{"title":"Empirical analysis of parallel-NARX recurrent network for long-term chaotic financial forecasting","authors":"S. J. Abdulkadir, S. Yong","doi":"10.1109/ICCOINS.2014.6868354","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868354","url":null,"abstract":"Financial data are characterized by non-linearity, noise, volatility and are chaotic in nature thus making the process of forecasting cumbersome. The main aim of forecasters is to develop an approach that focuses on increasing profit by being able to forecast future stock prices based on current stock data. This paper presents an empirical long term chaotic financial forecasting approach using Parallel non-linear auto-regressive with exogenous input (P-NARX) network trained with Bayesian regulation algorithm. The experimental results based on mean absolute percentage error (MAPE) and other forecasting error metrics shows that P-NARX network trained with Bayesian regulation slightly outperforms Levenberg-marquardt, Resilient back-propagation and one-step-secant training algorithm in forecasting daily Kuala Lumpur Composite Indices.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134086123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electronic Content Management Systems use and implementation in highly integrated businesses","authors":"N. Arshad, M. Mehat, Mohamed Imran","doi":"10.1109/ICCOINS.2014.6868846","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868846","url":null,"abstract":"Many organizations have invested large amounts of money in implementing Electronic Content Management Systems (ECMS), which refers to the technologies used to manage, store, and deliver business-related information across the organization. However, research indicates that many ECMS implementations fail to yield the kind of information sharing that is useful for business process executions. From the IS literature point of view, this is not because of the technologies, but it is due to ways ECMS is implemented and used which is not aligned with organization's way of doing business. Therefore, this paper explores how organizations that emphasize high integration and low standardization of business processes termed as Coordination use and implement ECMS to support its business operations. We suggest guidelines that explain the ways ECMS should be used and implemented in Coordination organizations that include (1) ways to use ECMS for sharing business process-related information, (2) ECMS infrastructure, (3) ways to manage content and (4) administration of ECMS. These findings are grounded in the analysis of qualitative data from one case study. The finding is significant for business and IT managers because it will guide them with ways to use ECMS and gain more benefits from these types of systems.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129990110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A computer aided system for breast cancer detection and diagnosis","authors":"Hamada R. H. Al-Absi, B. Samir, S. Sulaiman","doi":"10.1109/ICCOINS.2014.6868355","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868355","url":null,"abstract":"Breast cancer has become a significant health problem worldwide as it is considered one of the primary causes for deaths amongst females. In order to prevent the increase of deaths caused by breast cancer, early diagnosis through computer aided diagnosis systems has been very effective. This paper introduces a computer aided system for detecting and classifying suspicious regions in digital mammograms. The system starts by extracting regions of interest that are suspicious of containing cancerous cells. Then, all these regions are classified to check whether they are normal or abnormal. For the detection phase, template matching techniques are utilized. As for the classification phase, a 3-step process is applied which enclose feature extraction with wavelet transform, feature selection with statistical techniques and classification with clustering K-Nearest Neighbor classifier. A preliminary result shows a 97.73 % accuracy rate.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130334217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of distributed video coding with different channel encoding techniques","authors":"Chiam Kin Honn, M. Salleh","doi":"10.1109/ICCOINS.2014.6868390","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868390","url":null,"abstract":"Most recently, the low density parity check codes are chosen as the channel encoding method to encode the Wyner-Ziv frames in distributed video coding. These codes involve much complicated encoding and decoding algorithms, and might increase the processing time of the system. In this paper, we use the codes with simpler encoding and decoding algorithms, the Reed Solomon codes, and compare the performance of both codes in encoding the Wyner-Ziv frames. The proposed model is verified with the addition of white Gaussian noise. The simulation shows that the output video sequence is of acceptable quality compared to the current model with the low density parity check codes. The proposed model is also more efficient as the results could be obtained in a shorter time.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131177801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. K. Alzubaidi, Long-Zheng Cai, Shaymaa A. Alyawer
{"title":"Enhance the performance of ICMP protocol by reduction the IP over ethernet naming architecture","authors":"W. K. Alzubaidi, Long-Zheng Cai, Shaymaa A. Alyawer","doi":"10.1109/ICCOINS.2014.6868392","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868392","url":null,"abstract":"This study addresses the Internet Control Message Protocol (ICMP) performance problems arising in Internet protocol (IP) over Ethernet networks. These problems arise because of the compatibility issue between two different compositional protocols: the IP and Ethernet protocol. The motivation behind addressing the compatibility problem is to improve the security and performance of networks by studying the link compatibility between the Ethernet and IP protocols. The findings of this study have given rise to proposals for modifications. A reduction in the current naming architecture design is advocated to improve the performance and security of IP over Ethernet networks. The use of the IP address, as one flat address for the naming architecture, is proposed instead of using both the IP and Media Access Control (MAC) addresses. The proposed architecture is evaluated through a simulated cancellation of the use of the Address Resolution Protocol (ARP) protocol.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132655092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Filters for device-free indoor localization system based on RSSI measurement","authors":"N. Pirzada, Yunus Nayan, Fadzil Hassan, F. Subhan","doi":"10.1109/ICCOINS.2014.6868386","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868386","url":null,"abstract":"Based on wireless sensor networks, device-free indoor localization technique has received much attention in the field of indoor localization system Due to different indoor environmental parameters, multipath fading, human presences and different system configurations, the WiFi-based received signal strength indicator values are affected. This problem leads the researchers to choose any filter or smoothing algorithm to get proper values of received signal strength in the indoor environment. The aim of using the filter or smoothing algorithm is to get a signal value which can clearly identify the changes in the signal values due to interferences caused by various factors in the indoor environment. Wi-Fi based device-free indoor localization technique has become more attractive because its simplicity, as well as it does not require extra hardware. However the implementation of this technique in the indoor environment becomes complex, sometimes because of imprecise and unreliable readings caused by multipath fading. There are various filters designed and tested to remove the inconsistencies occurring in RSSI readings due to the various environmental effects. This paper presents various types of filters which are used for smoothing the raw data received signal strength indicator values and also improving the strength of these values by mitigating multipath fading effects in an indoor environment.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"2022 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123836120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shiladitya Bhattacharjee, Lukman Bin Ab Rahim, I. Aziz
{"title":"A multibit burst error detection and correction mechanism for application layer","authors":"Shiladitya Bhattacharjee, Lukman Bin Ab Rahim, I. Aziz","doi":"10.1109/ICCOINS.2014.6868380","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868380","url":null,"abstract":"To enhance the correctness and robustness of received text information at the receiver end, we propose an error detection and correction mechanism that executes at the application layer. Basically the error checking bits are incorporated with the original information during transition at the network. The error positions are detected by these error checking bits and then corresponding errors are corrected accordingly. Generally, the data link layer performs the task of error detection and correction but it platform dependent. So we introduce such a mechanism which is totally platform independent and acts at the application layer. It is capable of detecting all the error position and correcting all the error bits while it is destroyed or corrupted during the transmission. The data link layer sometimes fails to detect and correct all the error bits which can be solved by our proposed mechanism.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127077532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessment and evaluation of requirements elicitation techniques using analysis determination requirements framework","authors":"Souhaib Besrour, Lukman Bin Ab Rahim, P. Dominic","doi":"10.1109/ICCOINS.2014.6868446","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868446","url":null,"abstract":"Numerous requirements engineering methods have been proposed to improve the quality of requirements documents and to increase customer satisfaction with the final product. However, the choosing between various techniques may be confusing and puzzling. Therefore, this paper aims to present an empirical study to assess requirement analysis techniques, highlight their key features, strength and limitations. The empirical study results show a high competitiveness between requirement engineering techniques and slight score differences among them. Statistics shows that Interview technique is the uppermost obtained score among all techniques, followed by JAD and Brainstorming technique.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115570395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Swarm inspired test case generation for online C++ programming assessment","authors":"O. Foong, Q. Tran, S. Yong, H. Rais","doi":"10.1109/ICCOINS.2014.6868842","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868842","url":null,"abstract":"It is time consuming for lecturers to manually compile, run and verify students' programming assignments. Moreover, they also need to define test cases for different programming exercises in order to assess students' code. This paper presents a swarm inspired automatic test case generation for Online Programming Assessment or Judge (UOJ) system. The UOJ is built with the purpose to assist lecturers in evaluating codes submitted from students and generate test cases for every programming problem automatically. It also helps students to practice and enhance their programming skills. In this study, the mechanism of automatic test case generation was explored using Particle Swarm Optimization (PSO) algorithm and new fitness function is proposed to determine the optimal solution for each problem. Experiments were set up to benchmark between manual and automatic PSO test case generation results to evaluate the efficiency of the proposed method. The preliminary results are satisfactory for automatic test case generation using swarm inspired PSO algorithm in C++ programming assignments.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129530062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS routing for Cognitive Radio Ad-Hoc Networks: Challenges & issues","authors":"T. S. Malik, Halabi B. Hasbulah","doi":"10.1109/ICCOINS.2014.6868835","DOIUrl":"https://doi.org/10.1109/ICCOINS.2014.6868835","url":null,"abstract":"Cognitive Radio Ad-Hoc Network (CRAHN) is an emerging class of mobile ad hoc networks that provides each network node with a list of available channels. It is expected that the available routing protocols and metrics for traditional ad-hoc networks are not suitable for CRAHN in the environment of topology changes and different level of user mobility interference situations. Therefore, to achieve more realistic cognitive routing in radio ad hoc networks, routing metrics and routing protocols should be designed to adapt to traffic and propagation conditions. The focus of this work is on highlighting such routing metrics which are emphasizing on the implementation and improvement of the traditional routing protocols in case of channel switching and user mobility. The aim of any routing protocol is to provide the basic Quality of Service (QoS) to the applications in terms of overall throughput and end-to-end delay. We have simulated the basic routing protocols in traditional ad hoc network and CRAHN environments using NS-2 on the current available routing metrics and results highlighted that there are some challenges and issues are still open to provide the QoS routing in CRAHN environment.","PeriodicalId":368100,"journal":{"name":"2014 International Conference on Computer and Information Sciences (ICCOINS)","volume":"87 37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130363303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}