By Topic

Computers & Informatics (ISCI), 2012 IEEE Symposium on

Date 18-20 March 2012

Filter Results

Displaying Results 1 - 25 of 58
  • Welcome message

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (40 KB) | HTML iconHTML

    On behalf of the Organizing Committee of ISCI 2012 it gives me great pleasure in welcoming all delegates to Penang, Malaysia. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Table of contents

    Publication Year: 2012, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • International Advisory Comittee

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s):iv - vii
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • Technical program overview

    Publication Year: 2012, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (317 KB)
    Freely Available from IEEE
  • Technical program / abstract

    Publication Year: 2012, Page(s):ix - xxii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (639 KB)

    Summary form only given. Presents abstracts of the Keynote papers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2012, Page(s):xxiii - xxiv
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Key.net: A system and method for accessing offline lock system by the Internet- made key using barcode technology

    Publication Year: 2012, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB) | HTML iconHTML

    Regarding to Key.net, Clients can apply for their desired room key, which is available for a specific duration using an online booking system. The key can be printed at home without utilizing any special peripheral equipment. The issued key is recognizable by offline and the standalone lock system. Barcode as a code carrier has been chosen, according to its advantages, such as reduced cost of key ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding the user acceptance of gesture-based human-computer interactions

    Publication Year: 2012, Page(s):7 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    This study empirically evaluates how user perceptions and attitudes influence behavioral intention use of multi-touch gestures on a large multi-touch screen by using Technology Acceptance Model (TAM). In the study the researchers presented 20 novice users with an introduction and hands-on of multi-touch gestures on window, object and image manipulations. Following the hand-on session, data on user... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stock prediction using multiple time series of stock prices and news articles

    Publication Year: 2012, Page(s):11 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2054 KB) | HTML iconHTML

    In the stock market, stock prices of multiple companies interact with each other. For instance, a stock price movement of a company triggers that of another one. Therefore, investors are interested in inter-relationship of multiple companies whose stock prices interact with each other. In recent years, a number of studies are conducted to predict stock price movements in the area of artificial int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stock market prediction based on interrelated time series data

    Publication Year: 2012, Page(s):17 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    In this paper, we propose a stock market prediction method based on interrelated time series data. Though there are a lot of stock market prediction models, there are few models which predict a stock by considering other time series data. Moreover it is difficult to discover which data is interrelated with a predicted stock. Therefore we focus on extracting interrelationships between the predicted... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A large scale knowledge integration leading to human decision making

    Publication Year: 2012, Page(s):22 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    For the first time natural language processing approaches are applied on a large scale to psychometric methods. Psychometric methods have been applied in hundreds of thousands of published studies. This study examines automated approach to discovering behavioral knowledge that are encoded as constructs in social and behavioral science disciplines. To date, constructs relationships are ordinarily r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge discovery based on importance of features

    Publication Year: 2012, Page(s):28 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3970 KB) | HTML iconHTML

    This paper proposes a system which datamines time series classification knowledge leading by a discovery of feature patterns. In the case of classification, prediction accuracy is an important point, and to build a human understandable model is another essential issue. To satisfy these requests, our system runs in two stages. In the first stage, the system discovers important feature patterns whic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stereo matching based on disparity propagation using cellular evolutionary neural networks

    Publication Year: 2012, Page(s):34 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1820 KB) | HTML iconHTML

    In this paper, we propose a novel stereo matching algorithm based on disparity propagation using cellular evolutionary neural networks (CEN). Most of previous works have drawbacks and advantages in accuracy, running time and scene types of image; however, our advantage is obtaining not exceedingly-high but satisfactory accuracy for various scenes with low computational cost. Our algorithm calculat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image filtering with multilayered cellularly connected evolutionary neural networks

    Publication Year: 2012, Page(s):40 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1212 KB) | HTML iconHTML

    This paper presents a study of automatic construction of image filters with a novel multilayered cellular network. Each layer of the proposed network is Cellular Real Valued Flexibly Connected Neural Network (CRFCN), the neural network model for automatic construction of image filters we previously proposed. CRFCN consists of a regular array of evolutionary neural networks called Real Valued Flexi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refined cellular automata model for Tawaf simulation

    Publication Year: 2012, Page(s):46 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1043 KB) | HTML iconHTML

    In this paper, a cellular automata (CA) model is extended to simulate the circular movements of Muslim pilgrims performing the Tawaf ritual within the Masjid Al-Haram facility in Makkah. There is scant literature on the implementation of CA in modeling circular motions. Moreover, most of the published studies do not take into account the pedestrian's ability to select the exit route in their model... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Review in Sign Language Recognition Systems

    Publication Year: 2012, Page(s):52 - 57
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (414 KB) | HTML iconHTML

    The Sign Language Recognition System (SLR) is highly desired due to its ability to overcome the barrier between deaf and hearing people. At present, a robust SLR is still unavailable in the real world due to numerous obstacles. Additionally, as we know, Sign Language recognition has emerged as one of the most important research areas in the field of human computer interaction (HCI). Hence, this pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A PageRank based detection technique for phishing web sites

    Publication Year: 2012, Page(s):58 - 63
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (569 KB) | HTML iconHTML

    Phishing is an attempt to acquire one's information without user's knowledge by tricking him by making similar kind of website or sending emails to user which looks like legitimate site or email. Phishing is a social cyber threat attack, which is causing severe loss of economy to the user, due to phishing attacks online transaction users are declining. This paper aims to design and implement a new... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SOA4DERTS: A Service-Oriented UML profile for Distributed Embedded Real-Time Systems

    Publication Year: 2012, Page(s):64 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB) | HTML iconHTML

    In order to reduce the development complexities of Distributed Embedded Real-Time Systems (DERTS), new software engineering methods and techniques are always adopted. The use of Service Orientated Computing (SOC) and the Unified Modeling Language (UML) for DERTS development is part of this trend. There exists a number of UML profiles for embedded, real-time and SOC separately. However, a holistic ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An empirical assessment of the use of different communication modes for requirement elicitation and negotiation using students as a subject

    Publication Year: 2012, Page(s):70 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (441 KB) | HTML iconHTML

    Requirements engineering is considered the most communication-intensive activity among all other software engineering activities. Requirements' elicitation and negotiation are communication-rich stages that require intensive contact between different stakeholders (i.e., clients and engineers). For this reason, the need to identify the appropriate task/technology fits, to support the communication ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Educators' perception towards automation of curriculum design process for institution of higher learning in Malaysia

    Publication Year: 2012, Page(s):75 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (470 KB) | HTML iconHTML

    Curriculum design is an important phase in curriculum development process. Curriculum design precedes its submission to national regulatory body for approval. Curriculum design process plays an important role in helping educators to produce curriculum that is incompliance with the program standards and guidelines set by national regulatory body. The traditional approach requires much cumbersome ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sequence-based interaction testing implementation using Bees Algorithm

    Publication Year: 2012, Page(s):81 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (497 KB) | HTML iconHTML

    T-way strategies is used to generate test data to detect faults due to interaction. In the literature, there are many t-way strategies developed by researchers for the past 10 years. However, most of the strategies assumed sequence-less parameter interaction. In the real world, there are many systems that consider the sequence of the input parameter in order to produce correct output. These intera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generate Sub-Agent Mechanism to protect mobile agent privacy

    Publication Year: 2012, Page(s):86 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB) | HTML iconHTML

    In recent years, the mobile agent system has taken a wide area of researchers' attention. They conducted intensive researches in the security areas to reach an ideal mobile agent model. The security area still needs more efforts to protect the mobile agent system. The protection of the mobile agent is one of these issues. this paper a new mechanism called Generated Sub-Agent Mechanism (GSAM) to pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reduced complexity scheme for MIMO receiver with combined ZF-OSIC and ML detection

    Publication Year: 2012, Page(s):92 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    Wireless system capacity can be increased enormously by using multiple antennas at transmitter and receiver sides in the system. Among them, maximum likelihood (ML) receiver is an optimal receiver, but it is difficult to implement due to high complexity arising from exhaustive searches over all candidate vector symbols. On the other hand, zero forcing ordered successive interference cancellation (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Persist: Mitigating route breakages in wireless mesh networks

    Publication Year: 2012, Page(s):97 - 100
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB) | HTML iconHTML

    Although static mesh networks lack mobility, yet research shows that route breakages are quite frequent for reactive protocols in 802.11-based static mesh networks. In 802.11, a link is considered broken if a fixed number of consecutive transmission attempts fail at link-layer. However, transmissions failures can be temporary and may occur due a number of reasons including collisions on the channe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.