{"title":"A novel approach to the design and implementation of mutation operators for object-oriented programming language","authors":"Qianqian Wang, H. Haga","doi":"10.1109/WICT.2014.7077310","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077310","url":null,"abstract":"Software testing allows programmers to determine and guarantee the quality of software system. It is one of the essential activities in software development process. Mutation analysis is a branch of software testing. It is classified as a fault-based software testing technology. Unlike other software testing technologies, mutation analysis assesses the quality of software test cases and therefore improves the efficiency of software testing by measuring and improving the quality of test cases set. Mutation analysis works by generating mutants, which describe the faults that may occur in the software programs, from original program. Mutants are generated by applying mutation operators on original software program. Mutation operator is a rule that specifies the syntactic variations of strings. There have been several works about mutation analysis support system for conventional languages such as C and FORTRAN. However, there are a few for object-oriented languages such as C++ and Java. This article aims to propose a novel approach to design and implement mutation operators for object-oriented programming language. The essential idea of proposed method is the usage of JavaML language as the intermediate representation to implement mutation operators: it first converts the original program into JavaML document; then implements mutation operator for JavaML document and gets the mutated JavaML document with the help of DOM - a tool to process JavaML document; finally it converts the mutated JavaML document into mutant program.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"613 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124627316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of cognitive mapping algorithm for mobile robot navigation system","authors":"A. R. Ismail, Recky Desia, M. R. Zuhri, R. Daniel","doi":"10.1109/WICT.2014.7077279","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077279","url":null,"abstract":"Mobile robot navigation has become as a challenging problem over the last few decades. Despite the significant advances in this field, mobile robot researchers have yet to reach a comfortable level of satisfaction and yet still finding an improved algorithm for robot's navigation. In this paper, we proposed investigate the cognitive mapping algorithm that is been implemented to the mobile robot. This mobile robot will be given some inputs which are horizontal and vertical value and start and goal point and a task which is to move from start point to goal point. Some obstacles are also located in the arena and the mobile robot must be able to avoid any given obstacles to reach the goal point. The performance of the cognitive mapping algorithm is compared with an edge follower navigation algorithm, which is an algorithm for a mobile robot to navigate by following the edges or the wall. Based on the experiments that have been performed the cognitive mapping algorithm can be an alternative way for the robot's navigation systems.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125281085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved deep learning-based approach for sentiment mining","authors":"N. Sharef, M. Y. Shafazand","doi":"10.1109/WICT.2014.7077291","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077291","url":null,"abstract":"The sentiment mining approaches can typically be divided into lexicon and machine learning approaches. Recently there are an increasing number of approaches which combine both to improve the performance when used separately. However, this still lacks contextual understanding which led to the introduction of deep learning approaches which allows for semantic compositionality over a sentiment treebank. This paper enhances the deep learning approach with semantic lexicon so that scores can be computed in-stead merely nominal classification. Besides, neutral classification is also improved. Results suggest that the approach outperforms its original.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126233312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Homenda, A. Jastrzębska, W. Pedrycz, Radosław Piliszek
{"title":"Classification with a limited space of features: Improving quality by rejecting misclassifications","authors":"W. Homenda, A. Jastrzębska, W. Pedrycz, Radosław Piliszek","doi":"10.1109/WICT.2014.7077322","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077322","url":null,"abstract":"Classification, especially in the case of a small space of features, is prone to errors. This is more important when it is costly to gain data from samples to calculate the values for futures. We study what effect limiting the space of features has on the performance of built classifiers and how the quality of classification can be improved by rejecting misclassified elements.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129455861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A prototype of event-based tracking system for mobile users","authors":"W. Wibisono, T. Ahmad, R. Ijtihadie, A. Hilman","doi":"10.1109/WICT.2014.7076907","DOIUrl":"https://doi.org/10.1109/WICT.2014.7076907","url":null,"abstract":"This paper describes prototype development of event-based tracking for mobile users. Nowadays, queries about location and activities are the most common question people send to other people in their social connections. This phenomenon has highlighted the need to provide a service to monitor positions and physical activities of multiple users. There are several challenges that need to be dealt with when developing the service of tracking system. In this paper a framework that facilitates service to monitor location and user physical activities is developed. A mechanism to reduce periodic update of position and sensor data for activity recognition is proposed for the mobile side. It is done by estimating degree of temporal sensor data changes as the trigger for the updating process. In the server a simple yet robust classification algorithm is applied and the accuracy of activity recognition is also evaluated. The framework prototype has also been implemented in real scenarios. The results of experiments show a promising results with 95% recognition rate for cycling activities and 80% for both walking and running activities.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134224589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A proposed taxonomy of assets for information security risk assessment (ISRA)","authors":"Palaniappan Shamala, R. Ahmad","doi":"10.1109/WICT.2014.7077297","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077297","url":null,"abstract":"Information security has become a vital entity because organizations across the globe conduct business in an interconnected and information rich environment. Hence, organizations wanting to eliminate the possible risks in their organizations by conducting information security risk assessment (ISRA). By means of this ISRA, organizations are able to identify and prioritize information assets and ensure that effective control mechanisms are utilized for high-priority information assets. However, current ISRA methods have critical limitations in that they adopt merely a technical perspective. Currently available ISRA methods function in a limited view of information assets. The aim of this paper is to propose a taxonomy of assets for ISRA. The presented taxonomy of assets is not only able to guide ISRA practitioners to examine which assets are most important to the organization in the early process of doing risk assessment but also enables them to collect all the needed information associated with assets before and during their actual ISRA implementation. A structured approach was carried out using Webster & Watson guidelines for determining the source material for the review. The result shows the limitation on identifying information assets issue which have been discussed separately by various researchers but none of the researchers have combines all the human related non-technical perspective assets together under on frame as the taxonomy of assets for ISRA.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127083702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Bakri, Rosalan Ali, S. Ismail, F. Sufian, A. H. Baharom
{"title":"Pre and post subprime mortgage crisis: An empirical analysis in Malaysia","authors":"M. Bakri, Rosalan Ali, S. Ismail, F. Sufian, A. H. Baharom","doi":"10.1109/WICT.2014.7077308","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077308","url":null,"abstract":"In view of the vast developments that have occurred in financial markets since the introduction of the asset securitization in 1986, it recognizes the importance of developing a comprehensive capital framework for asset securitization, including both traditional forms and synthetic forms of securitization. This research aims to examine the determinant primary market spread. Least square method and regression analysis are applied for the study period 2004–2012. The result shows one determinants in internal regression model influence or contribute to the primary market spread and are statistically significant in developing the securitization in Malaysia. It can be concluded that maturity significantly contribute to the determinant primary market spread in internal regression model and debt and crisis significant in external regression model.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123973130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Omid Seifaddini, A. Abdullah, M. Hussin, A. Muhammed
{"title":"Performance assessment of mobile computation offloading","authors":"Omid Seifaddini, A. Abdullah, M. Hussin, A. Muhammed","doi":"10.1109/WICT.2014.7077316","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077316","url":null,"abstract":"Offloading is a technique that resource poor mobile devices try to alleviate the resource constrained by migrating partial or full heavy computation part of mobile application to the more resourceful platforms such as cloud computing. This paper presents an analysis and overview of cloud based mobile computation offloading performance based on the current Internet infrastructure and backbone in Malaysia specifically in Peninsular Malaysia, Serdang area. The experimental results show that the current developing infrastructure and backbone need to be more enhanced in order to support mobile offloading.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114395480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Training intelligent agents using LCSs in the Three-Cornered Coevolution System","authors":"S. Marzukhi","doi":"10.1109/WICT.2014.7076902","DOIUrl":"https://doi.org/10.1109/WICT.2014.7076902","url":null,"abstract":"In existing pattern classification systems, humans usually play a major role in creating and controlling the problem domain. In particular, humans set-up and tune the problem's difficulty. A motivation of the work is to design and develop a system that can generate various sets of exemplars to be learned from and perform the classification tasks autonomously. The system be able to automatically adjust the problem's difficulty based on the learners' ability to learn. This paper introduces the Three-Cornered Coevolution System, a real implementation of the Three-Cornered Coevolution Framework proposed by Wilson, that had not been implemented previously. The system consists of three different agents that evolve to adapt with and drive the changes of the problem. Experiments show that the realised system is capable of autonomously generating various problems and triggering learning through coevolutionary process autonomously.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129228007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A bee colony optimization with automated parameter tuning for sequential ordering problem","authors":"Moon Hong Wun, L. Wong, A. Khader, T. Tan","doi":"10.1109/WICT.2014.7077286","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077286","url":null,"abstract":"Sequential Ordering Problem (SOP) is a type of Combinatorial Optimization Problem (COP). Solving SOP requires finding a feasible Hamiltonian path with minimum cost without violating the precedence constraints. SOP models myriad of real world industrial applications, particularly in the fields of transportation, vehicle routing and production planning. The main objective of this research is to propose an idea of solving SOP using the Bee Colony Optimization (BCO) algorithm. The underlying mechanism of the BCO algorithm is the bee foraging behavior in a typical bee colony. Throughout the research, the SOP benchmark problems from TSPLIB will be chosen as the testbed to evaluate the performance of the BCO algorithm in terms of the solution cost and the computational time needed to obtain an optimum solution. Moreover, efforts are taken to investigate the feasibility of using the Genetic Algorithm to optimally tune the parameters equipped in the existing BCO model. On average, over the selected 40 benchmark problems, the proposed method has successfully solved 9 (22.5%) benchmark problems to optimum, 17 (42.5%) benchmark problems ≤ 1% of deviation from the known optimum, and 37 (85%) benchmark problems ≤ 5% of deviation from the known optimum. Overall, the 40 benchmark problems are solved to 2.19% from the known optimum on average.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130474388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}