2014 International Conference on Computer and Information Sciences (ICCOINS)最新文献

筛选
英文 中文
Empirical analysis of parallel-NARX recurrent network for long-term chaotic financial forecasting 并行- narx循环网络用于长期混沌财务预测的实证分析
2014 International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2014-06-03 DOI: 10.1109/ICCOINS.2014.6868354
S. J. Abdulkadir, S. Yong
{"title":"Empirical analysis of parallel-NARX recurrent network for long-term chaotic financial forecasting","authors":"S. J. Abdulkadir, S. Yong","doi":"10.1109/ICCOINS.2014.6868354","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868354","url":null,"abstract":"Financial data are characterized by non-linearity, noise, volatility and are chaotic in nature thus making the process of forecasting cumbersome. The main aim of forecasters is to develop an approach that focuses on increasing profit by being able to forecast future stock prices based on current stock data. This paper presents an empirical long term chaotic financial forecasting approach using Parallel non-linear auto-regressive with exogenous input (P-NARX) network trained with Bayesian regulation algorithm. The experimental results based on mean absolute percentage error (MAPE) and other forecasting error metrics shows that P-NARX network trained with Bayesian regulation slightly outperforms Levenberg-marquardt, Resilient back-propagation and one-step-secant training algorithm in forecasting daily Kuala Lumpur Composite Indices.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134086123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Electronic Content Management Systems use and implementation in highly integrated businesses 电子内容管理系统在高度集成业务中的使用和实现
2014 International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2014-06-03 DOI: 10.1109/ICCOINS.2014.6868846
N. Arshad, M. Mehat, Mohamed Imran
{"title":"Electronic Content Management Systems use and implementation in highly integrated businesses","authors":"N. Arshad, M. Mehat, Mohamed Imran","doi":"10.1109/ICCOINS.2014.6868846","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868846","url":null,"abstract":"Many organizations have invested large amounts of money in implementing Electronic Content Management Systems (ECMS), which refers to the technologies used to manage, store, and deliver business-related information across the organization. However, research indicates that many ECMS implementations fail to yield the kind of information sharing that is useful for business process executions. From the IS literature point of view, this is not because of the technologies, but it is due to ways ECMS is implemented and used which is not aligned with organization's way of doing business. Therefore, this paper explores how organizations that emphasize high integration and low standardization of business processes termed as Coordination use and implement ECMS to support its business operations. We suggest guidelines that explain the ways ECMS should be used and implemented in Coordination organizations that include (1) ways to use ECMS for sharing business process-related information, (2) ECMS infrastructure, (3) ways to manage content and (4) administration of ECMS. These findings are grounded in the analysis of qualitative data from one case study. The finding is significant for business and IT managers because it will guide them with ways to use ECMS and gain more benefits from these types of systems.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129990110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A computer aided system for breast cancer detection and diagnosis 一种用于乳腺癌检测和诊断的计算机辅助系统
2014 International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2014-06-03 DOI: 10.1109/ICCOINS.2014.6868355
Hamada R. H. Al-Absi, B. Samir, S. Sulaiman
{"title":"A computer aided system for breast cancer detection and diagnosis","authors":"Hamada R. H. Al-Absi, B. Samir, S. Sulaiman","doi":"10.1109/ICCOINS.2014.6868355","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868355","url":null,"abstract":"Breast cancer has become a significant health problem worldwide as it is considered one of the primary causes for deaths amongst females. In order to prevent the increase of deaths caused by breast cancer, early diagnosis through computer aided diagnosis systems has been very effective. This paper introduces a computer aided system for detecting and classifying suspicious regions in digital mammograms. The system starts by extracting regions of interest that are suspicious of containing cancerous cells. Then, all these regions are classified to check whether they are normal or abnormal. For the detection phase, template matching techniques are utilized. As for the classification phase, a 3-step process is applied which enclose feature extraction with wavelet transform, feature selection with statistical techniques and classification with clustering K-Nearest Neighbor classifier. A preliminary result shows a 97.73 % accuracy rate.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130334217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance evaluation of distributed video coding with different channel encoding techniques 采用不同信道编码技术的分布式视频编码性能评价
2014 International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2014-06-03 DOI: 10.1109/ICCOINS.2014.6868390
Chiam Kin Honn, M. Salleh
{"title":"Performance evaluation of distributed video coding with different channel encoding techniques","authors":"Chiam Kin Honn, M. Salleh","doi":"10.1109/ICCOINS.2014.6868390","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868390","url":null,"abstract":"Most recently, the low density parity check codes are chosen as the channel encoding method to encode the Wyner-Ziv frames in distributed video coding. These codes involve much complicated encoding and decoding algorithms, and might increase the processing time of the system. In this paper, we use the codes with simpler encoding and decoding algorithms, the Reed Solomon codes, and compare the performance of both codes in encoding the Wyner-Ziv frames. The proposed model is verified with the addition of white Gaussian noise. The simulation shows that the output video sequence is of acceptable quality compared to the current model with the low density parity check codes. The proposed model is also more efficient as the results could be obtained in a shorter time.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131177801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhance the performance of ICMP protocol by reduction the IP over ethernet naming architecture 通过减少IP over ethernet的命名体系结构,提高ICMP协议的性能
2014 International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2014-06-03 DOI: 10.1109/ICCOINS.2014.6868392
W. K. Alzubaidi, Long-Zheng Cai, Shaymaa A. Alyawer
{"title":"Enhance the performance of ICMP protocol by reduction the IP over ethernet naming architecture","authors":"W. K. Alzubaidi, Long-Zheng Cai, Shaymaa A. Alyawer","doi":"10.1109/ICCOINS.2014.6868392","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868392","url":null,"abstract":"This study addresses the Internet Control Message Protocol (ICMP) performance problems arising in Internet protocol (IP) over Ethernet networks. These problems arise because of the compatibility issue between two different compositional protocols: the IP and Ethernet protocol. The motivation behind addressing the compatibility problem is to improve the security and performance of networks by studying the link compatibility between the Ethernet and IP protocols. The findings of this study have given rise to proposals for modifications. A reduction in the current naming architecture design is advocated to improve the performance and security of IP over Ethernet networks. The use of the IP address, as one flat address for the naming architecture, is proposed instead of using both the IP and Media Access Control (MAC) addresses. The proposed architecture is evaluated through a simulated cancellation of the use of the Address Resolution Protocol (ARP) protocol.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132655092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Filters for device-free indoor localization system based on RSSI measurement 基于RSSI测量的无设备室内定位系统滤波器
2014 International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2014-06-03 DOI: 10.1109/ICCOINS.2014.6868386
N. Pirzada, Yunus Nayan, Fadzil Hassan, F. Subhan
{"title":"Filters for device-free indoor localization system based on RSSI measurement","authors":"N. Pirzada, Yunus Nayan, Fadzil Hassan, F. Subhan","doi":"10.1109/ICCOINS.2014.6868386","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868386","url":null,"abstract":"Based on wireless sensor networks, device-free indoor localization technique has received much attention in the field of indoor localization system Due to different indoor environmental parameters, multipath fading, human presences and different system configurations, the WiFi-based received signal strength indicator values are affected. This problem leads the researchers to choose any filter or smoothing algorithm to get proper values of received signal strength in the indoor environment. The aim of using the filter or smoothing algorithm is to get a signal value which can clearly identify the changes in the signal values due to interferences caused by various factors in the indoor environment. Wi-Fi based device-free indoor localization technique has become more attractive because its simplicity, as well as it does not require extra hardware. However the implementation of this technique in the indoor environment becomes complex, sometimes because of imprecise and unreliable readings caused by multipath fading. There are various filters designed and tested to remove the inconsistencies occurring in RSSI readings due to the various environmental effects. This paper presents various types of filters which are used for smoothing the raw data received signal strength indicator values and also improving the strength of these values by mitigating multipath fading effects in an indoor environment.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"2022 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123836120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A multibit burst error detection and correction mechanism for application layer 一种应用层的多比特突发错误检测和纠错机制
2014 International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2014-06-03 DOI: 10.1109/ICCOINS.2014.6868380
Shiladitya Bhattacharjee, Lukman Bin Ab Rahim, I. Aziz
{"title":"A multibit burst error detection and correction mechanism for application layer","authors":"Shiladitya Bhattacharjee, Lukman Bin Ab Rahim, I. Aziz","doi":"10.1109/ICCOINS.2014.6868380","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868380","url":null,"abstract":"To enhance the correctness and robustness of received text information at the receiver end, we propose an error detection and correction mechanism that executes at the application layer. Basically the error checking bits are incorporated with the original information during transition at the network. The error positions are detected by these error checking bits and then corresponding errors are corrected accordingly. Generally, the data link layer performs the task of error detection and correction but it platform dependent. So we introduce such a mechanism which is totally platform independent and acts at the application layer. It is capable of detecting all the error position and correcting all the error bits while it is destroyed or corrupted during the transmission. The data link layer sometimes fails to detect and correct all the error bits which can be solved by our proposed mechanism.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127077532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Assessment and evaluation of requirements elicitation techniques using analysis determination requirements framework 使用分析确定需求框架评估和评价需求引出技术
2014 International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2014-06-03 DOI: 10.1109/ICCOINS.2014.6868446
Souhaib Besrour, Lukman Bin Ab Rahim, P. Dominic
{"title":"Assessment and evaluation of requirements elicitation techniques using analysis determination requirements framework","authors":"Souhaib Besrour, Lukman Bin Ab Rahim, P. Dominic","doi":"10.1109/ICCOINS.2014.6868446","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868446","url":null,"abstract":"Numerous requirements engineering methods have been proposed to improve the quality of requirements documents and to increase customer satisfaction with the final product. However, the choosing between various techniques may be confusing and puzzling. Therefore, this paper aims to present an empirical study to assess requirement analysis techniques, highlight their key features, strength and limitations. The empirical study results show a high competitiveness between requirement engineering techniques and slight score differences among them. Statistics shows that Interview technique is the uppermost obtained score among all techniques, followed by JAD and Brainstorming technique.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115570395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Swarm inspired test case generation for online C++ programming assessment 基于Swarm的在线c++编程评估测试用例生成
2014 International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2014-06-03 DOI: 10.1109/ICCOINS.2014.6868842
O. Foong, Q. Tran, S. Yong, H. Rais
{"title":"Swarm inspired test case generation for online C++ programming assessment","authors":"O. Foong, Q. Tran, S. Yong, H. Rais","doi":"10.1109/ICCOINS.2014.6868842","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868842","url":null,"abstract":"It is time consuming for lecturers to manually compile, run and verify students' programming assignments. Moreover, they also need to define test cases for different programming exercises in order to assess students' code. This paper presents a swarm inspired automatic test case generation for Online Programming Assessment or Judge (UOJ) system. The UOJ is built with the purpose to assist lecturers in evaluating codes submitted from students and generate test cases for every programming problem automatically. It also helps students to practice and enhance their programming skills. In this study, the mechanism of automatic test case generation was explored using Particle Swarm Optimization (PSO) algorithm and new fitness function is proposed to determine the optimal solution for each problem. Experiments were set up to benchmark between manual and automatic PSO test case generation results to evaluate the efficiency of the proposed method. The preliminary results are satisfactory for automatic test case generation using swarm inspired PSO algorithm in C++ programming assignments.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129530062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
QoS routing for Cognitive Radio Ad-Hoc Networks: Challenges & issues 认知无线Ad-Hoc网络的QoS路由:挑战与问题
2014 International Conference on Computer and Information Sciences (ICCOINS) Pub Date : 2014-06-03 DOI: 10.1109/ICCOINS.2014.6868835
T. S. Malik, Halabi B. Hasbulah
{"title":"QoS routing for Cognitive Radio Ad-Hoc Networks: Challenges & issues","authors":"T. S. Malik, Halabi B. Hasbulah","doi":"10.1109/ICCOINS.2014.6868835","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868835","url":null,"abstract":"Cognitive Radio Ad-Hoc Network (CRAHN) is an emerging class of mobile ad hoc networks that provides each network node with a list of available channels. It is expected that the available routing protocols and metrics for traditional ad-hoc networks are not suitable for CRAHN in the environment of topology changes and different level of user mobility interference situations. Therefore, to achieve more realistic cognitive routing in radio ad hoc networks, routing metrics and routing protocols should be designed to adapt to traffic and propagation conditions. The focus of this work is on highlighting such routing metrics which are emphasizing on the implementation and improvement of the traditional routing protocols in case of channel switching and user mobility. The aim of any routing protocol is to provide the basic Quality of Service (QoS) to the applications in terms of overall throughput and end-to-end delay. We have simulated the basic routing protocols in traditional ad hoc network and CRAHN environments using NS-2 on the current available routing metrics and results highlighted that there are some challenges and issues are still open to provide the QoS routing in CRAHN environment.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"87 37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130363303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信