W. Ahmad, Hidayatun Nafisah Binti Isa Muddin, A. Shafie
{"title":"Number skills mobile application for down syndrome children","authors":"W. Ahmad, Hidayatun Nafisah Binti Isa Muddin, A. Shafie","doi":"10.1109/ICCOINS.2014.6868844","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868844","url":null,"abstract":"Down syndrome (DS) children seem to have difficulties in learning numbers compared to reading. They need customized learning in numbers due to their slower pace of learning. Unfortunately, there is limited theory to guide DS children to learn and master in mathematics. With the advancement of technology, the learning style of special children has been improved from time to time from the paper and pen method, to the use of computer application such as courseware to the latest technology such as mobile application in smart phones and tablets. As for now, there is no personalized mathematics learning mobile application for DS children. The objectives of this paper are to report on the development of a mobile application on learning the basic numbers for DS children and to evaluate the user acceptance on the developed mobile application. The study will be focusing on the DS children with moderate level of IQ who are learning to recognize basic numbers. The method used to achieve the objectives is Rapid Application Development (RAD). The mobile application was developed using Eclipse Android Development Tool (ADT). An observation has been conducted to 5 DS children who have different level of IQ. The finding shows that the mobile application is really suitable for DS children who have moderate level IQ.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"20 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120860967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prediction of hidden knowledge from Clinical Database using data mining techniques","authors":"Gunasekar Thangarasu, P. Dominic","doi":"10.1109/ICCOINS.2014.6868414","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868414","url":null,"abstract":"Clinical Database has enormous quantity of information about patients and their diseases. The database mainly contains clinical consultation details, family history, medical lab report and other information which are considered to taking a final diagnostic decision by physician. Clinical databases are widely utilized by the numerous researchers for predicting different diseases. The current diabetes diagnosis methods are carried out based on the impact of various medical test and the results of physical examination. The new and innovative prediction methods are projected in this research to identify the diabetic disease, its types and complications from the clinical database in an efficiently and an economically faster manner.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116021292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Participation/collaboration pattern: Perspectives of trust and security risks","authors":"Sadaf Hina, A. Oxley","doi":"10.1109/ICCOINS.2014.6868430","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868430","url":null,"abstract":"Cyber security issues, due to a lack of trust in social networking sites (SNS), are being addressed by many researchers and practitioners. Despite the diversity of security and privacy vulnerabilities, SNS have acquired and are still acquiring great popularity. Cybercrimes exploiting flaws in information technology and the imprudent trust of users, in who they add as contacts, are alarming and can lead to serious consequences in terms of identity theft, harassment, cyber bullying and defamation. People share personal and sensitive information on profiles and trust SNS service providers and friends to keep their information private. Our study reveals that trust in SNS and trust in friends are two different perspectives of the factor `trust' which can be predicted by `security', `privacy' and `cyber safety education' factors. Moreover, trust is a vital factor that affects the intention of a user to participate in the collaborative sharing pattern. A multiple regression analysis has been used to validate the proposed research framework. The results from 380 SNS users in a school community, including students, teachers, parents and school admin show that perceived privacy and security in SNS are the antecedents of trust in SNS while cyber safety education is the antecedent of trust in friends. Sensible levels of trust aid people in collaborating safely using SNS. `Trust' also influences the intention to use SNS for participation/collaboration among users.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133662690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. A. Shah, H. Hasbullah, Shahzad Rafique, S. Rehman, L. T. Jung
{"title":"Fuzzy logic based link status classification for efficient multipath routing in multi-hop wireless mesh networks","authors":"P. A. Shah, H. Hasbullah, Shahzad Rafique, S. Rehman, L. T. Jung","doi":"10.1109/ICCOINS.2014.6868381","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868381","url":null,"abstract":"In contrast to traditional wireless networks, hosts of a multi-hop wireless network, like wireless mesh network (WMN), may rely on each other to maintain network connectivity. A main design objective of these networks is to eliminate or minimize the unavailability of network at some point. However, in infrastructure and the client part of WMN movement of nodes still creates delay as path failure detection and re-establishment consumes considerable time. Existing solutions for link classification operate on discrete values resulting in performance degradation. This problem can best be modelled through fuzzy logic based classification that is based on continuous values. This paper presents a new fuzzy logic based link status classification mechanism for use with multipath routing protocols in multi-hop wireless networks like WMNs. The proposed mechanism classifies the link status as active, about-to-break or broken. On the basis of link status, said algorithm predicts in advance that a particular link, on the active path between sender and receiver, is about to break and helps the reactive multipath routing protocol to start the rerouting operation, thus minimizing the route discovery frequency, delay and packet loss.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115020959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Brain-like classifier of temporal patterns","authors":"D. Kleyko, Evgeny Osipov","doi":"10.1109/ICCOINS.2014.6868349","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868349","url":null,"abstract":"In this article we present a pattern classification system which uses Vector Symbolic Architecture (VSA) for representation, learning and subsequent classification of patterns, as a showcase we have used classification of vibration sensors measurements to vehicles types. On the quantitative side the proposed classifier requires only 1 kB of memory to classify an incoming signal against of several hundred of training samples. The classification operation into N types requires only 2*N+1 arithmetic operations this makes the proposed classifier feasible for implementation on a low-end sensor nodes. The main contribution of this article is the proposed methodology for representing temporal patterns with distributed representation and VSA-based classifier.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116436924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Task-technology fit and user adoption of cloud-based collaborative learning technologies","authors":"E. Yadegaridehkordi, N. A. Iahad, Norasnita Ahmad","doi":"10.1109/ICCOINS.2014.6868439","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868439","url":null,"abstract":"Trend of a new generation of students towards collaborative learning as well as significant characteristics of cloud computing technology have changed the world of teaching and learning. This paper reported the results of a survey study and provided evidence of testing Task-Technology Fit (TTF) model in understanding the factors that play significant roles in predicting student adoption of cloud-based collaborative learning technologies in university settings. Therefore, based on purposive sampling, questionnaires were distributed to target population. The results indicated that task non-routineness has negative influence on Task-Technology Fit (TTF). However, inconsistent with past studies, task Interdependence positively influences Task-Technology Fit (TTF). Significant effect of Mobility and Personalization and collaboration as technology characteristics were observed on Task-Technology Fit (TTF). Finally, as expected significant relationships between Task-Technology Fit (TTF) and User Adoption were also found. Overall, Users' adoption of cloud-based collaborative learning technologies was determined directly by fit between characteristics of task and technology.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122453171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding factors affect on the effectiveness of social networks for cancer patients","authors":"M. Mirabolghasemi, N. A. Iahad, S. Miskon","doi":"10.1109/ICCOINS.2014.6868437","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868437","url":null,"abstract":"Cancer related social network communities have the potential to develop an interactive environment where virtual relationships among cancer patients can be made. Few studies have looked at the role of Social Network Sites (SNS) for cancer patients despite their potential to deliver health messages to large audiences. The purpose of this study is to understand factors that affect the effectiveness of the SNS as fast growing source for online cancer support using Social Cognitive Theory (SCT) and the theory of Task Technology Fit (TTF). A semi-structured interview designed through reviews of relevant literature was analyzed using thematic analysis. Most respondents believed the effectiveness of SNS is significant on information and emotional support. Although, the central issues appeared to be more focused on the self efficacy, past experience, social supports, system and task characteristics in explaining the way factors affect on the effectiveness of SNS for cancer patients. Consequently, more rigorous research should be focused on explaining the best practices that may help speed up effective intervention of social network technology in healthcare.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"376 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122858246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adeel Ansari, Afza Bt Shafie, S. Ansari, A. Said, Elisha Tadiwa Nyamasvisva, M. Abdulkarim, Muhammad Rauf
{"title":"Infomax and FASTICA using principle component analysis as preprocessor for airwave removal in seabed logging","authors":"Adeel Ansari, Afza Bt Shafie, S. Ansari, A. Said, Elisha Tadiwa Nyamasvisva, M. Abdulkarim, Muhammad Rauf","doi":"10.1109/ICCOINS.2014.6868356","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868356","url":null,"abstract":"This research aims to apply the FASTICA and Infomax algorithm in the field of seabed logging, by utilizing the Principal Component Analysis (PCA) as preprocessor. All the three algorithms are statistical algorithms used for signal deconvolution and are respectively in the field of Independent Component Analysis (ICA). In seabed logging (SBL) implies the marine controlled source electromagnetic (CSEM) technique for the detection of hydrocarbons underneath the seabed floor. The results from SBL, indicate the presence of Hydrocarbon, but due to the presence of noise, in the form of airwaves, interfere with the signals from the subsurface and tend to dominate the receiver response. Hence, the Infomax and FASTICA de-convolution algorithms are used, considering PCA as a pre-processor to filter out the airwaves which disrupt the subsurface signals within the receiver response. The results obtained from simulations and their comparative analysis, indicate that the results from the infomax algorithm are better.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123176145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Communication risks in GSD during RCM: Results from SLR","authors":"A. Khan, S. Basri, P. Dominic","doi":"10.1109/ICCOINS.2014.6868448","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868448","url":null,"abstract":"Majority of the software production companies are adopting Global Software Development (GSD) and it is incessantly getting fast. Most of Software development organizations are trying to globalize their study worldwide in order to get the various benefits. However, GSD is not a simple task and the organizations face different challenges. But Communication is a major issue and it becomes more complicated during the process of Requirements Change Management (RCM). This research will result to explore different communication risks, their causes, negative effects and mitigation strategies to allay the identified communication risks during the RCM process by conducting the Systematic Literature Review (SLR). In this study total 31 risks are identified their causes 31 and negative effects 29. Total 10 best practices are identified which are used to mitigate the identified communication risks.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131246719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social commerce from the Information Systems perspective: A systematic literature review","authors":"M. Shanmugam, Yusmadi Yah Jusoh","doi":"10.1109/ICCOINS.2014.6868435","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868435","url":null,"abstract":"The evolution of social media has changed the conventional e-commerce to social commerce. The delayed growth of the social commerce is however relatively low researched in the Information Systems disciple despite its intense evolution. As a result, this paper aims to critically probe into existing and related work in the area of social commerce from the Information Systems perspective. The standard systematic literature review method employing a physical search of 12 journals and 6 conference proceedings were used in conducting the literature review. The comprehensive systematic literature review is valuable in bridging the social commerce gap and opens up novel directions to Information Systems scholars in this market segment.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130140434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}