Notice
There is currently an issue with the citation download feature. Learn more

2014 Annual Global Online Conference on Information and Computer Technology

3-5 Dec. 2014

Filter Results

Displaying Results 1 - 25 of 29
  • [Front cover]

    Publication Year: 2014, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (916 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (13 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2014, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (148 KB)
    Freely Available from IEEE
  • Chairman's Message

    Publication Year: 2014, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2014, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2014, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • Machine Learning Facilitated Rice Prediction in Bangladesh

    Publication Year: 2014, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    The climate of a region is often determined by its landscape and amount of vegetation present in it. Environment parameters such as rainfall, wind-speed and humidity are highly influenced by these alluvial features. Bangladesh, a country situated on the banks of the Himalaya, does not have a homogeneous topography. Human settlement over the course of centuries has led to pockets of micro-regions. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The PSO Algorithm and the Diagnosis of Multiple Sclerosis Using Artificial Neural Networks

    Publication Year: 2014, Page(s):5 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (422 KB) | HTML iconHTML

    Artificial neural networks with radial basis functions are used to diagnose patients with multiple sclerosis. But the training of this type of network requires a great amount of time. It would be advantageous if we could speed up this training. The Particle Swarm Optimization (PSO) algorithm was previously used in a particular case, but the results were poor. It was suggested to review this scenar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Performance Analysis of Cloud Computing Using the Balanced Scorecard Approach

    Publication Year: 2014, Page(s):11 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (359 KB) | HTML iconHTML

    Cloud computing and the Internet of Things (IoT) are currently the two dominant Internet technologies, but cloud computing embodies the maturity of the computing field with its clear path to software generation, transmission, distribution and control. The growth and popularity of cloud-virtualized resources (infrastructure, platform and software), have been accompanied with an increase in cloud pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud Infrastructure for Higher Education: The Sullivan Experience

    Publication Year: 2014, Page(s):17 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    The growth in data traffic within higher institutions has always been accompanied with the adoption of a more scalable IT infrastructure. With the increasing budgetary constraints, cloud computing (a disruptive technology) presents an attractive means to address the scalability challenges while realizing the potential of ubiquitous IT services. The on-demand business proposition of the cloud provi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linux Containers Simplify Engineering and Scientific Simulations in the Cloud

    Publication Year: 2014, Page(s):22 - 26
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    While many cloud providers today offer powerful computing infrastructure as a service, and enterprises are already making routine use of it, the adoption of cloud computing for engineering and scientific applications is lagging behind. Despite the many benefits cloud resources provide, reasons for this slow adoption are many: complex access to clouds, inflexible software licensing, time-consuming ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HTML Educational Node.js System (HENS): An Applied System for Web Development

    Publication Year: 2014, Page(s):27 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    In this paper, a very compelling proposition is presented, a portable system for software development. The focus is on HTML, Java Script, CSS, Node.js, and SQLite. The system provides all the applications required for students to start developing web applications. The HTML Educational Node.js System (HENS) does not require installation or admin access allowing for portability. This environment is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining Bug Database for Detecting Potential Areas of Bug Occurrence

    Publication Year: 2014, Page(s):32 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (355 KB) | HTML iconHTML

    Vulnerability issues are important for any system, therefore, many testing approaches have been proposed so far. In social networking communities, there are lot of public pages and components where people might easily get access of the system inside. It is crucial to analyze the data from web applications specially data from the social networking websites to provide security to the users of the sy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of Affordable Care Act (ACA) on Health Informatics

    Publication Year: 2014, Page(s):36 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (133 KB) | HTML iconHTML

    The Healthcare Reform is complex with many facets of assumptions, facts, figures and expectations. In this paper the author discusses the potential impact of the Affordable Care Act (ACA) on Ambulatory and Non-ambulatory care settings while expecting 25-30 million new patients to enter our healthcare system by 2016.[1] Applying the theory of "episode multiplier" that might induce over 90-100 milli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Study into Information Security Governance Focus Areas and their Effects on Risk Management

    Publication Year: 2014, Page(s):42 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (162 KB) | HTML iconHTML

    This paper aimed at determining the extent to which information security governance (ISG) focus areas impact risk management. A total of 81 valid questionnaires were collected and processed using multiple linear regression and frequency analyses. The results showed that 92.7% of the variances in risk management were explained by the resource management, information security and business strategic ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Management Wake-Up and Govern: The Era of the Cyber Security Governance

    Publication Year: 2014, Page(s):50 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    The subject of cyber security governance has evolved and has achieved a greater degree of importance as organizations increase their operational efficiencies through Information Technology. Additionally due to the use of Information Technology, organizations also face increased pressure to manage data and the Information Technology that is used to store and transport it. As a result organizations ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User Online Privacy and Identity Management Behaviors: A Comparative Study

    Publication Year: 2014, Page(s):53 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    The digital era has introduced information technology to the man on the street. This has led to the growing use of mobile devices and smartphones with internet connectivity capabilities. With more people owning internet connected smartphones, the number of online users has increased too. Some of these online users are self-taught and have not been trained in online etiquette or secure usage of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Energy Meter Reader with Load Control Capacity and Secure Switching Using a Password Based Relay Circuit

    Publication Year: 2014, Page(s):58 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    Energy conservation and its efficient utilization has been a subject of discourse amongst numerous stakeholders since the industrial age. Advancements in information technology tools thus provides a solution to automating the process of electricity metering as well as remote load control alternatives. This paper thus presents an energy meter reader implemented with a microcontroller based logic me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SYMBOL-BASED INTERFLOW NETWORK CODING FOR WIRELESS NETWORKS

    Publication Year: 2014, Page(s):64 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2720 KB) | HTML iconHTML

    We investigate the problem of reliable unicast transmissions in wireless ad hoc and WLAN/WiMAX networks. Currently, approaches using network coding show several-fold gain in term of bandwidth efficiency over the traditional technique, "store and forward". However, most of these approaches have assumed that aU the information flows have the same packet size, while the other's consider h'ansmission ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fault Tolerant Workflow for Reproducible Research

    Publication Year: 2014, Page(s):70 - 75
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    In this work, the authors present a set of tools to overcome the problem of creating and executing distributed applications on dynamic environments in a resilient way, also ensuring the reproducibility of the performed experiments. The objective is to provide a portable, unattended and fault-tolerant set of tools, encapsulating the infrastructure-dependent operations away from the application deve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reference Architectural Pattern: Component-Based Scheduling System for Heterogeneous Computing Environment

    Publication Year: 2014, Page(s):76 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (546 KB) | HTML iconHTML

    The paper presents a conceptual design pattern for a component-based scheduling framework for several classes of multi-component applications. In addition, we propose an object oriented reference architecture, which guides the design of a general purpose scheduling system inside a wide-area heterogeneous computing environment or meta-systems. The heterogeneity nature of today's application and com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding Fault-Tolerant Solutions for Complete Bipartite Networks

    Publication Year: 2014, Page(s):85 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (122 KB) | HTML iconHTML

    A major goal in designing multicomputer networks is to include fault tolerance capability so that the system can continue to operate correctly after losing some of its basic components. This is usually achieved by introducing redundancy, i.e, Adding spare processors and links to the network. However, due to the limitation on the number of links adjacent to a node in VLSI design, it is important to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HTML Architecture, a Novel Development System (HANDS): An Approach for Web Development

    Publication Year: 2014, Page(s):90 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    In this paper, a very compelling proposition is presented, a novel approach for web development that is a hybrid of Single Page Applications (SPA) and server side applications. The proposed architecture lowers the entry to web development by providing a simplistic approach for development. The focus is on HTML, Java Script, Cascading Style Sheets, and Node.js. The architecture provides all the com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.