Pub Date : 2011-05-11DOI: 10.1109/JCSSE.2011.5930111
Nuttapong Chaiyawatana, B. Uyyanonvara, T. Kondo, P. Dubey, Y. Hatori
The process of the alternative functioning of the surveillance system has been discussed in this paper along with software implementation at a low cost. A frame subtraction technique has been applied, which projects a moving object in consideration to be in current view, while subtraction of the current and the previous frame image reaches a certain threshold. Auto detect system has been suggested to detect vehicles to consider its performance. Information is processed from the surveillance camera where data will be analyzed and sent to the central processing unit.
{"title":"Robust object detection on video surveillance","authors":"Nuttapong Chaiyawatana, B. Uyyanonvara, T. Kondo, P. Dubey, Y. Hatori","doi":"10.1109/JCSSE.2011.5930111","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930111","url":null,"abstract":"The process of the alternative functioning of the surveillance system has been discussed in this paper along with software implementation at a low cost. A frame subtraction technique has been applied, which projects a moving object in consideration to be in current view, while subtraction of the current and the previous frame image reaches a certain threshold. Auto detect system has been suggested to detect vehicles to consider its performance. Information is processed from the surveillance camera where data will be analyzed and sent to the central processing unit.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117334106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-11DOI: 10.1109/JCSSE.2011.5930100
C. Likitkhajorn, A. Surarerks, A. Rungsawang
Link spam techniques are widely used in commercial web pages to achieve higher ranking in search results which may reduce the quality of the results. Most of techniques require some boosting pages to increase score of the target pages. In this paper, we aim to detect boosting pages and then spam pages to increase the quality of results. Our approach consists of two steps: (1) find boosting pages from spam seed set, and (2) detect web spam from the discovered boosting pages. An experimental result shows that our approach can detect 93.20 % of web spam pages with 79.96% precision.
{"title":"A novel approach for spam detection using boosting pages","authors":"C. Likitkhajorn, A. Surarerks, A. Rungsawang","doi":"10.1109/JCSSE.2011.5930100","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930100","url":null,"abstract":"Link spam techniques are widely used in commercial web pages to achieve higher ranking in search results which may reduce the quality of the results. Most of techniques require some boosting pages to increase score of the target pages. In this paper, we aim to detect boosting pages and then spam pages to increase the quality of results. Our approach consists of two steps: (1) find boosting pages from spam seed set, and (2) detect web spam from the discovered boosting pages. An experimental result shows that our approach can detect 93.20 % of web spam pages with 79.96% precision.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126041220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-11DOI: 10.1109/JCSSE.2011.5930145
M. Pinkowska, B. Lent, Somnuk Keretho
Practice and science today agree that software project managers have to master soft skills in order to be successful. Lack of justified, derived from concrete needs, essential soft skills identification makes their mastering impossible. The research model presented hereafter is build on detailed investigation of human factor related processes in software project management and subsequent identification of project manager soft skills needed to perform these processes. The L-Timer™ process based mental model of project management is chosen for the evaluation. Innovative and systematic approach identified at least 645 human factor related activities. Their effective execution requires mastering of at least 256 soft skills.
{"title":"Process based identification of software project manager soft skills","authors":"M. Pinkowska, B. Lent, Somnuk Keretho","doi":"10.1109/JCSSE.2011.5930145","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930145","url":null,"abstract":"Practice and science today agree that software project managers have to master soft skills in order to be successful. Lack of justified, derived from concrete needs, essential soft skills identification makes their mastering impossible. The research model presented hereafter is build on detailed investigation of human factor related processes in software project management and subsequent identification of project manager soft skills needed to perform these processes. The L-Timer™ process based mental model of project management is chosen for the evaluation. Innovative and systematic approach identified at least 645 human factor related activities. Their effective execution requires mastering of at least 256 soft skills.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124700262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-11DOI: 10.1109/JCSSE.2011.5930154
Punyawi Jamjareekul
This paper proposes a concept for design and fabrication about a compact microstrip bandstop resonator for dual-band wireless communication. This proposed microstrip bandstop resonator is constructed from 2 open-circuited quarter wave-length transmission line stubs and J-inverter which are used to separate widely between low and high frequency bands by using transmission lines theory and admittance inverter. The low frequency band of 800–900 MHz can be served the CDMA mobile networks of CAT Telecom Public Company Limited in Thailand, and the high frequency band of 2.3–2.7 GHz can be served the wireless networks both WiFi-2.45 GHz and WiMA-2.5 GHz. The experimental results have been shown that the measured return losses are in good agreement with the simulated ones both the entire higher and lower frequency bands. Refer to considering the return loss of 20 dB, the bandwidth of a measured microstrip bandstop resonator is close to the simulated bandwidth for the lower frequency band, but it is wider than the simulated bandwidth for the higher frequency band. Moreover, the measured insertion losses are high, but those are in good agreement with the simulated ones. The advantages of this proposed microstrip bandstop resonator are as follows: the return losses are good and acceptable, the wide rejection band can be owned, and the compact size can be achieved.
{"title":"Compact microstrip bandstop resonator for dual-band wireless communication","authors":"Punyawi Jamjareekul","doi":"10.1109/JCSSE.2011.5930154","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930154","url":null,"abstract":"This paper proposes a concept for design and fabrication about a compact microstrip bandstop resonator for dual-band wireless communication. This proposed microstrip bandstop resonator is constructed from 2 open-circuited quarter wave-length transmission line stubs and J-inverter which are used to separate widely between low and high frequency bands by using transmission lines theory and admittance inverter. The low frequency band of 800–900 MHz can be served the CDMA mobile networks of CAT Telecom Public Company Limited in Thailand, and the high frequency band of 2.3–2.7 GHz can be served the wireless networks both WiFi-2.45 GHz and WiMA-2.5 GHz. The experimental results have been shown that the measured return losses are in good agreement with the simulated ones both the entire higher and lower frequency bands. Refer to considering the return loss of 20 dB, the bandwidth of a measured microstrip bandstop resonator is close to the simulated bandwidth for the lower frequency band, but it is wider than the simulated bandwidth for the higher frequency band. Moreover, the measured insertion losses are high, but those are in good agreement with the simulated ones. The advantages of this proposed microstrip bandstop resonator are as follows: the return losses are good and acceptable, the wide rejection band can be owned, and the compact size can be achieved.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131380116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-11DOI: 10.1109/JCSSE.2011.5930141
Pornchai Lerthathairat, N. Prompoon
The importance of software development is a design and programming to create a code quality, especially maintainability fatcor. An approach for source code classification to enhance maintainability is a method to clssify and improve code. This approach can increase High cohesion and Low coupling that effect to the internal and the external of software. It can reduce degraded integrity. First of all, we classify source code with software metrics and fuzzy logic and then improve bad smell, ambiguous code with refactoring to be a clean code. The last step, we evaluate the quality of clean code with maintainability measurement.
{"title":"An approach for source code classification to enhance maintainability","authors":"Pornchai Lerthathairat, N. Prompoon","doi":"10.1109/JCSSE.2011.5930141","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930141","url":null,"abstract":"The importance of software development is a design and programming to create a code quality, especially maintainability fatcor. An approach for source code classification to enhance maintainability is a method to clssify and improve code. This approach can increase High cohesion and Low coupling that effect to the internal and the external of software. It can reduce degraded integrity. First of all, we classify source code with software metrics and fuzzy logic and then improve bad smell, ambiguous code with refactoring to be a clean code. The last step, we evaluate the quality of clean code with maintainability measurement.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134620684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-11DOI: 10.1109/JCSSE.2011.5930155
V. Visoottiviseth, Chaiwat Yanprasop, P. Pongpaibool
We implement a new IP address auto-configuration mechanism for MANET. The proposed mechanism lets any nodes in a MANET distribute address pools to a new node. The proposed algorithm can guarantee address uniqueness and achieve fast address assignment. The protocol is implemented on the Optimized Link State Routing protocol and supports both IPv4 and IPv6. This paper extends the previous work [6] by providing reliability, optimizing the codes and validating the protocol performance with more experiments and more nodes on the real wireless testbed. We also discuss concerns about security vulnerabilities of this proposed protocol.
{"title":"DAA: Distributed address auto-configuration for mobile ad hoc networks","authors":"V. Visoottiviseth, Chaiwat Yanprasop, P. Pongpaibool","doi":"10.1109/JCSSE.2011.5930155","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930155","url":null,"abstract":"We implement a new IP address auto-configuration mechanism for MANET. The proposed mechanism lets any nodes in a MANET distribute address pools to a new node. The proposed algorithm can guarantee address uniqueness and achieve fast address assignment. The protocol is implemented on the Optimized Link State Routing protocol and supports both IPv4 and IPv6. This paper extends the previous work [6] by providing reliability, optimizing the codes and validating the protocol performance with more experiments and more nodes on the real wireless testbed. We also discuss concerns about security vulnerabilities of this proposed protocol.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134643060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-11DOI: 10.1109/JCSSE.2011.5930121
R. Tangkitjaroenmongkol, Supapom Kaittisin, S. Ongwattanakul
This paper present the decision support system in logistics inbound and transportation system with application of Geographic Information System (GIS) to analyse the Cassava Service Centres (CSC) location in order to collect cassava roots location and optimized the number and location suitability of CSC. The methodology used K-mean clustering and application of Geographic Information System with spatial and attribute data, and network analyst extension to find, compared and minimize optimization with cost for investment and transportation distance solution of their scenarios. The results had show the optimization number of location of CSC must be 20 nodes, investment cost for CSC location was reduced to 9.8 million baht, and distance was 136,176.58 kilometres, that results had reduce to 49.5 and 13.3 percent, respectively.
{"title":"Inbound logistics cassava starch planning: With application of GIS and K-means clustering methods in Thailand","authors":"R. Tangkitjaroenmongkol, Supapom Kaittisin, S. Ongwattanakul","doi":"10.1109/JCSSE.2011.5930121","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930121","url":null,"abstract":"This paper present the decision support system in logistics inbound and transportation system with application of Geographic Information System (GIS) to analyse the Cassava Service Centres (CSC) location in order to collect cassava roots location and optimized the number and location suitability of CSC. The methodology used K-mean clustering and application of Geographic Information System with spatial and attribute data, and network analyst extension to find, compared and minimize optimization with cost for investment and transportation distance solution of their scenarios. The results had show the optimization number of location of CSC must be 20 nodes, investment cost for CSC location was reduced to 9.8 million baht, and distance was 136,176.58 kilometres, that results had reduce to 49.5 and 13.3 percent, respectively.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115922658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-11DOI: 10.1109/JCSSE.2011.5930134
Udomchai Sutheparaks, W. Vatanawood, Chate Patanothai
Integrating data sources with different local schemas by ETL requires a global schema definition for improving consistency. However, the definition is usually performed without standard guideline. We propose an improved methodology for defining a conceptual model for the global schema by applying REA ontology which represents semantics for general organizational activities with their underlying policies. This study presents the generic model for not only human resource performance appraisal system, but also other business domains. The model can be extended and adapted to constant changes of appraisal policies. To be conformed to the ontology foundation, it can be implemented with RDF.
{"title":"Defining global schema for ETL of human resource performance appraisal system using REA ontology","authors":"Udomchai Sutheparaks, W. Vatanawood, Chate Patanothai","doi":"10.1109/JCSSE.2011.5930134","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930134","url":null,"abstract":"Integrating data sources with different local schemas by ETL requires a global schema definition for improving consistency. However, the definition is usually performed without standard guideline. We propose an improved methodology for defining a conceptual model for the global schema by applying REA ontology which represents semantics for general organizational activities with their underlying policies. This study presents the generic model for not only human resource performance appraisal system, but also other business domains. The model can be extended and adapted to constant changes of appraisal policies. To be conformed to the ontology foundation, it can be implemented with RDF.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129868366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-11DOI: 10.1109/JCSSE.2011.5930138
Ekawit Gultawatvichai, T. Senivongse
Context-aware computing is gaining much interest on mobile device platforms. This paper proposes a concept of Process-Based Composite Contexts in which a composite context can be easily composed of other contexts in form of a process. Developing such a context with Model Driven Architecture, we defne PIM-, PSM-, and code-level metamodels as well as transformation rules between the meta-models. The composite context can then be ported to different platforms using only one PIM model. Also, we present a development of the composite context for two platforms — Windows Mobile and Android — using ATL transformation language.
{"title":"A development of process-based composite contexts for mobile device platforms based on model driven architecture","authors":"Ekawit Gultawatvichai, T. Senivongse","doi":"10.1109/JCSSE.2011.5930138","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930138","url":null,"abstract":"Context-aware computing is gaining much interest on mobile device platforms. This paper proposes a concept of Process-Based Composite Contexts in which a composite context can be easily composed of other contexts in form of a process. Developing such a context with Model Driven Architecture, we defne PIM-, PSM-, and code-level metamodels as well as transformation rules between the meta-models. The composite context can then be ported to different platforms using only one PIM model. Also, we present a development of the composite context for two platforms — Windows Mobile and Android — using ATL transformation language.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126025533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-11DOI: 10.1109/JCSSE.2011.5930102
Danu Onkaew, Rashmi Turior, B. Uyyanonvara, T. Kondo
Retinal vessel extraction is important for the diagnosis of numerous eye diseases. It plays an important role in automatic retinal disease screening systems. This paper presents an efficient method for the automated analysis of retinal images. Fine anatomical features, such as blood vessels, are detected by analyzing the gradient orientation of the retinal images. The method is independent of image intensity and gradient magnitude; therefore, it performs accurately despite the common problems inherent to the retinal images, such as low contrast and non-uniform illumination. Blood vessels with varying diameters are detected by applying this method at multiple scales. The blood vessel network is then extracted from the detected features by manual thresholding followed by a few simple morphological operations. Based on the binary vessel map obtained, we attempt to evaluate the performance of the proposed algorithm on two publicly available databases (DRIVE and STARE database) of manually labeled images. The receiver operating characteristics (ROC), area under ROC and segmentation accuracy is taken as the performance criteria. The results demonstrate that the proposed method outperforms other unsupervised methods in respect of maximum average accuracy (MAA). The proposed method results in the area under ROC and the accuracy of 0.9037, 0.9358 for DRIVE database 0.9117, 0.9423 for STARE database respectively.
{"title":"Automatic extraction of retinal vessels based on gradient orientation analysis","authors":"Danu Onkaew, Rashmi Turior, B. Uyyanonvara, T. Kondo","doi":"10.1109/JCSSE.2011.5930102","DOIUrl":"https://doi.org/10.1109/JCSSE.2011.5930102","url":null,"abstract":"Retinal vessel extraction is important for the diagnosis of numerous eye diseases. It plays an important role in automatic retinal disease screening systems. This paper presents an efficient method for the automated analysis of retinal images. Fine anatomical features, such as blood vessels, are detected by analyzing the gradient orientation of the retinal images. The method is independent of image intensity and gradient magnitude; therefore, it performs accurately despite the common problems inherent to the retinal images, such as low contrast and non-uniform illumination. Blood vessels with varying diameters are detected by applying this method at multiple scales. The blood vessel network is then extracted from the detected features by manual thresholding followed by a few simple morphological operations. Based on the binary vessel map obtained, we attempt to evaluate the performance of the proposed algorithm on two publicly available databases (DRIVE and STARE database) of manually labeled images. The receiver operating characteristics (ROC), area under ROC and segmentation accuracy is taken as the performance criteria. The results demonstrate that the proposed method outperforms other unsupervised methods in respect of maximum average accuracy (MAA). The proposed method results in the area under ROC and the accuracy of 0.9037, 0.9358 for DRIVE database 0.9117, 0.9423 for STARE database respectively.","PeriodicalId":287775,"journal":{"name":"2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121147327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}