world congress on engineering and computer al mamun, khairul anam, md fakhrul alam onik, and a...
TRANSCRIPT
World Congress on Engineering and
Computer Science
WCECS 2012
24-26 October, 2012
San Francisco, USA
Organizing Association;
IAENG
International Association of Engineers
IA ENG
International Association of EngineersISBN: 978-988-19251-6-9
ISSN: 2078-0958
Table of Contents
World Congress on Engineering and
Computer Science 2012
WCECS 2012
Preface xxx
Committees xxx
Abstracts of Invited Lectures xl
VOLUME I
International Conference on Computer Science and
Applications 2012
On Parity based Divide and Conquer Recursive Functions
Sung-Hyuk Cha 1
Evaluating Cache Contention Prediction - A Ranking Based Approach -
Michael Zwick 7
A New Anytime Dynamic Navigation Algorithm
Weiya Yue, John Franco, Weiwei Cao, and Qiang Han 17
Secure Information Sharing in Mixed-Criticality Systems
Armin Wasicek, and Thomas Mair 23
Detection of Non-Content Based Attacks Using GA with Extended KDD
Features
Edward Guillen, Jhordany Rodriguez, Rafael Paez, and Andrea
Rodriguez
iii
Alkanet: A Dynamic Malware Analyzer based on Virtual Machine Monitor
Yuto Otsuki, Eiji Takimoto, Takehiro Kashiyama, Shoichi Saito, Eric5v
W. Cooper, and Koichi Mouri
Information Translation: A Practitioners Approach
Majid Zaman, S. M. K. Quadri, and Muheet Ahmed Butt 45
An Integrated Monitoring System for Managing Diabetes Patients Using
Mobile Computing Technology
Mashael S. BinSabbar, and Mznah A. Al~Rodhaan 48
Enterprise High Assurance Scale-up
Coimbatore Chandersekaran, and William R Simpson 54
A Mood Driven Computational Model for Gross Emotion Regulation
Process Paradigm
Ahmad Soleimani, and Ziad Kobti 60
An Easy-to-Use 3D Visualization System for Planning Context-aware
Applications in Smart Buildings
Jun-Ming Su 66
People Centred Information Security Model for Corporate Nigeria
Fidel is 0. Aghware, and Emeka 0. Egbuna 72
A Unified Approach to Parallel Programming
Victor Eijkhout 78
Flood Analysis and Prediction Support based on UML and Mobile Petri
Net Specification and Verification
Sher Afzal Khan, Rao Sohail Iqbal, Nazir Ahmad Zafar, and Farooq^
Ahmad
A 3-Tier Framework Web-based Document, Content and Enterprise
Resource Management Systems
Adesanya Sunday Adelaja 89
Automatic Parallelization Tools
King Qian 97
iv
ii
Tracking Malware using Internet Activity Data
Abner Mendoza, and Cihan Varol 102
Hybrid Multi-Biometric Person Authentication System
Tran Binh Long, and Le Hoang Thai 106
Authorship Attribution of Documents Using Data Compression as a
Classifier
W. R. Oliveira Jr, E. J. R. Justino, and L. E. S. Oliveira... 112
An Optimized Numerical Method for Solving the Two-Dimensional
Impedance Equation
C. M. A. Robles G., A. Bucio R., and M. P. Ramirez T. 116
Feature Relevance Analysis and Classification of Road Traffic
Accident Data through Data Mining Techniques
S. Shanthi, and R. Geetha Ramani 122
Cellular Network Service Dependency Modeling for Network Faults
Prediction
Oku the P. Kogeda 128
Development of a Web-based Tailored Intervention for Excessive
Gaming
Y. Y. Chen, K. N. Goh, and M. F. Abdul Razak 134
Analysis of Freeware Hacking Toolkit
Albert K. Ansah, Janus Kyei-Nimakoh, and Millicent Kontoh....
140
Stress-strain Analysis of the Temporomandibular Joint with Subtotal
Prosthesis
Josef Danek, Tatjana Dostalova, Milan Hubacek, Nima Mahdian, and JirilbU
Nedoma
Value based Regression Test Case Prioritization
E. Ashraf, A. Rauf, and K. Mahmood 156
Towards a Pharmaceutical Ontology for African Traditional Herbs
John B. Oladosu, Matthew 0. Adigun, and Victor Mbarika 161
v
Hybridization of Genetic Algorithm and Linear Programming for
Solving Cell Formation Problem with Alternative Process Routings
Payam Chiniforooshan, and Shahrooz Shahparvari 167
Taxonomy and Nomenclature of Preferential Voting Methods
Sung-Hyuk Cha, and Yoo Jung An 173
Towards the Spatial Database Specification for GIS using Z-Notations
Farooq Ahmad, Salahuddin Khan, and Sher Afzal Khan 179
Modeling Group Emphasis
R. T. Hans, N. D. Chuene, and C. K. Lepota 185
An Essay- Based Examination Assessment Model Using Double Blind
Marking Technique
Akanbi Caleb Olufisoye 189
Bond-Sequential Search (BSS)
Omer H. Abu El Haija, and Azmi Alazzam 194
Automated Number Plate Recognition Using Hough Lines and Template
Matching
Saqib Rasheed, Asad Naeem, and Omer Ishaq 199
Improving Reliability in Application-Specific 3D Network-on-Chip
Farnoosh Hosseinzadeh, Nader Bagherzadeh, Ahmad Khademzadeh, Majid
Janidarmian, and Fathollah Karimi Koupaei
Deployment of Cloud Computing into VANET to Create Ad Hoc Cloud
Network Architecture
Md Ali Al Mamun, Khairul Anam, Md Fakhrul Alam Onik, and A M Esfar~E-
Alam
Information Extraction from Research Papers by Data Integration and
Data Validation from Multiple Header Extraction Sources
Ozair Saleem, and Seemab Latif 215
A Framework of Discourse Analysis and Modeling
Feng-Jen Yang 220
vi
A Column Generation Approach to Scheduling of Real-Time Networks
Ernst Althaus, Sebastian Hoffmann, Joschka Kupilas, and Eike
Thaden
International Conference on Education and
Information Technology 2012
An Error Code Highlighting Function in Java Programming Learning
Assistant System Using Test-Driven Development Method
Nobuo Funabiki, Yuuki Fukuyama, Yukiko Matsushima, Toru Nakanishi,
and Kan Watanabe
Authoring Tutored, Adaptive e-Courses in a Personal Learning
Environment: a Dynamic Syllabus and Dynamic Assembly Approach
Francesco Altimari, Anna Franca Plastina, Michael D. Cronin, Rocco
Servidio, Maria Caria, and Attilio Pedrazzoli
Experimenting on the Added Value of M-Learning for the Teaching of
Word Problems
K. M. Cassia, and S. D. Eyono Obono 243
Real-time E-Learning System: A Tool for Students Population
Decongestion in Nigeria Public Higher Institutions of Learning (Case
Study of Yaba College Of Technology Nigeria)
Ladipo K. Margret, Oyeyinka I. Kolawole, and Yekini N. Asafe.
249
Applying the Augmented Reality and RFID Technologies in the
Maintenance of Mining Machines
D. Michalak 256
A Framework for Promoting Reading Skills for Hearing-Impaired
Persons Using the Sign Language Picture Story
Kanyanat Plaewfueang, and Surachai Suksakulchai 261
Using Cloud Computing to Mitigate Rural E-Learning Sustainability
and Challenges
Odunaike SA, Olugbara 00, and 0jo SO 265
Experience with Teaching Mathematics for Engineers with the Aid of
Wolfram Alpha
vii
Petr Necesal, and Jan Pospisil 271
The Design Framework of Interactive Storybook Support Early Literacy
Learning for Ethnic Minority Children
Muneeroh Phadung, Surachai Suksakulchai, and Wacheerapan0__
Zio
Kaewprapan
Examining Artificial Intelligence Techniques for the Design and
Implementation of a Generally Acceptable Intelligent Educational
Tutoring System (IETS)
Adesanya Sunday Adelaja 279
ICT Skills Gap Analysis of the Saudi Market
Lilac Alsafadi, and Rana Abunafesa 284
The Educational - Driven Approach for Technology Enhanced Learning
Stefan Svetsky, Oliver Moravcik, Jana Stefankova, and Peter
Schreiber
BhatMeer Inspirational Model for Student-centered Teaching &
Learning
Anjum Zameer Bha t 297
The Influence of Technostress and Antismart on Continuous Use of
Smartphones
Sang-Joon Lee, Soo~Hyang Jin, and Beom-Jin Choi 303
A Framework for Designing Information Technology Programmes using
ACM/IEEE Curriculum Guidelines
0. D. Adegbehingbe, and S. D. Eyono Obono 309
Dynamic Content Selection Based On An Associative Semantic
Processing Network
P. Nilas, and R. Lumpuprakarn 315
Modular Design and Adoption of Embedded System Courseware with
Portable Labs in a Box
Xiaolin Hu, Minghao Wang, Yuanfeng Xu, and Kai Qian 320
International Conference on Intelligent Automation
viii
and Robotics 2012
Object Manipulation Using Cooperative Mobile Multi-Robot Systems
Ignacio Mas, and Christopher Kitts 324
Energy Shaping Nonlinear Acceleration Control for a Mobile Inverted
Pendulum with a Slider Mechanism Utilizing Instability
K. Yokoyama, and M. Takahashi 330
Augmented Observer for Fault Detection and Isolation (FDI) in Rotor
Systems
Zhentao Wang, Rudolf Sebastian Schittenhelm, and Stephan
Rinderknecht
Design and Simulation Experiment Research of a New Jaw Movement
Robot
Cong Ming, Du Jing, Liu Tongzhan, Wen Haiying, and Xu
Weiliang
Designing a Linear Controller for Enlarging the Robust Domain of
Attraction
S. Haghighatnia, and R. K. Moghaddam 348
High Stability Lateral Guided Method for Articulated Vehicle Based
on Sensor Steering Mechanism
Yoshihiro Takita, Shinya Ohkawa, and Hisashi Date 351
A Flexible Process Monitoring and Control System Based on Data
Engine and Layout Engine
Zuye Zhao, Lichao Zhang, and Yusheng Shi 357
Using Genetic Algorithms for Identikit Creation
P. Schreiber, M. Kovac, and 0. Moravcik 363
Development of Die-bonder with Multi & Matrix Picker and Placer to
Increase Production Capacity
Piljune Kim, YongDae Ha, HyunHo Park, and JungHee Park 369
Adaptive Recurrent Wavelet Fuzzy CMAC Tracking Control for De-icing
Robot Manipulator
ix
YaoNan Wang, ThanhQuyen Ngo, ThangLong Mai, and ChengZhong Wu 372
International Conference on Internet and Multimedia
Technologies 2012
Identifying Common Research Interest through Matching of Ontological
Research Profiles
Nawarat Kamsiang, and Twittie Senivongse 380
Automated Attention Analysis: a Valuable Tool for Online Marketers?
Tomas Kind, Michal Novak, and Pavel Strach 386
Towards a Participant-Oriented Model to Enhance SOA Model with
Mobility
Yang Syu, and Yong-Yi Fanjiang 392
User Context Centric Models in A Knowledge Advantage Machine
Luyi Wang, Ramana Reddy, Sumitra Reddy, and Asesh Das 398
Visual Representation of Searched Results using Tree Diagram
Goh Kim Nee, Chen Yoke Yie, and Richard Liaw Zhi Cheng 404
Hidden Web Query Technique for Extracting the Data From Deep Web
Data Base
Nripendra Narayan Das, and Ela Kumar 410
Utilisation of a Hybrid Approach for Immersive Industrial Process
Control Visualisation
Tomas Skripcak, Pa vol Tanuska, and Nils Schmeisser 415
Telemedicine Network Implementation with SOA Architecture: A Case
Study
Edward Guillen, Jenny Ubaque, Leonardo Ramirez, and Yaneth
Cardenas
Enhancing Online University Class Management System with Instant
Email Feedback Alert
Bongani T. Mabunda, and Johnson 0. Dehinbo 425
Using Kohonen-SOM & K-Means Clustering Techniques to Analyze QoS
x
Parameters of RSVP
Hartinder Singh Johal, Balraj Singh, Harwant Singh, Amandeep Nagpal,^
and Harjot Singh Virdi
International Conference on Machine Learning and
Data Analysis 2012
Refining K-means Algorithm by Detecting Superfluous and Oversized
Clusters
Hakan Gumus, and Fatih Erdogan Sevilgen 437
Normal/Abnormal Gait Analysis based on the Statistical Registration
and Modeling of the Frontal View Gait Data
Kosuke Okusa, and Toshinari Kamakura 443
Knowledge Discovery (Email Harvesting, Gender Identification &
Prediction) in Social Network Data (Facebook 100 Million URL)
Nancy P, and R. Geetha Ramani 449
Statistical Disturbance Rejection of the Background Noise by
Microwave Doppler Radar - Modelization of an Electric Fan Noise
Tomoo Tsujimura, Kosuke Okusa, Kurato Maeno, and Toshinari
Kamakura
Intrusion Detection using an Ensemble of Classification Methods
M. Govindarajan, and RM. Chandrasekaran 459
Using Machine Learning Techniques for Identifying Important
Characteristics to Predict Changes in Species Richness in EcoSim, an
Individual-Based Ecosystem Simulation
Abbas Golestani, and Robin Gras 465
Data Mining For Wind Energy Site Selection
Muhammad Shaheen, Muhammad Shahbaz, and Khalid Afsar Khan
Jadoon
Acyclic Word Graph for Web Clustering
Issam A. R. Moghrabi 477
Signal Source Classification Based on Independency Analysis of
xi
Doppler Signals
Kouhei Yamamoto, Kurato Maeno, and Toshinari Kamakura 482
Position of Retraining CHURN Data Mining Model in Six Sigma
Methodology
Andrej Trnka 488
Efficient Classifier for Classification of Prognostic Breast Cancer
Data through Data Mining Techniques
Shomona Gracia Jacob, and R. Geetha Ramani 493
Blood Donor Classification Using Neural Network and Decision Tree
Techniques
Wijai Boonyanusith, and Phongchai Jittamai 499
Load Forecasting for Power System Planning using Fuzzy-Neural
Networks
Swaroop R, and Hussein AH Al Abdulqader 504
Recognizing Aspiration Presence using Model Parameter Classification
from Microwave Doppler Signals
Shuhei Inui, Kosuke Okusa, Kurato Maeno, and Toshinari
Kanakura
Use of Data Mining in Education Sector
Manpreet Singh Bhullar, and Amritpal Kaur 513
Content-Based Movie Recommendation Using Different Feature Sets
Mahiye Uluyagmur, Zehra Cataltepe, and Esengul Tayfur 517
Hyperspectral Image Classification using Random Forests and Neural
Networks
B. T. Abe, 0. 0. Olugbara, and T. Marwala 522
Important Considerations for an ETL Process in CFE's Health and
Security Area
/. Roblero, N. Jacome, and L. Argotte 528
Grammatical Induction with Error Correction for Deterministic
Context-free L-systems
xii
Ryohei Nakano, and Shinya Suzumura 534
International Conference on Soft Computing and
Applications 2012
Frameworks for Validation of Mobile Software Project Performance
Haeng Kon Kim 539
V-Optimal Filters for Data Approximation in Continuous Data Streams
Joseph Gomes, Wenhao Chen, and Pushkar Dahal 545
Interval-valued EM Algorithm with Application to Estimating
Parameters
Zhi-gang Su, Pei~hong Wang, and Yi-fan Wang 551
A Multivariate Artificial Neural Network Approach for Rainfall
Forecasting: Case Study of Victoria, Australia
F. Mekanik, and M. A. Imteaz 557
Real Time Movement Detection for Human Recognition
Sreedevi M, Yaswanth Kumar Avulapati, Anj'an Babu G, and Sendhil Kumarn„n
562R
Comparison of Cost Estimates of Electrical and Communication System
for Industrial Factory Construction
Nantachai Kantanantha, and Pornprasert Leelakriangsak 566
Bipolar-valued Fuzzy Finite Switchboard State Machines
J. Kavikumar, Azme Bin Khamis, and Rozaini Bin Roslan 571
A Neuro-wavelet Method for the Forecasting of Financial Time Series
Luis F. Ortega 577
International Conference on Signal Processing and
Imaging Engineering 2012
Minimax MMSE Estimator for Sparse System
Hongqing Liu, and Mandar Chitre 583 -
Low Complexity Hybrid Rate Control Schemes for Distributed Video
xiii
Coding
Mohamed HaJ Taieb, Jean-Yves Chouinard, and Demin Wang 589
Frequency Estimation for Non-pilot Mode of DVB-S2 System
Sooyeob Jung, and Deock-Gil Oh 595
Monitoring of High Power Laser Welding Process by Using Image
Difference Algorithm
Deyong You, and Xiangdong Gao 599
On the Linear Combination of the Gaussian and Student-t Random
Fields and the Geometry of its Excursion Sets
Ola Suleiman Ahmad, and Jean-Charles Pinoli 604
Computer Vision and Image Segmentation Implemented on GPU Using
Compute Unified Device Architecture as Applied on Quality Inspection
of Pre-etched Printed Circuit Board
Philip Virgil Astillo, and Van Patiluna 609
Enhancement of Medical Ultrasound Images using Non-Linear FilteringBased on Rational-Dilation Wavelet Transform
Deep Gupta, R. S. Anand, and BarJeev Tyagi 615
Generation and Replication of Computer Generated Hologram
A. Palevicius, B. NariJauskaite, and G. Janusas 621
Development of CUiris: A Dark-Skinned African Iris Dataset for
Enhancement of Image Analysis and Robust Personal Recognition
Joke A. BadeJo, Tiwalade 0. Majekodunmi, and Aderemi A.624
Atayero
Controlling Depth Perception of Stereoscopic Images under Given
Constraints
Tzung-Han Lin 630
Dynamic Modeling of Nuclear Fusion As a New Tool to Identify
Subgroups in Multiple Sclerosis Magnetic Resonance Imaging Data
Heiko Neeb 634
Handwritten Hindi Text Segmentation Techniques for Lines and
Characters
xiv
Saiprakash Palakollu, Renu Dhir, and Rajneesh Rani 640
Gender Recognition via Face Area Analysis
Vladimir Khryashchev, Andrey Priorov, Lev Shmaglit, and Maxim64b
Golubev
Image Processing by Compression: An Overview
A. Roman-Gonzalez, and K. Asalde-Alvarez 650
H.264/AVC Data Hiding Based on Intra Prediction Modes for Real-time
Applications
Samira Bouchama, Latifa Hamami, and Hassina Aliane 655
Time-frequency Characteristics Clustering of Metallic Plume during
High Power Disk Laser Welding
X. D. Gao, R L. Wang, and Y C. Yang 660
Lightweight Multi~direction-of-arrival Estimation on a Mobile
Robotic Platform
Caleb Rascon, and Luis A. Pineda 665
Steganography using Odd-even Based Embedding and Compensation
Procedure to Restore Histogram
Neeta Nain, Jaideep Singh, Ishan Dayma, and Rajesh Meena 671
Gender Effect in Trait Recognition
Mohamed A. Bencherif, Mansour Alsulaiman, Ghulam Muhammad, Zulfiqar „_„
o7oAH, Awais Mahmood, and Mohamed Faisal
Individualized 3D Face Model Reconstruction using Two Orthogonal
Face Images
SunHee Weon, Sungll Joo, and Hyungll Choi 680
Use of Virtual Reality Systems and Augmented Reality for Visualizing
Acrophobic Environments
Gianfranco Preciado Cossio, and Giacomo Preciado Cossio 685
A Simple Mutual Deconvolution Algorithm for Acoustic Blind
Dereverberat ion
Lei Liu, and Wayne T. Padgett 688
xv