2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)最新文献

筛选
英文 中文
Enhanced and effective parallel optical flow method for vehicle detection and tracking 改进的、有效的平行光流车辆检测与跟踪方法
2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC) Pub Date : 2015-05-19 DOI: 10.1109/ISMSC.2015.7594042
Prem Kumar Bhaskar, S. Yong, L. T. Jung
{"title":"Enhanced and effective parallel optical flow method for vehicle detection and tracking","authors":"Prem Kumar Bhaskar, S. Yong, L. T. Jung","doi":"10.1109/ISMSC.2015.7594042","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594042","url":null,"abstract":"In the area of traffic flow monitoring, planning and controlling, a video based traffic detection and tracking plays an effective and significant role where effective traffic management and safety is the main concern. The goal of the project is to recognize moving vehicles and track them throughout their life spans. In this paper, we discuss and address the issue of detecting vehicle/traffic data from video frames with increased real time video processing. Although various researches have been done in this area and many methods have been implemented, still this area has room for improvements. With a view to do improvements, it is proposed to develop an unique algorithm for vehicle data recognition and tracking using Parallel Optical Flow method based on Lucas-Kanade algorithm. Here, Motion detection is determined by temporal differencing and template matching is done only on the locations as guided by the motion detection stage to provide a robust target-tracking method. The foreground optical flow detector detects the object and a binary computation is done to define rectangular regions around every detected object. To detect the moving object correctly and to remove the noise some morphological operations have been applied. Then the final counting is done by tracking the detected objects and their regions in a real time sequence. Results show no false object recognition in some tested frames, perfect tracking for the detected images and 98% tracked rate on the real video with an enhanced real time video processing.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130012594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Assessing cognitive enhancements in introductory programming through online collaborative learning system 通过在线协作学习系统评估入门编程的认知增强
2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC) Pub Date : 2015-05-19 DOI: 10.1109/ISMSC.2015.7594019
M. Othman, Nurzaid Muhd Zain, Umi Hanim Mazlan, Raihana Zainordin
{"title":"Assessing cognitive enhancements in introductory programming through online collaborative learning system","authors":"M. Othman, Nurzaid Muhd Zain, Umi Hanim Mazlan, Raihana Zainordin","doi":"10.1109/ISMSC.2015.7594019","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594019","url":null,"abstract":"The objectives of this study are i) to assess the students' cognitive enhancements, specifically in logical thinking skills in introductory programming via Online Collaborative Learning System (OCLS) and ii) to identify the students' cognitive levels in their early stage in learning programming via online platform. To achieve this, forty Diploma in Computer Science students from Universiti Teknologi MARA (UiTM), Perlis, Malaysia have taken part in this study, where they were asked to take pre and post-tests of logical thinking using the online Group Assessment Logical Thinking (GALT) test. Ten collaborative groups were then formed based from the pre-test results where they need to collaborate online in order to solve programming questions that have been constructed based on Bloom's Taxonomy Cognitive domain via OCLS. OCLS was used as the technology mediator to stimulate group collaboration, discussion and problem-solving activities, thus acted as intervention mechanism in helping to enhance the students' logical thinking skills. The results have shown positive cognitive enhancements with paired samples t-test analysis were significant at p-value<;0.05 for both individuals and groups' logical thinking skills. Meanwhile, the cognitive levels identified for the beginners in programming are the Application and Analysis.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128367836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mathematical models for network card simulation and their empirical validations 网卡仿真的数学模型及其经验验证
2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC) Pub Date : 2015-05-19 DOI: 10.1109/ISMSC.2015.7594029
O. Nurika, M. Hassan, N. Zakaria, L. T. Jung
{"title":"Mathematical models for network card simulation and their empirical validations","authors":"O. Nurika, M. Hassan, N. Zakaria, L. T. Jung","doi":"10.1109/ISMSC.2015.7594029","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594029","url":null,"abstract":"Network simulations mostly focus on protocol observation, development, and prediction. However, newly developed protocol will take time to become standard and be implemented on network devices. A faster way of network improvement is to optimize existing network card parameters, because they are generic and protocol-independent. In this paper, we propose mathematical models to represent network card parameters, thus their optimal configuration can be predicted, which then will accelerate the reduced network speed caused by unoptimized network hardware. The simulation gaps that we fulfill are the inclusion of transmission size, packet polling based on timer, and packet polling based on watermark or packet capture threshold. The results generated and their validations show the accuracy of our models.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114913395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SVM for network anomaly detection using ACO feature subset 基于蚁群算法的SVM网络异常检测
2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC) Pub Date : 2015-05-19 DOI: 10.1109/ISMSC.2015.7594039
T. Mehmood, H. Rais
{"title":"SVM for network anomaly detection using ACO feature subset","authors":"T. Mehmood, H. Rais","doi":"10.1109/ISMSC.2015.7594039","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594039","url":null,"abstract":"Over the past short time, network security facing a lot of challenges. Confidentiality, integrity, and availability are the major concerns of the data. To cope with this problem different systems have been developed and the systems are known as Intrusion detection systems. Intrusion detection system detects the violation of confidentiality, integrity, and availability of the data. Intrusion detection systems are developed on the bases of two different detection techniques, signature-based technique and anomaly-based technique. Classification approach has been widely adopted for the development of the anomaly detection model to classify the data into normal class and attack class. But irrelevant and redundant features are the obstacle for classification algorithm to build an efficient detection model. This paper proposes a detection model, ant system with support vector machine, which uses ant system, a variation of ant colony optimization, to filter out the redundant and irrelevant features for support vector machine classification algorithm. KDD99, which is a benchmark dataset used for anomaly detection, has been adopted here. Each instance in KDD99 has been represented by 41 features which also has some redundant or irrelevant features. Ant system has been used to remove those redundant and irrelevant features. The selected feature subset using ant system is then validated using support vector machine. The experimental results showed that the performance of the classification algorithm, when trained with the reduced feature set, has been improved. The performance measures used in this comparison are true positive rate, false positive rate, and precision.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124182608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
An evaluation of public cloud adoption for higher education: A case study from Pakistan 高等教育采用公共云的评估:来自巴基斯坦的案例研究
2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC) Pub Date : 2015-05-19 DOI: 10.1109/ISMSC.2015.7594054
S. Riaz, Jan Muhammad
{"title":"An evaluation of public cloud adoption for higher education: A case study from Pakistan","authors":"S. Riaz, Jan Muhammad","doi":"10.1109/ISMSC.2015.7594054","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594054","url":null,"abstract":"There has been a global change of perception about right to education over the past few decades. Information and Communication Technologies (ICT) are one of such advanced means to access educational material and resources anywhere/anytime in the world. Invention of cloud computing technology has opened many options for organizations and individual to share the educational resources among students. By adopting cloud computing organizations can save various recurring costs such as ICT hardware/software, licensing, storage space, backups, maintenance and human resources. Cloud computing enables teachers and students to access and approach the academic material ubiquitously through portable appliances (smart phones, tablets, IPAD's etc.). There are numerous public cloud applications (offerings) available for accessing educational resources in urban as well as rural vicinity. The Usability evaluation of these cloud-based services in a particular academic atmosphere is significant prior to their adoption. Moreover, this enables the stakeholders to make better decisions to adopt these contemporary services. In this paper we present the usability evaluation of public cloud applications across three universities in Pakistan from stakeholders' perspective i.e. (teachers and students). Our experimental results show that there is lack of awareness on using cloud-based services for accessing educational resources.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"586 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122694050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Lorenz time-series analysis using a scaled hybrid model 使用比例混合模型的洛伦兹时间序列分析
2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC) Pub Date : 2015-05-19 DOI: 10.1109/ISMSC.2015.7594082
S. J. Abdulkadir, S. Yong
{"title":"Lorenz time-series analysis using a scaled hybrid model","authors":"S. J. Abdulkadir, S. Yong","doi":"10.1109/ISMSC.2015.7594082","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594082","url":null,"abstract":"Lorenz time-series is characterized by non-linearity, noise, volatility and is chaotic in nature thus making the process of forecasting cumbersome. The main aim of forecasters is to apply an approach that focuses on improving accuracy in both one-step and multi-step-ahead forecasts. This paper presents an empirical analysis of Lorenz time-series using Scaled UKF-NARX hybrid model to perform one-step and multi-step-ahead forecasts. The proposed hybrid model is trained using Bayesian regulation algorithm. The experimental results based on two forecatingg erorr metrics, normalized mean squared error (NMSE) and root mean square error (RMSE) shows that proposed hybrid model provides better multi-step-ahead forecasts whilst addressing the issue of long term dependencies.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130067399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Role of academia to make current practices of software project risk management more effective: An exploratory study 学术界在使当前软件项目风险管理实践更有效中的作用:一项探索性研究
2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC) Pub Date : 2015-05-19 DOI: 10.1109/ISMSC.2015.7594065
U. Janjua, J. Jaafar
{"title":"Role of academia to make current practices of software project risk management more effective: An exploratory study","authors":"U. Janjua, J. Jaafar","doi":"10.1109/ISMSC.2015.7594065","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594065","url":null,"abstract":"For a decade or so, academic researchers and practitioners working in the field of software engineering have realized that in order to decrease the failure rate of software project development there is a need to make current practices of risk management more effective. The objective of this study is to explore how academia can play a significant role in making the current practices of software project risk management more effective. To achieve the objective fourteen experts in six different countries were selected to participate in this study. Following the qualitative analysis of open ended questionnaire that the authors undertook, five main related categories have been identified that shape up the role of academia in making current practices of risk management more effective.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"518 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116240377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Numerical simulation of undular bore evolution with Chezy friction 带有切齐摩擦的波状内孔演变的数值模拟
2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC) Pub Date : 2015-05-19 DOI: 10.1109/ISMSC.2015.7594090
W. Tiong, K. Chiew, K. Tay, C. T. Ong
{"title":"Numerical simulation of undular bore evolution with Chezy friction","authors":"W. Tiong, K. Chiew, K. Tay, C. T. Ong","doi":"10.1109/ISMSC.2015.7594090","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594090","url":null,"abstract":"This paper studies and simulates numerically the evolution of undular bore under the effect of damping in the framework of the perturbed extended Korteweg-de Vries equation. Here, we consider Chezy frictional term to be the damping term in the perturbed extended Korteweg-de Vries equation. Numerical simulations show that under the influence of the friction, the undular bore with thick leading wave will transform into KdV-like solitary wave as the leading wave of the undular bore. The amplitude of the “thick” leading wave will remain the same for some time even though there is dissipation effect.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130694465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Open source seismic visualization package on OpenNebula cloud management system OpenNebula云管理系统上的开源地震可视化包
2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC) Pub Date : 2015-05-19 DOI: 10.1109/ISMSC.2015.7594048
F. M. Zain, I. Aziz, N. Haron, A. Ramadhani, M. Mehat
{"title":"Open source seismic visualization package on OpenNebula cloud management system","authors":"F. M. Zain, I. Aziz, N. Haron, A. Ramadhani, M. Mehat","doi":"10.1109/ISMSC.2015.7594048","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594048","url":null,"abstract":"Currently, the exploration of oil and gas have become more complex due to the oil depletion. The increasing difficulties in discovering new hydrocarbon reservoirs using existing technologies have caused an exceptional rise in the cost and risk to discover hydrocarbons. Seismic interpretation is one of the main element in oil exploration. Seismic interpretation software is vital to assist geophysicists to find hydrocarbons trap. However, specialized commercial seismic visualization package is highly priced. Hence, open source seismic visualization package is introduced as an alternative to minimize the cost in oil exploration. The goal of this research is to demonstrate through comparative study of computing functionalities between two different types of open source seismic visualization packages in order to find a preferable one to integrate in cloud infrastructure, OpenNebula cloud. This paper addresses how the author chooses OpendTect over ParaViewGeo as the preferable open source seismic visualization packages by comparing the functionality of the software packages. In addition, a research study on OpenNebula also has been done to understand the working principle of this cloud management system. Furthermore, an experiment has been conducted to test whether or not the preferable open source seismic visualization package is able to be integrated correctly in OpenNebula cloud with high scalability and good performance.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132095767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hiding of compressed bit stream into audio file to enhance the confidentiality and portability of a data transmission system 将压缩的比特流隐藏到音频文件中,以提高数据传输系统的保密性和可移植性
2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC) Pub Date : 2015-05-19 DOI: 10.1109/ISMSC.2015.7594052
Shiladitya Bhattacharjee, Lukman Bin Ab Rahim, Izatdin B. A. Aziz
{"title":"Hiding of compressed bit stream into audio file to enhance the confidentiality and portability of a data transmission system","authors":"Shiladitya Bhattacharjee, Lukman Bin Ab Rahim, Izatdin B. A. Aziz","doi":"10.1109/ISMSC.2015.7594052","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594052","url":null,"abstract":"Data security is always an important aspect of any data transmission system. With the advancement of internet, various security threats and challenges are also becoming more powerful. However, among the various security challenges in any transmission system, confidentiality, portability, and data losses are most important concern. Therefore, to solve these issues, we have proposed a lossless fixed length coding based compression to reduce the file size and to increase portability of transmitted data. To enhance confidentiality and reduce data loss, the compressed bit stream is incorporated with in the audio file using a unique audio steganography. Efficiencies of the proposed technique are examined by experimented results and compared with other existing to show its effectiveness.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132619831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信