Putu Y. Kusmawan, B. Hong, Seungwoo Jeon, Jiwan Lee, Joonho Kwon
{"title":"Computing traffic congestion degree using SNS-based graph structure","authors":"Putu Y. Kusmawan, B. Hong, Seungwoo Jeon, Jiwan Lee, Joonho Kwon","doi":"10.1109/AICCSA.2014.7073226","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073226","url":null,"abstract":"Social networking site (SNS) messages can contain subjective traffic information, including congestion-related expressions such as “bad traffic” or “traffic is crazy”. Moreover, they also contain heterogeneous levels of location information, such as a point (latitude, longitude), a road, or an area name, which complicates the process of collecting related traffic information. This paper aims to use SNS messages for monitoring traffic conditions on a road by computing the traffic congestion degree. The process begins by classifying those SNS messages that are related to a road in terms of location information and constructing an initial graph structure to store each message. Because of the heterogeneous location types, we need to combine the initial graph structures based on their spatial references. We can then measure the subjective congestion by computing an expression score using our rule-based approach.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115808754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A metamodel for modeling cost behavior in service composition","authors":"Robson W. A. Medeiros, N. Rosa, L. F. Pires","doi":"10.1109/AICCSA.2014.7073183","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073183","url":null,"abstract":"During the service composition lifecycle, service costs should be predicted, controlled and reported in order to optimize resource utilization and increase profit. Several approaches have been proposed to address cost issues in some phases of the service composition lifecycle. However, each approach expresses costs in its own way, which makes it hard to integrate them into a comprehensive and automated approach that tackles cost issues throughout the service composition lifecycle. This paper addresses this problem by proposing a metamodel for expressing costs in service compositions. The proposed metamodel allows designers to express different cost behaviors and to enforce them throughout the service composition lifecycle. In addition to the metamodel, the paper also discusses the tools have been specially designed and implemented to support this metamodel. In order to evaluate the metamodel, we performed a case study in which cost results calculated with the proposed tools are compared with results obtained in a conventional way. Moreover, we describe some cost behaviors of real web service to evaluate the applicability of our metamodel.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130051460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ConceptOnto: An upper ontology based on ConceptNet","authors":"Erfan Najmi, Khayyam Hashmi, Zaki Malik, A. Rezgui, Habib Ullah Khan","doi":"10.1109/AICCSA.2014.7073222","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073222","url":null,"abstract":"The exponential growth of information has prompted the introduction of new technologies such as Semantic Web and Common Sense knowledge bases. To connect the different knowledge presentations together is a primary requirement, and ontologies are central we need for this transformation. In this paper we introduce ConceptOnto which is an ontology based on the ConceptNet knowledge base with extension of some of the other properties in some of the more acclaimed upper ontologies. Our goal in the creation of ConceptOnto is readability for humans, and maximizing the functionality while saving the generality of the ontology.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130237905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lamyae Haloui, Nisrine Dad, Noureddine Ennahnahi, S. E. Ouatik, M. Oumsis
{"title":"Improvement of fingerprint matching by describing the minutiae neighborhood using a set of Quaternion Disc-Harmonic Moments","authors":"Lamyae Haloui, Nisrine Dad, Noureddine Ennahnahi, S. E. Ouatik, M. Oumsis","doi":"10.1109/AICCSA.2014.7073209","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073209","url":null,"abstract":"we propose a hybrid method that integrates the minutiae and their local neighborhood information. This contribution can be seen as a validation step of the minutiae triplets matching performed in a recent algorithm: M3gl. We aim to improve the result of the minutiae triplets matching stage. The characterization of the neighborhood of each triplet is established by a unique feature vector. This descriptor is based on a novel set of moments: the Quaternion Disc-Harmonic Moments (QDHMs). The QDHMs were proposed as an extension of the ordinary disc-harmonic moments using the algebra of quaternions. This representation is able to distinguish minutiae having different neighborhood information. We carried several experiments using the database FVC2002 data and the results underline a significant improvement of the classical M3gl.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132746853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomaly based intrusion detection for Building Automation and Control networks","authors":"Zhiwen Pan, S. Hariri, Y. Al-Nashif","doi":"10.1109/AICCSA.2014.7073181","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073181","url":null,"abstract":"Advanced networking technology and increasing information services have led to extensive interconnection between Building Automation and Control (BAC) networks and Internet. The connection to Internet and public networks massively elevates the risk of the BAC networks being attacked. In this paper, we present a framework for a rule based anomaly detection of Building Automation and Control networks. We develop an anomaly based intrusion detection system to the building network by training the system with dataflows that are dynamically captured from the Fire Alarm System testbed using the BACnet Protocol Monitoring module. The rules acquired from the offline data mining procedure can detect attacks against the BACnet protocol with an extremely low false positive rate. We evaluate our approach by launching several attacks that exploit the generic vulnerabilities of the BACnet Protocol. A classification of detected attacks is introduced at the end.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115035874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection and classification of voice pathology using feature selection","authors":"Malak Al Mojaly, Muhammad Ghulam, M. Alsulaiman","doi":"10.1109/AICCSA.2014.7073250","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073250","url":null,"abstract":"The aim of this study is to apply automatic speech recognition (ASR) mechanism to improve the amount of information extracted from the voice and to increase the accuracy of the system by using selective highly discriminative features among different types of acoustic features. For feature extraction, we applied three techniques which are Mel Frequency Cepstral Coefficient (MFCC), Linear Prediction Cepstral Coefficients (LPCC), and RelAtive SpecTrA - Perceptual Linear Predictive (RASTA-PLP) with a number of selected coefficients from each technique by using t-test, Kruskal-Wallis test, or genetic algorithm (GA). Then for classification, either support vector machine (SVM) or Gaussian Mixture Model (GMM) is used. The experimental results on a selected MEEI subset database show that the proposed method gives high accuracies compared with some recent related methods both in detection and classification tasks. The highest accuracy of 99.9875 % with a standard deviation of 0.0263 is achieved in case of detection, and 99.8578 % with a standard deviation of 0.1657 in case of multi-class pathology classification.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116866590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A component-based framework for autonomic performance management in a distributed computing environment","authors":"R. Mehrotra, S. Abdelwahed","doi":"10.1109/AICCSA.2014.7073239","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073239","url":null,"abstract":"Distributed computing systems (DCS) host a wide variety of enterprise applications in dynamic and uncertain operating environments. These applications require stringent reliability, availability, and quality of service (QoS) guarantee to maintain their service level agreements (SLAs). Due to the growing size, increasing complexity, and varying nature of applications hosted in DCS, development of a single autonomic performance management system is difficult to maintain the SLAs of all of these applications. Therefore, a customizable autonomic performance management system is introduced in this paper, by using model-integrated computing methodologies, which allow application domain architects to develop meta-models of each system, various system modules with attributes, their connectivity, constraints, and visualization aspects. Then, domain engineers can define the initial settings of the application, QoS objectives, system components' placement, and interaction among these components in a graphical domain specific modeling environment. This configurable performance management system facilitates reusability of the same components, algorithms, and application performance models in different deployment settings.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117034046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using metrics and cluster analysis for analyzing learner video viewing behaviours in educational videos","authors":"A. Kleftodimos, Georgios Evangelidis","doi":"10.1109/AICCSA.2014.7073210","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073210","url":null,"abstract":"On line video is a powerful tool for e-learning and this is evident from a number of reports, research papers and university initiatives, which portray that online video is becoming an important medium for delivering educational content. Therefore, research that focuses on how students view educational videos becomes of particular interest and in previous work we argued that in order to efficiently analyze learner viewing behavior we should deploy tools that log the learner activity and assist usage analysis and data mining. Working towards this direction, a framework for recording and analyzing learner behavior was presented together with findings of applying the framework into educational settings. In this paper, we continue this work by presenting a set of metrics that can be derived from the framework and be used to measure learner engagement and video popularity. These metrics in conjunction with the data mining method of clustering are then used to gain insights into learner viewing behavior.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116136298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using codebooks generated from text skeletonization for forensic writer identification","authors":"S. Al-Maadeed, A. Hassaïne, A. Bouridane","doi":"10.1109/AICCSA.2014.7073272","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073272","url":null,"abstract":"In this paper, we propose a novel approach for writer identification using codebook generation based on text skeletonization.Unlike other schemes, the skeleton in this approach is segmented at its junction pixels into elementary graphic units called graphemes. The codebook is generated by clustering the graphemes according to their distributions into a predefined grid. This method has been evaluated using the benchmarking dataset of the International Conference on Document Analysis and Recognition (ICDAR 2011) writer identification contest and has shown promising results. We also studied the effect of the amount of handwriting on the identification accuracy of the method and demonstrated that the proposed method is valid for Latin and Greek languages.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129590031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A K-based language for Design Patterns","authors":"Halima Douibi, Sahar Smaali, F. Belala","doi":"10.1109/AICCSA.2014.7073256","DOIUrl":"https://doi.org/10.1109/AICCSA.2014.7073256","url":null,"abstract":"Today, Design Patterns play a cornerstone role in the development of complex software applications. Although several notations have been proposed to specify them, the kind of formal and tool support they provide is quite limited. In this paper we explore the use of Maude as a formal notation for describing design patterns and reasoning about them. The key to the defined approach is to use a meta model notation, according to MDA approach, and a Maude semantic basis (using the K-framework), for specifying both structural and dynamic aspects of design patterns. In particular, we show how we exploit our combined models approach for reasoning on design pattern inherent operations, such as composition, instantiation, etc.","PeriodicalId":412749,"journal":{"name":"2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130643541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}