A. F. Thaha, Manvir Singh, A. Amin, N. M. Ahmad, Subarmaniam Kannan
{"title":"Hadoop in OpenStack: Data-location-aware cluster provisioning","authors":"A. F. Thaha, Manvir Singh, A. Amin, N. M. Ahmad, Subarmaniam Kannan","doi":"10.1109/WICT.2014.7077282","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077282","url":null,"abstract":"Nowadays, cloud based analytics platforms are replacing traditional physical clusters due to the high efficiency it provides. Such cloud platforms runs Hadoop on virtual clusters with remotely attached storage. In cloud architecture with multiple geographically separated regions, virtual machines (VMs) belonging to a virtual cluster are placed randomly. In order to run MapReduce jobs, data have to be moved to the regions where the VMs reside to achieve data locality. In this paper, we propose a data-location aware virtual cluster provisioning strategy to identify the data location and provision the cluster near to the storage. The use of bio-inspired optimization algorithms are considered for optimizing the placements of VMs. Data location aware cluster provisioning reduces the network distance between storage and the virtual cluster, resulting in faster job completion times.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121307459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic abstraction of class diagram using logical approach","authors":"Nuraini Abdulganiyyi, N. Ibrahim","doi":"10.1109/WICT.2014.7077274","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077274","url":null,"abstract":"Unified Modeling Language (UML) is the most famous modeling language use for software design in software development industries with the class diagram being the most use diagram by UML practitioners. As software development progress, the UML model became complicated. Thus, difficult for human being to trace back previously known relationship(s) between classes of the previous class diagram(s) in the present complex class diagram. Tracing back previous relationship(s) is accomplished by abstracting relationships among three related classes to semantic equivalent relationship between two of the classes. Abstracting class diagram aid in checking consistency, reverse engineering and facilitate model understanding. This article presented abstraction rules of a class diagram using a logical approach. The result was evaluated using a case study of hotel management system, and the rules were found to be reliable and useful.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131351104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liew Tze Hui, Housam Khalifa Bashier, L. S. Hoe, Wee Kuok Kwee, Mohd Fikri Azli Abdullah
{"title":"Sequential graphical password framework for mobile devices","authors":"Liew Tze Hui, Housam Khalifa Bashier, L. S. Hoe, Wee Kuok Kwee, Mohd Fikri Azli Abdullah","doi":"10.1109/WICT.2014.7076904","DOIUrl":"https://doi.org/10.1109/WICT.2014.7076904","url":null,"abstract":"Nowadays, computer systems are very essential for human daily life for its ability to store and retrieve data in a more meaningful way. Thus, the data stored in computer system contains a very critical and important information and therefore, there's a critical needs to put more effort in handling of such data. Based on the traditional method, the most popular authentication way for computer security is using alphanumeric password. However, this type of authentication method come with few drawbacks. In recent years, many new methods have been developed by researchers to overcome the limitation of the password authentication, and one of the most popular method is known as graphical password, which utilizes picture as password instead of the alphanumeric string. Hence, this paper propose a new graphical password framework and method to be used in mobile-platform. Finally, the experiments results demonstrated the effectiveness of the proposed solution.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132710004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohd Hafeez Osman, M. Chaudron, P. van der Putten, Truong Ho-Quang
{"title":"Condensing reverse engineered class diagrams through class name based abstraction","authors":"Mohd Hafeez Osman, M. Chaudron, P. van der Putten, Truong Ho-Quang","doi":"10.1109/WICT.2014.7077321","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077321","url":null,"abstract":"In this paper, we report on a machine learning approach to condensing class diagrams. The goal of the algorithm is to learn to identify what classes are most relevant to include in the diagram, as opposed to full reverse engineering of all classes. This paper focuses on building a classifier that is based on the names of classes in addition to design metrics, and we compare to earlier work that is based on design metrics only. We assess our condensation method by comparing our condensed class diagrams to class diagrams that were made during the original forward design. Our results show that combining text metrics with design metrics leads to modest improvements over using design metrics only. On average, the improvement reaches 5.3%. 7 out of 10 evaluated case studies show improvement ranges from 1% to 22%.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115019662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Graph Neuron based approach to smart roads solutions using wireless sensor networks","authors":"Victor Welikhe, Jayakumar Vaidhyashankar, A. Amin","doi":"10.1109/WICT.2014.7077278","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077278","url":null,"abstract":"The ability for the network to effectively differentiate between event and non-event is instrumental in the classification process. Graph Neuron employs an associative memory, network-centric technique that provides for instantaneous recall/recognizing of patterns and high levels of scalability. Implementations of Graph Neuron (GN) for the purposes of event detection in wireless sensor networks (WSN) used in transportation systems has not thoroughly been explored. This paper aims to discuss the possible implementations of the GN algorithm in a WSN for a road safety traffic support system being deployed at black-spots with a high likelihood of motor accidents.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131854354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Bakar, F. Shahbodin, Nur Amalina Maria Mohd Hatta
{"title":"The effectiveness of 3D approach in development of 3D-Atomic Cubic courseware","authors":"N. Bakar, F. Shahbodin, Nur Amalina Maria Mohd Hatta","doi":"10.1109/WICT.2014.7077294","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077294","url":null,"abstract":"This research is about the development of the 3D courseware named as 3D-Atomic Cubic as a tool for teaching and learning chemistry subject. This 3D-Atomic Cubic courseware will contain all multimedia elements used to attract students' attention for learning the contents. This courseware is specifically developed for a topic in chemistry subject for student of Mechanical Engineering in Universiti Teknikal Malaysia Melaka (UTeM). The questionnaire is the instrument used in this research to determine the problem statement. Based on the questionnaires, Properties of Matter topic is identify as the most difficult topic. Because of this topic need students to visualizing the arrangement of the atom in cubic cell, one of their problems facing when learning this topic is, student cannot imagine the arrangement of the atom easily. This research is focusing on delivery approach of learning by using three dimensional (3D) approaches in study Chemistry subject. Advantages from this research can be benefits to students, lecturers, education industry and high institution and also to the public. For evaluation on the effectiveness of 3D-Atomic Cubic Courseware, 52 of Mechanical Engineering students from UTeM is involved and they are divided by two which are Conventional and Experimental Group. From the analysis of the result, both of conventional and experiment group showed an improvement but the student who use 3D-Atomic Cubic courseware get higher mark. This shows that 3D-Atomic Cubic courseware can be used as teaching aid material in classroom since it shows those students who use the courseware get better result.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116701399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bee inspired QoS routing in VANET","authors":"L. T. Jung, A. Mu'azu","doi":"10.1109/WICT.2014.7077323","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077323","url":null,"abstract":"A bee communications inspired QoS routing scheme is proposed in this paper primarily to improve the network throughput and to reduce packet loss in vehicular ad hoc network (VANET) environment. The proposed scheme is inspired by the natural bee communications paradigm. The mobile agent concept is adopted from the bees' mobility behavior for network traffic information exchange among the VANET nodes aiming for a quality transmission of data packets. This is accomplished by calculating the corresponding QoS provision values based on certain QoS metrics threshold to determine a reliable and stable route between a source (beehive) and the destination (food source) node. The proposed scheme shows a better performance as compared to the AODV and DSR protocols in terms of packet loss and network throughput.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126441573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Geometry based hybrid method for determining lesion area","authors":"F. Ahmad, Ahmad Airuddin","doi":"10.1109/WICT.2014.7077273","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077273","url":null,"abstract":"In this paper, a hybrid method to measure lesion area on the green leaf surface is presented. The method involved combining two algorithms, Artificial Bee Colony and Otsu algorithm and applying geometry to obtain the area. Three leaf images were used that contains leaf lesions of different sizes: small, medium and big. The method was conducted in three phases, data preparation, algorithm construction and analysis. Comparison was made with pixel counting, and real measurement. The results show that the proposed hybrid method achieved results more accurate (average accuracy 92.03%) and faster (average time processing 0.015 milliseconds) than the pixel counting method.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129832598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An interval type-2 fuzzy system with hybrid intelligent learning","authors":"P. Meesad","doi":"10.1109/WICT.2014.7077276","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077276","url":null,"abstract":"In this paper, an alternative approach for automatically generation of interval type-2 fuzzy inference systems is proposed. The proposed method comprises of two phases: 1) Structure initialization and parameters fine tuning. In the first phase, a one-pass clustering method is carried out to find both a suitable number of rules and a suitable number of fuzzy sets of each variable in which inputs and targets are used as training data. In the second phase, the genetic algorithm is then employed to fine tune the membership function parameters to increase the performance of the system. The evaluation of the proposed method is then conducted for pattern classification. The results show satisfactory achievement in pattern classification applications and comparable to existing techniques.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121509123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Channel agnostic healthcare","authors":"R. Alberts, A. Botha, Thomas Fogwill","doi":"10.1109/WICT.2014.7077280","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077280","url":null,"abstract":"Mobile technologies have become a social reality in large parts of the developing world in general and in Africa especially. The large scale connected representativeness of access to and often ownership of mobile devices opens many doors to innovative, far reaching mobile-based applications and services. This near ubiquitous access, however, is characterized by an entirely new set of challenges as different legacy devices and cutting edge smartphones make up a cornucopia of end user realities. In order to reach as many end users as possible through the devices that they already own and are comfortable with, channel agnostic access is needed that would support the different mobile access channels using a variety of communications protocols. This paper outlines the various technical and operational considerations associated with the conceptualization of a middleware platform for mobile enablement and its application in the health environment as a mobile health monitoring system for community health workers.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134224682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}