{"title":"A pragmatic use of Semantic Web technologies for preschool cognitive skills tutoring system","authors":"M. A. Abbas, W. Ahmad, K. Kalid","doi":"10.1109/ICCOINS.2014.6868429","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868429","url":null,"abstract":"Primarily preschool cognitive skills are abilities of acquiring generic knowledge. Generic knowledge is said to be the knowledge about kinds of things. Currently these cognitive skills are taught through the use of pre-authored (in the form of books or worksheets) learning contents containing the objects and concepts of the real world. This method of teaching is known as instructional pedagogy that has several limitations such as it require specialized skills and a large amount of time for content authoring, thinking and dedication and it does not support individualized learning. As a remedy to the limitations of instructional pedagogy, constructive pedagogical method provides learning through exploration. The present work proposes an intelligent tutoring system (ITS) that follows the constructive approach for preschool cognitive skills tutoring. The proposed ITS uses the Semantic Web technologies namely Ontologies and Semantic Web Rule Language (SWRL) for the construction of a rule-based ITS. The reason is, Ontologies natively (by definition) provides a formal explicit way of modeling concepts in a domain of discourse specially the real world objects and also support rule base reasoning. Finally shortcomings of the existing knowledge sources (ontologies) and step by step processing of the inference engine to generate learning contents is provided in the present work.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115802529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Options strategy for technology companies","authors":"T. Tan, B. Bing","doi":"10.1109/ICCOINS.2014.6868365","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868365","url":null,"abstract":"Product innovation in the technology ecosystem can be enhanced through proper management of the supply chain. While there are several strategies that technology investors favor for profitability during the earning cycles, one of the strategies utilized quite often is the short strangle. A short strangle is an effective strategy with a theoretically unlimited risk. For example, Google's recent earnings sent its share price up sharply by 13.8%, breaking the $1,000 barrier for the first time and increasing the company's value by nearly $40 billion within a day. Such variations can be very costly for an investor who trades around earnings using short strangles. The aim of this paper is to debunk this myth and demonstrate how a short strangle can be traded safely as long as certain requirements are met. We will employ two companies in the technology sector to illustrate how our criteria can help in making better trading decisions. Since the volatility crush is the key determinant for profitability, we modeled the crush between the implied volatility of the front and next earliest expiration using Bayesian statistics. The accuracy of the Bayesian model is quantified using the Google stock as an example and it is shown that the method is reasonably accurate even with sharp changes in volatility trends.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123757272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Students' inclinations towards games and perceptions of Game-Based Learning (GBL)","authors":"Mazeyanti M. Ariffin, A. Oxley, S. Sulaiman","doi":"10.1109/ICCOINS.2014.6868839","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868839","url":null,"abstract":"The term `games' has remained as one of the most popular search terms in Google for the past 10 years. Looking at games' popularity, especially among the youth, there is a need for academicians and educationists to find ways in which games might support learning. In order to ensure a close match between the learning activities and the expected outcome, instructors should aware of the learners' needs and their perception towards Game-Based Learning (GBL). The research focuses on the learner specification dimension in the Four-Dimensional Framework (FDF). The method of study was through a survey and the target audience is student of Universiti Teknologi Petronas. The research adopted convenience sampling and 208 samples were collected. The outcomes of this paper are twofold: first is the identification of sets of game characteristics to be used either by game developers or instructors, and second is an indication of the viability of games as an educational tool for Higher Education settings.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133415486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The effectiveness of using the dependency relations approach in recognizing the head modifier for malay compound nouns","authors":"S. Ab. Rahman, N. Omar, Mohd Juzaidin Ab Aziz","doi":"10.1109/ICCOINS.2014.6868828","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868828","url":null,"abstract":"This paper addresses the approach named dependency relations to identify the position of words located in compound noun as a head modifier or modifier head. To identify correctly the head modifier in the words, the type of relationships needs to be used. Currently, there are a few outstanding parsers available to analyze the input sentence in the structure of dependency triples, hierarchy of typed dependencies and syntactic level of words. All these kinds of structures are useful in our research work. However, the output generated is in an English form. Extensive research and development are needed to adopt them in our localized data. The data gathered need to be analyzed before being executed in the next process of checking the head and modifier relations between words. In this situation, not all the relations used in the three structures above are used in our research work. We have to choose only the most relevant relations, those which can assist us to solve the problems. The effectiveness of the relations used in our study can be measured using recall, precision and F1-score techniques. The comparison of the baseline values is important, so that whether or not there has been an improvement in a result can be seen.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117178685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Puangpronpitag, Thongchai Chuachan, Pornntiwa Pawara
{"title":"Classifying peer-to-peer traffic using protocol hierarchy","authors":"S. Puangpronpitag, Thongchai Chuachan, Pornntiwa Pawara","doi":"10.1109/ICCOINS.2014.6868391","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868391","url":null,"abstract":"Detection and classification of peer-to-peer traffic are still difficult tasks for bandwidth shapers. First, peer-to-peer traffic is not easy to detect, and can be a serious problem. Second, some peer-to-peer applications may be desirable, while some may be undesirable. Hence, different peer-to-peer applications should also be treated differently. The previous work of peer-to-peer traffic detection still faces both problems. So, in this paper, we propose new classification mechanisms to solve the problems. Our proposed solution has been implemented by using JAVA, and experimented on a network test-bed. Experimental results have demonstrated that our extended classification mechanism can improve the peer-to-peer traffic detection and classification.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125177584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A process warehouse based resource performance evaluation method for business processes improvement","authors":"A. Sohail, P. Dominic, K. Shahzad","doi":"10.1109/ICCOINS.2014.6868408","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868408","url":null,"abstract":"Existing studies on business process improvement (BPI) have widely focused on development of separate techniques for resource management and structural redesign of processes. In this study, we contend that the relationship of resource with task is not sufficiently understood. Particularly, business intelligence based approaches to BPI have not adequately explored this relationship. To understand this, we classify resources into human and non-human resources, because the two types of resources behave differently leaving different impact on process performance. Subsequently, a set of relationships between human resources, non-human resources and tasks (named suitability, preference and competence) are presented. However, only human resource's relationship with non-human resource/s (named preference) is presented in detail, as a resource preference model. The model bundled with the presented preference evaluation method guides users for evaluation of resources' preference. The applicability of the method is illustrated through a healthcare case study.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124568022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A theoretical validation of the number of polymorphic methods as a complexity metric","authors":"A. Bajeh, S. Basri, L. T. Jung","doi":"10.1109/ICCOINS.2014.6868445","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868445","url":null,"abstract":"The external quality attributes of software product are influenced by the internal and structural properties of the design of software products. This implies that to estimate the external quality, the internal properties need to be accurately measured. Measuring the internal attributes requires the use of metrics that are both theoretically and empirically valid. This work identifies and theoretically validates an OO metrics that measures polymorphism. The property-based and measurement theory-based validation approaches are used to show that the metric measures the concept of complexity which has impact on the external quality attribute of software design.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127720868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamics of the entanglement over noisy quantum networks","authors":"A. Abdel‐Aty, Nordin Zakaria, M. Mabrok","doi":"10.1109/ICCOINS.2014.6868409","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868409","url":null,"abstract":"In this paper, the effect of homogeneous and non-homogeneous magnetic fields as an external noisy on the entanglement dynamics over partial entangled state quantum network is studied. The Dzyaloshiniskii-Moriya (DM) interaction is used to generate entangled network from partially entangled states in the presence of the spin-orbit coupling. The entanglement between any two nodes is quantified using Wootter concurrence. The effect of homogeneous and non-homogeneous magnetic field in presence and absence of the spin coupling on the entanglement between any two nodes of the network is investigated. The results show that the homogeneous magnetic field has no effect on the entanglement without the presence of the spin-orbit interaction. The non-homogeneous magnetic field has a strong impact on the entanglement either with or without spin-orbit couplings. For initially entangled channels, the upper bound does not exceed its initial value, whereas for the channels generated via indirect interaction, the entanglement reaches its maximum value.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127757145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image processing based vehicle detection and tracking method","authors":"Prem Kumar Bhaskar, S. Yong","doi":"10.1109/ICCOINS.2014.6868357","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868357","url":null,"abstract":"Vehicle detection and tracking plays an effective and significant role in the area of traffic surveillance system where efficient traffic management and safety is the main concern. In this paper, we discuss and address the issue of detecting vehicle / traffic data from video frames. Although various researches have been done in this area and many methods have been implemented, still this area has room for improvements. With a view to do improvements, it is proposed to develop an unique algorithm for vehicle data recognition and tracking using Gaussian mixture model and blob detection methods. First, we differentiate the foreground from background in frames by learning the background. Here, foreground detector detects the object and a binary computation is done to define rectangular regions around every detected object. To detect the moving object correctly and to remove the noise some morphological operations have been applied. Then the final counting is done by tracking the detected objects and their regions. The results are encouraging and we got more than 91% of average accuracy in detection and tracking using the Gaussian Mixture Model and Blob Detection methods.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125446670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data fusion for reducing power consumption in Arduino-Xbee wireless sensor network platform","authors":"Y. Solahuddin, W. Ismail","doi":"10.1109/ICCOINS.2014.6868379","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868379","url":null,"abstract":"Data fusion is one of the subsystems in data aggregation that aims to conserve power consumption by reducing the size of the transmitted data. The purpose of this paper is to present a simple data fusion mechanism called local data differentiation (LDD) for actual implementation in micro-controlled sensor nodes. LDD requires the end node to calculate the average value of an initially sampled data and afterwards, to only transmit the difference between the newly collected data with the average value. Usage of buffer in conjunction with LDD is also explored and empirical results are shown based on a hardware prototype to verify the benefit of the proposed method. The hardware for the test run is based on the Arduino platform and Xbee modules, as both are very popular in small-scale research and wireless automation solution.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131970904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}