{"title":"Enhanced and effective parallel optical flow method for vehicle detection and tracking","authors":"Prem Kumar Bhaskar, S. Yong, L. T. Jung","doi":"10.1109/ISMSC.2015.7594042","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594042","url":null,"abstract":"In the area of traffic flow monitoring, planning and controlling, a video based traffic detection and tracking plays an effective and significant role where effective traffic management and safety is the main concern. The goal of the project is to recognize moving vehicles and track them throughout their life spans. In this paper, we discuss and address the issue of detecting vehicle/traffic data from video frames with increased real time video processing. Although various researches have been done in this area and many methods have been implemented, still this area has room for improvements. With a view to do improvements, it is proposed to develop an unique algorithm for vehicle data recognition and tracking using Parallel Optical Flow method based on Lucas-Kanade algorithm. Here, Motion detection is determined by temporal differencing and template matching is done only on the locations as guided by the motion detection stage to provide a robust target-tracking method. The foreground optical flow detector detects the object and a binary computation is done to define rectangular regions around every detected object. To detect the moving object correctly and to remove the noise some morphological operations have been applied. Then the final counting is done by tracking the detected objects and their regions in a real time sequence. Results show no false object recognition in some tested frames, perfect tracking for the detected images and 98% tracked rate on the real video with an enhanced real time video processing.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130012594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Othman, Nurzaid Muhd Zain, Umi Hanim Mazlan, Raihana Zainordin
{"title":"Assessing cognitive enhancements in introductory programming through online collaborative learning system","authors":"M. Othman, Nurzaid Muhd Zain, Umi Hanim Mazlan, Raihana Zainordin","doi":"10.1109/ISMSC.2015.7594019","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594019","url":null,"abstract":"The objectives of this study are i) to assess the students' cognitive enhancements, specifically in logical thinking skills in introductory programming via Online Collaborative Learning System (OCLS) and ii) to identify the students' cognitive levels in their early stage in learning programming via online platform. To achieve this, forty Diploma in Computer Science students from Universiti Teknologi MARA (UiTM), Perlis, Malaysia have taken part in this study, where they were asked to take pre and post-tests of logical thinking using the online Group Assessment Logical Thinking (GALT) test. Ten collaborative groups were then formed based from the pre-test results where they need to collaborate online in order to solve programming questions that have been constructed based on Bloom's Taxonomy Cognitive domain via OCLS. OCLS was used as the technology mediator to stimulate group collaboration, discussion and problem-solving activities, thus acted as intervention mechanism in helping to enhance the students' logical thinking skills. The results have shown positive cognitive enhancements with paired samples t-test analysis were significant at p-value<;0.05 for both individuals and groups' logical thinking skills. Meanwhile, the cognitive levels identified for the beginners in programming are the Application and Analysis.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128367836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical models for network card simulation and their empirical validations","authors":"O. Nurika, M. Hassan, N. Zakaria, L. T. Jung","doi":"10.1109/ISMSC.2015.7594029","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594029","url":null,"abstract":"Network simulations mostly focus on protocol observation, development, and prediction. However, newly developed protocol will take time to become standard and be implemented on network devices. A faster way of network improvement is to optimize existing network card parameters, because they are generic and protocol-independent. In this paper, we propose mathematical models to represent network card parameters, thus their optimal configuration can be predicted, which then will accelerate the reduced network speed caused by unoptimized network hardware. The simulation gaps that we fulfill are the inclusion of transmission size, packet polling based on timer, and packet polling based on watermark or packet capture threshold. The results generated and their validations show the accuracy of our models.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114913395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SVM for network anomaly detection using ACO feature subset","authors":"T. Mehmood, H. Rais","doi":"10.1109/ISMSC.2015.7594039","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594039","url":null,"abstract":"Over the past short time, network security facing a lot of challenges. Confidentiality, integrity, and availability are the major concerns of the data. To cope with this problem different systems have been developed and the systems are known as Intrusion detection systems. Intrusion detection system detects the violation of confidentiality, integrity, and availability of the data. Intrusion detection systems are developed on the bases of two different detection techniques, signature-based technique and anomaly-based technique. Classification approach has been widely adopted for the development of the anomaly detection model to classify the data into normal class and attack class. But irrelevant and redundant features are the obstacle for classification algorithm to build an efficient detection model. This paper proposes a detection model, ant system with support vector machine, which uses ant system, a variation of ant colony optimization, to filter out the redundant and irrelevant features for support vector machine classification algorithm. KDD99, which is a benchmark dataset used for anomaly detection, has been adopted here. Each instance in KDD99 has been represented by 41 features which also has some redundant or irrelevant features. Ant system has been used to remove those redundant and irrelevant features. The selected feature subset using ant system is then validated using support vector machine. The experimental results showed that the performance of the classification algorithm, when trained with the reduced feature set, has been improved. The performance measures used in this comparison are true positive rate, false positive rate, and precision.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124182608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An evaluation of public cloud adoption for higher education: A case study from Pakistan","authors":"S. Riaz, Jan Muhammad","doi":"10.1109/ISMSC.2015.7594054","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594054","url":null,"abstract":"There has been a global change of perception about right to education over the past few decades. Information and Communication Technologies (ICT) are one of such advanced means to access educational material and resources anywhere/anytime in the world. Invention of cloud computing technology has opened many options for organizations and individual to share the educational resources among students. By adopting cloud computing organizations can save various recurring costs such as ICT hardware/software, licensing, storage space, backups, maintenance and human resources. Cloud computing enables teachers and students to access and approach the academic material ubiquitously through portable appliances (smart phones, tablets, IPAD's etc.). There are numerous public cloud applications (offerings) available for accessing educational resources in urban as well as rural vicinity. The Usability evaluation of these cloud-based services in a particular academic atmosphere is significant prior to their adoption. Moreover, this enables the stakeholders to make better decisions to adopt these contemporary services. In this paper we present the usability evaluation of public cloud applications across three universities in Pakistan from stakeholders' perspective i.e. (teachers and students). Our experimental results show that there is lack of awareness on using cloud-based services for accessing educational resources.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"586 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122694050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lorenz time-series analysis using a scaled hybrid model","authors":"S. J. Abdulkadir, S. Yong","doi":"10.1109/ISMSC.2015.7594082","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594082","url":null,"abstract":"Lorenz time-series is characterized by non-linearity, noise, volatility and is chaotic in nature thus making the process of forecasting cumbersome. The main aim of forecasters is to apply an approach that focuses on improving accuracy in both one-step and multi-step-ahead forecasts. This paper presents an empirical analysis of Lorenz time-series using Scaled UKF-NARX hybrid model to perform one-step and multi-step-ahead forecasts. The proposed hybrid model is trained using Bayesian regulation algorithm. The experimental results based on two forecatingg erorr metrics, normalized mean squared error (NMSE) and root mean square error (RMSE) shows that proposed hybrid model provides better multi-step-ahead forecasts whilst addressing the issue of long term dependencies.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130067399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Role of academia to make current practices of software project risk management more effective: An exploratory study","authors":"U. Janjua, J. Jaafar","doi":"10.1109/ISMSC.2015.7594065","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594065","url":null,"abstract":"For a decade or so, academic researchers and practitioners working in the field of software engineering have realized that in order to decrease the failure rate of software project development there is a need to make current practices of risk management more effective. The objective of this study is to explore how academia can play a significant role in making the current practices of software project risk management more effective. To achieve the objective fourteen experts in six different countries were selected to participate in this study. Following the qualitative analysis of open ended questionnaire that the authors undertook, five main related categories have been identified that shape up the role of academia in making current practices of risk management more effective.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"518 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116240377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Numerical simulation of undular bore evolution with Chezy friction","authors":"W. Tiong, K. Chiew, K. Tay, C. T. Ong","doi":"10.1109/ISMSC.2015.7594090","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594090","url":null,"abstract":"This paper studies and simulates numerically the evolution of undular bore under the effect of damping in the framework of the perturbed extended Korteweg-de Vries equation. Here, we consider Chezy frictional term to be the damping term in the perturbed extended Korteweg-de Vries equation. Numerical simulations show that under the influence of the friction, the undular bore with thick leading wave will transform into KdV-like solitary wave as the leading wave of the undular bore. The amplitude of the “thick” leading wave will remain the same for some time even though there is dissipation effect.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130694465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. M. Zain, I. Aziz, N. Haron, A. Ramadhani, M. Mehat
{"title":"Open source seismic visualization package on OpenNebula cloud management system","authors":"F. M. Zain, I. Aziz, N. Haron, A. Ramadhani, M. Mehat","doi":"10.1109/ISMSC.2015.7594048","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594048","url":null,"abstract":"Currently, the exploration of oil and gas have become more complex due to the oil depletion. The increasing difficulties in discovering new hydrocarbon reservoirs using existing technologies have caused an exceptional rise in the cost and risk to discover hydrocarbons. Seismic interpretation is one of the main element in oil exploration. Seismic interpretation software is vital to assist geophysicists to find hydrocarbons trap. However, specialized commercial seismic visualization package is highly priced. Hence, open source seismic visualization package is introduced as an alternative to minimize the cost in oil exploration. The goal of this research is to demonstrate through comparative study of computing functionalities between two different types of open source seismic visualization packages in order to find a preferable one to integrate in cloud infrastructure, OpenNebula cloud. This paper addresses how the author chooses OpendTect over ParaViewGeo as the preferable open source seismic visualization packages by comparing the functionality of the software packages. In addition, a research study on OpenNebula also has been done to understand the working principle of this cloud management system. Furthermore, an experiment has been conducted to test whether or not the preferable open source seismic visualization package is able to be integrated correctly in OpenNebula cloud with high scalability and good performance.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132095767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shiladitya Bhattacharjee, Lukman Bin Ab Rahim, Izatdin B. A. Aziz
{"title":"Hiding of compressed bit stream into audio file to enhance the confidentiality and portability of a data transmission system","authors":"Shiladitya Bhattacharjee, Lukman Bin Ab Rahim, Izatdin B. A. Aziz","doi":"10.1109/ISMSC.2015.7594052","DOIUrl":"https://doi.org/10.1109/ISMSC.2015.7594052","url":null,"abstract":"Data security is always an important aspect of any data transmission system. With the advancement of internet, various security threats and challenges are also becoming more powerful. However, among the various security challenges in any transmission system, confidentiality, portability, and data losses are most important concern. Therefore, to solve these issues, we have proposed a lossless fixed length coding based compression to reduce the file size and to increase portability of transmitted data. To enhance confidentiality and reduce data loss, the compressed bit stream is incorporated with in the audio file using a unique audio steganography. Efficiencies of the proposed technique are examined by experimented results and compared with other existing to show its effectiveness.","PeriodicalId":407600,"journal":{"name":"2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132619831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}