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Adoption of Enterprise Architecture by Public Sector Organizations : Research in Brief","authors":"N. Ahmad, S. M. Drus, H. Kasim","doi":"10.1109/ICIMU49871.2020.9243330","DOIUrl":"https://doi.org/10.1109/ICIMU49871.2020.9243330","url":null,"abstract":"The survey of public sector organizations (N = 255) applied the institutional theory and technology-organization-environment (TOE) framework. Findings indicate that clear communication, good governance, expected benefit, size, normative pressure, coercive pressure, and mimetic pressure have a significant influence on the intention to adopt enterprise architecture (EA). The multigroup analysis reveals the different influences towards EA adoption between federal and state. The study leads an operational review in the context of EA at the organizational level. The results also provide valuable insights into the management of the EA process for decision-makers and EA initiators.","PeriodicalId":344064,"journal":{"name":"2020 8th International Conference on Information Technology and Multimedia (ICIMU)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126920237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Web Data Analytics Quiz and Tests System","authors":"M. Sidhu, Chen Kang Lee, Z. Ali","doi":"10.1109/ICIMU49871.2020.9243384","DOIUrl":"https://doi.org/10.1109/ICIMU49871.2020.9243384","url":null,"abstract":"In recent years, the increase in the number of students in classrooms has demanded more efficient analytics software tools for educators such as to grade, track and store student's learning activities and providing quick feedbacks. Analytics also refers to the scientific process that examines data to formulate conclusions and to present paths to make decisions. In this paper we demonstrate an analytics quiz and tests system that could be used by educators to analyze and improve questionnaires based on students' performance and to introduce the current possibilities in incorporating AI and analytics. An analysis of the system using the Technology Acceptance Model (TAM) with participants' results revealed that the web data analytics system has helped the instructors to determine the point of modifications in improving the quiz and tests questions especially for individual student as opposed to the traditional method since it is more tedious to grade and analyze the results.","PeriodicalId":344064,"journal":{"name":"2020 8th International Conference on Information Technology and Multimedia (ICIMU)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121480865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed Najah Mahdi, Mohamed Zabil M.H, Azlan Yusof, Lim Kok Cheng, Muhammad Sufyian Mohd Azmi, A. Ahmad
{"title":"Design and Development of Machine Learning Technique for Software Project Risk Assessment - A Review","authors":"Mohamed Najah Mahdi, Mohamed Zabil M.H, Azlan Yusof, Lim Kok Cheng, Muhammad Sufyian Mohd Azmi, A. Ahmad","doi":"10.1109/ICIMU49871.2020.9243459","DOIUrl":"https://doi.org/10.1109/ICIMU49871.2020.9243459","url":null,"abstract":"Accurate assessment of software project risk is amongst the key activities in a software project. It directly impacts the time and cost of software projects. This paper presents a literature review of designing & developing machine learning techniques for software project risk assessment. The results of the review have concluded prominent trends of machine learning approaches, size metrics, and study findings in the growth and advancement of machine learning in project management. Besides that, this research provides a deeper insight and an important framework for future work in the software project risk assessment. Furthermore, we demonstrated that the assessment of project risk using machine-learning is more efficient in reducing a project's fault. It also increases the probability for the software project's prediction and response, provides a further way to reduce the probability chances of failure effectively and to increase the software development performance ratio.","PeriodicalId":344064,"journal":{"name":"2020 8th International Conference on Information Technology and Multimedia (ICIMU)","volume":"93 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125974934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Threat Extenuation for Substation Data Communication: Evaluation of Encrypt-Authenticator Prototype for IEC 60870–5 Data","authors":"R. Jidin, N. Jamil, Azril Azam Abdul Rahim","doi":"10.1109/ICIMU49871.2020.9243388","DOIUrl":"https://doi.org/10.1109/ICIMU49871.2020.9243388","url":null,"abstract":"Data communicated at many existing secondary electrical substations is currently not encrypted. In order to improve their data security level, a low-cost cryptography prototype is proposed. Both lightweight and conventional crypto-algorithm types are chosen to encrypt, authenticate and encrypt-authenticate data packets of IEC 60870–5, the data protocol being used at most substations. Implementations of selected algorithms are on a programmable logic arrays (FPGA) to meet communication time sensitivity while employing an eight-bit processor. The FPGA implementations are optimized for speed rather than footprint. The processor is mainly to handle processing of data packets either coming from or going into substation devices. The performance in term of latency for both the conventional and lightweight cryptography is evaluated to meet different data transmission speeds. The lightweight encryption has lower latency compared to the conventional one, while both types of authentication algorithms yield similar latency as expected.","PeriodicalId":344064,"journal":{"name":"2020 8th International Conference on Information Technology and Multimedia (ICIMU)","volume":"9 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130959637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ali Abdul Latif, Noor Habibah Arshad, Norjansalika Janom
{"title":"Towards an Infostructure Maturity Model for Disaster Management","authors":"Ali Abdul Latif, Noor Habibah Arshad, Norjansalika Janom","doi":"10.1109/ICIMU49871.2020.9243354","DOIUrl":"https://doi.org/10.1109/ICIMU49871.2020.9243354","url":null,"abstract":"Maturity models has been accepted as a widely accepted tool in guiding the development of improvement program to transform an organization to a better state. Due to the ad-hoc and dynamic state of disaster management, activities conducted in dealing with disaster need to be assessed so it meets the objectives. This paper highlights a preliminary investigation of a suitable assessment tool, aimed at the development of an infostructure maturity model for the domain of disaster management. The development of this model is justified to the extent that there is no existing maturity model to assess infostructure, which is a new term developed specifically for disaster management. The research also aims to serve as a preliminary work in developing a tool to determine the maturity of the activities involved in disaster management, specifically for electricity company.","PeriodicalId":344064,"journal":{"name":"2020 8th International Conference on Information Technology and Multimedia (ICIMU)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132436475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alicia Tang Yee Chong, M. Mahmoud, Fung-Cheng Lim, Hairoladenan Kasim
{"title":"Description for Smart Grid: Towards the Ontological Approach","authors":"Alicia Tang Yee Chong, M. Mahmoud, Fung-Cheng Lim, Hairoladenan Kasim","doi":"10.1109/ICIMU49871.2020.9243313","DOIUrl":"https://doi.org/10.1109/ICIMU49871.2020.9243313","url":null,"abstract":"Smart grids facilitate the use of distributed and renewable resources on the supply side and providing consumers with a range of tailored services on the consumption side. The introduction of energy smart grid in Malaysia allows other stakeholders to reap the potential benefits it offers. However, for the stakeholders to share knowledge and collaborate, a common language that can act as intermediary that allows any application to communicate with each other is needed. Ontologies have been successful in integrating the knowledge required for solving complex problems such as energy management problems. Ontology has become a promising future direction towards devising a context-aware middleware platform for the smart grid. Hence, we propose to develop ontology for energy smart grid to support information integration for existing smart grid applications and to produce an efficient, semantically aware and operationally accurate software environment for managing flexibility in Malaysian energy distribution networks.","PeriodicalId":344064,"journal":{"name":"2020 8th International Conference on Information Technology and Multimedia (ICIMU)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131445223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Norsyahirah Khairul Anuar, Asmidar Abu Bakar, A. Ahmad, S. Yussof, Fiza Abdul Rahim, Ramona Ramli, Roslan Ismail
{"title":"Privacy Preserving Features Selection for Data Mining using Machine Learning Algorithms","authors":"Norsyahirah Khairul Anuar, Asmidar Abu Bakar, A. Ahmad, S. Yussof, Fiza Abdul Rahim, Ramona Ramli, Roslan Ismail","doi":"10.1109/ICIMU49871.2020.9243355","DOIUrl":"https://doi.org/10.1109/ICIMU49871.2020.9243355","url":null,"abstract":"Features selection known as process of lessening the number of inputs while designing a predictive model using machine learning algorithms. Metadata is an asset because useful information is concealing in these large quantities of data. Data analytics needs more in-depth insight and the identification of fine-grain patterns to make precise predictions that allow better decision-making. To make identification towards the data, the privacy of the data must be preserving. It will ensure there is no leakage information to other parties. In this paper, we review features selection for data mining and machine learning algorithms to preserve data privacy.","PeriodicalId":344064,"journal":{"name":"2020 8th International Conference on Information Technology and Multimedia (ICIMU)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114872400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}