Pub Date : 2020-01-01DOI: 10.24507/IJICIC.16.03.1093
Shota Rikukawa, H. Mori, Taku Harada
{"title":"Recurrent neural network based stock price prediction using multiple stock brands","authors":"Shota Rikukawa, H. Mori, Taku Harada","doi":"10.24507/IJICIC.16.03.1093","DOIUrl":"https://doi.org/10.24507/IJICIC.16.03.1093","url":null,"abstract":"","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"15 1","pages":"1093-1099"},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74172212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Application that adopts collaborative system allows multiple users to interact with other users in the same virtual space either in Virtual Reality (VR) or Augmented Reality (AR). This paper aims to integrate the VR and AR space in a Collaborative User Interface that enables the user to cooperate with other users in a different type of interfaces in a single shared space manner. The gesture interaction technique is proposed as the interaction tool in both of the virtual spaces as it can provide a more natural gesture interaction when interacting with the virtual object. The integration of VR and AR space provide a cross-discipline shared data interchange through the network protocol of client-server architecture.
{"title":"Integrating Virtual Reality and Augmented Reality in a Collaborative User Interface","authors":"M. N. A. Nor’a, A. W. Ismail","doi":"10.11113/ijic.v9n2.242","DOIUrl":"https://doi.org/10.11113/ijic.v9n2.242","url":null,"abstract":"Application that adopts collaborative system allows multiple users to interact with other users in the same virtual space either in Virtual Reality (VR) or Augmented Reality (AR). This paper aims to integrate the VR and AR space in a Collaborative User Interface that enables the user to cooperate with other users in a different type of interfaces in a single shared space manner. The gesture interaction technique is proposed as the interaction tool in both of the virtual spaces as it can provide a more natural gesture interaction when interacting with the virtual object. The integration of VR and AR space provide a cross-discipline shared data interchange through the network protocol of client-server architecture.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86455871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.24507/IJICIC.15.04.1521
K. Goto, T. Sugi, H. Fukuda, T. Yamasaki, S. Tobimatsu, Y. Goto
{"title":"The effect of stimulus pattern, color combination and flicker frequency on steady-state visual evoked potentials topography","authors":"K. Goto, T. Sugi, H. Fukuda, T. Yamasaki, S. Tobimatsu, Y. Goto","doi":"10.24507/IJICIC.15.04.1521","DOIUrl":"https://doi.org/10.24507/IJICIC.15.04.1521","url":null,"abstract":"","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"92 1","pages":"1521-1530"},"PeriodicalIF":1.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75923456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient matrix embedding technique by using submatrix transform for grayscale images","authors":"Hsi-Yuan Chang, Jyun-Jie Wang, Chi-Yuan Lin, Chin-hsing Chen","doi":"10.24507/IJICIC.15.04.1565","DOIUrl":"https://doi.org/10.24507/IJICIC.15.04.1565","url":null,"abstract":"","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"48 1","pages":"1565-1580"},"PeriodicalIF":1.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87935952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Automated Essay Scoring (AES) is the use of specialized computer programs to assign grades to essays written in an educational assessment context. It is developed to overcome time, cost, and reliability issues in writing assessment. Most of the contemporary AES are “western” proprietary product, designed for native English speakers, where the source code is not made available to public and the assessment criteria may tend to be associated with the scoring rubrics of a particular English test context. Therefore, such AES may not be appropriate to be directly adopted in Malaysia context. There is no actual software development work found in building an AES for Malaysian English test environment. As such, this work is carried out as the study for formulating the requirement of a local AES, targeted for Malaysia's essay assessment environment. In our work, we assessed a well-known AES called LightSide for determining its suitability in our local context. We use various Machine Learning technique provided by LightSide to predict the score of Malaysian University English Test (MUET) essays; and compare its performance, i.e. the percentage of exact agreement of LightSide with the human score of the essays. Besides, we review and discuss the theoretical aspect of the AES, i.e. its state-of-the-art, reliability and validity requirement. The finding in this paper will be used as the basis of our future work in developing a local AES, namely Intelligent Essay Grader (IEG), for Malaysian English test environment.
{"title":"A Study for the Development of Automated Essay Scoring (AES) in Malaysian English Test Environment","authors":"Wee Sian Wong, Chih How Bong","doi":"10.11113/IJIC.V9N1.220","DOIUrl":"https://doi.org/10.11113/IJIC.V9N1.220","url":null,"abstract":"Automated Essay Scoring (AES) is the use of specialized computer programs to assign grades to essays written in an educational assessment context. It is developed to overcome time, cost, and reliability issues in writing assessment. Most of the contemporary AES are “western” proprietary product, designed for native English speakers, where the source code is not made available to public and the assessment criteria may tend to be associated with the scoring rubrics of a particular English test context. Therefore, such AES may not be appropriate to be directly adopted in Malaysia context. There is no actual software development work found in building an AES for Malaysian English test environment. As such, this work is carried out as the study for formulating the requirement of a local AES, targeted for Malaysia's essay assessment environment. In our work, we assessed a well-known AES called LightSide for determining its suitability in our local context. We use various Machine Learning technique provided by LightSide to predict the score of Malaysian University English Test (MUET) essays; and compare its performance, i.e. the percentage of exact agreement of LightSide with the human score of the essays. Besides, we review and discuss the theoretical aspect of the AES, i.e. its state-of-the-art, reliability and validity requirement. The finding in this paper will be used as the basis of our future work in developing a local AES, namely Intelligent Essay Grader (IEG), for Malaysian English test environment.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"96 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86988761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jalilah Arijah Mohd Kamarudin, A. Abdullah, R. Sallehuddin
In the past decade it has become increasingly the effort for researcher to surpass the bioinformatics challenges foremost in next generation sequencing (NGS). This review paper gives an overview of the computational software and bioinformatics model that has been used for next generation sequencing. In this paper, the description on functionalities, source type and website of the program or software are provided. These computational software and bioinformatics model are differentiating into three types of bioinformatics analysis stages including alignment, variant calling and filtering and annotation. Besides, we discuss the future work and the development for new bioinformatics tool to be advanced.
{"title":"A Review of Bioinformatics Model and Computational Software of Next Generation Sequencing","authors":"Jalilah Arijah Mohd Kamarudin, A. Abdullah, R. Sallehuddin","doi":"10.11113/IJIC.V9N1.217","DOIUrl":"https://doi.org/10.11113/IJIC.V9N1.217","url":null,"abstract":"In the past decade it has become increasingly the effort for researcher to surpass the bioinformatics challenges foremost in next generation sequencing (NGS). This review paper gives an overview of the computational software and bioinformatics model that has been used for next generation sequencing. In this paper, the description on functionalities, source type and website of the program or software are provided. These computational software and bioinformatics model are differentiating into three types of bioinformatics analysis stages including alignment, variant calling and filtering and annotation. Besides, we discuss the future work and the development for new bioinformatics tool to be advanced.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"11 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75211376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md Yeahia Bhuiyan, S. H. Othman, Raja Zahilah Raja Md Radzi
Cloud computing (CC) is a future technological trend for technological infrastructure development. And it is growing strongly as the backbone of industrial future technological infrastructure. As CC service has a lot to offer, it also has some major downside that clients cannot ignore. For CC service adoption, the potential candidates are SMEs but due to lack of resources, experience, expertise and low financial structure scenario CC can be most helpful. CC faces a major issue in term of cloud security, an organization doesn’t understand the cloud security factors in the organization and data owner doubts about their data. In the research paper, an investigation on the cloud security objectives to find out the influential factors for cloud adoption in SMEs by proposing an enhancement of Technology-Organization-Environment (TOE) model with some positive influential factor like cloud security, relative advantages, cost saving, availability, SLA, capability, top management, organizational readiness, IS knowledge, malicious insiders, government regulatory support, competitive pressure, size and type. Some negative influencing factors like technological readiness, cloud trust and lack of standards in cloud security. Data were collected by questionnaires from a selected IT company based on SaaS and public cloud. Case study method has been used for validating the enhance TOE model. The IBM Statistics SPSS v22 tool was used for data analysis. The results of data analysis support the enhancement as well as all the proposed hypotheses. In summary, the results of the analysis show that all the enhancement factors were found to have a significant cloud security influence on adoption of cloud computing for SMEs.
{"title":"An Enhancement of TOE Model by Investigating the Influential Factors of Cloud Adoption Security Objectives","authors":"Md Yeahia Bhuiyan, S. H. Othman, Raja Zahilah Raja Md Radzi","doi":"10.11113/IJIC.V9N1.192","DOIUrl":"https://doi.org/10.11113/IJIC.V9N1.192","url":null,"abstract":"Cloud computing (CC) is a future technological trend for technological infrastructure development. And it is growing strongly as the backbone of industrial future technological infrastructure. As CC service has a lot to offer, it also has some major downside that clients cannot ignore. For CC service adoption, the potential candidates are SMEs but due to lack of resources, experience, expertise and low financial structure scenario CC can be most helpful. CC faces a major issue in term of cloud security, an organization doesn’t understand the cloud security factors in the organization and data owner doubts about their data. In the research paper, an investigation on the cloud security objectives to find out the influential factors for cloud adoption in SMEs by proposing an enhancement of Technology-Organization-Environment (TOE) model with some positive influential factor like cloud security, relative advantages, cost saving, availability, SLA, capability, top management, organizational readiness, IS knowledge, malicious insiders, government regulatory support, competitive pressure, size and type. Some negative influencing factors like technological readiness, cloud trust and lack of standards in cloud security. Data were collected by questionnaires from a selected IT company based on SaaS and public cloud. Case study method has been used for validating the enhance TOE model. The IBM Statistics SPSS v22 tool was used for data analysis. The results of data analysis support the enhancement as well as all the proposed hypotheses. In summary, the results of the analysis show that all the enhancement factors were found to have a significant cloud security influence on adoption of cloud computing for SMEs.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"149 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91142121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Today, databases are on of the most important things in the IT world and it is also becoming more and more popular and organizations globally are gradually moving their traditional IT setup to database model to gain the benefits of securing the data and in terms of providing easy access to, and elasticity of IT services. With database security, the IT service roles within an organization become integrated hence giving the overall IT operating model a more structured layout. Such objectivity however can only be materialized when proper planning and execution are put in place. As such, a proper execution and implementation of database system would include a stringent set of checks and audit processes. The goal of database auditing is central towards determining if the services engaged and its―maintainers are meeting certain legal requirements in terms of protecting customers data and organization standards to achieve secure data assets success against various security threats. Therefore, this project explores the factors influencing security audit quality by collecting data using structured group discussion.
{"title":"A Conceptual Framework of Information Security Database Audit and Assessment","authors":"Muneeb ul-Hasan, S. H. Othman, Marina Md Arshad","doi":"10.11113/IJIC.V9N1.206","DOIUrl":"https://doi.org/10.11113/IJIC.V9N1.206","url":null,"abstract":"Today, databases are on of the most important things in the IT world and it is also becoming more and more popular and organizations globally are gradually moving their traditional IT setup to database model to gain the benefits of securing the data and in terms of providing easy access to, and elasticity of IT services. With database security, the IT service roles within an organization become integrated hence giving the overall IT operating model a more structured layout. Such objectivity however can only be materialized when proper planning and execution are put in place. As such, a proper execution and implementation of database system would include a stringent set of checks and audit processes. The goal of database auditing is central towards determining if the services engaged and its―maintainers are meeting certain legal requirements in terms of protecting customers data and organization standards to achieve secure data assets success against various security threats. Therefore, this project explores the factors influencing security audit quality by collecting data using structured group discussion.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"25 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87935315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nowadays, the advancement of the sensor technology, has introduced the smart living community where the sensor is communicating with each other or to other entities. This has introduced the new term called internet-of-things (IoT). The data collected from sensor nodes will be analyzed at the endpoint called based station or sink for decision making. Unfortunately, accurate data is not usually accurate and reliable which will affect the decision making at the base station. There are many reasons constituted to the inaccurate and unreliable data like the malicious attack, harsh environment as well as the sensor node failure itself. In a worse case scenario, the node failure will also lead to the dysfunctional of the entire network. Therefore, in this paper, an unsupervised one-class SVM (OCSVM) is used to build the anomaly detection schemes in recourse constraint Wireless Sensor Networks (WSNs). Distributed network topology will be used to minimize the data communication in the network which can prolong the network lifetime. Meanwhile, the dimension reduction has been providing the lightweight of the anomaly detection schemes. In this paper Distributed Centered Hyperellipsoidal Support Vector Machine (DCESVM-DR) anomaly detection schemes is proposed to provide the efficiency and effectiveness of the anomaly detection schemes.
{"title":"Distributed CESVM-DR Anomaly Detection for Wireless Sensor Network","authors":"Nurfazrina Mohd Zamry, A. Zainal, M. Rassam","doi":"10.11113/IJIC.V9N1.218","DOIUrl":"https://doi.org/10.11113/IJIC.V9N1.218","url":null,"abstract":"Nowadays, the advancement of the sensor technology, has introduced the smart living community where the sensor is communicating with each other or to other entities. This has introduced the new term called internet-of-things (IoT). The data collected from sensor nodes will be analyzed at the endpoint called based station or sink for decision making. Unfortunately, accurate data is not usually accurate and reliable which will affect the decision making at the base station. There are many reasons constituted to the inaccurate and unreliable data like the malicious attack, harsh environment as well as the sensor node failure itself. In a worse case scenario, the node failure will also lead to the dysfunctional of the entire network. Therefore, in this paper, an unsupervised one-class SVM (OCSVM) is used to build the anomaly detection schemes in recourse constraint Wireless Sensor Networks (WSNs). Distributed network topology will be used to minimize the data communication in the network which can prolong the network lifetime. Meanwhile, the dimension reduction has been providing the lightweight of the anomaly detection schemes. In this paper Distributed Centered Hyperellipsoidal Support Vector Machine (DCESVM-DR) anomaly detection schemes is proposed to provide the efficiency and effectiveness of the anomaly detection schemes.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"23 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80813322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This simulation project aims to solve forensic anthropology issues by using the computational method. The positive identification on gender is such a potential field to be explored. Basically, gender identification in forensic anthropology by comparative skeletal anatomy by atlas and crucially affect the identification accuracy. The simulation identification method was studied in order to determine the best model, which reduce the total costs of the post-mortem as an objective. The computational method on simulation run improves the identification accuracy as proven by many studies. Fuzzy K-nearest neighbours classifier (FuzzyNN) is such a computational intelligence method and always shows the best performance in many fields including forensic anthropology. Thus, this intelligent identification method was implemented within the determining for best accuracy. The result of this proposed model was compared with raw data collection and standard collections datasets; Goldman Osteometric dataset and Ryan and Shaw Dataset (RSD) as a benchmark for the identification policy. To improve the accuracy of FuzzyNN classifier, Particle Swarm Optimization (PSO) feature selection was used as the basis for choosing the best features to be used by the selected FuzzyNN classification model. The model is called PSO-FuzzyNN and has been developed by MATLAB and WEKA tools platform. Comparisons of the performance measurement namely the percentage of the classification accuracy of the model were performed. The result show potential the proposed PSO-FuzzyNN method demonstrates the capability to the obtained highest accuracy of identification.
本模拟项目旨在利用计算方法解决法医人类学问题。对性别的积极认同就是这样一个有待探索的潜在领域。法医人类学的性别鉴定主要是通过比较骨骼解剖图谱进行的,对鉴定的准确性有重要影响。为了确定以降低尸体总成本为目标的最佳模型,研究了仿真识别方法。仿真运行的计算方法提高了识别精度,已被许多研究证明。模糊k近邻分类器(FuzzyNN)就是这样一种计算智能方法,在包括法医人类学在内的许多领域都表现出最好的性能。因此,这种智能识别方法在确定范围内实现了最佳的准确性。将该模型与原始采集数据集和标准采集数据集进行了比较;以Goldman骨测量数据集和Ryan and Shaw数据集(RSD)作为识别策略的基准。为了提高FuzzyNN分类器的准确率,将粒子群优化(Particle Swarm Optimization, PSO)特征选择作为选择最佳特征的基础,供所选的FuzzyNN分类模型使用。该模型被称为PSO-FuzzyNN,并通过MATLAB和WEKA工具平台开发。进行了性能度量的比较,即模型的分类准确率的百分比。结果表明,所提出的PSO-FuzzyNN方法具有较高的识别精度。
{"title":"PSO-FuzzyNN Techniques in Gender Classification Based on Bovine Bone Morphology Properties","authors":"Nur A. Sahadun, N. A. Ali, H. Haron","doi":"10.11113/IJIC.V9N1.215","DOIUrl":"https://doi.org/10.11113/IJIC.V9N1.215","url":null,"abstract":"This simulation project aims to solve forensic anthropology issues by using the computational method. The positive identification on gender is such a potential field to be explored. Basically, gender identification in forensic anthropology by comparative skeletal anatomy by atlas and crucially affect the identification accuracy. The simulation identification method was studied in order to determine the best model, which reduce the total costs of the post-mortem as an objective. The computational method on simulation run improves the identification accuracy as proven by many studies. Fuzzy K-nearest neighbours classifier (FuzzyNN) is such a computational intelligence method and always shows the best performance in many fields including forensic anthropology. Thus, this intelligent identification method was implemented within the determining for best accuracy. The result of this proposed model was compared with raw data collection and standard collections datasets; Goldman Osteometric dataset and Ryan and Shaw Dataset (RSD) as a benchmark for the identification policy. To improve the accuracy of FuzzyNN classifier, Particle Swarm Optimization (PSO) feature selection was used as the basis for choosing the best features to be used by the selected FuzzyNN classification model. The model is called PSO-FuzzyNN and has been developed by MATLAB and WEKA tools platform. Comparisons of the performance measurement namely the percentage of the classification accuracy of the model were performed. The result show potential the proposed PSO-FuzzyNN method demonstrates the capability to the obtained highest accuracy of identification.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"88 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72553853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}