M. Y. Darus, A. Kamarudin, N. Awang, Fakariah Hani Mohd Ali
{"title":"Analysis performance on contention-based MAC protocols in MANETs","authors":"M. Y. Darus, A. Kamarudin, N. Awang, Fakariah Hani Mohd Ali","doi":"10.1109/WICT.2014.7077284","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077284","url":null,"abstract":"ALOHA protocol and its variations are commonly deployed Medium Access Control (MAC) protocols in environments where multiple transmitting devices compete for a medium. Idealized Slotted ALOHA protocol is the most deploy variation in Mobile Ad Hoc Networks (MANETs) environment for example in digital cellular systems such as GSM, RFID and underwater wireless sensor network. In this research paper, the analysis and studies were made with simulation tools to get an illustration of how the Idealized Slotted ALOHA protocol works and to get mathematical results in graphical form in term of throughput and average time delay. These results are then used to compare with the performances of non-persistent CSMA protocol, another MAC protocol that happened to fell under the same category as ALOHA protocols to prove that Idealized Slotted ALOHA protocol outperforms non-persistent CSMA protocol. However, the throughput of Idealized Slotted ALOHA protocol is improvable with the right approaches. In this research paper, the approaches that are used to improve the performance made primarily are by amending the Idealized Slotted ALOHA protocol with capture effect and by increasing the CNR possibility values.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116203273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A preliminary review of interface design elements for mobile electronic government systems","authors":"N. Ghazali, R. Razali","doi":"10.1109/WICT.2014.7076908","DOIUrl":"https://doi.org/10.1109/WICT.2014.7076908","url":null,"abstract":"Electronic Government (e-Government) systems are intended primarily to deliver governmental information and services through the web. The rapid evolution of mobile technology has triggered the need for conventional web-based e-Government systems to move towards another era known as Mobile Government (m-Government) systems. Although the functionality remains the same, the use of mobile devices in m-Government systems has caused the interface design of such systems to be dissimilar from the conventional web-based e-Government systems. Mobile devices in some ways have limited capacity in terms retrieving and displaying information, which makes their interface design to be quite tricky. This study aims to review the existing interface design frameworks in order to identify and collate the essential design elements that should be considered in designing the interface for m-Government systems. The study analysed qualitatively four m-Government interface design frameworks, namely 7Cs Design Elements, A Functional Design Approach for Mobile Government Website, Adaptive Mobile Government Framework and Framework of information Quality of Mobile Interface e-Government. By using content analysis, the study identified eight design elements from such frameworks. The study also highlighted the limitations of the current frameworks that could be explored further by future studies in interface design for m-Government systems.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122057489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zaid Mujaiyid Putra Ahmad Baidowi, Teh Faradilla Abdul Rahman, N. Bashah, Faizal Haini Fadzil
{"title":"A preliminary study in improvising instant mobile messaging framework using cloud storage service","authors":"Zaid Mujaiyid Putra Ahmad Baidowi, Teh Faradilla Abdul Rahman, N. Bashah, Faizal Haini Fadzil","doi":"10.1109/WICT.2014.7076911","DOIUrl":"https://doi.org/10.1109/WICT.2014.7076911","url":null,"abstract":"Nowadays, Instant Mobile Messaging (IMM) applications such as WhatsApp, Line and WeChat, are widely used. Studies conducted in this area found that cost is the main reason why people would rather use the IMM compared to Short Message Service (SMS). However, in WhatsApp, photos send through the IMM will be located in local storage and eventually the local storage will run out of space. In this research our objective is to come out with a new framework of IMM application. It also introduces a way on how to save documents that sent via this application. The framework will benefit from the use of cloud storage service to store the new files created. In order to send files to the recipients, they need to be accessed via the cloud storage. Once sent, the files will be stored in the recipients' cloud storage. There will be an interface that allows communication between smart phone and cloud storage. As a result, the smart phone space will be saved and this new improvised framework is expected to be the basis of reference for optimizing the smart phone resource overhead.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123998325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved k-means clustering with Harmonic-Bee algorithms","authors":"Mohammad Babrdel Bonab, S. Z. Mohd Hashim","doi":"10.1109/WICT.2014.7077289","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077289","url":null,"abstract":"Data clustering is one of widely used methods for data mining. The k-means approach is one of the simplest unsupervised learning algorithms that solve the well-known clustering problem. But some hindrances such as the sensitivity to initial values and cluster centers or the risk of trapping in local optimal reduce its best performance. The purpose of kmeans method is minimizing the dissimilarity of observations, from cluster centers. In this paper, a new solution method inspired by harmony search combined with bee algorithm is introduced to improve performance k-means clustering. In this study, harmony and clustering structures are combined to produce harmony clustering. To avoid initial random selection, seed cluster center is considered in primary population as well as bee algorithm has been employed to increase the efficiency of algorithm. The proposed methods have been tested on standard benchmark data sets and also compared to other methods in the literature; it is noted that results show a promising performance leading to better efficiency and capability of the proposed solution.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116877001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secured data partitioning in multi cloud environment","authors":"Hazila Hasan, S. Chuprat","doi":"10.1109/WICT.2014.7077319","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077319","url":null,"abstract":"Data security and privacy have become the biggest concern in cloud computing due to the fact that data can be compromised if cloud service storage is being attacked or during cloud service breakdown. Therefore, the adoption of data partitioning in multi cloud environment to address this issue has attracted academia and researchers' interest. Hence, this paper will discuss the concept of data partitioning, the current state-of-the-art of data partitioning and secured data partitioning in multi cloud environment. We then compared the current security approaches used to secure data partitioning in multi cloud environment. Lastly, we conclude that pure data partitioning alone is insufficient to address data security and privacy problem. Therefore, we will extend this issue for our future work.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126500504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and evaluation of SURF descriptors for automatic 3D facial expression recognition using different classifiers","authors":"Amal Azazi, S. Lutfi, Ibrahim Venkat","doi":"10.1109/WICT.2014.7077296","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077296","url":null,"abstract":"Emotion recognition plays a vital role in the field of Human-Computer Interaction (HCI). Among the visual human emotional cues, facial expressions are the most commonly used and understandable cues. Different machine learning techniques have been utilized to solve the expression recognition problem; however, their performance is still disputed. In this paper, we investigate the capability of several classification techniques to discriminate between the six universal facial expressions using Speed Up Robust Features (SURF). The evaluation were conducted using the BU-3DFE database with four classifiers, namely, Support Vector machine (SVM), Neural Network (NN), k-Nearest Neighbors (k-NN), and Naïve Bayes (NB). Experimental results show that the SVM was successful in discriminating between the six universal facial expressions with an overall recognition accuracy of 79.36%, which is significantly better than the nearest accuracy achieved by Naïve Bayes at significance level p <; 0.05.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121342839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Morteza Rashidi Koochi, Ab Razak Che Hussin, H. M. Dahlan
{"title":"Improving recommendation diversity using tensor decomposition and clustering approaches","authors":"Morteza Rashidi Koochi, Ab Razak Che Hussin, H. M. Dahlan","doi":"10.1109/WICT.2014.7076912","DOIUrl":"https://doi.org/10.1109/WICT.2014.7076912","url":null,"abstract":"Diversity and novelty of items in recommendation, and coverage of overall recommended items are emerging recommendation quality measures for user and system respectively. These measures tend to alleviate the problem of user satisfaction in terms of redundancy in recommendations caused by accuracy-oriented approaches. This work proposes solution to provide diversity in different modes when we are dealing with multi-mode data. To provide diverse suggestion list of communities to join, the proposed framework uses Tensor Decomposition to reveal latent topics among multi-mode data including communities, users and social tags. It exploits co-clustering approaches on decomposed components to extract clusters of communities based on user similarity and tag similarity. Afterwards, clusters' information is used to develop and apply re-ranking algorithms, which leads to improvement in diversity and coverage of recommended lists.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126930823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trend cluster analysis using self organizing maps","authors":"M. Amin, P. Nohuddin, Zuraini Zainol","doi":"10.1109/WICT.2014.7077306","DOIUrl":"https://doi.org/10.1109/WICT.2014.7077306","url":null,"abstract":"Trend cluster analysis using Self Organization Maps (SOM) is an application for clustering time series data. The application is able to cluster and display the time series data into trend lines graphs, and also identify trend variations in time series data. The system can process a large number of records as well as a smaller datasets. The results generated by the application are useful for analyzing large data which is often hard to analyze using normal spreadsheet software. The system has been developed using Matlab SOM functions and adopted SOM learning technique to cluster time series data. Based on the experiments, the test results have shown that the application is able to accommodate large sets of data and produce the trend lines graphs.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129622136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emotion detection with hybrid voice quality and prosodic features using Neural Network","authors":"Inshirah Idris, M. Salam","doi":"10.1109/WICT.2014.7076906","DOIUrl":"https://doi.org/10.1109/WICT.2014.7076906","url":null,"abstract":"This paper investigates the detection of speech emotion using different sets of voice quality, prosodic and hybrid features. There are a total of five sets of emotion features experimented in this work which are two from voice quality features, one set from prosodic features and two hybrid features. The experimental data used in the work is from Berlin Emotional Database. Classification of emotion is done using Multi-Layer Perceptron, Neural Network. The results show that hybrid features gave better overall recognition rates compared to voice quality and prosodic features alone. The best overall recognition of hybrid features is 75.51% while for prosodic and voice quality features are 64.67% and 59.63% respectively. Nevertheless, the recognition performance of emotions are varies with the highest recognition rate is for anger with 88% while the lowest is disgust with only 52% using hybrid features.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131094825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Vulnerability Risk Factor: Critical ICT Outsourcing project characteristics","authors":"Nik Zulkarnaen Bin Khidzir, A. Mohamed, N. Arshad","doi":"10.1109/WICT.2014.7076901","DOIUrl":"https://doi.org/10.1109/WICT.2014.7076901","url":null,"abstract":"Business Strategist and Technologist Implementers realized that ICT Outsourcing was one of the most successful strategies for ICT operational cost cutting and solved the shortage of ICT expertise or resources to implement an ICT project and services. Unfortunately, the strategy cause's other significant risks that could interrupt the ICT outsourcing venture's success. Information Security Risk (ISR) was considered among the critical significant risk in ICT Outsourcing project. Therefore the objective of this study is to explore the information security Vulnerabilities Risks Factor (VRF) critical level for ICT Outsourcing project characteristics through exploratory analysis approach. About 300 government agencies and private companies from various industries in Malaysia involved in the survey. However, 36% response was analyzed as a sample for the study population. Thus, Vulnerability Risks Factor (VRF) critical level was analyzed and discussed for each common ICT Outsourcing project characteristics implemented in Malaysia. The results of the analysis discovered the evidence of those ICT outsourcing project characteristics, risks exploited through Vulnerabilities Risks Factor (VRF). Several highly critical ICT outsourcing project characteristics were project team size between 10 to 99 members (33.6%), medium size project (28.2%) and outsource the ICT project to more than one service provider. The findings could be used as an indicator for organizations to prepare more effective information security management plan for ICT Outsourcing project. Eventually, the organization could give more priority to the specific ICT Outsourcing project characteristic where the Vulnerability Risks Factor (VRF) level is critical.","PeriodicalId":439852,"journal":{"name":"2014 4th World Congress on Information and Communication Technologies (WICT 2014)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128958903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}