2014 International Conference on Computer and Information Sciences (ICCOINS)最新文献

筛选
英文 中文
MetOcean data to linked data metoocean数据到关联数据
2014 International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2014-06-03 DOI: 10.1109/ICCOINS.2014.6868363
K. U. Danyaro, J. Jaafar, M. S. Liew
{"title":"MetOcean data to linked data","authors":"K. U. Danyaro, J. Jaafar, M. S. Liew","doi":"10.1109/ICCOINS.2014.6868363","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868363","url":null,"abstract":"This paper describes the Linked Data initiative in meteorological environment. MetOcean data are meteorological and oceanographic datasets that provide information to meteorological industries, petroleum industries as well as research institutes. The MetOcean has a myriad of data and scattered along the globe which lack Linked Data or Semantic Web capabilities. Linked Data is a concept of publishing interoperable data globally. As a way of integrating MetOcean data, this work used D2R server, a server that manages data sources and translates it to Web data. Therefore, the paper elucidates the process of developing Linked Data in Meteorological sector. Also, the results were queried using SPARQL endpoint as a graph. This approach was analyzed using F-measure which reveals the system is sufficient for querying and accessing the data as a graph.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121327591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A review of educational games design frameworks: An analysis from software engineering 教育类游戏设计框架综述:基于软件工程的分析
2014 International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2014-06-03 DOI: 10.1109/ICCOINS.2014.6868452
Mifrah Ahmad, L. Rahim, N. Arshad
{"title":"A review of educational games design frameworks: An analysis from software engineering","authors":"Mifrah Ahmad, L. Rahim, N. Arshad","doi":"10.1109/ICCOINS.2014.6868452","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868452","url":null,"abstract":"Game-based learning allows leveraging on young learners preference towards playing games to turn games into tools for learning. There are a number of frameworks developed in the various aspects and theories of game-based learning. There are many relationships in existing frameworks that has been discussed regarding certain domains such as subject-matter expert, the game environment, developers, game goals and game designs, however, the relationship between subject-matter, game environment, learning theories and game-play is yet to be discussed together. This paper analyzes a few educational frameworks and discusses their relations among domains that they have used. In addition, this paper will discuss the software engineering practices that is of concern to educational games development but have not been discussed in previous literature.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114054054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A distributed framework for supporting 3D swarming applications 支持3D集群应用程序的分布式框架
2014 International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2014-06-03 DOI: 10.1109/ICCOINS.2014.6868347
Ghazaleh Pour Sadrollah, J. C. Barca, Asad I. Khan, J. Eliasson, Ilankaikone Senthooran
{"title":"A distributed framework for supporting 3D swarming applications","authors":"Ghazaleh Pour Sadrollah, J. C. Barca, Asad I. Khan, J. Eliasson, Ilankaikone Senthooran","doi":"10.1109/ICCOINS.2014.6868347","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868347","url":null,"abstract":"In-flight wireless sensor networks (WSN) are of increased interest owing to efficiency gains in weight and operational lifetime of IP-enabled computers. High impact 3D swarming applications for such systems include autonomous mapping, surveying, servicing, environmental monitoring and disaster site management. For distributed robotic applications, such as quad copter swarms, it is critical that the robots are able to localise themselves autonomously with respect to other robots and to share information. The importance of fast and reliable dissemination of localised information in these elastic three-dimensional networks provides us sufficient reason to present a distributed framework and hardware settings for passing this information pervasively through the swarm. The research field of Internet of Things (IoT) have for several years been addressing issues around low-power, low-bandwidth wireless communication. By applying IoT technologies to the challenges around swarming, new opportunities are created. However, since IoT have been primarily used with stationary devices, the introduction of flying sensors will add more challenges to address.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127000815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Airwaves estimation in shallow water CSEM data: Multi-layer perceptron versus multiple regression 浅水CSEM数据的电波估计:多层感知器与多元回归
2014 International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2014-06-03 DOI: 10.1109/ICCOINS.2014.6868367
M. Abdulkarim, W. Ahmad, Adeel Ansari, Elisha Tadiwa Nyamasvisva, A. Shafie
{"title":"Airwaves estimation in shallow water CSEM data: Multi-layer perceptron versus multiple regression","authors":"M. Abdulkarim, W. Ahmad, Adeel Ansari, Elisha Tadiwa Nyamasvisva, A. Shafie","doi":"10.1109/ICCOINS.2014.6868367","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868367","url":null,"abstract":"In this study, a Multi-Layer Perceptron Neural Network and Multiple Regression techniques are used to estimate airwaves associated with shallow water Controlled-Source Electro-Magnetic (CSEM) data. Both techniques are appropriate for the development of estimation models. However, multiple regression models make some assumptions about the underlying data. These assumptions include independence, normality and homogeneity of variance. Conversely, neural network based models are not constrained by such assumptions. The performance of the two techniques is calculated based on coefficient of determination (R2) and mean square error (MSE). The results indicate that MLP produced better estimate for the airwaves with MSE of 0.0113 and R2 of 0.9935.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127594971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adoption of cloud computing to enhance the healthcare services in Malaysia 采用云计算来加强马来西亚的医疗保健服务
2014 International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2014-06-03 DOI: 10.1109/ICCOINS.2014.6868413
Kalai Anand Ratnam, P. Dominic
{"title":"Adoption of cloud computing to enhance the healthcare services in Malaysia","authors":"Kalai Anand Ratnam, P. Dominic","doi":"10.1109/ICCOINS.2014.6868413","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868413","url":null,"abstract":"The global healthcare industry is continuing to grow, and it is important to realize that healthcare providers will have to continue to invest in IT based systems to improve overall operations and cross system communications. The study focuses on the relationships between healthcare providers, IT resources and health insurance providers in determining the adoption of cloud computing. The results obtained as result of this study shows that IT resources significantly influences healthcare providers and health insurance providers. The efficiency and clinical services can be improvised with the adoption of the cloud. The findings of this study are presented with reliability analysis, descriptive, factor loading, regression and correlations for IT capability in healthcare services, structural equation modelling is used to determining the overall model fit. Structural equation modelling (SEM) using AMOS 20.0 is used for model fit testing and SPSS 20.0 is used for analysing the descriptive statistics, hypothesis and assumptions for SEM.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132842779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Early detection of incident using Vehicular Ad-hoc Network 利用车载自组织网络早期发现事件
2014 International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2014-06-03 DOI: 10.1109/ICCOINS.2014.6868393
Bharat Singh, H. Hasbullah, Md Yunus Nayan, Bhumit Tahlan
{"title":"Early detection of incident using Vehicular Ad-hoc Network","authors":"Bharat Singh, H. Hasbullah, Md Yunus Nayan, Bhumit Tahlan","doi":"10.1109/ICCOINS.2014.6868393","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868393","url":null,"abstract":"Vehicular Ad-hoc Networks (VANET) is mainly discussed todeploy of ITS (Intelligent Transportation Systems) analysis and design solutions for safety, security and road traffic monitoring with better management. Through the vehicle information exchange to vehicles, road side units (RSU) and infrastructure nodes, Traffic Monitoring Center (TMC) can support incident detection monitoring and management. In this context, Early Detection of Incident (EDI) presents and discusses in this paper, a Vehicle-to-Vehicle (V2V) cooperative technique for detecting incident early using Incident Detection Node (IDN). EDI is experimented under small-scale highway based scenario using two cars equipped with on-board unit and one access point (AP). EDI is evaluated with measurement of received signal strength indication(RSSI) using network monitoring tool. The experimented results demonstrate average throughput, average signal strength, overall performance of AP in vehicle-to-roadside (V2R). EDI results demonstrate incident detection probabilities and capability to detect accurately.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123515476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
K-NN classifier for data confidentiality in cloud computing 云计算中数据机密性的K-NN分类器
2014 International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2014-06-03 DOI: 10.1109/ICCOINS.2014.6868432
M. A. Zardari, L. T. Jung, Nordin Zakaria
{"title":"K-NN classifier for data confidentiality in cloud computing","authors":"M. A. Zardari, L. T. Jung, Nordin Zakaria","doi":"10.1109/ICCOINS.2014.6868432","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868432","url":null,"abstract":"Securing the data in cloud is still a challenging issue. In cloud, many techniques are used to secure the data. Data encryption is a data security technique which is widely used for data security. Deciding data security approach for the data without understanding the security needs of the data is not a technically valid approach. Before applying any security on data in cloud, it is best to know the security needs of the data. What data need security and what data do not need security. In this paper, we propose a data classification approach based on data confidentiality. K-NN data classification technique is modulated in the cloud virtual environment. The aim to use K-NN is to classify the data based on their security needs. The data is classified into two classes, sensitive and non-sensitive (public) data. After data classification we got that what data need security and what data does not need security. The RSA algorithm is used to encrypt the sensitive data to keep it secure. We used CloudSim simulator to find the results of proposed approach in cloud. The proposed approach will easily decide the security needs of the data. After the data classification, it is easy to select an appropriate security for data according to the need of data. The results show that this approach is appropriate as compared to store data in cloud without understanding the security requirements of data.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125105709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Maximum-shift string matching algorithms 最大移位字符串匹配算法
2014 International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2014-06-03 DOI: 10.1109/ICCOINS.2014.6868423
Hakem Adil Kadhim, NurAini AbdulRashidx
{"title":"Maximum-shift string matching algorithms","authors":"Hakem Adil Kadhim, NurAini AbdulRashidx","doi":"10.1109/ICCOINS.2014.6868423","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868423","url":null,"abstract":"The string matching algorithms have broad applications in many areas of computer sciences. These areas include operating systems, information retrieval, editors, Internet searching engines, security applications and biological applications. Two important factors used to evaluate the performance of the sequential string matching algorithms are number of attempts and total number of character comparisons during the matching process. This research proposes to integrate the good properties of three single string matching algorithms, Quick-Search, Zuh-Takaoka and Horspool, to produce hybrid string matching algorithm called Maximum-Shift algorithm. Three datasets are used to test the proposed algorithm, which are, DNA, Protein sequence and English text. The hybrid algorithm, Maximum-Shift, shows efficient results compared to four string matching algorithms, Quick-Search, Horspool, Smith and Berry-Ravindran, in terms of the number of attempts and the total number of character comparisons.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125132098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Handling tradeoffs between agile and usability methods 处理敏捷和可用性方法之间的权衡
2014 International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2014-06-03 DOI: 10.1109/ICCOINS.2014.6868450
S. Butt, W. Ahmad, L. Rahim
{"title":"Handling tradeoffs between agile and usability methods","authors":"S. Butt, W. Ahmad, L. Rahim","doi":"10.1109/ICCOINS.2014.6868450","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868450","url":null,"abstract":"In the past few years, many organizations have tried to improve their software development methodology. Different development approaches had been introduced but only a few are still functioning in the software industry. Agile software development is one approach, which is currently successful in software industry. For the development of interactive and usable software, this agile approach needs to integrate with usability approaches. But this integration is not clear as both agile and usability follows iterative approach of development while agile approach is more toward on writing code and development of a running system; whereas, usability focused on the user interface to make the software more usable and increase its usability by following UCD process. This paper provides an extensive related work on the integration of agile methods with usability that highlights critical issues in agile methods and shows the importance of usability in agile methods. In the end, the proposed model is discussed to handle tradeoff between usability and agile methods under one model.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121173307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An integrative perspective for CRMS implementation in healthcare in Malaysia crm在马来西亚医疗保健实施的综合视角
2014 International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2014-06-03 DOI: 10.1109/ICCOINS.2014.6868399
Yahia Baashar, A. Mahmood
{"title":"An integrative perspective for CRMS implementation in healthcare in Malaysia","authors":"Yahia Baashar, A. Mahmood","doi":"10.1109/ICCOINS.2014.6868399","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868399","url":null,"abstract":"Customer Relationship Management (CRM) is a powerful tool to help healthcare organizations in managing patient interactions. The further that the healthcare organizations understand the value of being customer-centric, the more likely they adopt to CRM as their main source of business strategy. Numerous of healthcare organizations are now practicing the CRM in order to computerize the medical processes and manage relationships with patients to deliver the best quality of medical services. Unfortunately, only few numbers of CRM projects have been successfully implemented, as the failure rate is said to be very high. In the Malaysian healthcare sector, the CRM concept has not acknowledged much attention and according to the review of literatures, there is a lack of CRM implementation and adoption in that field. In order to fill this gap and to improve the process of CRM implementation, this paper presents the investigation of CRMS implementation from an integration perspective. A mixed methodology of qualitative and quantitative and a study model that leads to CRMS implementation are proposed.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126594943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信