By Topic

Computer Science and Information Technology (CSIT), 2013 5th International Conference on

Date 27-28 March 2013

Filter Results

Displaying Results 1 - 25 of 61
  • [Front cover]

    Publication Year: 2013, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (360 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (535 KB)
    Freely Available from IEEE
  • 2013 5th International Conference on Computer Science and Information Technology (CSIT) [Copyright notice]

    Publication Year: 2013, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):iii - viii
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • [Two welcome messages]

    Publication Year: 2013, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (439 KB) | HTML iconHTML
    Freely Available from IEEE
  • Keynote speaker [2 abstracts]

    Publication Year: 2013, Page(s):xi - xii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB)

    Provides an abstract for each of the two keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Organizing committee

    Publication Year: 2013, Page(s):xiii - xvii
    Request permission for commercial reuse | PDF file iconPDF (816 KB)
    Freely Available from IEEE
  • Compact image signature generation: An application in image retrieval

    Publication Year: 2013, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6476 KB) | HTML iconHTML

    In this article, we have proposed a novel Content Based Image Retrieval (CBIR) system, where each image in the database is represented by a compact image signature which is computed using the Nonsubsampled Contourlet Transform (NSCT) and Fuzzy-C-means (FCM) technique. To improve the retrieval accuracy, the proposed system incorporates Least Square Support Vector Machine (LS-SVM) based classifier, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy logic and dempster-shafer theory to find kicking range of sepak takraw game

    Publication Year: 2013, Page(s):8 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB) | HTML iconHTML

    This research works considered how fuzzy logic and Dempster-Shafer theory can be applied for the sepak takraw game - for addressing uncertainty in kicking range of the ball. Uncertainty happens due to lack of knowledge or unpredictable factors. The salient aspect of the approach is the integration within a Tsukamoto's fuzzy reasoning and inferences for evidential reasoning based on Dempster-Shafer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling of ANFIS in predicting TiN coatings roughness

    Publication Year: 2013, Page(s):13 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (455 KB) | HTML iconHTML

    In this paper, an approach in predicting surface roughness of Titanium Aluminum Nitrite (TiN) coatings using Adaptive Network Based Fuzzy Inference System (ANFIS) is implemented. The TiN coatings were coated on tungsten carbide (WC) using Physical Vapor Deposition (PVD) magnetron sputtering process. The N2 pressure, argon pressure and turntable speed were selected as the input parameters and the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology semantic approach to extraction of knowledge from Holy Quran

    Publication Year: 2013, Page(s):19 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    With the continued demand for Islamic knowledge, which is mainly based on the Quran as a source of knowledge and wisdom, systems that facilitate an easy search of the content of the Quran remain a considerable challenge. Although in recent years there have been tools for Quran search, most of these tools are based on keyword search, meaning that the user needs to know the correct keywords before b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Local Triangular Kernel density-based clustering for high-dimensional data

    Publication Year: 2013, Page(s):24 - 32
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB) | HTML iconHTML

    A number of clustering algorithms can be employed to find clusters in multivariate data. However, the effectiveness and efficiency of the existing algorithms are limited, since the respective data has high dimension, contain large amount of noise and consist of clusters with arbitrary shapes and densities. In this paper, a new kernel density-based clustering algorithm, called Local Triangular Kern... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The forensic investigation of android private browsing sessions using orweb

    Publication Year: 2013, Page(s):33 - 37
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    The continued increase in the usage of Small Scale Digital Devices (SSDDs) to browse the web has made mobile devices a rich potential for digital evidence. Issues may arise when suspects attempt to hide their browsing habits using applications like Orweb - which intends to anonymize network traffic as well as ensure that no browsing history is saved on the device. In this work, the researchers con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using ontologies for users-groups matching in an annotation system

    Publication Year: 2013, Page(s):38 - 44
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB) | HTML iconHTML

    Representing a domain knowledge through an ontology allows people and systems to share a common corpus of knowledge for reasoning and communicating. We have recently introduced groups to the MADCOW annotation system, and in this paper we describe how the integration of ontologies allows more refined annotations to be posted on groups focused on some domain. In particular, concepts of the domain on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology evaluation: Which test to use

    Publication Year: 2013, Page(s):45 - 48
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    There are various methodologies to evaluate ontologies. One of them is based on the percentage coverage of ontology for domain knowledge i.e. gold samples. This paper demonstrates several experiments to show how we can use this ontological coverage to test the quality of ontology. The main concern here is how to use the coverage measure to accept or reject the quality of ontology. Two domains onto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel verification of UML using DiVinE tool

    Publication Year: 2013, Page(s):49 - 53
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    Unified Modeling Language is being used for modeling of business processes, real-time systems, embedded systems and hybrid systems. In software engineering, there are different techniques for verification of such systems. Model checking is one of the techniques for the automatic verification of software models. Earlier, these model were verified by sequential model checking tools. For very large c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A metric approach for simultaneous localization and map building

    Publication Year: 2013, Page(s):54 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (984 KB) | HTML iconHTML

    Simultaneous localization and mapping is a stochastic map building method which permits consistent robot navigation without requiring an a priori map. The map is built incrementally as the robot observes the environment with its on-board sensors and, at the same time, is used to localise the robot. In this paper simultaneous localization and map building is performed with a metric approach which p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Database security threats: A survey study

    Publication Year: 2013, Page(s):60 - 64
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    Databases are the repositories of the most important and expensive information in the enterprise. With the increase in access to data stored in databases, the frequency of attacks against those databases has also increased. A database threat refers to an object, person or other entity that represents a risk of loss or corruption of sensitive data to an asset. Today, in many business organizations,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approach for a rule based ontologies integration

    Publication Year: 2013, Page(s):65 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    Integrated Distributed Description Logics (IDDL) offers the possibility to describe semantic relations that exist between two ontologies in a networked-based system. However, in order to improve the expressivity of a distributed system, networked ontologies with context rules need to be integrated. OWL2Jess is a hybrid reasoning framework; that may be used to ensure the connection between OWL (Ont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An optimistic approach in distributed database concurrency control

    Publication Year: 2013, Page(s):71 - 75
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (446 KB) | HTML iconHTML

    In this paper, we present an optimistic concurrency control solution. The proposed solution represents an excellent blossom in the concurrency control field. It deals with the concurrency control anomalies, and, simultaneously, assures the reliability of the data before read-write transactions and after successfully committed. It can be used within the distributed database to track data logs and r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of discernibility matrix based reduct computation techniques

    Publication Year: 2013, Page(s):76 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    Rough set theory provides some principles that are used for data classification and knowledge reduction. Reduct is one of the main concepts that can be used for feature set reduction and for data classification. Finding the reduct set is computationally expensive for data sets with large number of attributes. Several heuristic approached have been proposed to extract reduct sets where some of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Review on raindrop detection and removal in weather degraded images

    Publication Year: 2013, Page(s):82 - 88
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (659 KB) | HTML iconHTML

    Bad weather conditions lead the robustness of most surveillance and driver assistance system. Therefore this paper attempts to review the type of bad weather in a perspective of computer vision and image processing and some recent effort on raindrop detection and removal techniques which has been successfully designed and developed to enhance the image degraded by the bad weather. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel communication system for firefighters using audio/video conferencing/sub-conferencing in standalone MANETs

    Publication Year: 2013, Page(s):89 - 98
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2233 KB) | HTML iconHTML

    As of today's current communication system, all Fire Fighters (FFs) use the simplex Radio Frequency (RF) system (walkie-talkie) to communicate with each other. Serious problems and injuries can occur because of the current communications system; so far, very little attention has been dedicated to solve these problems. Mobile Ad-Hoc Networks (MANETs) are infrastructure-less and self-organized wirel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Matching mother and calf reindeer using wireless sensor networks

    Publication Year: 2013, Page(s):99 - 105
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (595 KB) | HTML iconHTML

    The problem of matching newborn reindeer calves to their mothers, and hence to their owners, so that they are given proper identification tags, after the reindeers are gathered from the wild in September each year, is a painstaking task which is being undertaken using manpower which is very costly and time consuming, at the same time the manual techniques used are very stressful for the animals an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed secure routing protocol for Mobile Ad-Hoc Networks

    Publication Year: 2013, Page(s):106 - 110
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (575 KB) | HTML iconHTML

    Mobile Ad-Hoc Networks (MANETs) reputation is ever increasing rapidly. With the wide spread of MANET the need for securing routing protocols emerges as a very important issue, which is not easy to achieve in MANET. The concept and structure of MANETs make them prone to be easily attacked using several techniques often used against wired networks as well as new methods that have been particularly d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.