Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066595
S. Yussof, M. Rusli, Yunus Yusoff, Roslan Ismail, Azimah Abdul Ghapar
Many power utility companies around the world are moving towards smart grid, which integrates power delivery infrastructure with information and communication technologies. Smart meter is one of the main components of smart grid. The task of a smart meter is to track energy consumption of a premise and send that information to the utility company. Although the use of smart meter has many benefits, there are a number of security concerns regarding its usage. One particular concern is regarding the impacts of security and privacy breach of smart meter. This paper focuses on the financial impacts of smart meter security and privacy breach. The financial impacts discussed in this paper are derived from the impacts of security and privacy breach described in the literature. It is found out that the financial loss may involve various parties including the premise owner, the utility company, as well as the nation. The amount of loss can also go up to billions of dollars. Given the large group of people who may be involved and the large amount of money to be potentially lost should a security or privacy breach occur, it is very important for power companies to establish a security policy regarding smart meter and to allocate reasonable amount of resources to secure the deployed smart meter as well as the rest of the smart grid infrastructure.
{"title":"Financial impacts of smart meter security and privacy breach","authors":"S. Yussof, M. Rusli, Yunus Yusoff, Roslan Ismail, Azimah Abdul Ghapar","doi":"10.1109/ICIMU.2014.7066595","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066595","url":null,"abstract":"Many power utility companies around the world are moving towards smart grid, which integrates power delivery infrastructure with information and communication technologies. Smart meter is one of the main components of smart grid. The task of a smart meter is to track energy consumption of a premise and send that information to the utility company. Although the use of smart meter has many benefits, there are a number of security concerns regarding its usage. One particular concern is regarding the impacts of security and privacy breach of smart meter. This paper focuses on the financial impacts of smart meter security and privacy breach. The financial impacts discussed in this paper are derived from the impacts of security and privacy breach described in the literature. It is found out that the financial loss may involve various parties including the premise owner, the utility company, as well as the nation. The amount of loss can also go up to billions of dollars. Given the large group of people who may be involved and the large amount of money to be potentially lost should a security or privacy breach occur, it is very important for power companies to establish a security policy regarding smart meter and to allocate reasonable amount of resources to secure the deployed smart meter as well as the rest of the smart grid infrastructure.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115623267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066622
Mohamad Firdaus Che Abdul Rani, Rizawati Rohizan, Nor Azlina Abd Rahman
Web-based learning tool provides incorporated environment of various technologies to support diverse instructor and learner needs via the Internet. Electronic learning materials can be accessed easily by normal students but not for dyslexic students. This is because student with Dyslexia needs more attention and guidance from the instructor and special tool is needed to improve their learning environment. This paper proposed the design for a Math Web-based learning tool based on pedagogical techniques for dyscalculia.
{"title":"Web-based learning tool for primary school student with dyscalculia","authors":"Mohamad Firdaus Che Abdul Rani, Rizawati Rohizan, Nor Azlina Abd Rahman","doi":"10.1109/ICIMU.2014.7066622","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066622","url":null,"abstract":"Web-based learning tool provides incorporated environment of various technologies to support diverse instructor and learner needs via the Internet. Electronic learning materials can be accessed easily by normal students but not for dyslexic students. This is because student with Dyslexia needs more attention and guidance from the instructor and special tool is needed to improve their learning environment. This paper proposed the design for a Math Web-based learning tool based on pedagogical techniques for dyscalculia.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113966075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066662
Ahmad Redza Razieff Zainudin, Azmi Bin Mohd Yusof, M. Rusli, Mohd Zaliman Mohd Yusof, Imran Mahalil
This paper shares an author's findings on the effectiveness between guided and non-guided virtual reality setups during stress treatment. In the first setup, users are guided so that their virtual navigations are automatically controlled by a computer. On the other hand, in the second setup, users are allowed to move freely within a pre-set boundary. Findings obtained from this study, will be used for stress treatments' in future references toward establishing an effective treatment setup. Twelve random users participated in this guided setup and the same number of other users participated in the non-guided treatment setup.
{"title":"Stress treatment: The effectiveness between guided and non-guided virtual reality setup","authors":"Ahmad Redza Razieff Zainudin, Azmi Bin Mohd Yusof, M. Rusli, Mohd Zaliman Mohd Yusof, Imran Mahalil","doi":"10.1109/ICIMU.2014.7066662","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066662","url":null,"abstract":"This paper shares an author's findings on the effectiveness between guided and non-guided virtual reality setups during stress treatment. In the first setup, users are guided so that their virtual navigations are automatically controlled by a computer. On the other hand, in the second setup, users are allowed to move freely within a pre-set boundary. Findings obtained from this study, will be used for stress treatments' in future references toward establishing an effective treatment setup. Twelve random users participated in this guided setup and the same number of other users participated in the non-guided treatment setup.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116592031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066605
Areej Al-Mazroa, N. Rikli
IEEE 802.15.6 standard has emerged as the most suitable standard that fits the special requirements of WBANs. Although the published IEEE 802.15.6 standard draft provides flexibility to designers by recommending the use of several MAC layer techniques, it does not specify how to combine some or all of these recommended techniques to form the most efficient WBAN MAC for a specific scenario. Our main objective here is to combine various MAC techniques in an adaptive way that takes into consideration the types of sensors, their number, and their traffic and energy requirements. The performance of the proposed techniques will be evaluated using some of the standard performance measures such as throughput, delay and energy consumption.
{"title":"Performance evaluation of IEEE 802.15.6 MAC in WBANs - A case study","authors":"Areej Al-Mazroa, N. Rikli","doi":"10.1109/ICIMU.2014.7066605","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066605","url":null,"abstract":"IEEE 802.15.6 standard has emerged as the most suitable standard that fits the special requirements of WBANs. Although the published IEEE 802.15.6 standard draft provides flexibility to designers by recommending the use of several MAC layer techniques, it does not specify how to combine some or all of these recommended techniques to form the most efficient WBAN MAC for a specific scenario. Our main objective here is to combine various MAC techniques in an adaptive way that takes into consideration the types of sensors, their number, and their traffic and energy requirements. The performance of the proposed techniques will be evaluated using some of the standard performance measures such as throughput, delay and energy consumption.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114959465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066604
Mishal Almazrooie, R. Abdullah, L. Yi, Ibrahim Venkat, Zahraa Adnan
Parallel programming has been extensively applied to different fields, such as medicine, security, and image processing. This paper focuses on parallelizing the Laplacian filter, an edge detection algorithm, using CUDA. We have conducted a performance analysis to benchmark the sequential Laplacian version against the CUDA parallel approach. Results show that the parallelization of Laplacian filter achieves better performance than sequential code. CUDA approach achieved 200 fold speedup for an image size of 50MB when 216 processing elements were deployed.
{"title":"Parallel Laplacian filter using CUDA on GP-GPU","authors":"Mishal Almazrooie, R. Abdullah, L. Yi, Ibrahim Venkat, Zahraa Adnan","doi":"10.1109/ICIMU.2014.7066604","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066604","url":null,"abstract":"Parallel programming has been extensively applied to different fields, such as medicine, security, and image processing. This paper focuses on parallelizing the Laplacian filter, an edge detection algorithm, using CUDA. We have conducted a performance analysis to benchmark the sequential Laplacian version against the CUDA parallel approach. Results show that the parallelization of Laplacian filter achieves better performance than sequential code. CUDA approach achieved 200 fold speedup for an image size of 50MB when 216 processing elements were deployed.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115453295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066620
Abdullah Hussein Al-Hashedi, Muhammad Rafie Mohd. Arshad, A. S. Baharudin, H. Mohamed, Omar Osman
The growing number of radio frequency identification (RFID) applications in various industrial fields makes the development of strategic information systems planning (SISP) for the implementation process is essential. Hajj (pilgrimage) sector is one of sectors that would benefit from RFID system implementation through several applications. Without a good plan for the implementation process, it would be difficult to reap a lot of benefits expected from the use of this technology. For this reason, this study proposed a model of SISP for RFID implementation in Hajj management systems. This model assists Hajj management authorities and any related Hajj organization wishing to implement RFID system to better understand and prepare for RFID implementation. It provides guidelines for RFID implementation in Hajj management systems with an emphasis on implementation issues that are needed to be considered such as RFID implementation scenario and RFID data sharing. We hope that the proposed model will provide Hajj organizers with knowledge needed for the implementation of RFID technology in Hajj management.
{"title":"Strategic information systems planning for RFID implementation in Hajj management systems","authors":"Abdullah Hussein Al-Hashedi, Muhammad Rafie Mohd. Arshad, A. S. Baharudin, H. Mohamed, Omar Osman","doi":"10.1109/ICIMU.2014.7066620","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066620","url":null,"abstract":"The growing number of radio frequency identification (RFID) applications in various industrial fields makes the development of strategic information systems planning (SISP) for the implementation process is essential. Hajj (pilgrimage) sector is one of sectors that would benefit from RFID system implementation through several applications. Without a good plan for the implementation process, it would be difficult to reap a lot of benefits expected from the use of this technology. For this reason, this study proposed a model of SISP for RFID implementation in Hajj management systems. This model assists Hajj management authorities and any related Hajj organization wishing to implement RFID system to better understand and prepare for RFID implementation. It provides guidelines for RFID implementation in Hajj management systems with an emphasis on implementation issues that are needed to be considered such as RFID implementation scenario and RFID data sharing. We hope that the proposed model will provide Hajj organizers with knowledge needed for the implementation of RFID technology in Hajj management.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125302373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066660
M. Wagdy, I. Faye, D. Rohaya
The state-of-arts global thresholding techniques are fast and efficient to convert the gray scale document image into a binary image. However, they are unsuitable for complex and degraded documents. Moreover, global thresholding techniques produce border noise when the illumination of the document is not uniform. Other methods that depend on local thresholding techniques are efficient in the case of degraded document images, but have common disadvantages include the dependence on the region size and the image characteristics, and the computational time. In this paper we propose a method to overcome the limitations of the related global and local threshold techniques by using the concept of Retinex theory based on Median filter which can effectively enhance the degraded and poor quality document image. High quality results in terms of visual criteria and OCR performance is produced compared to the previous works.
{"title":"Degradation enhancement for the captured document image using retinex theory","authors":"M. Wagdy, I. Faye, D. Rohaya","doi":"10.1109/ICIMU.2014.7066660","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066660","url":null,"abstract":"The state-of-arts global thresholding techniques are fast and efficient to convert the gray scale document image into a binary image. However, they are unsuitable for complex and degraded documents. Moreover, global thresholding techniques produce border noise when the illumination of the document is not uniform. Other methods that depend on local thresholding techniques are efficient in the case of degraded document images, but have common disadvantages include the dependence on the region size and the image characteristics, and the computational time. In this paper we propose a method to overcome the limitations of the related global and local threshold techniques by using the concept of Retinex theory based on Median filter which can effectively enhance the degraded and poor quality document image. High quality results in terms of visual criteria and OCR performance is produced compared to the previous works.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126069057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066599
Noorul Halimin Mansol, N. M. Alwi, W. Ismail
Today's increased reliance on Information and Communications Technology (ICT) has raised the expectations for service quality, reliability and availability. Such expectations have introduced BCM as a crucial requirement for organizations. BCM is a management process that helps in improving the organization's resilience to interruptions caused by information security threats. The implementation of BCM not only involves the information technology (IT) department, but also business areas that use IT services. BCM however, only receives attention with the support and direction from top management whenever it is required for regulatory compliance. Therefore this paper aims to explore and identify the effects of organizational culture on the successful implementation of BCM in Malaysian organizations. Quantitative surveys have been distributed to 300 participants with varying roles within the organizational hierarchy. 22 Malaysian IT organizations and departments have been selected to participate in the survey. The survey explores the organization employee's view on the importance and effect of organizational culture on BCM implementation. The results indicate that cultural factors greatly impact and play an important role to the organization in terms of BCM readiness and implementation. The results are useful as a guidance for organizations in Malaysia specifically to monitor security incidents or threats which may arise not only from technicalities but also human complexity. The results may also aid in the preparation of organizational guidelines regarding readiness towards BCM implementation.
{"title":"Embedding organizational culture values towards successful business continuity management (BCM) implementation","authors":"Noorul Halimin Mansol, N. M. Alwi, W. Ismail","doi":"10.1109/ICIMU.2014.7066599","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066599","url":null,"abstract":"Today's increased reliance on Information and Communications Technology (ICT) has raised the expectations for service quality, reliability and availability. Such expectations have introduced BCM as a crucial requirement for organizations. BCM is a management process that helps in improving the organization's resilience to interruptions caused by information security threats. The implementation of BCM not only involves the information technology (IT) department, but also business areas that use IT services. BCM however, only receives attention with the support and direction from top management whenever it is required for regulatory compliance. Therefore this paper aims to explore and identify the effects of organizational culture on the successful implementation of BCM in Malaysian organizations. Quantitative surveys have been distributed to 300 participants with varying roles within the organizational hierarchy. 22 Malaysian IT organizations and departments have been selected to participate in the survey. The survey explores the organization employee's view on the importance and effect of organizational culture on BCM implementation. The results indicate that cultural factors greatly impact and play an important role to the organization in terms of BCM readiness and implementation. The results are useful as a guidance for organizations in Malaysia specifically to monitor security incidents or threats which may arise not only from technicalities but also human complexity. The results may also aid in the preparation of organizational guidelines regarding readiness towards BCM implementation.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131854611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066646
Al-Mutazbellah Khamees Itaiwi, M. S. Ahmad, Alicia Y. C. Tang, M. Mahmoud
Several works have been conducted on norms detection and identification, but almost none has been found to explore the concept of norm's benefit awareness that triggers agents' belief to adopt new norms. The literature discuss norms' adoption by agents which are not aware of the benefits of the adopted norms, but use some mining algorithms to identify the norms from a set of observed events. In this paper, we propose a novel solution to this problem that calculates the benefit of a norm to its utility and subsequently decides to adopt or reject the norm.
{"title":"A proposed norms' benefits awareness framework for norms adoption","authors":"Al-Mutazbellah Khamees Itaiwi, M. S. Ahmad, Alicia Y. C. Tang, M. Mahmoud","doi":"10.1109/ICIMU.2014.7066646","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066646","url":null,"abstract":"Several works have been conducted on norms detection and identification, but almost none has been found to explore the concept of norm's benefit awareness that triggers agents' belief to adopt new norms. The literature discuss norms' adoption by agents which are not aware of the benefits of the adopted norms, but use some mining algorithms to identify the norms from a set of observed events. In this paper, we propose a novel solution to this problem that calculates the benefit of a norm to its utility and subsequently decides to adopt or reject the norm.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131905575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066621
Mustafa S. Khalefa, M. Jabar, R. Abdullah, Salfarina Abdullah, A. Amidi
Knowledge flow (KF) and workflow have many definitions in the literature. The development of information technology has led many organizations to become more focused on knowledge than on labor because KF is considered complementary to the software development process when used in the software development domain. Knowledge is the most valuable property about any business organization or academic institution; in addition the knowledge flow plays a part in elevating the competitiveness of teams. This paper presents the origin of KF research and its different definitions. It provides an overview of KF and workflow and the interaction mechanism between the two. A systematic review of the subject is also given.
{"title":"Overview of knowledge flow in a software development process","authors":"Mustafa S. Khalefa, M. Jabar, R. Abdullah, Salfarina Abdullah, A. Amidi","doi":"10.1109/ICIMU.2014.7066621","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066621","url":null,"abstract":"Knowledge flow (KF) and workflow have many definitions in the literature. The development of information technology has led many organizations to become more focused on knowledge than on labor because KF is considered complementary to the software development process when used in the software development domain. Knowledge is the most valuable property about any business organization or academic institution; in addition the knowledge flow plays a part in elevating the competitiveness of teams. This paper presents the origin of KF research and its different definitions. It provides an overview of KF and workflow and the interaction mechanism between the two. A systematic review of the subject is also given.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129521003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}