{"title":"Computer based characterisation of Pteropus vampyrus endogenous betaretrovirus (PvEB) from bat genome project database","authors":"N. F. A. Razlan, R. Kambol","doi":"10.1109/ISCAIE.2014.7010200","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010200","url":null,"abstract":"Retroviruses have been associated with numerous chronic diseases such as leukemias and immunodeficiencies which harbored by diverse host range of animals. Recently, one member of bat endogenous retrovirus has been reported as the basal of gammaretrovirus. Later, a study discovered that betaretrovirus also present in diverse micro and megabats. From these recent studies, we gain our interest to further analyze one of the discoveries of betaretrovirus in Pteropus vampyrus in which we called it as Pteropus vampyrus endogenous betaretrovirus (PvEB). The size of nucleotide sequence is 8.7kb which was obtained during screening and characterization of bat genome from large flying fox (Pteropus vampyrus) database genome project. It has a typical genomic organization of a retrovirus possessing all the major conserved motifs and LTR flanking the viral genes:5'-LTR-gag-dUTPase-pol-env-LTR-3'plus the presence of dUTPase which is common in al l betaretrovirus. Therefore, this discovery strengthens the current studies which extend the endogenous retrovirus from bats into betaretrovirus group.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129108210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. S. Yalli, S. A. Latif, M. H. Masud, M. K. Alam, A. Abdallah
{"title":"A comprehensive analysis of improving QoS and IMM traffic of high speed wireless campus network","authors":"J. S. Yalli, S. A. Latif, M. H. Masud, M. K. Alam, A. Abdallah","doi":"10.1109/ISCAIE.2014.7010201","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010201","url":null,"abstract":"Interactive Multimedia (IMM) applications such as voice and video conferencing are very important in our learning environment. They offer useful services that benefit its users but these services suffers performance degradation from today's high speed Wireless Local Area Network (WLAN). However, guaranteed Quality of Service (QoS) remains the bottleneck in the network which becomes a great challenge in attempting to improve its performance. This work reviewed many approaches and considers mapping QoS class parameters such as Quality of Service Class Identifier (QCI), Maximum Bit Rate (MBR) and Allocation and Retention Priority (ARP) to the upstream and downstream data flowing in the network as an attempt to improve its performance. Priority is then given to the QoS bearer packets by associating Differentiated Services Code Point (DSCP). A comprehensive analysis of QoS in different protocols in wireless networks has been studied. Open issues and research directions have been addressed with a proposed mechanism to enhance the QoS of the wireless network.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115039337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of a MOS estimation model for G.729 using listening-opinion tests with Thai speech referring to packet loss effects","authors":"Pongpisit Wuttidittachotti, Phisit Khaoduang, Therdpong Daengsi","doi":"10.1109/ISCAIE.2014.7010204","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010204","url":null,"abstract":"This paper presents a proposed mathematical model of VoIP quality estimation from G.729. This model is based on native Thai users. The subjective Mean Opinion Score (MOS) were obtained from listening-opinion tests with a total of 102 subjects that covered five conditions of packet loss effects (0%, 3%, 5%, 10% and 20%). The model was then created using a simple function in Microsoft Excel, before evaluating with the test set data obtained from four test conditions (0%, 4%, 8% and 12%) with 30 subjects. From the evaluated result, it has been found that the Mean Absolute Percent Error (MAPE) of the model is 16.29%. That means this model is accepted as a good model for MOS estimation from G.729 for Thai users, referring to packet loss effects (0-10% =excellent, whereas about 10-20% = good).","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126604378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Geogiana Buja, Kamarularifin Bin Abd Jalil, Fakariah Bt Hj Mohd Ali, Teh Faradilla Abdul Rahman
{"title":"Detection model for SQL injection attack: An approach for preventing a web application from the SQL injection attack","authors":"Geogiana Buja, Kamarularifin Bin Abd Jalil, Fakariah Bt Hj Mohd Ali, Teh Faradilla Abdul Rahman","doi":"10.1109/ISCAIE.2014.7010210","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010210","url":null,"abstract":"Since the past 20 years the uses of web in daily life is increasing and becoming trend now. As the use of the web is increasing, the use of web application is also increasing. Apparently most of the web application exists up to today have some vulnerability that could be exploited by unauthorized person. Some of well-known web application vulnerabilities are Structured Query Language (SQL) Injection, Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF). By compromising with these web application vulnerabilities, the system cracker can gain information about the user and lead to the reputation of the respective organization. Usually the developers of web applications did not realize that their web applications have vulnerabilities. They only realize them when there is an attack or manipulation of their code by someone. This is normal as in a web application, there are thousands of lines of code, therefore it is not easy to detect if there are some loopholes. Nowadays as the hacking tools and hacking tutorials are easier to get, lots of new hackers are born. Even though SQL injection is very easy to protect against, there are still large numbers of the system on the internet are vulnerable to this type of attack because there will be a few subtle condition that can go undetected. Therefore, in this paper we propose a detection model for detecting and recognizing the web vulnerability which is; SQL Injection based on the defined and identified criteria. In addition, the proposed detection model will be able to generate a report regarding the vulnerability level of the web application. As the consequence, the proposed detection model should be able to decrease the possibility of the SQL Injection attack that can be launch onto the web application.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131156294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Y. Chai, H. H. Woon, Liang Kim Meng, Yuen Shang Li
{"title":"Non-standard Malaysian car license plate recognition","authors":"H. Y. Chai, H. H. Woon, Liang Kim Meng, Yuen Shang Li","doi":"10.1109/ISCAIE.2014.7010228","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010228","url":null,"abstract":"Automated car license plate recognition systems are developed and applied for purpose of facilitating the surveillance, law enforcement, access control and intelligent transportation monitoring with least human intervention. The challenging part of this system lies in accurately recognizing a non-standard plate that consists of various character fonts, character sizes, plate size, orientations, plate and character colors, materials, positions of numeric characters and alphabetic characters. The objective of the paper is to present our developed algorithms that cope with these practical variations in the context of non-standard Malaysian plate from image scene acquisition to optical character recognition. In each standard step of license plate recognition, we consider the processing of the plates under various environmental condition and non-standard formation of characters in real scene. The algorithm is tested with 500 Malaysian car plates in real-time and the result shown that the algorithm remains relatively robust under different conditions and car plate standard.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131106823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joseph Ng Poh Soon, A. Mahmood, P. Y. Choo, See Wan Wong, K. Y. Phan, E. H. Lim
{"title":"BareBone cloud IaaS: Revitalization disruptive technology","authors":"Joseph Ng Poh Soon, A. Mahmood, P. Y. Choo, See Wan Wong, K. Y. Phan, E. H. Lim","doi":"10.1504/IJBIS.2015.066130","DOIUrl":"https://doi.org/10.1504/IJBIS.2015.066130","url":null,"abstract":"With today's Internet of Hype-Things, technology innovation is no longer a strategic weapon to gain competitiveness or even sustainability at SME. Legacy frameworks are biased towards larger computing during happy day environment. This paper presents a new framework for SME to embrace IaaS with confidence to move up the value chain despite facing volatile economic turbulence. While disruptive BareBone cloud technology maybe inferior to large enterprises, holds potential opportunities to the smaller enterprise where base cost does matter. The use of three instruments (mass survey, interview and focus group) for collecting primary data has ensured consistent information validation. The findings from the directional correlation hypothesis affirm the negative correlation between infancy stage of technology innovation and the measurable organizational values expected by the small enterprise. This contribution can be applied during dilemma decision making stage for migrating into the next cloud computing infrastructure.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115653832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Eslahi, Maryam Var Naseri, H. Hashim, N. Tahir, E. Saad
{"title":"BYOD: Current state and security challenges","authors":"M. Eslahi, Maryam Var Naseri, H. Hashim, N. Tahir, E. Saad","doi":"10.1109/ISCAIE.2014.7010235","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010235","url":null,"abstract":"Recently, BYOD or Bring Your own Device has become one of the most popular models for enterprises to provide mobility and flexibility in workplaces. The emergence of new technologies and features of mobile devices makes them integral parts of every aspect of daily business activities. Also, mobile networks are now well integrated with the Internet (e.g. 3G, 4G and LTE technologies), therefore, in BYOD, the personal devices (i.e. mobile devices) can be used to increase employees' satisfaction and reduce an organization's device costs. Mobile devices are not well protected compared to computer and computer networks and users pay less attention to security updates and solutions. As a result, mobile security has become a crucial issue in BYOD as employees use their own mobile devices to access an organization's data and systems. Therefore, in this paper we present an overview of the current state of BYOD security and we discuss some future challenges in this area.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114251422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Khalid, N. Fisal, Mohd. Rozaini, Hashim Safdar, R. Ullah, W. Maqbool
{"title":"Middleware framework for network virtualization in SHAAL","authors":"Z. Khalid, N. Fisal, Mohd. Rozaini, Hashim Safdar, R. Ullah, W. Maqbool","doi":"10.1109/ISCAIE.2014.7010232","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010232","url":null,"abstract":"Wireless Sensor Network (WSN) has led to a new paradigm of Internet of Things (IoT). WSNs are usually deployed for a particular application. However, the demand of WSNs in Smart Home and Ambient Assisted Living (SHAAL) is the accumulation and allocation of multiple resources providing diverse services and applications. Virtualization of a sensor network is an emerging technique that permits aggregation of several independent heterogeneous sensor networks. The technique of virtualization poses overhead challenges like more processing and power consumption. In this paper efforts have been put forward by proposing an energy aware middleware framework that resides on the sensor nodes to achieve network virtualization for SHAAL.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124756166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Azhar, S. S. Shariffudin, I. H. Affendi, S. H. Herman, M. Rusop
{"title":"Electrical properties of tetrapod zinc oxide thin films deposited by thermal-CVD method","authors":"N. Azhar, S. S. Shariffudin, I. H. Affendi, S. H. Herman, M. Rusop","doi":"10.1109/ISCAIE.2014.7010218","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010218","url":null,"abstract":"Zinc oxide (ZnO) thin films were deposited by thermal chemical vapor deposition (TCVD) method. Gold (Au) metal was used as a catalyst to improve the growth of tetrapod ZnO structures. In this study, the substrates were deposited at 750°C to 800°C to study the temperature effect of tetrapod ZnO thin films. The surface morphology of ZnO thin films were characterized using field emission scanning electron microscope (FE-SEM). Energy dispersive X-ray (EDX) was analyzed to identify element composition of ZnO thin films. It exhibits the EDX spectrum was successful grown product which contains Zn and O only. The electrical properties were measured using 2-point probe I-V measurement. From I-V curve, the resistivity of ZnO thin films decreases, the films become more conductive as deposition temperature increased. The optical properties were measured through photoluminescence (PL) with wavelength 325 nm to 900 nm.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128690754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Z. Baig, Ehtasham Javed, Y. Ayaz, W. Afzal, S. O. Gillani, Muhammad Naveed, Mohsin Jamil
{"title":"Classification of left/right hand movement from EEG signal by intelligent algorithms","authors":"M. Z. Baig, Ehtasham Javed, Y. Ayaz, W. Afzal, S. O. Gillani, Muhammad Naveed, Mohsin Jamil","doi":"10.1109/ISCAIE.2014.7010230","DOIUrl":"https://doi.org/10.1109/ISCAIE.2014.7010230","url":null,"abstract":"Brain Computer interface (BCI) shown enormous ability to advance the human way of life. Furthermore its application is also targeting the disabled ones. In this research, we have implemented a new approach to classify EEG signals more efficiently. The dataset used for this purpose is from BCI competition-II 2003 named Graz database. Initial processing of the EEG signals has been carried out on 2 electrodes named C3 & C4; after that the bi-orthogonal wavelet coefficients, Welench Power Spectral Density estimates and the average power were used as a feature set for classification. We have given a relative study of currently used classification algorithms along with a new approach for classification i.e. Self-organizing maps (SOM) based neural network technique. It is used to classify the feature vector obtain from the EEG dataset, into their corresponding classes belong to left/right hand movements. Algorithms have been implemented on both unprocessed features and processed reduced feature sets. Principal component Analysis (PCA) has been used for feature reduction. Measured data revealed that the maximum classification accuracy of 84.17% on PCA implemented reduce feature set has been achieved using SOM based classifier. Furthermore, the classification accuracy has been increased about 2% by simply using bi-orthogonal Wavelet transform rather than Daubechies wavelet transform.","PeriodicalId":385258,"journal":{"name":"2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127415782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}