Notice
There is currently an issue with the citation download feature. Learn more

2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)

4-6 Nov. 2015

Filter Results

Displaying Results 1 - 25 of 31
  • [Front cover]

    Publication Year: 2015, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (3346 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (16 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • Message from Chairman

    Publication Year: 2015, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (279 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2015, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2015, Page(s):x - xv
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2015, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE
  • Growing Software Applications by Incremental Development of Heterogeneous Micro-Applications Using Cellular Regeneration Concepts

    Publication Year: 2015, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    In this paper, the concepts of growing software applications by incremental development of heterogeneous micro-applications using cellular regeneration concepts are explored. The proposal is the move from homogeneous monolithic architectures to heterogeneous micro-architectures, to allow for application evolution. The focus is on growing legacy applications that will evolve to remain healthy. Cell... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Influence of Wavelets and Boundary Conditions on the Diagnosis of Multiple Sclerosis Using Artificial Neural Networks

    Publication Year: 2015, Page(s):6 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    Artificial neural networks with radial basis functions are used to diagnose patients with multiple sclerosis. But the results of the training of this type of network varies greatly with the wavelet selected to compress the data and with the boundary conditions applied to the signal to compensate for the usage of a closed interval. In this paper we compare the results obtained for several wavelets ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Educating the STEM Leaders of Tomorrow

    Publication Year: 2015, Page(s):11 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    In this paper, we discuss our contribution to the field of computer science and education technology through various projects we have designed and implemented at Auburn University. We begin by introducing a very successful computer proficiency course called Personal Computer Applications (PCA). The goal of this course is not only to impart useful computer skills to the students but also to attract... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the Effectiveness of Lego Robots in Engaged Scholarship

    Publication Year: 2015, Page(s):16 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    The aim of this paper is to investigate the effect of Lego Robotics Training on learner performance in mathematics. This research was conducted partially to determine the efficacy of a community engagement project that was established to inspire young people's interest in science, technology, engineering and mathematics (STEM) fields. The project uses LEGO League robotics to mentor learners (aged ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incorporating Mobile Learning in Institutions of Higher Learning in South Africa

    Publication Year: 2015, Page(s):21 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Despite the advancements made towards learning such as technological innovations in the classroom and access to learning in general, there are significant challenges that remain especially the modes of delivery of quality education apart from the traditional classroom teaching and learning. In the endeavour to discover feasible solutions for these challenges, much trust has been put in new data an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Processing of Metadata on Multimedia Using ExifTool: A Programming Approach in Python

    Publication Year: 2015, Page(s):26 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    The exchange image file format (Exif) standard defines the specification for how to store metadata and ancillary tags for multimedia files. These tags are useful in documenting information about how the content in the multimedia file was collected, stored, and modified. The list of available tags are constantly being updated, with one of the most notable updates being the Global Positioning System... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Procrustes Classifier for Marine Day Marker

    Publication Year: 2015, Page(s):31 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    This conceptual paper examines the computer identification of signs called day markers that commonly appear for navigation purposes in a marine channel waterway. Most people are familiar with these signs when navigating in a boat as they appear either as red triangles, green rectangles or diamonds since they aid navigation through the channel. The paper focuses on a proposed classifier using Procr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decision Support in Context of a Standard-Based Usability Evaluation

    Publication Year: 2015, Page(s):36 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB) | HTML iconHTML

    A usability evaluation based on international standards can be a challenging task. There is a large number of (potentially) useful standard documents and the theoretical knowledge represented by these sources has to be translated into practical solutions. As a part of a European project our approach enables involved end users to find appropriate usability standards for evaluating specific technolo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predictive Pointing in Cascading Pull-Down Menus

    Publication Year: 2015, Page(s):41 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    Cascading pull-down menus are common interface elements in many modern graphical interactive applications. Navigation of standard cascading pull-down menus is governed by a combination of Fitts' and Acott-Zhai steering laws, however, recent research has shown that the constraints imposed by the two laws can be overcome by reducing the target distance by either reducing the target distance or incre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accessibility, Quality and Performance of Government Portals and Ministry Web Sites: A View Using Diagnostic Tools

    Publication Year: 2015, Page(s):46 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    Accessibility, quality, and performance of government websites and portals are key issues for e-government programmes. Although the number of government sites has increased rapidly in the past few years, their ultimate success will largely depend on their accessibility, quality and performance. This paper reports the results of an evaluative study of 19 e-government websites and portals using a co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Elliptic Curve Algorithm for Iris Pattern Recognition

    Publication Year: 2015, Page(s):51 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2499 KB) | HTML iconHTML

    This paper presents an iris recognition system with a self-developed elliptic curve algorithm or hash. The system was written in Python with the OpenCV library. This iris recognition system is faster than standard systems because the extraction of the iris was done on a grayscale image. To test the elliptic curve hash, iris recognition system, and computation time, images from the UBIRIS database ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Privacy Preserving Context-Aware Insider Threat Prediction and Prevention Model Predicated on the Components of the Fraud Diamond

    Publication Year: 2015, Page(s):60 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    This paper presents a novel, interdisciplinary insider threat prediction and prevention model which combines several approaches, techniques and tools from computer science, criminology and psychology. It is based on the fraud diamond which comprises four components: pressure (i.e. motive), opportunity, capability and rationalisation. In general, it has been found that a criminal must have the moti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Obfuscation of Image Sensor Fingerprints

    Publication Year: 2015, Page(s):66 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (555 KB) | HTML iconHTML

    To date, there have been several attempts to utilize sensor noise for device identification and authentication. Most of these developments have taken place in mobile image sensors, accelerometers, and microphones. The ramifications of isolating sensor fingerprints is that any third party, utilizing multiple sources, may effectively track the mobile movements of a user without the use of cookies. S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure and Efficient Data Transmission for Wireless Mesh Networks

    Publication Year: 2015, Page(s):70 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    Wireless data dissemination can be utilized for broadcasting emergency services and military communication. However secure and reliable dissemination of data over a lossy wireless network is challenging due to security attacks and network dynamics. The current proposed schemes require high computational capability of the devices which may not be feasible in most of hand held receivers. Furthermore... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SONET over Ethernet

    Publication Year: 2015, Page(s):75 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (409 KB) | HTML iconHTML

    Today's common and extensively used MAC layers are SONET and Ethernet. They serve different networks and are incompatible. It is necessary to interface the two networks since they may be part of the route used by data. This paper integrates SONET over Ethernet thus creating compatibility between these two protocols without going through unnecessary conversions. Simulation shows that this New Layer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FPGA Based Wireless Emergency Medical System for Developing Countries

    Publication Year: 2015, Page(s):80 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (419 KB) | HTML iconHTML

    In developing countries like India the translational gap between research development & implementation to routine clinical applications is high. To bridge this gap, a research methodology related to the development of emergency medical system & implementation of pre-hospital care is proposed. In order to provide comfort & convenience to first responders & paramedics, system is highly portable due ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.