SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The International Conference on Informatics and Applications (ICIA2012)
-
EVENT SEQUENCE RECOGNITION AND MULTIAGENT BASED TASK ISOLATION OF HUMAN ACTIVITIES
People follow some specific patterns in their life style and recognition of human activity is thus a potential problem to develop an effective smart home. At the same time, inhabitant ...Authors: M. R. Alam, M. B. I. Reaz
Year Published: Jun. 2012 | 1-7 | ICIA2012 -
FRAMEWORK FOR ENHANCING P2P COMMUNICATION PROTOCOL ON MOBILE PLATFORM
Peer-to-Peer (P2P) communications and its applications have become conventional architecture in the wired network environment. However, they have not been effectively adapted to the ensemble ...Authors: Waheb A. Jabbar, M. Ismail, R. Nordin
Year Published: Jun. 2012 | 8-18 | ICIA2012 -
THEOREM PROVING TECHNIQUES FOR FORMAL SYSTEM VERIFICATION
The complexity and functionality of Hardware and Software systems are persistently growing. Therefore, the probability of subtle faults existence in these systems is also increasing. Some of ...Authors: Hasan Krad
Year Published: Jun. 2012 | 19-27 | ICIA2012 -
SIMPLE RULES MALAY STEMMER
Stemming is a morphological analysis that tries to associate variants of the same term with a common root form. It is important to improve recall and precision in IR systems. Malay word stemming is ...Authors: Syed Abdullah Fadzli, A Khairani Norsalehen, I. Ahmad Syarilla, Hassan Hasni, M Satar Siti Dhalila
Year Published: Jun. 2012 | 28-35 | ICIA2012 -
CONCEPTUAL MODEL OF BUSINESS PROCESS RE-ENGINEERING: A CASE STUDY OF A CARGO COMPANY IN MALAYSIA
Faced with the growth of business enterprises as well as consideration of the increasing competition in freight business to Indonesia, MS Company realizes that the company’s business process needs ...Authors: Syafrani Fithri, Jamaiah H. Yahaya
Year Published: Jun. 2012 | 36-48 | ICIA2012 -
COMBINATION OF SUPERVISED LEARNING AND REINFORCEMENT LEARNING FOR ROBOT NAVIGATION
Applying supervised learning in robot navigation encounters serious challenges such as inconsistence and noisy data, difficulty to gathering training data, and high error in training data. Hence, ...Authors: Fateme Fathi nezhad, Vali Derhami, Mehdi Rezaeian
Year Published: Jun. 2012 | 49-57 | ICIA2012 -
FACE RECOGNITION USING DUAL TREE COMPLEX WAVELET TRANSFORM
We propose a novel face recognition using Dual Tree Complex Wavelet Transform (DTCWT), which is used to extract features from face images. The Complex Wavelet Transform is a tool that uses a ...Authors: Suresh Shanmugasundaram, Divyapreya Chidambaram
Year Published: Jun. 2012 | 58-70 | ICIA2012 -
DEVELOPMENT OF A FUZZY EXPERT SYSTEM BASED ON PCS7 AND FUZZYCONTROL++ CEMENT MILL CONTROL
The basic idea of this work was to study the application of expert systems and fuzzy logic in the field of diagnostic and industrial maintenance. For this, a fuzzy expert system ...Authors: Hanane Zermane, L. Hayet Mouss, Sonia Benaicha
Year Published: Jun. 2012 | 71-76 | ICIA2012 -
AN EXPERT SYSTEM FOR WEATHER PREDICTION BASED ON ANIMAL BEHAVIOUR
Long before technology was developed, people had to rely on observations, patterns and their experience to predict the weather. Observers reported that the animals have senses that warned them of ...Authors: Najat O. Alsaiari
Year Published: Jun. 2012 | 77-84 | ICIA2012 -
HAND WRITING RECOGNITION SYSTEM FOR TEACHING CHILDREN ARABIC LANGUAGE BASED ON OCR
In this paper we present a new program (On-line Arabic Language Learning System (OALLS)), that can be used to learn the children how to write the arabic characters and words, then it examine if ...Authors: Moh'd Rasoul Al-Hadidi, Bayan Al-Saaidah, Nayel Al-Zu'bi
Year Published: Jun. 2012 | 85-90 | ICIA2012 -
AUTOMATIC IMAGE TAGGING BY USING IMAGE CONTENT ANALYSIS
Image analysis and in particular automatic image classification or annotation, often begins with feature extraction for content representation. The content representation can be based on low ...Authors: Lailatul Qadri binti Zakariaa, Paul Lewisb, Wendy Hallc
Year Published: Jun. 2012 | 91-101 | ICIA2012 -
INTELLIGENT VIDEO SURVEILLANCE SYSTEM ARCHITECTURE FOR ABNORMAL ACTIVITY DETECTION
Video security is becoming more and more vital today due to rapid development of hardware equipments as the number of installed cameras can confirm. This paper presents the system architecture of ...Authors: M. Elarbi- Boudihir, Khalid A. Al-Shalfan
Year Published: Jun. 2012 | 102-111 | ICIA2012 -
FACE EXPRESSION RECOGNITION USING AR-BURG MODEL AND NEURAL NETWORK CLASSIFIER
Neural network classifying method is used in this work to perform facial expression recognition. The processed expressions were the six most pertinent facial expressions and the neutral one. This ...Authors: M. Saaidia, A. Gattal1, M. Maamri, M. Ramdani
Year Published: Jun. 2012 | 112-117 | ICIA2012 -
IMPROVED BILATERAL FILTERING SCHEME FOR NOISE REMOVAL IN COLOR IMAGES
In this paper a new approach to the problem of noise removal in color images is presented. The proposed ltering design is a modication of the bilateral denos- ing scheme, which takes into ...Authors: Krystyna Malik, Bogdan Smolka
Year Published: Jun. 2012 | 118-130 | ICIA2012 -
ECOLOGICAL MONITORING AND FEEDBACK APPROACH FOR GREEN AND SUSTAINABLE IT
The innovation and development of the Information Technology and Communication (ICT) industry has significantly contributed to almost all aspect in human life. However, ICT is also responsible for ...Authors: Mohd Norhisham Razali, Helmer Ron Loindin, Leau Yu Beng, Rozita Hanapi
Year Published: Jun. 2012 | 131-137 | ICIA2012 -
METHODS FOR COMPLEX WEB HYPERMEDIA APPLICATION: THE DESIGN PROCESSES
Web Hypermedia Applications (WHA) has transformed from a simple static information webpage into a more complex web application that need to undergo more complex processes, design and transactional ...Authors: Ahmad Syafiq Ahmad Appandi, Azrul Hazri Jantan
Year Published: Jun. 2012 | 138-144 | ICIA2012 -
AN ANALYSIS OF REWARD SYSTEMS OF ELECTRONIC SERVICES
A reward system is a diverse and popular program implemented by many firms in various circumstances to motivate customers’ behavior for frequent and loyal patronage. With the evolving diversity of ...Authors: Shari S. C. Shang, Yi-Chen Yeh, Ya-Ling Wu
Year Published: Jun. 2012 | 145-155 | ICIA2012 -
NON-BINARY EVOLUTIONARY SYNTHESIS TECHNIQUES A COMPARISON
Binary signaling is facing on-chip interconnection and functional density limitations. Beyond binary digital systems is one possible solution to such problems. Non-Binary circuits are currently ...Authors: Mostafa Abd-El-Barr
Year Published: Jun. 2012 | 156-167 | ICIA2012 -
COMBINING BLIND SOURCE SEPARATION AND EMPIRICAL MODE DECOMPOSITION APPLIED TO SOURCE SEPARATION FROM SINGLE CHANNEL BIOMEDICAL SIGNALS
Nowadays, Blind Source Separation (BSS) techniques are very common and useful in signal processing. In the field of multichannel recording, there are many techniques of BSS that work accurately, ...Authors: N. Abdolmaleki, M. Pooyan
Year Published: Jun. 2012 | 168-173 | ICIA2012 -
CLASSIFYING SECURITY ALERTS FROM MULTIPLE SENSORS BASED ON HYBRID APPROACH
Protecting and assuring confidential information on the internet is a crucial need. Many organizations have installed multiple security sensors for complete monitoring and detection (for example the ...Authors: Maheyzah Md Siraj, Mohd Aizaini Maarof, Siti Zaiton Mohd Hashim
Year Published: Jun. 2012 | 174-181 | ICIA2012 -
SD-REE: A CRYPTOGRAPHIC METHOD TO EXCLUDE REPETITION FROM A MESSAGE
In this paper, the author presents a new cryptographic technique, SD-REE, to exclude the repetitive terms in a message, when it is to be encrypted, so that it becomes almost impossible for a person ...Authors: Somdip Dey
Year Published: Jun. 2012 | 182-189 | ICIA2012 -
FAST ELLIPTIC CURVE CRYPTOGRAPHY USING OPTIMAL DOUBLE-BASE CHAINS
In this work, we propose an algorithm to produce the double-base chain that optimizes the time used for computing an elliptic curve scalar multiplication, i.e. the bottleneck operation of the ...Authors: Vorapong Suppakitpaisarn, Hiroshi Imai, Masato Edahiro
Year Published: Jun. 2012 | 190-204 | ICIA2012 -
INTERGRID SECURITY POLICY INTEGRATION FRAMEWORK BASED ON UCON TOWARD FEDERATED GRID ACCESS CONTROL
Research in grid computing access control is focused on improving the scalability and enhancing the expressiveness of the security policy while keeping the security overhead as low as possible. ...Authors: Maizura Ibrahim, Siti Nurbahyah Hamdan, Hamidah Ibrahim, Azizol Abdullah, Rohaya Latip
Year Published: Jun. 2012 | 205-212 | ICIA2012 -
IP CORE DESIGN OF MICROCONTROLLER SYSTEM USING VERILOG FOR ROBOT BASED AGRICULTURAL IMPLEMENTS
This paper presents an RTL compliant Verilog IP Core design of a Microcontroller System modeled on the popular 8051 of Intel. This requirement primarily stems from the on-going project to design a ...Authors: C. S. Mala, S. Ramachandran
Year Published: Jun. 2012 | 213-227 | ICIA2012 -
LEXICAL ENTAILMENT FOR PRIVACY PROTECTION IN MEDICAL RECORDS
Most privacy preserving data mining methods apply transformations to the data that result in the loss of original data and reduces the effectiveness of the underlying mining results. Our goal in this ...Authors: Lila Ghemri, Raji Kannah
Year Published: Jun. 2012 | 228-232 | ICIA2012 -
CODE COVERAGE INFORMATION TO SUPPORT REGRESSION TESTING
Code coverage information is widely used to address problems in software development and maintenance phase. Software undergoes changes at all stages of the software development process and in ...Authors: Muhammad Shahid, Suhaimi Ibrahim, Mohd Naz’ri Mahrin
Year Published: Jun. 2012 | 233-239 | ICIA2012 -
AN AGENT-BASED CONCEPTUAL MODEL FOR COMPUTATIONAL PROBLEM SOLVING
Novice students face difficulties to understand problems and transform the problems using problem solving techniques. A novel model based on agents has been designed to assist novices in ...Authors: Teh Noranis Mohd Aris
Year Published: Jun. 2012 | 240-248 | ICIA2012 -
DESIGNING A TOOL TO MAP UML CLASS DIAGRAM INTO RELATIONAL DATABASE
The majority of computer information system developments utilize an object oriented technology such as java to construct the application interface and at the same time relying on the relational ...Authors: Mohd Khalid Awang, Nur Lian Labadu
Year Published: Jun. 2012 | 249-254 | ICIA2012 -
CRITICAL EVALUATION ON SOFTWARE DEVELOPMENT PROCESS MODELS WITH RESPECT TO MOBILE SOFTWARE DEVELOPMENT
Desktop computing is different from mobile computing, however, mostly mobile software developers or designers are using desktop development strategies for mobile software developments. To compete ...Authors: Kesava Pillai Rajadorai, Sa’adah Hassan and Novia Admodisastro
Year Published: Jun. 2012 | 255-264 | ICIA2012 -
PYTHON TEST FRAMEWORK WITH JENKINS IMPLEMENTATION IN SOFTWARE AUTOMATION TESTING
The Python Test Framework is a test automation tool to manage and distribute the execution of web-based functional testing. This paper presents the introduction of Python Test Framework, Jenkins and ...Authors: Fakaruddin Fahmi Romli, Mohd Ariffudin Mohd Isa, Mohd Solehudin Abdullah, Rosnisa Abdull Razak, Sazianti Mohd Saad
Year Published: Jun. 2012 | 265-276 | ICIA2012 -
ADAPTIVE POLICY-BASED APPROACH FOR STATIC AND DYNAMIC POLICY CONFLICT DETECTION
Policy-based approach has been mostly acknowledged as a methodology that separates the rules governing the behavior of a system from its functionality. It provides the ability to (re-)configure ...Authors: Abdelhamid Abdelhadi Mansor, Wan M.N. Wan Kadir, Toni Anwar, Hidayah Elias
Year Published: Jun. 2012 | 277-286 | ICIA2012 -
FACTORS INFLUENCING PRODUCTIVITY OF SOFTWARE PROJECTS INDIAN SCENARIO
In software industries today, expectations from Project leads, manager and Quality engineers is error free product with high quality characteristics. At the same time due to high competition in the ...Authors: SP Rahmesh, B Madhavan
Year Published: Jun. 2012 | 287-301 | ICIA2012 -
A MATHEMATICAL MODEL FOR MEASURING THE TIMELINESS OF HANDHELD APPLICATION USAGE
This study aimed at developing a mathematicalbased model specifically for measuring the timeliness of handheld applications usage. This study is designed to achieve three major objectives: developing ...Authors: Amalina Farhi Ahmad Fadzlah
Year Published: Jun. 2012 | 302-308 | ICIA2012 -
BASIC EMOTIONS ANALYSIS BY MEANS OF ELECTROENCEPHALOGRAM FOR COGNITIVE EMOTIONAL AGENT
This article shows progress of brain signals interpretation which identifies some of the primary emotions; those primary emotions are learned by the cognitive Agent. As a result we expect ...Authors: Arnulfo Alanis, Cinthya Solano, Miguel Angel Lopez, Gerardo Maximiliano, Bogart Yail Marquez, Karina Romero
Year Published: Jun. 2012 | 309-317 | ICIA2012 -
UNEARTHING THE DETERMINANTS OF SUCCESS IN SOFTWARE ENGINEERING EDUCATION: A CASE STUDY FOR BOTHO COLLEGE STUDENTS PERFORMANCE
The Botho College Software engineering curriculum has been running for quite some time now since 1997 up to date. Over the years we have seen considerable discrepancies or inconsistencies with ...Authors: Sridevi Radhakrishnan, Faith Gudo, Suresh Shanmugasundaram
Year Published: Jun. 2012 | 318-330 | ICIA2012 -
K-HAS: AN ARCHITECTURE FOR USING LOCAL AND GLOBAL KNOWLEDGE IN WIRELESS SENSOR NETWORKS
Sensor networks are driven by the activities of their deployed environment and they have the potential to use data that has previously been sensed in order to classify current sensed data. In this ...Authors: Christopher Gwilliams, Alun Preece, Alex Hardisty, Benoit Goossens, Laurentius N. Ambu
Year Published: Jun. 2012 | 331-341 | ICIA2012 -
DWT OFDM SYSTEMS WITH REDUCED PAPR FOR NEXT GENERATION MOBILE NETWORKS
Peak to power average ratio (PAPR) is a serious issue in OFDM systems. Several techniques have been proposed by researchers to reduce PAPR. A technique proposed, by Tellambura applies real-valued ...Authors: Y. A. LAFTA, P. JOHNSON
Year Published: Jun. 2012 | 342-348 | ICIA2012 -
TRAFFIC MANAGEMENT SYSTEM BASED ON WSN IN KUWAIT: AN INITIAL DESIGN
This paper discusses traffic problems in the world and emphasizes on Kuwait city as case study. Many of these problems can be solve by building a Traffic Management System based on a Wireless Sensor ...Authors: Abdulrahman A. Alkandari, Imad Fakhri Alshaikhli, Meshal alnasheet
Year Published: Jun. 2012 | 349-355 | ICIA2012 -
A ROUTE DISCOVERY METHOD BASED ON RECEIVED POWER OF REPEATER NODES FOR SENSOR NETWORKS IN A MULTIPATH FADING ENVIRONMENT
In this article, a route discovery method based on received power of repeater nodes for sensor networks in a multipath fading environment is studied. When each repeater node received Route Request ...Authors: Makoto Sugita, Yoshihiro Kainuma, Hideyuki Misawa, Kouhei Miyasaka, Kenko Ota, Hideaki Matsue
Year Published: Jun. 2012 | 356-361 | ICIA2012 -
INDOOR POSITION DETECTION USING WIFI AND TRILATERATION TECHNIQUE
Various techniques that employ GPS signals such as A-GPS and GPS transmitters [4, 7] have been introduced with the hope to provide a solution for indoor positioning detection. We proposed the ...Authors: Nor Aida Mahiddin, Noaizan Safie, Elissa Nadia, Suhailan Safei, Engku Fadzli
Year Published: Jun. 2012 | 362-366 | ICIA2012 -
HTTP PROTOCOL OPTIMIZATION
One of the most serious problems web users are experiencing is long response time and transmission delay due to high web traffic load. Since the World Wide Web is based on the client-server model, ...Authors: Abd Al-Qader Ayyash, Khalaf Khatatneh
Year Published: Jun. 2012 | 367-371 | ICIA2012 -
ENERGY EFFICIENT ROUTING PROTOCOL FOR LARGESCALE WIRELESS SENSOR NETWORKS
Recently wireless sensor networks (WSN) get great attention in both research and industrial fields. The fast development in WSNs raises many new issues in the field. One of the interesting and of ...Authors: Maher Elshakankiri
Year Published: Jun. 2012 | 372-382 | ICIA2012 -
SOME NUMERICAL METHODS OF DIFFUSION EQUATION FOR DIC TECHNIQUE
Food drying is one of the common techniques for preserving food to decrease the moisture content and minimize the biochemical reactions of degradation. This paper focuses on the mathematical modeling ...Authors: Norma Alias, Hafizah Farhah Saipan Saipol, Asnida Che Abd. Ghani
Year Published: Jun. 2012 | 383-389 | ICIA2012 -
CONCEPTUAL FRAMEWORK OF BUSINESS INTELLIGENCE ANALYSIS IN ACADEMIC ENVIRONMENT USING BIRT
The growth of technological development in information technology has caused challenges for many institutions. The enhancements of capabilities to gather and store data in multiple source system make ...Authors: Julaily Aida Jusoh, Norhakimah Endot, Nazirah Abd. Hamid, Raja Hasyifah Raja Bongsu, Roslinda Muda
Year Published: Jun. 2012 | 390-396 | ICIA2012 -
EDUCATIONAL CONTENT FOR TVDI
This paper presents partial results of the research project "Educational content for digital-CONTEDI". Different sectors of society such as academia, should be prepared, learn, train and promote the ...Authors: Adriana X. Reyes G, Gustavo A. Moreno, Jovani Jimenez B
Year Published: Jun. 2012 | 397-403 | ICIA2012 -
HABITS AND FACTORS AFFECTING UNDERGRADUATES ACCEPTANCE OF EDUCATIONAL COMPUTER GAMES: A CASE STUDY IN A MALAYSIAN UNIVERSITY
Educational computer games (ECG) are regarded as the promising teaching and learning tool due to its fun and engagement features as well as preferences of younger generations. Most research have ...Authors: Roslina Ibrahim, Azizah Jaafar, Khalili Khalil
Year Published: Jun. 2012 | 404-418 | ICIA2012 -
COMPUTER SUPPORTED COLLABORATIVE LEARNING IN A GRID COMPUTING ENVIRONMENT FOR INTEGRATED CIRCUIT AND MICROELECTROMECHANICAL SYSTEM DESIGN ACTIVITIES
e-Learning grid is an emerging branch of education that offers innovative learning experiences coupled with collaborative technologies. The advantages of elearning grid are improved scalability, ...Authors: M. Kusairay Musa, Sidek O, M. A. Miskam, Norlia Mustaffa, M. Nazer Abd Hadi
Year Published: Jun. 2012 | 419-424 | ICIA2012 -
ASSESSING LEVEL OF MOTIVATION IN LEARNING PROGRAMMING AMONG ENGINEERING STUDENTS
Students in programming courses have difficulties to master all required competencies and skills. Consequently, the failure rates in introductory programming courses are frequently high. Developing ...Authors: Azliza Yacob, Mohd Yazid Md Saman
Year Published: Jun. 2012 | 425-432 | ICIA2012 -
INTEGRATION OF HETEROGENEOUS DATABASES IN ACADEMIC ENVIRONMENT USING OPEN SOURCE ETL TOOLS
Data warehouse (DW) can be considered as the most significant tool for strategic decision making. However, in academic environment, the components of data warehouse still have not been completely ...Authors: Azwa A. Aziz, Abdul Hafiz Abdul Wahid, Nazirah Abd. Hamid, Azilawati Rozaimee
Year Published: Jun. 2012 | 433-439 | ICIA2012 -
AUTOMATED DIAGNOSIS OF THALASSEMIA BASED ON DATAMINING CLASSIFIERS
Thalassemia is a genetic disease that is commonly found in many parts of the world. It leads to death in most of its major cases so we must control it by determining the persons who trait the ...Authors: Eyad H. Elshami, Alaa M. Alhalees
Year Published: Jun. 2012 | 440-445 | ICIA2012 -
AN EFFICIENT TECHNIQUE FOR FREQUENT ITEMSET GENERATION USING THE SIGNIFICANCE DEGREE OF ITEMS
Mining association rules is one of the most important tasks in data mining. The classical model of association rules mining is supportconfidence. The support-confidence model concentrates only on the ...Authors: Wael Ahmad AlZoubi, Khairuddin Omar, Azuraliza Abu Bakar
Year Published: Jun. 2012 | 446-450 | ICIA2012 -
FINEST TRAIL SETUP TECHNIQUE IN CLOUD AMBIENCE
Resource Providers & Consumers to navigate purposefully in Cloud ambience needs three basic requirements: sensing the nodes, learning and reasoning the budget. In the existing system this is ...Authors: Suresh Shanmugasundaram, Divyapreya Chidamabarm, Sridevi Radhakrishnan
Year Published: Jun. 2012 | 451-457 | ICIA2012 -
A SURVEY ON TESTING CONCURRENT AND MULTI-THREADED APPLICATIONS TOOLS AND METHODOLOGIES
Recent advances in microprocessor technologies have increased the need for concurrent multi-threaded programming. These advances imposed an immediate mandate in the researcher to develop ...Authors: Desoky Abdelqawy, Amr Kamel, Fatma Omara
Year Published: Jun. 2012 | 458-470 | ICIA2012 -
SIMULATION FRAMEWORK OF PARTITIONED PUAS SCHEDULING ALGORITHM IN MULTICORE ENVIRONMENT
This paper presents the simulation design of Partition PUAS (PPUAS) that is a TUF/UA real time scheduling algorithm for multicore environment using partitioned scheduling scheme. PPUAS solved the ...Authors: Idawaty Ahmad, Shamala Subramaniam, Mohamed Othman, Zuriati Zulkarnain
Year Published: Jun. 2012 | 471-475 | ICIA2012 -
FROM DISTRIBUTED RECURSIVE WAVE TO NEW CONVERGE CAST ALGORITHM
ConvergeCast is one of group communication tasks in distributed systems: convergecast, broadcast, multicast and unicast. ConvergeCast algorithms allow concentrating network information for ...Authors: Ha Quoc Trung
Year Published: Jun. 2012 | 476-479 | ICIA2012 -
A STUDY ON THE TRANSLATION MECHANISM FROM RELATIONAL-BASED DATABASE TO COLUMN-BASED DATABASE
Lately, column-based database (CDB) has been considered as a standard solution dealing with the big data. But there is no standard translation mechanism mapping from Relational Database (RDB) to CDB. ...Authors: Chin-Chao Huang, Wenching Liou
Year Published: Jun. 2012 | 480-486 | ICIA2012 -
MAPPING DYNAMIC PROGRAMMING PROBLEMS ON COARSE GRAINED MULTICOMPUTER
Parallelization of dynamic programming algorithms is a very well studied topic. In this paper we are interested by an important class of Dynamic Programming problems. Many results have been presented ...Authors: Mounir Kechid, Jean-frederic Myoupo, Abdullah S.Khalufa, Moteb S.Alghamdi
Year Published: Jun. 2012 | 487-499 | ICIA2012 -
INTEGRATION OF WEB BASED USER INTERFACE FOR RELEVANCE FEEDBACK
In this article, we report on the study of Terrier search engine for Quranic verse retrieval problem. However, the results produced by Terrier search engine are not yet completely satisfying; an ...Authors: Tahiru Shittu, Azreen Azman, Rabiah Abdul Kadir, Muhamad Taufik Abdullah
Year Published: Jun. 2012 | 500-505 | ICIA2012 -
A SURVEY ON SERVICE AVAILABILITY AND ACCESSIBILITY ISSUES IN CLOUD ENVIRONMENT
Cloud computing is one contemporary technology in which the research community has recently embarked. Cloud computing faces many of the challenges and difficulties. Meeting the user needs is the ...Authors: Thamilvaani Arvaree @ Alvar, Rodziah Atan
Year Published: Jun. 2012 | 506-511 | ICIA2012 -
TAKING ANAK EMAS SYSTEM (MYANAKEMAS) TO THE CLOUD
This conceptual paper seeks to put forth a novel vision, namely the combined deployment of Quadruple Helix Model (QHM) collaboration mooted by Agensi Inovasi Malaysia, “whole-of-government” ...Authors: Abdul Rahman bin Ahmad Dahlan, Shairazi bin Sauki, Khairul Idham bin Rusmadi, Muhamad Hafizi bin Shuib, Mohd Mumtaz bin Man Sort, Mohd. Toriq Khan bin Mohamad Niyaz Khan
Year Published: Jun. 2012 | 512-519 | ICIA2012 -
RESOURCE MANAGEMENT ON DYNAMIC LOAD BALANCING BY SCHEDULING WITH COMPUTATION ELEMENT CONSIDERATION THROUGH POLICY REFINEMENT IN GRID
The proper resource management strategy in the scheduling algorithm will produce an improved dynamic load balancing result. The computation element and policy refinement has a big impact to the grid ...Authors: Bakri Yahaya, Rohaya Latip, Mohamed Othman, Azizol Abdullah
Year Published: Jun. 2012 | 520-526 | ICIA2012 -
THE UTILISATION OF CONCENTRATION PROFILE SIMULATION TO PREDICT LITHIUM-ION CELL PERFORMANCE
This paper presents the lithium-ion concentration profile simulation in the cathode for the half cell to predict the performance of the lithium-ion cell. The mathematical model is utilized in order ...Authors: Norzihani Yusof, Abd. Samad Hasan Basari, Nuzulha Khilwani Ibrahim
Year Published: Jun. 2012 | 527-533 | ICIA2012 -
UNCOVER SECURITY LEAKS IN PHP WEBSITE
This paper re-visits the security issues that are related to websites. In particular, it tries to highlights the possible attacks for website from inside. The word inside means that we are doing ...Authors: Abrar A. Alsulaiman, Eyas El-Qawasmeh
Year Published: Jun. 2012 | 534-541 | ICIA2012 -
FOUR CORNER MAGIC SQUARES WITH SYMMETRIC CENTER
In this paper we introduce and study special types of magic squares of order six. We list some enumerations of these squares. We present a parallelizable code. This code is based on the principles of ...Authors: S. Al-Ashhab
Year Published: Jun. 2012 | 542-551 | ICIA2012 -
SECURITY REQUIREMENTS FOR FUTURE BODY SENSOR NETWORKS
Security is first priority in Body Area sensor Network (BSN) as it contained personal health information like blood pressure & heartbeat. So Bio stats of a patient should be protected against attacks ...Authors: Zahid Mehmood, Waqas Nasar, Junaid Imtiaz, Ahsan Jamal Khan, Muhammad Ahsan Habib
Year Published: Jun. 2012 | 552-556 | ICIA2012