By Topic

Information Management and Engineering, 2009. ICIME '09. International Conference on

Date 3-5 April 2009

Filter Results

Displaying Results 1 - 25 of 158
  • [Front cover]

    Publication Year: 2009
    Save to Project icon | Request Permissions | PDF file iconPDF (392 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (73 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (202 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (111 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009 , Page(s): v - xv
    Save to Project icon | Request Permissions | PDF file iconPDF (176 KB)  
    Freely Available from IEEE
  • Preface

    Publication Year: 2009 , Page(s): xvi - xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (87 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • ICIME 2009 Organizing Committee

    Publication Year: 2009 , Page(s): xviii
    Save to Project icon | Request Permissions | PDF file iconPDF (99 KB)  
    Freely Available from IEEE
  • ICIME 2009 Reviewers

    Publication Year: 2009 , Page(s): xix
    Save to Project icon | Request Permissions | PDF file iconPDF (99 KB)  
    Freely Available from IEEE
  • Security of Internet Banking Services and its Linkage with Users' Trust: A Case Study of Parsian Bank of Iran and CIMB Bank of Malaysia

    Publication Year: 2009 , Page(s): 3 - 7
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (148 KB) |  | HTML iconHTML  

    Nowadays technology is growing fast and always adds new dimensions to our daily lives. In this way, Internet banking systems allow users to manage financial affairs such as checking account balances and transferring money between accounts as fast and easy as it can be. This study is done in Iran and Malaysia, the basic structure in Malaysia causes more concern, as well as use of this new way of banking. Also the differences between traditional and Internet banking are more obvious in Malaysia. Therefore, we separately investigated the users of Parsian Bank of Iran-Isfahan Province and CIMB Bank of Malaysia-Kuala Lumpur. For the purpose of validating or disproving the research hypotheses, SPSS software and one sample t-test, two sample t-test, one way ANOVA and correlation analysis was used. Due to the nature of Internet banking that occurs in the Web network, not face to face, expected security is very important. Therefore, the linkage between security and trust is being investigated and the results show a positive correlation between these two variables. Statistical results show that, age and the level of education affected the attitude toward Internet banking. But there is no statistical significant difference of the attitude between genders. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Segmenting Extra Pulmonary Tuberculous Lesions in Computed Tomography Images Using Positron Emission Tomography Intensity Markers

    Publication Year: 2009 , Page(s): 8 - 11
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (432 KB) |  | HTML iconHTML  

    Various studies have been conducted to expand the utilization of combined positron emission tomography and computed tomography (PET/CT) covering cases of infection and inflammation. PET images provide the functional activity of a lesion while CT images demonstrate the anatomical location. Hence, existence of infected lesions can be recognized in PET image but since the structural position can not be precisely defined on PET images, we need to retrieve this information from CT. We highlight localization of extra pulmonary tuberculosis infection using high activity points on PET image as references to extract regions of interest on CT image. Once PET and CT images have been registered, coordinates of the candidate points on PET are fed into seeded region growing algorithm to define the boundary of lesion on CT. The region growing process continues until a significant change in bilinear pixel values is reached. Results show that this algorithm works well considering the limitations of seeded region growing algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Algorithm for Building Ontology from Existing Rules: A Case Study

    Publication Year: 2009 , Page(s): 12 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (506 KB) |  | HTML iconHTML  

    From the fact that ontologies can help in making sense of huge amount of content, this paper proposes a case study for building ontology via set of rules generated by rule-based learning system. The proposed algorithm utilises the extracted and representative rules generated from the original dataset in developing ontology elements. The proposed algorithm is applied to a well known dataset in the breast cancer domain. The results are encouraging and support the potential role that this approach can play in providing a suitable starting point for ontology development. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neuronal Synchronization over Networks with Small-world Property

    Publication Year: 2009 , Page(s): 17 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (488 KB) |  | HTML iconHTML  

    In this paper the synchronization behavior of Hindmarsh-Rose neuron models over networks with small-world property is addressed. As network structure, a model proposed by Newman and Watts is considered and the synchronizability is obtained both by numerically solving the differential equations and by the master-stability-function method. In addition to diffusive electrical couplings, the effect of having excitatory chemical connections is also addressed and the complementary role of chemical synapses to the electrical one in providing complete synchrony in the network is shown. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Enhancing Synchronization Properties of Dynamical Networks Using Node and Edge Centrality Measures

    Publication Year: 2009 , Page(s): 22 - 26
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (413 KB) |  | HTML iconHTML  

    In this paper a method for enhancing the synchronizability of dynamical networks is discussed. The method considers both local structural properties, i.e. node degrees, and global properties, i.e. node and edge betweenness centrality measures. Its performance is compared with that of some other heuristic methods and the evidence for its superior behavior is discussed. As an index for the synchronizability of a dynamical network, the eigenratio of the Laplacian matrix of the connection graph is considered. As network structures, scale-free, Watts-Strogatz and random networks of different sizes and topological properties are used. Numerical calculations of the eigenratio in the networks weighted through different methods support the conclusion. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Taverna Workflow and Supporting Service for Single Nucleotide Polymorphisms Analysis

    Publication Year: 2009 , Page(s): 27 - 31
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (791 KB) |  | HTML iconHTML  

    This paper describes a Taverna workflow environment with supporting web services for Single Nucleotide Polymorphisms (SNP) analysis of genes in shrimp. The workflow is used to investigate SNPs advantages for gene development. Our first workflow environment did not give satisfying results for the phylogenetic tree processes because the data flows between the web services would frequently time-out. Our solution employs local web service interfaces in a cluster, which Taverna accesses with the aid of Soaplab analysis tools. The cluster enables the modified workflow to rapidly process the large amount of sequenced data required by phylogenetic trees, and is highly reliable. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rethinking Teaching: How ICTs Can Positively Impact Education in Architecture

    Publication Year: 2009 , Page(s): 32 - 36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (351 KB) |  | HTML iconHTML  

    The expanded use of new information technologies has significantly affected both the initiation and the maintenance of professional education. This trend is especially valuable for relatively isolated countries such as Taiwan, where architectural education could be vastly improved by encouraging regular interaction with faculties and practicing professionals outside the country. New, far-reaching information and communication technologies (ICTs) can facilitate such exchanges. This article 1) explores how ICTs hold a promise of transforming the process of professional education in architecture; 2) examines the issues and difficulties of implementing ICT in the teaching of professional architecture, and 3) discusses how instructional technology and school reform can, under the right conditions, become mutually reinforcing partners in supporting student learning, specifically in rapidly developing nations like Taiwan. Particular attention is given to the increased potential for collaborative work that crosses international and cultural boundaries, molding studies and exercises to the interests of students and teachers rather knowledge that has recently evolved, and how this maximized use will benefit architectural education. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Change Management in Business Process Modeling Survey

    Publication Year: 2009 , Page(s): 37 - 41
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (330 KB) |  | HTML iconHTML  

    Change management is very important to reduce risks and costs and maximizes the benefits of such major changes in business and information technology. Business Process Modeling (BPM) is the first and most important step in business process management lifecycle. BPM technology continues to face challenges in coping with dynamic business environments where requirements and goals are constantly changing at the execution time. In this paper a comparative study about the BPM languages and their runtime change management techniques will be provided and discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Runtime Change Management Based on Object Oriented Petri Net

    Publication Year: 2009 , Page(s): 42 - 46
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (312 KB) |  | HTML iconHTML  

    Change management is very important to reduce risks and costs and maximizes the benefits of such major changes in business and information technology. Business Process Modeling (BPM) technology continues to face challenges in coping with dynamic business environments where requirements and goals are constantly changing at the execution time. In this research, we propose a framework for change management technique based on the integration between Object Oriented (OO) diagramming technique and Petri Net (PN) modeling language to increase the representation capability for OO modeling for the dynamic changes in the runtime instances. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical Analysis of Team and Application Size on Software Maintenance and Support Activities

    Publication Year: 2009 , Page(s): 47 - 51
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (343 KB) |  | HTML iconHTML  

    Software industry is gaining momentum due to profound impact on the productivity of the various tasks. Typically software development life cycle includes, development activity and post release activities. The post release activities cover software maintenance and support. It is inevitable to deny the significance of software maintenance and support activities due to fairly a large size of the software. In this study we are analyzing the relationship of team size, application size and software maintenance and support activities. We used the latest dataset of International Standard Benchmark Group data repository containing the software maintenance and support information to conduct this empirical investigation. The results of this empirical investigation further reinforce the current perceptions of the significantly important role of application size, team structure and size on the software maintenance and support activities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Engineering Systems with Geometry

    Publication Year: 2009 , Page(s): 52 - 56
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (327 KB) |  | HTML iconHTML  

    The theory of connection has been used to solve many problems in engineering. economics, and in management; in this paper, firstly, the theory of connection is introduced. Secondly, a new toolbox of functions for modeling and simulation is presented. Thirdly, the theory is used to solve a planning and scheduling problem with the help of the toolbox of functions. The scope of this paper is limited to introducing and applying the theory of connection. The major contribution of the paper is the introduction of the toolbox with which mathematical modeling and simulations can be done efficiently on an operating platform like MATLAB. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fault Tolerant Method for Residue Arithmetic Circuits

    Publication Year: 2009 , Page(s): 59 - 63
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (396 KB) |  | HTML iconHTML  

    As a result of shrinking device dimensions, the occurrence of transient errors is increasing. This causes system reliability to be reduced. Thus, fault-tolerant methods are becoming increasingly important, particularly in safety-critical applications. In this paper a novel fault-tolerant method is proposed through combining time redundancy with information redundancy to reduce hardware complexity. Residue codes are selected as the source of information redundancy and the proposed technique is compared with some well-known fault tolerant schemes considering required hardware and delay. This method can be applied to various types of arithmetic circuits. Simulations results of a multiplier circuit shows that by using quadruple residue redundancy in comparison with a simple Residue Redundancy when multiplying two 64-bit numbers, number of gates can be reduced to 90% by exposing only 9% extra delay. Therefore,this technique can effectively reduce hardware complexity and consequently leads to large savings on the ALU as a whole,while introducing only a reasonable delay. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Time Replacement to Gross Replacement: The Effect of Online Virtual Game on Real Economy

    Publication Year: 2009 , Page(s): 64 - 69
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (417 KB) |  | HTML iconHTML  

    With the activities in the online virtual world becoming more and more complex, online virtual world seems to have developing into a virtual economy. This article develops a gross replacement model to analyze the effect of online virtual activities on the macro-economy. We propose that virtual activities, which include in-world activities and inter-world activity, do generate economic value and affect the macro-economy through three ways: when game-players allocate more time in virtual world and replace their real-world activities with virtual activities, it could generate the replacement effect on real gross domestic product and transfer effect on gross virtual product in the virtual world at the same time, but also increase complementary effect on the real income generated by the network industry. Results from survey proved that there exists the replacement effect. We developed a method of measuring the three effects of the virtual activity on real economy. Data from Second Life demonstrates that the virtual game has positive effect on the real GDP. Finally, we propose the suggestion that virtual economic activities should be included into the Mega-GDP to reflect the effect of network on the whole economy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Text-based Emotion Detection A Survey and Possible Improvements

    Publication Year: 2009 , Page(s): 70 - 74
    Cited by:  Papers (4)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (295 KB) |  | HTML iconHTML  

    This paper presents an overview of the emerging field of emotion detection from text and describes the current generation of detection methods that are usually divided into the following three main categories: keyword-based, learning-based, and hybrid recommendation approaches. Limitations of current detection methods are examined, and possible solutions are suggested to improve emotion detection capabilities in practical systems, which emphasize on human-computer interactions. These solutions include extracting keywords with semantic analysis, and ontology design with emotion theory of appraisal. Furthermore, a case-based reasoning architecture is proposed to combine these solutions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Data Mining Techniques: A Critical Literature Review

    Publication Year: 2009 , Page(s): 75 - 79
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (246 KB) |  | HTML iconHTML  

    Data mining has emerged as one of the major research domain in the recent decades in order to extract implicit and useful knowledge. This knowledge can be comprehended by humans easily. Initially, this knowledge extraction was computed and evaluated manually using statistical techniques. Subsequently,semi-automated data mining techniques emerged because of the advancement in the technology. Such advancement was also in the form of storage which increases the demands of analysis. In such case, semi-automated techniques have become inefficient. Therefore,automated data mining techniques were introduced to synthesis knowledge efficiently. Consequently, in this paper, we focused on automated data mining techniques.We have decided to critically reviewed literature on these techniques. We have highlighted the strengths and limitations of these automated techniques. Consequently,the significance of this paper is to provide a useful resource to academia as well as researchers in the form of concise literature on automated data mining techniques. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Development of an Arabized Fuzzy Expert System Shell

    Publication Year: 2009 , Page(s): 80 - 84
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (393 KB) |  | HTML iconHTML  

    This paper presents a comparison of various fuzzy expert system shells and describes the development of a fuzzy expert system shell intended for Arab users. The purpose of this shell is to provide Arab users with the ability to develop fuzzy expert systems using a simple Graphical User Interface. The shell is regarded as a general purpose shell. It is based on the implication methods: Rs, Rg, Rgs, Rgg, Rsg, Rss. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality Evaluation of E-government Website Using Web Diagnostic Tools: Asian Case

    Publication Year: 2009 , Page(s): 85 - 89
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (259 KB) |  | HTML iconHTML  

    In recent years, many people have devoted their efforts to the issue of quality of Web site. The concept of quality is consisting of many criteria: quality of service perspective, a user perspective, a content perspective or indeed a usability perspective. Because of its possible instant worldwide audience a Websitepsilas quality and reliability are crucial. The very special nature of the Web applications and Websites pose unique software testing challenges. Webmasters, Web applications developers, and Website quality assurance managers need tools and methods that can match up to the new needs. This research conducts some tests to measure the quality of e government web site of five Asian countries via Web diagnostic tools online. The result of this study confirmed that the E-government Websites of Asian are neglecting performance and quality criteria. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.