Pub Date : 1900-01-01DOI: 10.1109/ICICTM.2016.7890777
Syahaneim, Raja Asilah Hazwani, N. Wahida, Siti Intan Shafikah, Zuraini, Puteri Nor Ellyza
Extracting unknown and possibly useful information from a set of examples that has desired features is crucial and important for data analysis and interpretation. Normally, a public repository has become the most used method in attempting to find a suitable domain. However, relying on the available data in the public repository has several disadvantages. In this case, an automatic problem generation system would be valuable to provide several advantages over the traditional methods. This paper focuses more on data extraction and artificial data generation. Here, a framework is proposed that consists of four main phases: 1) Data extraction, 2) Data characterization, 3) Artificial data generation and 4) Artificial data creation. The approach systematically creates testing datasets based on real data that is extracted from a reliable sources. The system uses random permutation algorithm to generate a large number of artificial data that resembles real data.
{"title":"Automatic Artificial Data Generator: Framework and implementation","authors":"Syahaneim, Raja Asilah Hazwani, N. Wahida, Siti Intan Shafikah, Zuraini, Puteri Nor Ellyza","doi":"10.1109/ICICTM.2016.7890777","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890777","url":null,"abstract":"Extracting unknown and possibly useful information from a set of examples that has desired features is crucial and important for data analysis and interpretation. Normally, a public repository has become the most used method in attempting to find a suitable domain. However, relying on the available data in the public repository has several disadvantages. In this case, an automatic problem generation system would be valuable to provide several advantages over the traditional methods. This paper focuses more on data extraction and artificial data generation. Here, a framework is proposed that consists of four main phases: 1) Data extraction, 2) Data characterization, 3) Artificial data generation and 4) Artificial data creation. The approach systematically creates testing datasets based on real data that is extracted from a reliable sources. The system uses random permutation algorithm to generate a large number of artificial data that resembles real data.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131017631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICICTM.2016.7890806
Amna Saad, A. Amran, M. N. A. Hasan
Wireless access points are everywhere, at home, offices and public places like shopping malls, on the road and open spaces. Network engineer would require a specific tool to do wardriving, that is to search for Wi-Fi wireless networks by a person in a moving vehicle. The tool could be installed inside a portable computer, smartphone or personal digital assistant. Some hobbyist does wardriving to exploit connections to wireless local area network around a city or elsewhere. There may also be a potential data leak if the wardriving tool used are bulky that would attract attention from passerby. This is because to do wardriving one needs a vehicle, a portable computer, a wireless Ethernet card set to work in promiscuous mode, and some kind of an antenna which can be mounted on top of or positioned inside the car. A small and non-bulky wardriving tool is more suitable in order not to attract attention. Traditionally, a network engineer still brings his notebook or laptop that is installed with Wi-Fi receiver for wardriving. We designed a portable wardriving tool, WarBox, that is smaller and non-bulky as compared to the notebooks or laptops that most engineers used. The device is built over the Raspberry Pi, a small, single-board computer. Our prototype includes the database for data collection of wireless data for further analysis. For example, the data could be used for wireless mapping and other trending usage by end users. We got the inspiration to build WarBox from the dedicated wireless analysis devices, like Netstumbler and Wireless Geographic Logging Engine (WiGLE). However, we did not compare the WarBox performance with these tools as it is beyond our research objective. Our main objective is to build a wardriving tool based on the Raspberry Pi, which is affordable and customizable to most environments. Our result shows that the WarBox requires a low power consumption. It is powered by the 5V coming from the Micro USB port and it is using a battery bank to power it. We are able to detect 596 access points at Taman Setapak Jaya, a suburban area that is 8.4km away from Universiti Kuala Lumpur, City Campus.
{"title":"WarBox: Portable wardriving over Raspberry PI","authors":"Amna Saad, A. Amran, M. N. A. Hasan","doi":"10.1109/ICICTM.2016.7890806","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890806","url":null,"abstract":"Wireless access points are everywhere, at home, offices and public places like shopping malls, on the road and open spaces. Network engineer would require a specific tool to do wardriving, that is to search for Wi-Fi wireless networks by a person in a moving vehicle. The tool could be installed inside a portable computer, smartphone or personal digital assistant. Some hobbyist does wardriving to exploit connections to wireless local area network around a city or elsewhere. There may also be a potential data leak if the wardriving tool used are bulky that would attract attention from passerby. This is because to do wardriving one needs a vehicle, a portable computer, a wireless Ethernet card set to work in promiscuous mode, and some kind of an antenna which can be mounted on top of or positioned inside the car. A small and non-bulky wardriving tool is more suitable in order not to attract attention. Traditionally, a network engineer still brings his notebook or laptop that is installed with Wi-Fi receiver for wardriving. We designed a portable wardriving tool, WarBox, that is smaller and non-bulky as compared to the notebooks or laptops that most engineers used. The device is built over the Raspberry Pi, a small, single-board computer. Our prototype includes the database for data collection of wireless data for further analysis. For example, the data could be used for wireless mapping and other trending usage by end users. We got the inspiration to build WarBox from the dedicated wireless analysis devices, like Netstumbler and Wireless Geographic Logging Engine (WiGLE). However, we did not compare the WarBox performance with these tools as it is beyond our research objective. Our main objective is to build a wardriving tool based on the Raspberry Pi, which is affordable and customizable to most environments. Our result shows that the WarBox requires a low power consumption. It is powered by the 5V coming from the Micro USB port and it is using a battery bank to power it. We are able to detect 596 access points at Taman Setapak Jaya, a suburban area that is 8.4km away from Universiti Kuala Lumpur, City Campus.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121911920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICICTM.2016.7890807
Toqeer Ali Syed, Salman Jan, Shahrulniza Musa, Jawad Ali
Numerous applications are running in a distributed environment in today's large networked world. Corporations really need a mechanism to monitor their own application(s) running on remote devices. One such mechanism by Trusted Computing Group (TCG) called remote attestation that can monitor and verify trustworthiness of remote applications. In this regard, many solutions have been provided on how to monitor remote applications. However, It becomes quite challenging task, when applications are running on millions of devices and it becomes necessary for the corporates to verify all of the applications. In this paper we have provided an efficient, scalable and privacy preserved mechanism to tackle the scalability of all these kinds of verifications. Machine learning algorithms are incorporated as Hadoop/MapReduce functions on the public cloud. The rest of low CPU intensive and privacy preserved verifications are performed on the private cloud.
{"title":"Providing efficient, scalable and privacy preserved verification mechanism in remote attestation","authors":"Toqeer Ali Syed, Salman Jan, Shahrulniza Musa, Jawad Ali","doi":"10.1109/ICICTM.2016.7890807","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890807","url":null,"abstract":"Numerous applications are running in a distributed environment in today's large networked world. Corporations really need a mechanism to monitor their own application(s) running on remote devices. One such mechanism by Trusted Computing Group (TCG) called remote attestation that can monitor and verify trustworthiness of remote applications. In this regard, many solutions have been provided on how to monitor remote applications. However, It becomes quite challenging task, when applications are running on millions of devices and it becomes necessary for the corporates to verify all of the applications. In this paper we have provided an efficient, scalable and privacy preserved mechanism to tackle the scalability of all these kinds of verifications. Machine learning algorithms are incorporated as Hadoop/MapReduce functions on the public cloud. The rest of low CPU intensive and privacy preserved verifications are performed on the private cloud.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114752765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICICTM.2016.7890770
Norshahriah Wahab, N. Hasbullah, S. Ramli, Norul Zahrah Mohd Zainuddin
Holograms Technology gives tremendous interactive surface in collaborations' atmosphere. This technology is becoming increasingly affordable medium as it inherited characteristics of a conventional workspace, a projected personal computer and touching capabilities. Holograms Technology offers a world of possibilities task engagement neither face-to-face collaboration nor remote collaboration in 3 Dimensional (3D) environment. It creates an effective and efficient way of presentation by offering an interactive display medium in order to cater the abilities of users' vision. This may enrich the visualization elements during making decision or even in military planning process. Due to these advantages, the Army Planning doctrine have seen these technology as a future bright in theirs planning operations moreover the execution of ‘Course of Actions’ (COAs). Adding to this note, by emerging the Holograms Technology capabilities may have a great potential to improve soldier performance in making decision. The Army Officers' easily visualized the bulk of information and at the same time pointed out all the relevant and important information using Multi-touch Table as discussion medium. The information need to be digested and manipulated effectively amongst the Army Officers' before any decision can be made under time constraints.
{"title":"Verification of a Battlefield Visualization Framework in Military Decision Making using Holograms (3D) and multi-touch technology","authors":"Norshahriah Wahab, N. Hasbullah, S. Ramli, Norul Zahrah Mohd Zainuddin","doi":"10.1109/ICICTM.2016.7890770","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890770","url":null,"abstract":"Holograms Technology gives tremendous interactive surface in collaborations' atmosphere. This technology is becoming increasingly affordable medium as it inherited characteristics of a conventional workspace, a projected personal computer and touching capabilities. Holograms Technology offers a world of possibilities task engagement neither face-to-face collaboration nor remote collaboration in 3 Dimensional (3D) environment. It creates an effective and efficient way of presentation by offering an interactive display medium in order to cater the abilities of users' vision. This may enrich the visualization elements during making decision or even in military planning process. Due to these advantages, the Army Planning doctrine have seen these technology as a future bright in theirs planning operations moreover the execution of ‘Course of Actions’ (COAs). Adding to this note, by emerging the Holograms Technology capabilities may have a great potential to improve soldier performance in making decision. The Army Officers' easily visualized the bulk of information and at the same time pointed out all the relevant and important information using Multi-touch Table as discussion medium. The information need to be digested and manipulated effectively amongst the Army Officers' before any decision can be made under time constraints.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125544229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICICTM.2016.7890800
Z. Zali
This study is aimed for developing a framework of usability metrics specifically for assessing usability in mobile applications. This study is design to achieve fifteen major attributes: accurateness; attractiveness; behaviorness; cognitive load; effectiveness; efficiency; effortlessness; errors; learnability; memorability; operability; satisfaction; steadiness; timeliness; and understandability. As a results, a usability framework based on the sequence of Goal, Attributes and Metrics (GAM) is developed in which outlined metrics is used for measuring the different attributes. This framework can be used for constructing usability model for assessing usability in mobile applications.
{"title":"An initial theoretical usability evaluation model for assessing defence mobile e-based application system","authors":"Z. Zali","doi":"10.1109/ICICTM.2016.7890800","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890800","url":null,"abstract":"This study is aimed for developing a framework of usability metrics specifically for assessing usability in mobile applications. This study is design to achieve fifteen major attributes: accurateness; attractiveness; behaviorness; cognitive load; effectiveness; efficiency; effortlessness; errors; learnability; memorability; operability; satisfaction; steadiness; timeliness; and understandability. As a results, a usability framework based on the sequence of Goal, Attributes and Metrics (GAM) is developed in which outlined metrics is used for measuring the different attributes. This framework can be used for constructing usability model for assessing usability in mobile applications.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"372 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122068456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICICTM.2016.7890809
Abdulaziz Aborujilah, Shahrulniza Musa
Cloud computing based services represents a major development in the way of providing IT services. However, the security challenges remains serious threat for such services. Therefore, intrusion detection systems (IDSs) are receiving more attention; this includes IDS methods and applications. This review paper intensively explain characteristics and limitation of the most IDS techniques used in cloud computing environment.
{"title":"Critical review of intrusion detection systems in cloud computing environment","authors":"Abdulaziz Aborujilah, Shahrulniza Musa","doi":"10.1109/ICICTM.2016.7890809","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890809","url":null,"abstract":"Cloud computing based services represents a major development in the way of providing IT services. However, the security challenges remains serious threat for such services. Therefore, intrusion detection systems (IDSs) are receiving more attention; this includes IDS methods and applications. This review paper intensively explain characteristics and limitation of the most IDS techniques used in cloud computing environment.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122741364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICICTM.2016.7890811
Mohd Nizam Husen, Sukhan Lee
Location-based services application in indoor environment utilizing Wi-Fi Received Signal Strength (RSS) is recently prevalent in pervasive computing applications. It is used as an enabler of various location based personal services with handheld and wearable communication devices. This paper present a design guideline for the benefits of the society who wish to employ invariant RSS-based localization using Wi-Fi fingerprinting in any indoor environment. This useful guideline relates statistically the different levels of the random spatiotemporal disturbances inducing RSS instability to the minimum number of Wi-Fi sources required for achieving a certain class separation degree under the given number of calibration locations to be identified. We developed an algorithm to simulate the invariant reference RSS propagations, spontaneous RSS propagations, identify the effective invariant RSS after applying spatiotemporal disturbances, and compute the class separation degree of the calibrated reference locations. An instance from the result shows that to get a class separation degree of above 90% with 35% random spatiotemporal disturbances when the number of calibrated locations is 20, the optimum number of obtainable Wi-Fi signal sources should be at least 50.
{"title":"Design guideline of Wi-Fi fingerprinting in indoor localization using invariant Received Signal Strength","authors":"Mohd Nizam Husen, Sukhan Lee","doi":"10.1109/ICICTM.2016.7890811","DOIUrl":"https://doi.org/10.1109/ICICTM.2016.7890811","url":null,"abstract":"Location-based services application in indoor environment utilizing Wi-Fi Received Signal Strength (RSS) is recently prevalent in pervasive computing applications. It is used as an enabler of various location based personal services with handheld and wearable communication devices. This paper present a design guideline for the benefits of the society who wish to employ invariant RSS-based localization using Wi-Fi fingerprinting in any indoor environment. This useful guideline relates statistically the different levels of the random spatiotemporal disturbances inducing RSS instability to the minimum number of Wi-Fi sources required for achieving a certain class separation degree under the given number of calibration locations to be identified. We developed an algorithm to simulate the invariant reference RSS propagations, spontaneous RSS propagations, identify the effective invariant RSS after applying spatiotemporal disturbances, and compute the class separation degree of the calibrated reference locations. An instance from the result shows that to get a class separation degree of above 90% with 35% random spatiotemporal disturbances when the number of calibrated locations is 20, the optimum number of obtainable Wi-Fi signal sources should be at least 50.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127502634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}