No abstract available.
Proceeding Downloads
Performance analysis of black hole attack in MANET
The underlying element that supports the device communication in the MANET is the wireless connection capability. Each node has the ability to communicate with other nodes via the creation of routing path. However, due to the fact that nodes in MANET ...
Frag-shells cube based on hierarchical dimension encoding tree
Pre-computation of data cube can greatly improve the performance of OLAP (online analytical processing). There are a lot of effective pre-computation methods of data cube. But in practice, appropriate pre-computation method for the characteristics of ...
DNS amplification attack detection and mitigation via sFlow with security-centric SDN
Following the rise of modern networking, DDoS attacks are undeniably becoming more abusive. DNS amplification attack is a type of reflected DDoS attack that exploits DNS servers to distribute amplified responses. Detection-wise, related studies have ...
The effects of ambient scent on hedonic experience on online shopping
This study examines the effects of scent on hedonic experience in online shopping and then, which investigates olfactory cues such as citrus-mint and citrus-vanilla that improve the buyer's emotional state by creating an atmospherics. We selected a ...
Big data analysis on secure VoIP services
VoIP users increase each day. However, the documentation on the behavior of VoIP applications is still lacking. The needs to understand and generalize the behavior of applications like Skype, GoogleTalk and SIP based applications grow each day. There ...
Toward accessibility with usability: understanding the requirements of impaired uses in the mobile context
- Clauirton Siebra,
- Tatiana B. Gouveia,
- Jefte Macedo,
- Fabio Q. B. da Silva,
- Andre L M Santos,
- Walter Correia,
- Marcelo Penha,
- Marcelo Anjos,
- Fabiana Florentin
When applications intend to support accessibility, aspects of usability must be reviewed to adapt or extend common functional requirements that are implemented to ensure an easy use of applications. However, initiatives to develop guidelines for ...
Architectural framework in next learning support environment
Information technology has given successive and successful evolutions to different types of methods, means, tools, systems, environments and so on in learning/teaching activities, as well as the effectiveness of various kinds of human activities such as ...
Design & development of digital learning resource (BMT): blended learning approach
- Zahidah Abd Kadir,
- Shanti Balraj Baboo,
- Nurul Shuhadah Rosni,
- Zaidatul Husna Abd Rahman,
- Nurulain Abu Bakar
The evolution of technologies and the development of new media design for educational purposes are expanding. This work aims to look at the use of blended learning and how it affects students' score in examination. BMT (Basic Movement Therapy) Digital ...
Web-based application for learning Malaysian sign language
Malaysian Sign Language is the native language for the deaf people in Malaysia. However, there is still a lack of web resources available to the public to facilitate the learning of the language. To overcome this problem, a research initiative has been ...
Discovering users navigation of online newspaper using Markov model
Online newspaper readership is gradually increasing as users are actively spending more time on the Internet to read news. Understanding how users navigate the site is important so we can improve their Web experience. In this study, we collect Web ...
Improvement of user authentication scheme preserving uniqueness and anonymity for connected health care
Connected health care is a remotely healthcare system and it provides several services including telecare medicine, personally controlled health record, patient monitoring and so on. Recently, Xu et al. have shown that Xie et al.'s remote user ...
Experiments on images displayed for praising and scolding in e-learning systems
Currently, in addition to cloud computing and broadband communication, e-learning is being provided through various devices such as smart phones and tablets. While e-learning has many advantages such as users being able to study everywhere and at any ...
An intention-based approach to the updatability of views in relational databases
Views are essential for relational databases in that they could provide a high degree of logical data independence. However, although views are a useful tool for queries, they present significant problems if insertions, deletions, or rewrites are ...
A proposal of event study methodology with Twitter sentimental analysis for risk management
Once organizations have the security incident and breaches, they have to pay tremendous costs. Although visible cost, such as the incident response cost, customer follow-up care, and legal cost are predictable and calculable, it is tough to evaluate and ...
Lecturers' perception on social media networks uses in education
Reputation of higher education institutes are significantly affected by the degree of the students' satisfactions. Therefore, considering students opinions about the quality of education is very important in order to maintain the academic institutes' ...
Top-k frequent induced subgraph mining on a sliding window using sampling
Finding Frequent Induced Subgraph in a stream of graph data is critical for many application such as frequent substructures in biological networks, chemical compounds, or community detection in social networks. Some approaches have been proposed for ...
Study on proactive auto scaling for instance through the prediction of network traffic on the container environment
In this paper, we propose container traffic analyzer (COTA) structure to improve accommodating more network traffic to VMs and to reduce the scale-out time. COTA consists of two functions. The one is reporting the amount of network traffic on real-time. ...
Cryptanalysis and improvement of robust authentication scheme for telecare medicine information systems
Telecare Medicine Information System holds up health-care delivery service between patients and doctor. Send the user or TMIS server's information through the public channel. To protect patients' personal information such has telephone number, home ...
Dynamic weighted sequential pattern mining for USN system
Sequential pattern mining is a technique which finds out frequent patterns from the data set with a time attribute. Dynamic weighted sequential pattern mining can be applied to a computing environment that is constantly changed according to time period ...
A proposed model of online information grounds
This paper presents findings from a study of IT professionals on Twitter. Our study aimed to understand the way IT Professionals' use of Twitter for professional purposes. The data for this study was collected using online observations and interviews to ...
Fusion of face recognition and facial expression detection for authentication: a proposed model
- Delina Beh Mei Yin,
- Shariman Omar,
- Bazilah A. Talip,
- Amalia Muklas,
- Nur Afiqah Mohd Norain,
- Abu Talib Othman
The paper presents a novel model of hybrid biometric-based authentication. Currently, the recognition accuracy of a single biometric verification system is often much reduced due to many factors such as the environment, user mode and physiological ...
Effects of quizzes in marking supported e-learning
Marking on a textbook when studying is a natural and subjective learning activity conducted by a learner. Such activity can be positively utilized in the learning process. If we could extract marked phrases or sentences, it will be possible to develop ...
Feature expression of frequency transform regarding daily power demand information
Owing to the introduction of an energy-monitoring device called the "smart meter," a large amount of power-demand information regarding private houses is being stored around the world through the development of smart grids. Such electric consumption ...
Salt hero: an interactive application for learning salt in chemistry
We introduce Salt Hero, an interactive learning application designed to support students in learning about salt. Salt is an ionic compound that results from the neutralisation reaction of an acid and a base, and is one of the fundamental topics when ...
Identifying major contents among web pages with search engine suggests by modeling topics
This paper addresses the problem of identifying irrelevant items from a small set of similar documents using Web search engine suggests. Specifically, we collected volumes of Web pages through Web search engines and inspected the page contents using ...
Immersive browsing in an image sphere
In this paper, we present an immersive image database navigation system. Images are visualised in a spherical visualisation space and arranged, on a grid, by colour so that images of similar colour are located close to each other, while access to large ...
TopicWave: visual exploration for topics with hierarchical time-varying data
Opinion leaders have great influence in social networks. When influential events occur, experts may be concerned with the opinion flow of the event from social networks. Therefore, the trend of events during a time interval should be explored using a ...
Study on user customized data service model for improving data service reliability
New value was extracted through managing and analyzing huge volume of data in Big Data paradigm. With the paradigm, data environment such as Public Data and Data Market was built to collect and provide data for data users. Some issues to realize data-...
Efficient query processing on distributed stream processing engine
Distributed stream processing engines, such as Storm and Samza, have been developed to process large scale stream data. The engines are scale out horizontally with shared nothing architecture, but they do not provide high-level query language like SQL. ...
WARP: an web-based adaptive remote display protocol for improvement of user experience
Virtual Desktop Infrastructure (VDI) is growing on account of virtualization and network technology's development. VDI user utilizes virtual desktop from remote place through network by using diverse device. Providing user experiment such as local ...