{"title":"Access control and privacy in MANET emergency environment","authors":"A. Abu Bakar, Azimah Abdul Ghapar, Roslan Ismail","doi":"10.1109/ICCOINS.2014.6868389","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868389","url":null,"abstract":"Mobile ad hoc networks (MANETs) cultivate a new research trend in today's computing. With some unique features such as scalability, fault tolerant and autonomous system enable a network to be setup with or without any trusted authority. This makes MANET suitable for the emergency and rescue operations. During an emergency situation, there is a need for the data to be shared with the rescuers. However, there are some of the personal data cannot be shared to all rescuers. Thus, the privacy and security of data becomes a main concern here. This paper addresses these issues with a combination of access control mechanism and privacy policy to ensure that the privacy and security of personal data is protected accordingly.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125317562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Suziah Sulaiman Ahsanullah, S. Sulaiman, Ahmad Kamil, Muzafar Khan
{"title":"Human finger input properties for precise target selection on multi-touch screen","authors":"Suziah Sulaiman Ahsanullah, S. Sulaiman, Ahmad Kamil, Muzafar Khan","doi":"10.1109/ICCOINS.2014.6868402","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868402","url":null,"abstract":"In recent years, touch enabling technologies potentially have supported to design and develop small and large sizes of multi-touch screens. These sensitive devices assist users to select and manipulate the target objects using their bare fingers. However, it is reported that user fingertips cause the imprecise selection of small size targets and subsequently users get frustrated during interaction. Keeping in view this problem, it is attempted to provide an overview on human finger input properties and their possible use for the selection of targets on multi-touch screens. This survey paper helps in understanding the finger touch input and some inherited finger input properties. It also provides a rational to explore the finger input properties that may help in proposing new interaction techniques to avoid the imprecision problem.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125569306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Y. Abubakar, L. T. Jung, Nordin Zakaria, O. Foong
{"title":"Proposed method for enhancing quantum bit error rate using quantum key distribution technique","authors":"M. Y. Abubakar, L. T. Jung, Nordin Zakaria, O. Foong","doi":"10.1109/ICCOINS.2014.6868384","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868384","url":null,"abstract":"The current public key infrastructure (pki) encryption/decryption methods are still vulnerable to attacks. The main issue is, the public key algorithm suffers no effective solutions which are natural within particular integer factorization, distinct logarithm and also elliptic curve interactions. It might be computationally possible for an individual to create public and private key set computationally for attacking purposes. The current single channel quantum key distribution (qkd) technique suffers high quantum bit error rates (qber) in the presence of eavesdropping attacks. Therefore this high error rate needs to be reduced for better security using two channels qkd. With the current emergence of quantum computers many security algorithm that could take classical computer years to break could now be broken in matter of seconds. Therefore stronger quantum cryptography is needed for high security networking. This paper is proposed to provide a way for solving the key transmission issues using qkd, as a new method, by providing two quantum channels to improve qber. In addition also to develop an algorithm for integrating pki and qkd in solving the secrete key sharing issues in grid environment. The research methodology will require the use of qkd devices to be placed at the end of the sender and the receiver nodes for quantum channel secrete key sharing. The outcome of the research shall provide highly enhanced network cryptography mechanism for cyber security.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128115486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of software project risk managers: Established on roles and responsibilities","authors":"U. Janjua, A. Oxley, Jafreezal Bin Jaafar","doi":"10.1109/ICCOINS.2014.6868836","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868836","url":null,"abstract":"Generally, people have used the term “risk manager” in different fields of science to represent a person who is responsible for handling risk management activities. However, in the field of software engineering, the term “risk manager” is not well defined and there is ambiguity over the term's meaning. The main objective of the paper is to review the literature thematically in order to make the terms understandable and to find the role of a risk manager for effective software project risk management. Additionally, in the end of the paper different title of software project risk managers has been classified on the base of their roles and responsibilities.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126251512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mutual entropy of a single Cooper pair-box interacting with multi-photon field","authors":"Heba Kadry, Nordin Zakaria, L. Y. Cheong","doi":"10.1109/ICCOINS.2014.6868410","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868410","url":null,"abstract":"We discuss the interaction of a single Cooper pair box interacting with a multi-photon field. The dynamical behavior is investigated using the quantum mutual entropy. The results show that the system parameters (the number of quanta and detuning parameters) play an important role in entanglement. This result might shed the light on the possibility to use the number of quanta as a controller parameter for the present system.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114790872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontology based development of Domain Specific Languages for Systems Engineering","authors":"V. Mezhuyev","doi":"10.1109/ICCOINS.2014.6868825","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868825","url":null,"abstract":"The new approach to development of Domain Specific Languages (DSL) for solving tasks of Systems Engineering (SE) is proposed. A DSL alphabet is defined on the base of an ontology of the SE domain as the set of its typical concepts. A DSL grammar on the base of Finite State Machine (FSM) formalism is defined, which allows to link the SE ontology with the different SE processes (specification of requirements, work planning, development, validation, standardisation etc.). A DSL is mapped with the set of mathematical methods, which allows to solve arising in the SE domains tasks. The approach on the sample of development of the DSL for specification of requirements is illustrated.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123821325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Amir Khan, H. Hasbullah, B. Nazir, M. A. Ali Khan
{"title":"Lifetime and coverage maximization technique for mobile sensor networks","authors":"Muhammad Amir Khan, H. Hasbullah, B. Nazir, M. A. Ali Khan","doi":"10.1109/ICCOINS.2014.6868394","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868394","url":null,"abstract":"In recent times possess viewed a developing desire for the actual apps connected with wireless sensor communities (WSNs). In some of these apps, for instance lookup and also relief and also battlefield reconnaissance, a few cell nodes will be implemented so as to in concert survey an area of interest and/or conduct specific monitoring jobs. Like venture one of the detectors demands internode discussion thereby sustaining network on the web connectivity is important to the potency of WSNs. Though on the web connectivity could be provisioned with medical period then continual by way of watchful coordination when nodes go, extreme failing of your node postures an issue because network could get partitioned. Numerous strategies that will practice node moving to restore on the web connectivity possess been recently proposed. Even so, these types of strategies tend to disregard the feasible lack of insurance policy coverage in most areas, both a result of the failing alone or a result of the connectivity-limited concentrate on the recuperation. This paper floods that hole simply by addressing the actual on the web connectivity and also insurance policy coverage worries within the included manner. A new node repositioning Method along with a smaller amount percentage decrease in insurance policy coverage Intended for Mobile Sensor Sites protocol will be shown. Just about every next door neighbor quickly relocates to replacement the actual failed node, one at a time, then returns time for its authentic location. The simulation outcomes confirm the potency of the actual protocol.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124282291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Iqbal, I. Faye, A. M. Md Said, Brahim Belhaouari Samir
{"title":"An efficient computational intelligence technique for classification of protein sequences","authors":"M. Iqbal, I. Faye, A. M. Md Said, Brahim Belhaouari Samir","doi":"10.1109/ICCOINS.2014.6868352","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868352","url":null,"abstract":"Many artificial intelligence techniques have been developed to process the constantly increasing volume of data to extract meaningful information from it. The accurate annotation of the unknown protein using the classification of the protein sequence into an existing superfamily is considered a critical and challenging task in bioinformatics and computational biology. This classification would be helpful in the analysis and modeling of unknown protein to determine their structure and function. In this paper, a frequency-based feature encoding technique has been used in the proposed framework to represent amino acids of a protein's primary sequence. The technique has considered the occurrence frequency of each amino acid in a sequence. Popular classification algorithms such as decision tree, naïve Bayes, neural network, random forest and support vector machine have been employed to evaluate the effectiveness of the encoding method utilized in the proposed framework. Results have indicated that the decision tree classifier significantly shows better results in terms of classification accuracy, specificity, sensitivity, F-measure, etc. The classification accuracy of 88.7% was achieved over the Yeast protein sequence data taken from the well-known UniProtKB database.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122675530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Izyana Ariffin, Aliza Abd Latif, M. A. Faudzi, S. Shariff, Mawaddah Mohamad Nadzir
{"title":"Information audit in electricity utilities: Roles, methodologies, issues and challenges","authors":"Izyana Ariffin, Aliza Abd Latif, M. A. Faudzi, S. Shariff, Mawaddah Mohamad Nadzir","doi":"10.1109/ICCOINS.2014.6868421","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868421","url":null,"abstract":"Information audit is crucial in understanding the current state of an organisation. By implementing information audit, the needs, the available resources and the gaps are made known to the top management of an organisation, thus helping them to identify steps to be taken to improve the way they manage information in order to stay competitive in their business. Several framework and methodologies were introduced, aimed at providing step by step guidelines to organisations in executing information audit while maximizing the benefits of information audit itself. However, despite the benefits information audit carries, only a minimum number of organisations put information audit into practice and this indicates that current developed framework and methodologies fail to convince organisations to implement information audit. This includes organisations in Electricity Supply Industry (ESI). This paper reviews existing information audit framework and methodologies applicable to ESI and discuses some issues and challenges in implementing information audit based on previous literatures. This review is a preliminary study of a research aims at proposing a new improved information audit framework for ESI.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127642799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adeel Ansari, Afza Bt Shafie, S. Ansari, A. M. Md Said, Elisha Tadiwa Nyamasvisva, M. Abdulkarim, Muhammad Rauf
{"title":"Subsurface exploration of seabed using electromagnetic waves for the detection of hydrocarbon layers","authors":"Adeel Ansari, Afza Bt Shafie, S. Ansari, A. M. Md Said, Elisha Tadiwa Nyamasvisva, M. Abdulkarim, Muhammad Rauf","doi":"10.1109/ICCOINS.2014.6868830","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868830","url":null,"abstract":"This paper focuses on the detection of hydrocarbon layers under the seabed using Electromagnetic methods and to prove the relationship between the thickness and resistivity constrast of the hydrocarbon. Simulations have been carried out by varying the depth of seawater from 1000m to 100m and the resistivity contrast and thickness for each level of depth is also varied. The electric field is also measured using various simulation models and graphs over different offsets. The results obtained prove that the resistivity property of Hydrocarbon is directly proportional to the thickness, and at particular points the presence of hydrocarbon layer is clearly significant.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121498588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}