SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The Second International Conference on Informatics Engineering & Information Science (ICIEIS2013)
-
HS-SLA: A Hierarchical Self-Healing SLA Model for Cloud Computing
The service level agreement (SLA) is a mutual contract between the service provider and consumer which determines the agreed service level objective (SLO). The common SLA is enforced as a plain ...Authors: Ahmad Mosallanejad, Rodziah Atan, Rusli Abdullah, Masrha Azmi Murad, Taghi Javdani
Year Published: Nov. 2013 | 1-11 | ICIEIS2013 -
Packet Internet Billing Framework to Enhance Service Level Agreement (SLA) In Convergence Network
In line with the recent expansion of mobile technology over appliances and software’s, the technology itself much exposed to the insufficient of bandwidth issues. Globally the demands are growing ...Authors: Ahmad Kamal Ramli, Paridah Daud, Noor Azma Ismail
Year Published: Nov. 2013 | 12-16 | ICIEIS2013 -
Experiment Design for Prediction of Human Personality through Analysis of Activities Stored in Electronic Organizer
The paper focuses on analysis human activity for prediction of human personality contribute the development of personality assessment. The purpose of this study is to design an experiment so as to ...Authors: Andi Putra, Mohd. Juzaiddin Ab Aziz, Mohd. Rosmadi Mokhtar
Year Published: Nov. 2013 | 17-24 | ICIEIS2013 -
Integrated High-Performance and Web-Oriented System of The Kazakh Language Text Recognition
We presented in the paper the integrated high-performance and Web-oriented computer recognition system for the Kazakh language text. The design and integration methodology of the system are based on ...Authors: David L. Zaurbekov, Bakyt M. Kairakbay, Daniyar B. Nurseitov, Yuriy Y. Stolyarov, Ilyas E. Tursunov, Igor A. Ugay
Year Published: Nov. 2013 | 25-36 | ICIEIS2013 -
HP Model Protein Folding with Hybrid Algorithm using Genetic Algorithm and Estimation of Distribution Algorithm
This paper describes a hybrid algorithm of Genetic Algorithm (GA) and Estimation of Distribution Algorithm (EDA) to solve the Protein Structure Prediction (PSP) based on lattice Hydrophobic-Polar ...Authors: Kenji Tamura
Year Published: Nov. 2013 | 37-42 | ICIEIS2013 -
Experimental Comparison of Uninformed and Heuristic AI Algorithms for N Puzzle Solution
This paper compares the performance of popular AI techniques, namely the Breadth First Search, Depth First Search, A* Search, Greedy Best First Search and the Hill Climbing Search in approaching the ...Authors: Kuruvilla Mathew, Mujahid Tabassum, Mohana Ramakrishnan
Year Published: Nov. 2013 | 43-50 | ICIEIS2013 -
A Genetic Algorithm Approach Towards Image Optimization
In today’s world, an optimal and intelligent problem solving approaches are required in every field, regardless of simple or complex problems. Researches and developers are trying to make machines ...Authors: Mujahid Tabassum, Kuruvilla Mathew, Sailesh Choytooa
Year Published: Nov. 2013 | 51-59 | ICIEIS2013 -
Regularized Independent Component Analysis in Face Verification
A regularized Independent Component Analysis (denoted as RICA) is proposed in the application of face verification. In RICA, information of correlation coefficients between images is employed to form ...Authors: Ying Han Pang, Chuan Chin Teo, Shih Yin Ooi, Siong Hoe Lau, Fu San Hiew, Yee Ping Liew
Year Published: Nov. 2013 | 60-67 | ICIEIS2013 -
Coronary Plaque Boundary Detection in Intravascular Ultrasound Image by Using Hybrid Modified Level Set Method and Fuzzy Inference
This paper describes a boundary detection of coronary plaque by a hybrid of a modified level set method and a fuzzy inference. The standard level set method to detect an image boundary commonly uses ...Authors: Syaiful Anam, Eiji Uchino, Noriaki Suetake
Year Published: Nov. 2013 | 68-74 | ICIEIS2013 -
An Enhanced Steganographic System for Data Hiding in True Color Images
The process of information propagation through the Internet may expose it to risk by discovering and stealing. Steganography is the art of hiding the existence of data in another transmission medium ...Authors: Saad M. Darwish, Shawkat K. Guirguis, Wesam A. Alatafy
Year Published: Nov. 2013 | 75-83 | ICIEIS2013 -
A Hybrid Keystroke Authentication Dynamics
As time goes, the global access to information and recourses is becoming a routine and a necessity in our daily lives. Unfortunately this great increase in global accessibility brings great chances ...Authors: Saleh M. Abu-Soud
Year Published: Nov. 2013 | 84-95 | ICIEIS2013 -
A Robust Digital Image Watermarking against Salt and Pepper using Sudoku
Copyright information embedded in a digital data may disappear or become undetectable due to additive noise accidentally or deliberately introduced to a watermarked image. Several watermarking ...Authors: Shamsul Kamal Ahmad Khalid, Mustafa Mat Deris, Kamaruddin Malik Mohamad
Year Published: Nov. 2013 | 96-106 | ICIEIS2013 -
A Steganographic Technique for Highly Compressed JPEG Images
Hiding secret data in JPEG images has been popularly studied in steganography research. Most of the previous studies propose schemes that hide secret data in the quantized DCT coefficients. However, ...Authors: Shamsul Kamal Ahmad Khalid, Mustafa Mat Deris, Kamaruddin Malik Mohamad
Year Published: Nov. 2013 | 107-118 | ICIEIS2013 -
Review of Information Security Vulnerability: Human Perspective
Information security is about confidentiality, integrity and availability of the data and due to complexity of human resources the information security has always been exposed to the internal threat ...Authors: Malahat Pouransafara, Nurazean Maroop, Zuraini Ismail, Maral Cheperli
Year Published: Nov. 2013 | 119-126 | ICIEIS2013 -
An Improvement for Hiding Data in Audio Using Echo Modulation
This paper presents an improved technique to hide information in audio based on echo modulation. The improvement is done by using a sequence of random binary numbers and by modifying the formula used ...Authors: Huynh Ba Dieu,
Year Published: 2013 | 127-132 | ICIEIS2013 -
A Framework for a Corporation Cyber War Strategy
Computer technology has become increasingly integrated into modern corporations, which are also becoming increasingly interconnected locally and internationally. Where interconnectedness and ...Authors: Walid Al-Ahmad
Year Published: Nov. 2013 | 133-141 | ICIEIS2013 -
Text Based Chipper Notation for Angklung Music Compositions
Music notation is a set of symbols for representing music composition in a written form. In South East Asia, the most popular music notation is chipper notation (not angka). This paper introduces a ...Authors: Eko Mursito Budi, Asep Suhada, Hermawan K. Dipojono, Andrianto Handojo, Joko Sarwono
Year Published: Nov. 2013 | 142-154 | ICIEIS2013 -
Improved MIDI Message for Robotic Angklung Choir
Angklung is a unique musical instrument from South East Asia that should be played in a choir, because each angklung can only produce a single note. In a decent angklung composition, at least 3 ...Authors: Eko Mursito Budi, Asep Suhada, Hermawan K. Dipojono, Andrianto Handojo, Joko Sarwono
Year Published: Nov. 2013 | 155-162 | ICIEIS2013 -
Self-adaptive SSH Honeypot Model Capable of Reasoning
The increased number of SSH stolen credentials on the “black market” used for targeted attacks proves the opportunity of SSH Honeypots. Corroborated with recent trends in honeypot research area ...Authors: Adrian Pauna, Victor Valeriu Patriciu
Year Published: Nov. 2013 | 163-168 | ICIEIS2013 -
Feature Selection Based on Genetic Algorithm and SupportVector Machine for Intrusion Detection System
One of the most common problems in existing detection techniques is the high curse of dimensionality, due to multidimensional features of the network attack data. This paper investigates the ...Authors: Amin Dastanpour, Raja Azlina Raja Mahmood
Year Published: Nov. 2013 | 169-181 | ICIEIS2013 -
A Normal Profile Updating Method for False Positives Reduction in Anomaly Detection Systems
The contribution of this paper is to investigate whether there is a possibility of further processing of both the normal and abnormal data identified by any anomaly detector with the intent of ...Authors: Mohd Nizam Omar, Walid Mohamed Alsharafi
Year Published: Nov. 2013 | 182-187 | ICIEIS2013 -
An Experimental Study to Analyze SIP Traffic over LAN
VoIP (Voice over Internet Protocol) service has become famous now days due to their affordability and flexibility. VoIP networks use IP (Internet Protocol) phone to communicate over Internet or LAN ...Authors: Mujahid Tabassum, Kuruvilla Mathew, Mohana Ramakrishnan, Duaa Fatima S Khan
Year Published: Nov. 2013 | 188-196 | ICIEIS2013 -
Toward an Update of a Similarity Measurement for a Better Calculation of the Semantic Distance between Ontology Concepts
Computational models of semantic similarity can be found in many applications, with the aim to give this additional knowledge to reason about their data. The choice of a similarity measure is very ...Authors: Abdeslem Dennai, Sidi Mohammed Benslimane
Year Published: Nov. 2013 | 197-207 | ICIEIS2013 -
Automatic Extraction of Structures of Issues Based on Newspaper Articles
In this article, we propose the method to extract the structure of issues by using newspaper articles. The principal method used to extract the structure is ISM (Imperative Structural Modelling). ISM ...Authors: Hirohide Haga
Year Published: Nov. 2013 | 208-214 | ICIEIS2013 -
The Need For Usability Risk Assessment Model
Usability is an important factor in ensuring development of quality and usable software product. Ignorance and unawareness about the concept of usability and failure to address usability during ...Authors: Jayaletchumi T. Sambantha Moorthy, Suhaimi Ibrahim, Mohd Naz’ri Mahrin
Year Published: Nov. 2013 | 215-220 | ICIEIS2013 -
Risk Generating Situations of Requirement Engineering in Global Software Development
Challenges of Requirements Engineering (RE) become adequate when it is performed in global software development (GSD) paradigm. “Risks” are the important elements for making RE more challenging. ...Authors: Huma Hayat Khan, Mohd. Naz’ri Mahrin, Suriayati Chuprat
Year Published: Nov. 2013 | 221-233 | ICIEIS2013 -
Standards and Models on and Around Software Requirement Engineering: A Review with Perspective of Varying Situations
As part of our current research project, where we are investigating situational requirement engineering (RE) in Global Software Development (GSD) environment, here we are reviewing the standards and ...Authors: Huma Hayat Khan, Mohd. Naz’ri Mahrin, Suriayati Chuprat
Year Published: Nov. 2013 | 234-245 | ICIEIS2013 -
Smart Data: A System for Generating Application-Agnostic Interactive Data
Interaction design focuses on the complex interaction between human and software. The cognitive part of interaction relies on the application features offered through the user interface and ...Authors: Ashraf Gaffar, Abdessamad Tridane, Kris Pribadi
Year Published: Nov. 2013 | 246-254 | ICIEIS2013 -
Consumers’ Perception on Hotel Websites: Implications for Operational Performance
The hotel industry has been flourishing in recent years. Today, many firms including hotels use the Internet as a marketing tool, which has increased the number of e-commerce websites. ...Authors: Chew-Beng Tan, Uchenna Cyril Eze, Siang-Ling Loh
Year Published: Nov. 2013 | 255-265 | ICIEIS2013 -
Multi-Algorithm Ontology Mapping with Automatic Weight Assignments and Background Knowledge
Ontology mapping is an area dealing mainly with matching of entities from two different ontologies. To date, many different approaches have been proposed from those employing a single algorithm to ...Authors: Cheah Yu-N, Shailendra Singh
Year Published: Nov. 2013 | 266-273 | ICIEIS2013 -
Mobile Learning: The Effects of Gender and Age on Perceptions of the Use of Mobile Tools
Tertiary education practitioners are realising that integrating technology into programme delivery is an essential method of engaging and interacting with today’s learners. In particular, the ...Authors: Sarah Snell, Catherine Snell-Siddle
Year Published: Nov. 2013 | 274-281 | ICIEIS2013 -
Perceptions of Mobile Technologies and Associations with Attitudinal Outcomes in a Tertiary Environment
From extensive research conducted over the past 40 years it is clear that there is a connection between the quality of the learning environment and student learning. The learning environment can have ...Authors: Catherine Snell-Siddle, Sarah Snell
Year Published: Nov. 2013 | 282-288 | ICIEIS2013 -
Dynamic Controller Selection in Smart Home Networks
Many kinds of electrical devices are available at home and most of them are equipped with micro computers. These devices have been autonomously controlled. According to the highly advanced computer ...Authors: Hiroaki Higaki
Year Published: Nov. 2013 | 289-294 | ICIEIS2013 -
Simple Scheduling Scheme for Smart Home and Ambient Assisted Living
Smart Home and Ambient Assisted Living (SHAAL) systems utilize advanced and ubiquitous technologies including sensors and other devices that are integrated in the residential infrastructure or ...Authors: Rozeha A. Rashid, Hamdan Sayuti, Nurul Mu'azzah Abdul Latiff, Norsheila Fisal, Mohd Adib Sarijari, Abdul Hadi Fikri Abdul Hamid, Rozaini Abd Rahim.
Year Published: Nov. 2013 | 295-301 | ICIEIS2013 -
An Interactive Webbased Expert System Degree Planner
A webbased degree planner utilizing Extensible Markup Language (XML) and expert systems is described. A degree server hosts an XML file for each degree, describing its units and rules. The rules are ...Authors: Neil Dunstan
Year Published: Nov. 2013 | 302-308 | ICIEIS2013 -
The Challenges in Implementing Risk Management for Information Technology Projects
IT projects are characterized by high degrees of risk. The rapid speed of transformation in information technologies combines changes in business processes to create surprising shifts in cost, the ...Authors: Amine Nehari Talet, Razali Mat-Zin, Maaradj Houari
Year Published: Nov. 2013 | 309-316 | ICIEIS2013 -
Measurements of Distances from Compound Projection for GIS
The revolution of technologies in the field of geodesy is important for the coordinates system used in surveying work and geographic information system”GIS”, this paper presents a system of ...Authors: Mohammed Sabri Akresh
Year Published: Nov. 2013 | 317-320 | ICIEIS2013 -
Critical Factors Influencing the Registration of Domain Name
Growth and increasing use worldwide domain is inconsistent with growth of world population. Although in terms of domain usage statistics across the world increased, but the distribution of the domain ...Authors: Norul Bahriyah Shaari
Year Published: Nov. 2013 | 321-328 | ICIEIS2013 -
Oscillating Behaviors on Graph-rewriting Automata
We consider a class of connected planar 3-regular graphs (rotation systems) with states on each node, and their dynamical behaviors based on three structurally rewriting rules. In this paper, we ...Authors: Kohji Tomita, Akiya Kamimura, Haruhisa Kurokawa
Year Published: Nov. 2013 | 329-333 | ICIEIS2013 -
Individual Acceptance of e-Government: A Literature Review
In order to develop more acceptable e-government services, government needs to understand the factors influencing citizens to use the services. This paper reviews prior studies on acceptable ...Authors: Tony Dwi Susanto
Year Published: Nov. 2013 | 334-342 | ICIEIS2013 -
Service-Oriented GIS System for Risk Mapping of Oil Spills Integrated with High Performance Cluster
We present in the paper the service-oriented GIS system for risk mapping of oil spills integrated with high performance cluster. The design and integration methodology of the system are based on ...Authors: David L. Zaurbekov, Kairat A. Bostanbekov, Jalal K. Jamalov, Dmitriy K. Kim, Daniyar B. Nurseitov, Ilyas E. Tursunov, Edige A. Zakarin
Year Published: Nov. 2013 | 343-354 | ICIEIS2013 -
Privacy in Cloud Based E-Learning
The advent of cloud computing in recent years has brought the attention of many education institutions to enjoy its benefits. Cloud computing provides services and storage through the internet. Many ...Authors: Maher Alghali, Najwa Hayaati Mohd Alwi, Roesnita Ismail
Year Published: Nov. 2013 | 355-362 | ICIEIS2013 -
Past, Present and Future of Search Engine Optimization
Today the role of Internet in all aspects of our lives has become more and more vital. Accordingly, for businesses to grow, being active and visible on the Internet has become a new requirement. On ...Authors: Saeid Saberi, Golnaz Saberi, Masnizah Mohd
Year Published: Nov. 2013 | 363-369 | ICIEIS2013 -
An Analysis of the Code Coverage-based Greedy Algorithms for Test Suite Reduction
Software testing is widely used by development organizations to improve the quality and reliability of a System under Test (SUT). However, testing requires high amount of development resources due to ...Authors: Saif Ur Rehman Khan, Sai peck Lee, Reza Meimandi Parizi, Manzoor Elahi
Year Published: Nov. 2013 | 370-377 | ICIEIS2013