A. Azni, R. Ahmad, Z. Noh, Farida Hazwani, Najwa Hayaati
{"title":"Network survivability analysis modeling approach for MANETS: A systematic review","authors":"A. Azni, R. Ahmad, Z. Noh, Farida Hazwani, Najwa Hayaati","doi":"10.1109/WICT.2014.7077305","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077305","url":null,"abstract":"Network survivability analysis modeling in MANETs was hardly an issue in the early years of wireless technology because there was no critical network system that depended on wireless technology yet. Today, network survivability analysis is an essential aspect of reliable communication especially in MANETs. Although various methods have been proposed to model network survivability analysis in MANETs, no related review has been published as to date for this topic. Thus, a comprehensive review of this body of work would be beneficial to researchers to have an overview of the current state of research trend in this area. This paper provides a systematic literature review (SLR) of the state of the art approach in modeling network survivability analysis in MANETs. We used studies from a number of relevant article sources, and our results showed the existence of twenty six articles. From this SLR we found that the existing of modeling method is focusing on individual node in which the node is treated as independent event. Furthermore, the analysis also reveals the less popular methods in modeling network survivability analysis are with statistical methods such as regression analysis and survival analysis. The implication of this study is to give a clear direction to future researchers in this area for a better and accurate analysis in measuring network survivability in MANETs.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129373700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A clustering technique using single pass clustering algorithm for search engine","authors":"Zul Indra, Norshuani Zamin, J. Jaafar","doi":"10.1109/WICT.2014.7077325","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077325","url":null,"abstract":"Internet users rely heavily on search engine to explore and find useful information buried in the websites. Up to now, the search results returned by the search engines are still far from satisfaction due to a long list of search results which in practice contains a mix of relevant and irrelevant information. The manual process of filtering the irrelevant information is daunting and time consuming. Clustering is one of the popular solutions for this cumbersome task. However, our literature studies revealed that research on document clustering for Asian languages are relatively limited as compared to English. Whilst the application of document clustering technique in search engines is commonly less available. In this research, a clustering technique for search engine using Single Pass Clustering (SPC) Algorithm is proposed. The technique is experimented on a set of Indonesian news documents to support the limited research of document clustering for Indonesian language. An experiment done on 200 Indonesian news documents has produced a number of satisfactory labelled clusters and the application of the algorithm is shown on a simulated search engine.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132829800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of improved Particle Swarm Optimization technique for thinning of concentric hexagonal array antenna","authors":"R. Bera, D. Mandal, R. Kar, S. Ghoshal","doi":"10.1109/WICT.2014.7076903","DOIUrl":"https://doi.org/10.1109/WICT.2014.7076903","url":null,"abstract":"In this paper, the optimal thinning of two-ring Concentric Hexagonal Array (CHA) of uniformly excited isotropic antennas which can generate directive beam with minimum relative Side Lobe Level (SLL) is described. The Improved Particle Swarm Optimization (IPSO) method, which represents a new approach for optimization problems in electromagnetic, is used in the optimization process. To determine an optimal set of `ON-OFF' elements that provide a radiation pattern with maximum SLL reduction, the IPSO algorithm is used. The simulation results show that the number of antenna array elements can be brought down more than 50% of total isotropic elements with simultaneous reduction in Side Lobe Level (SLL) with an approximately fixed first null beam width (FNBW). Particle Swarm Optimization (PSO), as well is also adopted to compare the results of above IPSO.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131890333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic generate examination questions system to enhance preparation of learning assessment","authors":"S. Marzukhi, Muhammad Firdaus Sulaiman","doi":"10.1109/WICT.2014.7077315","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077315","url":null,"abstract":"Assessment is an integral part of the learning process that is required in order to measure the student's performance. In general, the academic staffs (e.g. teacher, instructor and lecturer) in the learning institutions are the person who will conduct the assessment to evaluate the student's performance. Using nowadays modern computer technology it is made possible to develop a new and rich system that generates different set of examination questions from user defined requirements automatically. Therefore, a system that can facilitate of producing typo-free examination questions is required to enhance the preparation of learning assessment among the academic staffs. This paper presents Automatic Generation of Examination Questions System that automatically generates different sets of examination questions to different group of students. The system offers a great flexibility in enhancing the preparation of learning assessment where the academic staffs be able to perform their tasks faster.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130698365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. A. Bero, A. Muda, Y. Choo, N. A. Muda, S. F. Pratama
{"title":"Rotation analysis of moment invariant for 2D and 3D shape representation for molecular structure of ATS drugs","authors":"S. A. Bero, A. Muda, Y. Choo, N. A. Muda, S. F. Pratama","doi":"10.1109/WICT.2014.7077285","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077285","url":null,"abstract":"Drug abuse among the people around the world is getting serious and increase nowadays. An Amphetamine-Type Stimulant (ATS) drug is one of the popular drugs in the world. This kind of drug is a combination of two types of drugs; amphetamine and ecstasy. In this project, we are focusing on two different techniques used to compare the result between 2D and 3D ATS drug molecule. Besides that, this project is also looking for the best technique to produce 2D and 3D images. United Moment Invariant (UMI) and Hough Transform (HT) are the feature extraction methods that will be used to extract data from both 2D and 3D molecular structure of the ATS drugs. Later, the extracted data will be processed into WEKA for classification accuracies for both molecular structures. As a conclusion, the MI and the HT technique will definitely provide different results, but both techniques will perform well with the ATS molecular structure.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130324011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A compact wideband microstrip patch antenna with defected ground plane","authors":"B. Gupta, Sangeeta Nakhate, Madhu Shandilya","doi":"10.1109/WICT.2014.7077301","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077301","url":null,"abstract":"In this paper, a compact design and construction of microstrip broadband antenna is proposed. The proposed antenna has the capability of operating between 1.8GHz to 12GHz. The antenna parameter in frequency domain analysis has been investigated to show its capability as an effective radiating element. The simulation results demonstrated good broadband linear transmission performance. A prototype is developed and measurement results are well in agreement. The highest efficiency claimed 92% at 2 GHz and minimum efficiency is 70%. The measured E-plane and H-plane radiation pattern in the entire bandwidth are identical in shape and the direction of maximum radiation is normal to the patch geometry. The designed antenna has a modified ground plane with diagonal edges, L-shaped slot and parasitic patches to main patch for the design of comp act antennas. The proposed low-cost, compact-size rectangular patch antenna on 4.7cm × 3.6cm printed circuit board (FR-4) is designed.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127472232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UniMiner: Towards a unified framework for data mining","authors":"Muhammad Habib ur Rehman, C. Liew, T. Wah","doi":"10.1109/WICT.2014.7077317","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077317","url":null,"abstract":"Wearable devices and Smartphones generate huge data streams in pervasive and ubiquitous environments. Traditionally, big data systems collect all the data at a central data processing system (DPS). These data silos are further analyzed to generate approximated patterns for different application areas. This approach has one-sided utility (i.e. at big data processing end) but two main side-effects that lead towards user's dissatisfaction and extra computational costs. These effects are: (1) since all the data is being collected at central DPS, user privacy is compromised and (2) the collection of huge raw data streams, most of which could be irrelevant, at central systems needs more computational and storage resources hence increases the overall operational cost. Keeping in view these limitations, we are proposing a unified framework that balances between utility and cost of big data system with increased user satisfaction. We studied different data mining systems and proposed a new framework, named as UniMiner, to leverage data mining systems with wearable devices, smartphones, and cloud computing technologies. The gist of UniMiner is the scalability of data mining tasks from resource-constraint devices to collaborative and hybrid execution models. This scalable unified data mining approach distinguishes UniMiner from existing systems by enabling maximum data processing near data sources. Finally, we assessed the feasibility of mobile devices using six frequent pattern mining algorithms. The results show that mobile devices could be adopted as data mining platforms by tuning some additional parameters.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128652949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introducing high-consistent large data cache using active-standby failover","authors":"Kun Ma, A. Abraham","doi":"10.1109/WICT.2014.7077295","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077295","url":null,"abstract":"With the development of cloud computing, the key data of the enterprises are in centralized control. Although primary-backup and multi-primary replication are effective way to maintain consistency of the cache, it will become the bottleneck in case of big data. This paper, the bidirectional replication using active-standby failover is proposed to address this issue first. Moreover, the architecture of high-consistent large data cache is presented in detail. Finally, the disaster tolerant and data expansion methods are discussed. Our experimental evaluation on the cache shows the high effectiveness and efficiency of the proposed approaches.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131090261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature and instances selection for nearest neighbor classification via cooperative PSO","authors":"S. Ahmad","doi":"10.1109/WICT.2014.7077300","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077300","url":null,"abstract":"Data reduction is an essential task in the data preparation phase of knowledge discovery and data mining (KDD). The reduction method contains two techniques, namely features reduction and data reduction which are commonly applied to a classification problem. The solution of data reduction can be viewed as a search problem. Therefore, it can be solved by using population-based techniques such as Genetic Algorithm and Particle Swarm Optimization. This paper proposes the integration of feature reduction and data reduction for Nearest Neighbor (NN) classification using Cooperative Binary Particle Swarm Optimization (CBPSO). This method can overcome the limitation of using the Nearest Neighbor (NN) classifier when dealing with high dimensional and large data. The proposed method is applied to 14 real world dataset from the machine learning repository. The algorithm's performance is illustrated by the corresponding table of the classification rate. The experimental results demonstrate the effectiveness of our proposed method.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115148469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Android malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization","authors":"O. S. Adebayo, N. AbdulAziz","doi":"10.1109/WICT.2014.7077314","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077314","url":null,"abstract":"Several machine learning techniques based on supervised learning have been adopted in the classification of malware. However, only supervised learning techniques have proofed insufficient for malware classification task. This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. Using a number of candidate detectors, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. The results of the experiments show that the proposed combined technique has remarkable benefits over the detection using only supervised or unsupervised learners.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116729157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}