Usability evaluation is part of the software development cycle. Throughout the years, various methodologies have been used to evaluate software effectiveness, efficiency and satisfaction. The capabilities of Internet technologies has make possible to run usability evaluation remotely via online. The usability evaluation can be run from different geographical locations between the respondents, experts and researchers. This paper discusses the development of online remote usability evaluation (e-RUE) in a Web-based environment. The development of e-RUE is a possible solution for usability evaluation.
{"title":"Remote Usability Evaluation System (e-RUE)","authors":"Rafidah Ramli, A. Jaafar, H. Mohamed","doi":"10.1109/ICCEE.2009.247","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.247","url":null,"abstract":"Usability evaluation is part of the software development cycle. Throughout the years, various methodologies have been used to evaluate software effectiveness, efficiency and satisfaction. The capabilities of Internet technologies has make possible to run usability evaluation remotely via online. The usability evaluation can be run from different geographical locations between the respondents, experts and researchers. This paper discusses the development of online remote usability evaluation (e-RUE) in a Web-based environment. The development of e-RUE is a possible solution for usability evaluation.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116083046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study deals to quantify the impact of Adjacent Channel Interference (ACI) in multi-radio 802.11a based wireless nodes designed for WLAN. The nodes are equipped with three 802.11a wireless interfaces, two for backhaul connectivity with directional antennas and one for Access Point (AP) functionality. Adjacent channels in 802.11a are considered to be non-overlapping and expected ACI would be almost negligible. Observed results are, 802.11a channels produces significant interference when adjacent channels are assigned in consecutive order to nodes or to the nodes which are placed in the beam of directional antennas, they are being known as directed nodes. Our work focuses mainly on backhaul of 802.11a, we propose a channel assignment technique where adjacent nodes and directed nodes are placed with spacing of one channel, Conflict graph and greedy algorithms for channel assignment to backhaul links have been used. We evaluate our technique by OPNET 14 simulations, where we quantify the effect of ACI in terms of throughput, observed results for our proposed technique have shown that the throughput of the network is doubled as compared to system where channels are assign to adjacent nodes with consecutive channels without spacing of channel.
{"title":"Channel Spacing for Maximum Performance of 5 GHz WLAN Backhaul Links","authors":"S. Abbasi, Quratulain Kalhoro, M. A. Kalhoro","doi":"10.1109/ICCEE.2009.213","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.213","url":null,"abstract":"This study deals to quantify the impact of Adjacent Channel Interference (ACI) in multi-radio 802.11a based wireless nodes designed for WLAN. The nodes are equipped with three 802.11a wireless interfaces, two for backhaul connectivity with directional antennas and one for Access Point (AP) functionality. Adjacent channels in 802.11a are considered to be non-overlapping and expected ACI would be almost negligible. Observed results are, 802.11a channels produces significant interference when adjacent channels are assigned in consecutive order to nodes or to the nodes which are placed in the beam of directional antennas, they are being known as directed nodes. Our work focuses mainly on backhaul of 802.11a, we propose a channel assignment technique where adjacent nodes and directed nodes are placed with spacing of one channel, Conflict graph and greedy algorithms for channel assignment to backhaul links have been used. We evaluate our technique by OPNET 14 simulations, where we quantify the effect of ACI in terms of throughput, observed results for our proposed technique have shown that the throughput of the network is doubled as compared to system where channels are assign to adjacent nodes with consecutive channels without spacing of channel.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125397398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Asadollahi, M. M. Teymoori, Morteza Saberi Kamarposhti
The most important part of poem in Persian language is rhythm. Normally, poem includes three parts, verse, rhythm and rhyme but if there are some sentences just with rhythm, we can call it poem. As result for making poem we focus on rhythm. In our method, we should make computer program by our proposed algorithm then for converting prose to poem, we should enter two fundamental parts. Firstly, the sentences that we want convert to poem. Secondly, pattern rhythm. The program make some suggestion verses and user, poet, can use of them. For making a program by our proposed algorithm we need a dictionary including, Persian words by translations to other synonym words also, syllable of each word.
{"title":"An Algorithm for Generating Prose to Poem in Persian Language","authors":"H. Asadollahi, M. M. Teymoori, Morteza Saberi Kamarposhti","doi":"10.1109/ICCEE.2009.111","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.111","url":null,"abstract":"The most important part of poem in Persian language is rhythm. Normally, poem includes three parts, verse, rhythm and rhyme but if there are some sentences just with rhythm, we can call it poem. As result for making poem we focus on rhythm. In our method, we should make computer program by our proposed algorithm then for converting prose to poem, we should enter two fundamental parts. Firstly, the sentences that we want convert to poem. Secondly, pattern rhythm. The program make some suggestion verses and user, poet, can use of them. For making a program by our proposed algorithm we need a dictionary including, Persian words by translations to other synonym words also, syllable of each word.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126990551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
One of the most fundamental features of digital image and the basic steps in image processing, analysis, pattern recognition and computer vision is the Edge of image where the preciseness and reliability of its results will affect directly the comprehension machine system made for objective world. Several edge detectors have been developed in the past decades, although no single edge detectors have been developed satisfactorily enough for all application. In this paper, a new edge detection technique is proposed basis on the BP neural network. Here, it is classified the edge patterns of binary images into 16 possible types of visual patterns. In the following, After training the pre-defined edge patterns, the BP neural network is applied to correspond any type of edges with its related visual pattern. The results demonstrated that the new proposed technique provides the better results compared with traditional edge detection techniques while improved the computations complexity.
{"title":"Novel Edge Detection Using BP Neural Network Based on Threshold Binarization","authors":"H. Mehrara, Mohammad Zahedinejad, A. Pourmohammad","doi":"10.1109/ICCEE.2009.144","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.144","url":null,"abstract":"One of the most fundamental features of digital image and the basic steps in image processing, analysis, pattern recognition and computer vision is the Edge of image where the preciseness and reliability of its results will affect directly the comprehension machine system made for objective world. Several edge detectors have been developed in the past decades, although no single edge detectors have been developed satisfactorily enough for all application. In this paper, a new edge detection technique is proposed basis on the BP neural network. Here, it is classified the edge patterns of binary images into 16 possible types of visual patterns. In the following, After training the pre-defined edge patterns, the BP neural network is applied to correspond any type of edges with its related visual pattern. The results demonstrated that the new proposed technique provides the better results compared with traditional edge detection techniques while improved the computations complexity.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127833023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Botnet is most widespread and occurs commonly in today's cyber attacks, resulting in serious threats to our network assets and organization's properties. Botnets are collections of compromised computers (Bots) which are remotely controlled by its originator (BotMaster) under a common Commond-and-Control (C & C) infrastructure. They are used to distribute commands to the Bots for malicious activities such as distributed denial-of-service (DDoS) attacks, sending large amount of SPAM and other nefarious purposes. Understanding the Botnet C & C channels is a critical component to precisely identify, detect, and mitigate the Botnets threats. Therefore, in this paper we provide a classification of Botnets C & C channels and evaluate well-known protocols (e.g. IRC, HTTP, and P2P) which are being used in each of them.
{"title":"Botnet Command and Control Mechanisms","authors":"Hossein Rouhani Zeidanloo, A. Manaf","doi":"10.1109/ICCEE.2009.151","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.151","url":null,"abstract":"Botnet is most widespread and occurs commonly in today's cyber attacks, resulting in serious threats to our network assets and organization's properties. Botnets are collections of compromised computers (Bots) which are remotely controlled by its originator (BotMaster) under a common Commond-and-Control (C & C) infrastructure. They are used to distribute commands to the Bots for malicious activities such as distributed denial-of-service (DDoS) attacks, sending large amount of SPAM and other nefarious purposes. Understanding the Botnet C & C channels is a critical component to precisely identify, detect, and mitigate the Botnets threats. Therefore, in this paper we provide a classification of Botnets C & C channels and evaluate well-known protocols (e.g. IRC, HTTP, and P2P) which are being used in each of them.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121549152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Every software project progresses through a development process with necessary involvement of developers and users both. For evaluation of the software to confirm its phase wise goals, objectives and quality, developers and customers must reach to a win-win condition. It has been observed that the user satisfaction is the most important factor that must be emphasized in software development and thus, usability is an indispensable feature of a software project. Inclusion of usability dictates determination of existence of usability at different stages of development for measurement of user performance and user satisfaction. Various criteria known as software parameters are employed to evaluate the software for realizing certain level of usability. These criteria may be applied for software estimations and are also involved in several assessments during software development process. Variety of well defined and well structured parameters such as size, duration, files used, external inputs, external outputs, external queries etc. are available to support development of desirable software. Further, based upon these parameters other important software estimations may be derived. Though there exist various dimensions of employing the parameters based on the requirements of a software project, these parameters must be redefined and restructured to evaluate usability of software to produce usable software. In this paper, we restructure the software project parameters for evaluation of software usability. It will lead to overall characterization of the projects in usability perspective. Also, it will be useful for ranking usability attributes and measuring usability subsequently.
{"title":"Characterization of Software Projects by Restructuring Parameters for Usability Evaluation","authors":"K. Paithankar, D. M. Ingle","doi":"10.1109/ICCEE.2009.216","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.216","url":null,"abstract":"Every software project progresses through a development process with necessary involvement of developers and users both. For evaluation of the software to confirm its phase wise goals, objectives and quality, developers and customers must reach to a win-win condition. It has been observed that the user satisfaction is the most important factor that must be emphasized in software development and thus, usability is an indispensable feature of a software project. Inclusion of usability dictates determination of existence of usability at different stages of development for measurement of user performance and user satisfaction. Various criteria known as software parameters are employed to evaluate the software for realizing certain level of usability. These criteria may be applied for software estimations and are also involved in several assessments during software development process. Variety of well defined and well structured parameters such as size, duration, files used, external inputs, external outputs, external queries etc. are available to support development of desirable software. Further, based upon these parameters other important software estimations may be derived. Though there exist various dimensions of employing the parameters based on the requirements of a software project, these parameters must be redefined and restructured to evaluate usability of software to produce usable software. In this paper, we restructure the software project parameters for evaluation of software usability. It will lead to overall characterization of the projects in usability perspective. Also, it will be useful for ranking usability attributes and measuring usability subsequently.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"113 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122056797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on the p-ary subdivision rules for B-splines, we show how to design more general subdivision schemes that preserve the B-spline smoothness exactly or almost. We illustrate the technique with new 4-point C5 binary, 4-point C3 ternary and C4 ternary subdivision schemes.
{"title":"P-ary Subdivision Generalizing B-splines","authors":"Hongchan Zheng, Meigui Hu, Guohua Peng","doi":"10.1109/ICCEE.2009.204","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.204","url":null,"abstract":"Based on the p-ary subdivision rules for B-splines, we show how to design more general subdivision schemes that preserve the B-spline smoothness exactly or almost. We illustrate the technique with new 4-point C5 binary, 4-point C3 ternary and C4 ternary subdivision schemes.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126295654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents Evolutionary Computing technique for solving constrained reactive power control (CRPC) problem in the attempt to enhance voltage stability under contingencies, while minimizing transmission loss and maintaining voltage level at an acceptable level. In this study, evolutionary programming (EP) was chosen as the Evolutionary Computing (EC) technique for solving the CRPC; taking into consideration two separate objective functions. Static voltage stability enhancement and minimization of real power loss are implemented separately on a reliability test system. Comparative studies performed with respect to Artificial Immune System (AIS) have highlighted that EP outperformed AIS for both objective functions.
{"title":"Constrained Reactive Power Control Using Evolutionary Computation Technique for Static Security Enhancement","authors":"N. Abdullah, I. Musirin, Muhammad Murthada","doi":"10.1109/ICCEE.2009.116","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.116","url":null,"abstract":"This paper presents Evolutionary Computing technique for solving constrained reactive power control (CRPC) problem in the attempt to enhance voltage stability under contingencies, while minimizing transmission loss and maintaining voltage level at an acceptable level. In this study, evolutionary programming (EP) was chosen as the Evolutionary Computing (EC) technique for solving the CRPC; taking into consideration two separate objective functions. Static voltage stability enhancement and minimization of real power loss are implemented separately on a reliability test system. Comparative studies performed with respect to Artificial Immune System (AIS) have highlighted that EP outperformed AIS for both objective functions.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128237939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Since wireless networks provide flexibility, mobility and convenience in setup, they became more widespread today. However, due to the nature of wireless networks that use shared medium for communications it needs more security features as its wired counterpart. Attackers can use proper devices and techniques to pull signals from the air and gain access to the unprotected wireless networks from anywhere in range of wireless network which receive wireless signals. Therefore, it is very difficult to trace back to the attacker. The three current location tracking solution: Closest Access Point, Triangulation and Radio Frequency Fingerprinting have their own limitations in tracing wireless intruders. In this paper, in the beginning we consider discovering wireless networks techniques and then overview the three current solutions for location tracking and also propose an amendment for Triangulation method that aims to overcome the limitations of this method.
{"title":"Intruder Location Tracking","authors":"Hossein Rouhani Zeidanloo, M. A. Ngadi","doi":"10.1109/ICCEE.2009.53","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.53","url":null,"abstract":"Since wireless networks provide flexibility, mobility and convenience in setup, they became more widespread today. However, due to the nature of wireless networks that use shared medium for communications it needs more security features as its wired counterpart. Attackers can use proper devices and techniques to pull signals from the air and gain access to the unprotected wireless networks from anywhere in range of wireless network which receive wireless signals. Therefore, it is very difficult to trace back to the attacker. The three current location tracking solution: Closest Access Point, Triangulation and Radio Frequency Fingerprinting have their own limitations in tracing wireless intruders. In this paper, in the beginning we consider discovering wireless networks techniques and then overview the three current solutions for location tracking and also propose an amendment for Triangulation method that aims to overcome the limitations of this method.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"56 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130586862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muslihah Wook, Y. H. Yahaya, Norshahriah Wahab, M. Isa, N. Awang, Hoo Yann Seong
The ability to predict the students’ academic performance is very important in institution educational system. Recently some researchers have been proposed data mining techniques for higher education. In this paper, we compare two data mining techniques which are: Artificial Neural Network (ANN) and the combination of clustering and decision tree classification techniques for predicting and classifying students’ academic performance. The data set used in this research is the student data of Computer Science Department, Faculty of Science and Defence Technology, National Defence University of Malaysia (NDUM).
{"title":"Predicting NDUM Student's Academic Performance Using Data Mining Techniques","authors":"Muslihah Wook, Y. H. Yahaya, Norshahriah Wahab, M. Isa, N. Awang, Hoo Yann Seong","doi":"10.1109/ICCEE.2009.168","DOIUrl":"https://doi.org/10.1109/ICCEE.2009.168","url":null,"abstract":"The ability to predict the students’ academic performance is very important in institution educational system. Recently some researchers have been proposed data mining techniques for higher education. In this paper, we compare two data mining techniques which are: Artificial Neural Network (ANN) and the combination of clustering and decision tree classification techniques for predicting and classifying students’ academic performance. The data set used in this research is the student data of Computer Science Department, Faculty of Science and Defence Technology, National Defence University of Malaysia (NDUM).","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132767055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}