Pub Date : 2016-05-09DOI: 10.1109/TENCONSPRING.2016.7519431
Y. Jewajinda
This paper presents a compact evolutionary algorithm called the covariance matrix compact differential evolution (CMcDE). CMcDE is a real-parameter optimization evolutionary algorithm that adopt crossover in eigenvector space and representing population of search solutions as Gaussian probability distribution. The proposed algorithm has been tested using a standard test set of numerical problems. The experimental results show that the proposed CMcDE algorithm outperforms other algorithms in the test sets.
{"title":"Covariance matrix compact differential evolution for embedded intelligence","authors":"Y. Jewajinda","doi":"10.1109/TENCONSPRING.2016.7519431","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519431","url":null,"abstract":"This paper presents a compact evolutionary algorithm called the covariance matrix compact differential evolution (CMcDE). CMcDE is a real-parameter optimization evolutionary algorithm that adopt crossover in eigenvector space and representing population of search solutions as Gaussian probability distribution. The proposed algorithm has been tested using a standard test set of numerical problems. The experimental results show that the proposed CMcDE algorithm outperforms other algorithms in the test sets.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115436875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/TENCONSPRING.2016.7519395
Subodha Charles
The development of Virtual Reality (VR) into consumer products has given new perspectives to many areas. This paper presents a method to enhance the VR experience by mapping real time body movements of a person to a virtual world such that the user can do basic interactions (move, lift, throw) with objects found in the virtual environment. This technique combines a Kinect controlled full body avatar with Oculus Rift head-mounted-display through the Unity game engine. Despite few failures in Kinect skeletal tracker when in sideways poses, movements were mapped with zero latency allowing the user to interact in real time.
{"title":"Real-time human movement mapping to a virtual environment","authors":"Subodha Charles","doi":"10.1109/TENCONSPRING.2016.7519395","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519395","url":null,"abstract":"The development of Virtual Reality (VR) into consumer products has given new perspectives to many areas. This paper presents a method to enhance the VR experience by mapping real time body movements of a person to a virtual world such that the user can do basic interactions (move, lift, throw) with objects found in the virtual environment. This technique combines a Kinect controlled full body avatar with Oculus Rift head-mounted-display through the Unity game engine. Despite few failures in Kinect skeletal tracker when in sideways poses, movements were mapped with zero latency allowing the user to interact in real time.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115652391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/TENCONSPRING.2016.7519418
Carlo Migel Bautista, Clifford Austin Dy, Miguel Inigo Manalac, Raphael Angelo Orbe, M. Cordel
Recent works on Convolutional Neural Network (CNN) in object detection and identification show its superior performance over other systems. It is being used on several machine vision tasks such as in face detection, OCR and traffic monitoring. These systems, however, use high resolution images which contain significant pattern information as compared to the typical cameras, such as for traffic monitoring, which are low resolution, thus, suffer low SNR. This work investigates the performance of CNN in detection and classification of vehicles using low quality traffic cameras. Results show an average accuracy equal to 94.72% is achieved by the system. An average of 51.28 ms execution time for a 2GHz CPU and 22.59 ms execution time for NVIDIA Fermi GPU are achieved making the system applicable to be implemented in real-time using 4-input traffic video with 6 fps.
{"title":"Convolutional neural network for vehicle detection in low resolution traffic videos","authors":"Carlo Migel Bautista, Clifford Austin Dy, Miguel Inigo Manalac, Raphael Angelo Orbe, M. Cordel","doi":"10.1109/TENCONSPRING.2016.7519418","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519418","url":null,"abstract":"Recent works on Convolutional Neural Network (CNN) in object detection and identification show its superior performance over other systems. It is being used on several machine vision tasks such as in face detection, OCR and traffic monitoring. These systems, however, use high resolution images which contain significant pattern information as compared to the typical cameras, such as for traffic monitoring, which are low resolution, thus, suffer low SNR. This work investigates the performance of CNN in detection and classification of vehicles using low quality traffic cameras. Results show an average accuracy equal to 94.72% is achieved by the system. An average of 51.28 ms execution time for a 2GHz CPU and 22.59 ms execution time for NVIDIA Fermi GPU are achieved making the system applicable to be implemented in real-time using 4-input traffic video with 6 fps.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123088103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/TENCONSPRING.2016.7519399
R. Biuk-Aghai, Weng Tat Kou, S. Fong
Transportation, as a means for moving goods and people between different locations, is a vital element of modern society. In this paper, we discuss how big data technology infrastructure fits into the current development of China, and provide suggestions for improvement. We discuss the current situation of China's transportation system, and outline relevant big data technologies that are being used in the transportation domain. Finally we point out opportunities for improvement of China's transportation system, through standardisation, integration of big data analytics in a national framework, and point to the future of transportation in China and beyond.
{"title":"Big data analytics for transportation: Problems and prospects for its application in China","authors":"R. Biuk-Aghai, Weng Tat Kou, S. Fong","doi":"10.1109/TENCONSPRING.2016.7519399","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519399","url":null,"abstract":"Transportation, as a means for moving goods and people between different locations, is a vital element of modern society. In this paper, we discuss how big data technology infrastructure fits into the current development of China, and provide suggestions for improvement. We discuss the current situation of China's transportation system, and outline relevant big data technologies that are being used in the transportation domain. Finally we point out opportunities for improvement of China's transportation system, through standardisation, integration of big data analytics in a national framework, and point to the future of transportation in China and beyond.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128327469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/TENCONSPRING.2016.7519444
Dwi Kristiawan, Harisno
The implementation of an information system is not just updating to the development of the era, especially for an academic information system. Academic Information system has been turned into a necessity for every single university as an instrument to deliver the simplicity of manipulating students data as well as the organizations data in an academic institution. The rate of a successful information system could be achieved by user's acceptance level which shows the acceptance of the users when using the system. This study will focus to the implementation of Oracle Peoplesoft Campus Solutions (OPCS) as an academic information system named MyUMN at Universitas Multimedia Nusantara with Unified Theory of Acceptance and Use of Technology (UTAUT) method. The purpose of this research is to analyze the UTAUT variables that is able to influence the interest and behavior of the users (students, instructors, and staffs) to the academic information system MyUMN and recommend an improvement to the system. The data collecting method was done by deploying questionares through an e-mail with sample of 423 respondents, while the data analysis was done by using Structural Equation Model (SEM) along with version 23 of AMOS software. The result indicated that the Performance Expectancy and Social Influence is significantly related one to another with Behavioral Intentions. But, in another way the Effort Expectancy indicated no effect on it. Facilitating Conditions and Behavioral Intentions were showing the significant effect of user's behavior to the academic information system MyUMN.
{"title":"Evaluation of implementation MyUMN as academic information system using UTAUT to Multimedia Nusantara University","authors":"Dwi Kristiawan, Harisno","doi":"10.1109/TENCONSPRING.2016.7519444","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519444","url":null,"abstract":"The implementation of an information system is not just updating to the development of the era, especially for an academic information system. Academic Information system has been turned into a necessity for every single university as an instrument to deliver the simplicity of manipulating students data as well as the organizations data in an academic institution. The rate of a successful information system could be achieved by user's acceptance level which shows the acceptance of the users when using the system. This study will focus to the implementation of Oracle Peoplesoft Campus Solutions (OPCS) as an academic information system named MyUMN at Universitas Multimedia Nusantara with Unified Theory of Acceptance and Use of Technology (UTAUT) method. The purpose of this research is to analyze the UTAUT variables that is able to influence the interest and behavior of the users (students, instructors, and staffs) to the academic information system MyUMN and recommend an improvement to the system. The data collecting method was done by deploying questionares through an e-mail with sample of 423 respondents, while the data analysis was done by using Structural Equation Model (SEM) along with version 23 of AMOS software. The result indicated that the Performance Expectancy and Social Influence is significantly related one to another with Behavioral Intentions. But, in another way the Effort Expectancy indicated no effect on it. Facilitating Conditions and Behavioral Intentions were showing the significant effect of user's behavior to the academic information system MyUMN.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128387708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/TENCONSPRING.2016.7519407
N. M. Ahmad, A. Amin, Subarmaniam Kannan, A. M. Ali, M. F. Abdollah, R. Yusof
The proliferation of geosocial networking applications has fostered an intense interest to enrich Location-based Services (LBSs). The poor scalability of Global Positioning System (GPS) within the building or dense urban area has forced such services to leverage the existing network infrastructure such as wireless networks. However, most of indoor localization systems pose a great risk to the client's privacy since the systems require the exchange of client's private information that allows the tracking of client's whereabouts. In this paper, we propose a passive and privacy-friendly area based localization system to address the privacy issue and intrinsic properties of wireless indoor channel. This system utilizes information element field in the beacon frame to piggyback the network information for the client to construct lightweight radio map. In this paper also, we evaluate the performance of the radio map in facilitating the localization system.
{"title":"A passive and privacy-friendly area based localization for wireless indoor networks","authors":"N. M. Ahmad, A. Amin, Subarmaniam Kannan, A. M. Ali, M. F. Abdollah, R. Yusof","doi":"10.1109/TENCONSPRING.2016.7519407","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519407","url":null,"abstract":"The proliferation of geosocial networking applications has fostered an intense interest to enrich Location-based Services (LBSs). The poor scalability of Global Positioning System (GPS) within the building or dense urban area has forced such services to leverage the existing network infrastructure such as wireless networks. However, most of indoor localization systems pose a great risk to the client's privacy since the systems require the exchange of client's private information that allows the tracking of client's whereabouts. In this paper, we propose a passive and privacy-friendly area based localization system to address the privacy issue and intrinsic properties of wireless indoor channel. This system utilizes information element field in the beacon frame to piggyback the network information for the client to construct lightweight radio map. In this paper also, we evaluate the performance of the radio map in facilitating the localization system.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129650484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/TENCONSPRING.2016.7519429
T. W. Cenggoro, S. M. Isa, Gede Putra Kusuma
The field of remote sensing has drawn a lot of attention recently. However, collecting necessary ground truth data for research in this field requires a lot of effort. Therefore, this paper presents a method for constructing estimated ground truth data using classification. This method reduces the workload in collecting remote sensing ground truth data. The contribution of this paper is to prepare and provide estimated Land Cover/Land Use (LULC) ground truth data of Jakarta area using the proposed method. The estimated ground truth data then can be used along with remote sensing image of Jakarta area to form dataset, which can be used for remote sensing research. For the estimated ground truth data to be reliable, the employed classification model have to achieve a reasonably good result. This research compares several algorithms to find the classification model with the best result for this case. The experimental result shows that Neural Network with single hidden layer of 30 neurons achieves best test accuracy of 75.41%. The method of this paper has been successfully implemented to construct LULC dataset of Jakarta area.
{"title":"Construction of Jakarta Land Use/Land Cover dataset using classification method","authors":"T. W. Cenggoro, S. M. Isa, Gede Putra Kusuma","doi":"10.1109/TENCONSPRING.2016.7519429","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519429","url":null,"abstract":"The field of remote sensing has drawn a lot of attention recently. However, collecting necessary ground truth data for research in this field requires a lot of effort. Therefore, this paper presents a method for constructing estimated ground truth data using classification. This method reduces the workload in collecting remote sensing ground truth data. The contribution of this paper is to prepare and provide estimated Land Cover/Land Use (LULC) ground truth data of Jakarta area using the proposed method. The estimated ground truth data then can be used along with remote sensing image of Jakarta area to form dataset, which can be used for remote sensing research. For the estimated ground truth data to be reliable, the employed classification model have to achieve a reasonably good result. This research compares several algorithms to find the classification model with the best result for this case. The experimental result shows that Neural Network with single hidden layer of 30 neurons achieves best test accuracy of 75.41%. The method of this paper has been successfully implemented to construct LULC dataset of Jakarta area.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114716409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/TENCONSPRING.2016.7519408
Ma Angelica Capuz, Lorraine Policarpio, Brylle Joseph Quinto, Selwyn Emerson Reyes, R. Uy
There are several MIPS simulators which are already available for the students to use. However, majority of the existing works are developed in the year 2005 or older, all of which are PC-based while most of the people are now using mobile or tablet-based technologies. A mobile application called Mobile-based MIPS Simulator (MMIPSS) is a simulator for MIPS64 Architecture that is capable of simulating MIPS64 assembly codes. It also supports pipeline map of the assembly code and all types of MIPS64 static pipeline methods that are essential in understanding computer architecture and are not complete in majority of existing simulators.
{"title":"MIPS64 simulator on a mobile environment","authors":"Ma Angelica Capuz, Lorraine Policarpio, Brylle Joseph Quinto, Selwyn Emerson Reyes, R. Uy","doi":"10.1109/TENCONSPRING.2016.7519408","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519408","url":null,"abstract":"There are several MIPS simulators which are already available for the students to use. However, majority of the existing works are developed in the year 2005 or older, all of which are PC-based while most of the people are now using mobile or tablet-based technologies. A mobile application called Mobile-based MIPS Simulator (MMIPSS) is a simulator for MIPS64 Architecture that is capable of simulating MIPS64 assembly codes. It also supports pipeline map of the assembly code and all types of MIPS64 static pipeline methods that are essential in understanding computer architecture and are not complete in majority of existing simulators.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133325759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/TENCONSPRING.2016.7519379
Semi Yulianto, Charles Lim, B. Soewito
A successful of PCI DSS implementation depends on the capability of the organization's information security in providing the effective safeguard of their information asset, while cardholder data security is the main concern. Many organizations failed to comply with the standard, and this eventually results in fines or even termination of the ability to process credit cards. Clearly, an evaluation mechanism or tool used to measure the current state of the organization's information security is needed. In this paper, an Information Security Maturity Model for PCI DSS (ISMM-PCI) with four maturity level - None, Initial, Basic and Capable - was proposed. The ISMM-PCI utilizes the use of quantitative and qualitative analysis, enhancing the PCI DSS to ISO/IEC 27001 mapping, and focuses on improving the quality of people, process and technology. The model assists the organizations to easily identify the key success factors and gaps (point of weaknesses), provides the guideline to better manage information security and formulate the best strategy for the enhancement, improving the overall information security state by selecting the best security countermeasures (controls) to protect their information assets from the emerging cyber-attacks, while achieving PCI DSS full compliant. The main advantage of ISMM-PCI over other ISMMs is its ease of use. The comparative analysis of the case results affirms the statement. ISMM-PCI may be used by a wide range of organizations regardless of the size.
{"title":"Information security maturity model: A best practice driven approach to PCI DSS compliance","authors":"Semi Yulianto, Charles Lim, B. Soewito","doi":"10.1109/TENCONSPRING.2016.7519379","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519379","url":null,"abstract":"A successful of PCI DSS implementation depends on the capability of the organization's information security in providing the effective safeguard of their information asset, while cardholder data security is the main concern. Many organizations failed to comply with the standard, and this eventually results in fines or even termination of the ability to process credit cards. Clearly, an evaluation mechanism or tool used to measure the current state of the organization's information security is needed. In this paper, an Information Security Maturity Model for PCI DSS (ISMM-PCI) with four maturity level - None, Initial, Basic and Capable - was proposed. The ISMM-PCI utilizes the use of quantitative and qualitative analysis, enhancing the PCI DSS to ISO/IEC 27001 mapping, and focuses on improving the quality of people, process and technology. The model assists the organizations to easily identify the key success factors and gaps (point of weaknesses), provides the guideline to better manage information security and formulate the best strategy for the enhancement, improving the overall information security state by selecting the best security countermeasures (controls) to protect their information assets from the emerging cyber-attacks, while achieving PCI DSS full compliant. The main advantage of ISMM-PCI over other ISMMs is its ease of use. The comparative analysis of the case results affirms the statement. ISMM-PCI may be used by a wide range of organizations regardless of the size.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123598287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-09DOI: 10.1109/TENCONSPRING.2016.7519372
Fajar Purnama, T. Usagawa, R. Ijtihadie, Linawati
E-learning has been widely implemented in educations system. Most higher institutions have applied Learning Management Systems (LMSs) to manage their online courses, with Moodle as one of the most favored LMS. However on the other side creating a well designed and written course remains problematic for teachers. That's why the community encourages them to share their courses for others to reuse. The authors or teachers then will continuously revise their courses, that will make subscribers to re-download the whole course again, which will soon lead to exhaustive network usage. To cope with this issue a synchronization model of course's backup file is proposed, retrieving the differential updates only. This paper proposed the synchronization of the existing backup and restore features. The file synchronization is performed between course's backup files based on rsync algorithm. The experiment was conducted on virtual machine, local network, and public network. The result showed lower network traffic compared to the conventional sharing method just like our previous synchronization method. However unlike the previous one this method had two other additional advantages which are the flexibility to control the synchronization content and compatibility to all versions of Moodle.
{"title":"Rsync and Rdiff implementation on Moodle's backup and restore feature for course synchronization over the network","authors":"Fajar Purnama, T. Usagawa, R. Ijtihadie, Linawati","doi":"10.1109/TENCONSPRING.2016.7519372","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2016.7519372","url":null,"abstract":"E-learning has been widely implemented in educations system. Most higher institutions have applied Learning Management Systems (LMSs) to manage their online courses, with Moodle as one of the most favored LMS. However on the other side creating a well designed and written course remains problematic for teachers. That's why the community encourages them to share their courses for others to reuse. The authors or teachers then will continuously revise their courses, that will make subscribers to re-download the whole course again, which will soon lead to exhaustive network usage. To cope with this issue a synchronization model of course's backup file is proposed, retrieving the differential updates only. This paper proposed the synchronization of the existing backup and restore features. The file synchronization is performed between course's backup files based on rsync algorithm. The experiment was conducted on virtual machine, local network, and public network. The result showed lower network traffic compared to the conventional sharing method just like our previous synchronization method. However unlike the previous one this method had two other additional advantages which are the flexibility to control the synchronization content and compatibility to all versions of Moodle.","PeriodicalId":166275,"journal":{"name":"2016 IEEE Region 10 Symposium (TENSYMP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125792248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}