Large amount of gene expression data obtained from Microarray technologies should be analyzed and interpreted in appropriate manner for the benefit of researchers. Using microarray techniques one can monitor the expressions levels of thousands of genes simultaneously. One challenging problem in gene expression analysis is to define the number of clusters. This can be done by some efficient clustering techniques; the Model Based Modified k-means method introduced in this paper could find the exact number of clusters and overcome the problems in the existing k-means clustering technique. Our experimental results show the efficiency of our method by calculating and comparing the sum of squares with different k values.
{"title":"Model Based Modified K-Means Clustering for Microarray Data","authors":"R. Suresh, K. Dinakaran, P. Valarmathie","doi":"10.1109/ICIME.2009.53","DOIUrl":"https://doi.org/10.1109/ICIME.2009.53","url":null,"abstract":"Large amount of gene expression data obtained from Microarray technologies should be analyzed and interpreted in appropriate manner for the benefit of researchers. Using microarray techniques one can monitor the expressions levels of thousands of genes simultaneously. One challenging problem in gene expression analysis is to define the number of clusters. This can be done by some efficient clustering techniques; the Model Based Modified k-means method introduced in this paper could find the exact number of clusters and overcome the problems in the existing k-means clustering technique. Our experimental results show the efficiency of our method by calculating and comparing the sum of squares with different k values.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127185685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The main purpose of software requirements is to describe the functionality of the software. The requirements often serve as a basis for contracts as well as for communication between customers and developers. Prior researches also have shown that requirements’ errors have impact on software development and they are more expensive to fix during later stages than early stages in software development. Hence, the requirements model is normally developed during the analysis phase. The model presents a complete view of the systems’ requirement prior to the development of the actual system. In this paper researcher propose to create a requirements model for employee training management system (ETMS). The requirements model is validated through prototype. Since the proposed prototype is a Web application which is more complex compared to traditional client/server application, the UML extends named Web Application Extensions (WAE) is used to provide Web specific constructs for modeling the web information. This proposed requirements model provides a guideline for other employee training management system developers.
{"title":"A Requirements Model for Employees Training Management System: Applying WAE-UML","authors":"N. M. Nor","doi":"10.1109/ICIME.2009.67","DOIUrl":"https://doi.org/10.1109/ICIME.2009.67","url":null,"abstract":"The main purpose of software requirements is to describe the functionality of the software. The requirements often serve as a basis for contracts as well as for communication between customers and developers. Prior researches also have shown that requirements’ errors have impact on software development and they are more expensive to fix during later stages than early stages in software development. Hence, the requirements model is normally developed during the analysis phase. The model presents a complete view of the systems’ requirement prior to the development of the actual system. In this paper researcher propose to create a requirements model for employee training management system (ETMS). The requirements model is validated through prototype. Since the proposed prototype is a Web application which is more complex compared to traditional client/server application, the UML extends named Web Application Extensions (WAE) is used to provide Web specific constructs for modeling the web information. This proposed requirements model provides a guideline for other employee training management system developers.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130022813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As growing of internet and e-learning in our country (Iran) and needing e-assessment as vital element of e-learning, it is possible to take test through preparing electronic assessment. In these systems, each lecturer prepares questions and save them in database system. Then students can connect to system and by entering the password and username attend in the exam. And finally they aware from their test result. The purpose of performing this kind of exams is using the computer to take a test in paperless form. In this paper, at first e-learning, e-assessment and its advantages and disadvantages are introduced. Then we illustrate how we implement e-assessment in Islamic Azad University in Iran which is based of synchronous and asynchronous models, and finally the problems of these kinds of assessment will be discussed.
{"title":"Computer Aided Assessment and its Situation in Higher Education: A Case Study from the Islamic Azad University in Iran","authors":"Maryam Honarmand","doi":"10.1109/ICIME.2009.137","DOIUrl":"https://doi.org/10.1109/ICIME.2009.137","url":null,"abstract":"As growing of internet and e-learning in our country (Iran) and needing e-assessment as vital element of e-learning, it is possible to take test through preparing electronic assessment. In these systems, each lecturer prepares questions and save them in database system. Then students can connect to system and by entering the password and username attend in the exam. And finally they aware from their test result. The purpose of performing this kind of exams is using the computer to take a test in paperless form. In this paper, at first e-learning, e-assessment and its advantages and disadvantages are introduced. Then we illustrate how we implement e-assessment in Islamic Azad University in Iran which is based of synchronous and asynchronous models, and finally the problems of these kinds of assessment will be discussed.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129475762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Software project management becomes more challenging due to increase in budget investment and stiff business competition requiring urgent deliveries. The paper presents an approach to sharing solutions to software project management problems. It includes risk identification, risk analysis and planning, risk prioritization, risk monitoring and risk control. The model incorporates problem analysis of historical data of projects which gives a good basis for risk projection. Organizations get to share project management problems and solutions in anonymity.
{"title":"An Approach to Sharing Solutions to Software Project Management Problems","authors":"K. Hashim, A. A. Keshlaf","doi":"10.1109/ICIME.2009.141","DOIUrl":"https://doi.org/10.1109/ICIME.2009.141","url":null,"abstract":"Software project management becomes more challenging due to increase in budget investment and stiff business competition requiring urgent deliveries. The paper presents an approach to sharing solutions to software project management problems. It includes risk identification, risk analysis and planning, risk prioritization, risk monitoring and risk control. The model incorporates problem analysis of historical data of projects which gives a good basis for risk projection. Organizations get to share project management problems and solutions in anonymity.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129924038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Requirements analysis focuses on stakeholders concerns and their influence towards e-government systems. Some characteristics of stakeholders concerns clearly show the complexity and conflicts. This imposes a number of questions in the requirements analysis, such as how are they relevant to stakeholders? What are their needs? How conflicts among the different stakeholders can be resolved? And what coherent requirements can be methodologically produced? This paper describes the Problem Articulation Method in Organizational Semiotics which can be used to conduct such complex requirements analysis. The outcomes of the analysis enable e-government systems development and management to meet users’ needs. A case study of Yantai Citizen Card is chosen to illustrate a process of analysing stakeholders in the lifecycle of requirements analysis.
{"title":"Articulation of Stakeholders Requirements for Complex E-government Systems Development","authors":"Jing Cao, Lily Sun","doi":"10.1109/ICIME.2009.55","DOIUrl":"https://doi.org/10.1109/ICIME.2009.55","url":null,"abstract":"Requirements analysis focuses on stakeholders concerns and their influence towards e-government systems. Some characteristics of stakeholders concerns clearly show the complexity and conflicts. This imposes a number of questions in the requirements analysis, such as how are they relevant to stakeholders? What are their needs? How conflicts among the different stakeholders can be resolved? And what coherent requirements can be methodologically produced? This paper describes the Problem Articulation Method in Organizational Semiotics which can be used to conduct such complex requirements analysis. The outcomes of the analysis enable e-government systems development and management to meet users’ needs. A case study of Yantai Citizen Card is chosen to illustrate a process of analysing stakeholders in the lifecycle of requirements analysis.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124476208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To identify a person using his/her handwriting; it is necessary to analyze a set of handwritings. Because of special styles of Persian handwritten; identifying Persian handwriting needs different approaches in compare with to other languages. This paper introduces a writer identification method to identify the writer of a Persian handwritten text. In the proposed method, the fuzzy approach is applied for the classification and clustering of handwritten texts. The proposed method consists of three main steps: the first step uses grapheme feature to select first candidates, the second one uses area features and fuzzy approach to restrict candidate domain; and finally third step uses gradient features to finalize selection. The experimental results were satisfactory and the accuracy of system was about 90% for 50 writers
{"title":"Text-independent Persian Writer Identification Using Fuzzy Clustering Approach","authors":"Soheila Sadeghi Ram, M. Moghaddam","doi":"10.1109/ICIME.2009.71","DOIUrl":"https://doi.org/10.1109/ICIME.2009.71","url":null,"abstract":"To identify a person using his/her handwriting; it is necessary to analyze a set of handwritings. Because of special styles of Persian handwritten; identifying Persian handwriting needs different approaches in compare with to other languages. This paper introduces a writer identification method to identify the writer of a Persian handwritten text. In the proposed method, the fuzzy approach is applied for the classification and clustering of handwritten texts. The proposed method consists of three main steps: the first step uses grapheme feature to select first candidates, the second one uses area features and fuzzy approach to restrict candidate domain; and finally third step uses gradient features to finalize selection. The experimental results were satisfactory and the accuracy of system was about 90% for 50 writers","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124616314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we utilize some hybrid rendering techniques combining image-based, point-based and geometry-based technique for the modeling and display of immersive virtual heritage environments (VHEs). This paper also uses a generic computation method of indirect illumination based on Monte Carlo sampling and on the sequential analysis theory, which is faster and more automatic than classical methods.The resulting VHEs aim to realistically recreate archaeological site that can be displayed in a range of immersive VR systems using a high-quality, view-dependent algorithm, the observer can act just like the ancients by interacting with the objects of the scenes. The observers are able to participate to lumber or fish in VHEs. We implement a collaborative system platform based on multi-PC called Multipro, which provide a platform to display immersive application which can be extended to be used in the areas of urban planning/architecture and cultural heritage education. In order to display photo-realistic virtual environment we implement a prototype system which is implemented on the Multipro. In order to enhance realism of the virtual environment, we adopt a view-dependent texture mapping technique to rendering the heritage model, furthermore the interaction and animation also are included into Hemudu virtual scenes, finally the lighting , vegetation rendering and hybrid rendering are addressed for enhancing the sense of realism. Examples of the prototype system in use are described and demonstrated in this paper.
{"title":"Immersive Display and Interactive Techniques for the Modeling and Rendering of Virtual Heritage Environments","authors":"Zhao Lei, Duanqing Xu","doi":"10.1109/ICIME.2009.127","DOIUrl":"https://doi.org/10.1109/ICIME.2009.127","url":null,"abstract":"In this paper we utilize some hybrid rendering techniques combining image-based, point-based and geometry-based technique for the modeling and display of immersive virtual heritage environments (VHEs). This paper also uses a generic computation method of indirect illumination based on Monte Carlo sampling and on the sequential analysis theory, which is faster and more automatic than classical methods.The resulting VHEs aim to realistically recreate archaeological site that can be displayed in a range of immersive VR systems using a high-quality, view-dependent algorithm, the observer can act just like the ancients by interacting with the objects of the scenes. The observers are able to participate to lumber or fish in VHEs. We implement a collaborative system platform based on multi-PC called Multipro, which provide a platform to display immersive application which can be extended to be used in the areas of urban planning/architecture and cultural heritage education. In order to display photo-realistic virtual environment we implement a prototype system which is implemented on the Multipro. In order to enhance realism of the virtual environment, we adopt a view-dependent texture mapping technique to rendering the heritage model, furthermore the interaction and animation also are included into Hemudu virtual scenes, finally the lighting , vegetation rendering and hybrid rendering are addressed for enhancing the sense of realism. Examples of the prototype system in use are described and demonstrated in this paper.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122768156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless Mesh Network (WMN) is a multi-hop wireless network with partial mesh topology, which can replace wired infrastructure backbone in a traditional wireless network, to wireless. It is an exciting new technology that has applications in defense, metro-area Internet access, and disaster management. WMNs are believed to be a highly promising technology and will play an increasingly important role in future generation wireless mobile networks. This paper presents a survey on multicast protocols in wireless mesh networks and factors to be addressed while designing a multicast protocol for wireless mesh networks, like availability of mesh router infrastructure, effect of multiple channels and channel assignment, load balancing, selection of multicast routing metric, effect of guaranteed Quality of Service, and cross layer optimization.
{"title":"Multicasting in Wireless Mesh Networks: Challenges and Opportunities","authors":"Ajish Kumar K.S., S. Hegde","doi":"10.1109/ICIME.2009.92","DOIUrl":"https://doi.org/10.1109/ICIME.2009.92","url":null,"abstract":"Wireless Mesh Network (WMN) is a multi-hop wireless network with partial mesh topology, which can replace wired infrastructure backbone in a traditional wireless network, to wireless. It is an exciting new technology that has applications in defense, metro-area Internet access, and disaster management. WMNs are believed to be a highly promising technology and will play an increasingly important role in future generation wireless mobile networks. This paper presents a survey on multicast protocols in wireless mesh networks and factors to be addressed while designing a multicast protocol for wireless mesh networks, like availability of mesh router infrastructure, effect of multiple channels and channel assignment, load balancing, selection of multicast routing metric, effect of guaranteed Quality of Service, and cross layer optimization.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122961802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a new watermarking method is presented to embed a binary watermark into an image. The proposed method uses a special type of fractal coding that its parameters are contrast scaling and the mean of range block. Also, it utilizes the fuzzy C-mean clustering to address the watermark bits. The experimental results show that the proposed method has high robustness against signal distortion such as JPEG compression, median filter and additive noise.
{"title":"Fractal Based Digital Image Watermarking Using Fuzzy C-Mean Clustering","authors":"Soheila Kiani, M. Moghaddam","doi":"10.1109/ICIME.2009.72","DOIUrl":"https://doi.org/10.1109/ICIME.2009.72","url":null,"abstract":"In this paper, a new watermarking method is presented to embed a binary watermark into an image. The proposed method uses a special type of fractal coding that its parameters are contrast scaling and the mean of range block. Also, it utilizes the fuzzy C-mean clustering to address the watermark bits. The experimental results show that the proposed method has high robustness against signal distortion such as JPEG compression, median filter and additive noise.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121764698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Band-pass bilateral filter is an improved bilateral filter which does not have low-pass characteristics but has band-pass characteristics to enhance image contrast around edges. However, the computation time is relatively large due to Gaussian calculation in all pixels. To reduce the calculation cost, we look to a nonlinear filter called epsilon-filter and propose an advanced epsilon-filter which does not have low-pass charactersitics but has band-pass characteristics to enhance the image contrast around edge, namely band-pass epsilon-filter. Due to its simple design, the calculation cost is relatively small the same as epsilon-filter. To show the effectiveness of the proposed method, we also report the results of some comparative experiments concerning the filter characteristics and computational cost.
{"title":"Noise Reduction and Edge Enhancement Based on Band-Pass Epsilon-filter","authors":"M. Matsumoto, S. Hashimoto","doi":"10.1109/ICIME.2009.21","DOIUrl":"https://doi.org/10.1109/ICIME.2009.21","url":null,"abstract":"Band-pass bilateral filter is an improved bilateral filter which does not have low-pass characteristics but has band-pass characteristics to enhance image contrast around edges. However, the computation time is relatively large due to Gaussian calculation in all pixels. To reduce the calculation cost, we look to a nonlinear filter called epsilon-filter and propose an advanced epsilon-filter which does not have low-pass charactersitics but has band-pass characteristics to enhance the image contrast around edge, namely band-pass epsilon-filter. Due to its simple design, the calculation cost is relatively small the same as epsilon-filter. To show the effectiveness of the proposed method, we also report the results of some comparative experiments concerning the filter characteristics and computational cost.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122777725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}