Siti Arpah Ahmad, Zarina Zainol, R. Yunos, Adzhar Abd Kadir, Mohd. Zaki Haji Ghazali, Muhammad Fadzil Murad
Augmented Reality (AR) is a visual technology that able to provide users with a semi-real time experience. The advancement of mobile phone and camera technology have make the potential of AR emerged. Companies wants high product sales and look more advanced than their competitors. One of the effort is to provide customers with correct experience of their products. Catalog is a tool to market a product. However, paper printing catalog is two dimensional, and has limitation in fully presenting the product. This work, presents the adoption of AR in T-shirt catalog. The application utilized Android mobile phone to view the 3D model of the t-shirt. The user scan the catalog using the android handphone on the paper printing catalog, and they able to view in 3D the different angle of the T-shirt. This application has successfully developed and testing has been made on compatibility and functionality test.
{"title":"Application of Augmented Reality (AR) in T-Shirt Catalog","authors":"Siti Arpah Ahmad, Zarina Zainol, R. Yunos, Adzhar Abd Kadir, Mohd. Zaki Haji Ghazali, Muhammad Fadzil Murad","doi":"10.11113/IJIC.V9N1.212","DOIUrl":"https://doi.org/10.11113/IJIC.V9N1.212","url":null,"abstract":"Augmented Reality (AR) is a visual technology that able to provide users with a semi-real time experience. The advancement of mobile phone and camera technology have make the potential of AR emerged. Companies wants high product sales and look more advanced than their competitors. One of the effort is to provide customers with correct experience of their products. Catalog is a tool to market a product. However, paper printing catalog is two dimensional, and has limitation in fully presenting the product. This work, presents the adoption of AR in T-shirt catalog. The application utilized Android mobile phone to view the 3D model of the t-shirt. The user scan the catalog using the android handphone on the paper printing catalog, and they able to view in 3D the different angle of the T-shirt. This application has successfully developed and testing has been made on compatibility and functionality test.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"12 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74341025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Database plays a very important role in everyone’s life including the organizations since everything today is connected via Internet and to manage so many data. There is a need of database which helps organizations to organize, sort and manage the data and to ensure that the data which a user is receiving and sending through the mean of database is secure since the database stores almost everything such as Banking details which includes user id, Password and so. Thus, it means that the data are really valuable and confidential to us and therefore security really matters for database. SQL Injection Attacks on the database are becoming common in this era where the hackers are trying to steal the valuable data of an individual through the mean of SQL Injection Attack by using malicious query on the application. This application reveals the individual data by an efficient and the best SQL Injection Prevention technique is required in order to protect the individual data from being stolen by the hackers. Therefore, this paper will be focusing on reviewing different types of SQL Injection prevention methods and SQL injection types. The initial finding of this paper can make comparison of different types of SQL Injection Prevention methods which will enable the Database Administrator to choose the best and the efficient SQL Injection Prevention Method for their organization. Consequently, Preventing of SQL Injection Attack from happening which would ultimately result in no data loss of an user.
{"title":"A Survey on SQL Injection Prevention Methods","authors":"Shahbaaz Mohammed Hayat Chaki, M. Din","doi":"10.11113/IJIC.V9N1.224","DOIUrl":"https://doi.org/10.11113/IJIC.V9N1.224","url":null,"abstract":"Database plays a very important role in everyone’s life including the organizations since everything today is connected via Internet and to manage so many data. There is a need of database which helps organizations to organize, sort and manage the data and to ensure that the data which a user is receiving and sending through the mean of database is secure since the database stores almost everything such as Banking details which includes user id, Password and so. Thus, it means that the data are really valuable and confidential to us and therefore security really matters for database. SQL Injection Attacks on the database are becoming common in this era where the hackers are trying to steal the valuable data of an individual through the mean of SQL Injection Attack by using malicious query on the application. This application reveals the individual data by an efficient and the best SQL Injection Prevention technique is required in order to protect the individual data from being stolen by the hackers. Therefore, this paper will be focusing on reviewing different types of SQL Injection prevention methods and SQL injection types. The initial finding of this paper can make comparison of different types of SQL Injection Prevention methods which will enable the Database Administrator to choose the best and the efficient SQL Injection Prevention Method for their organization. Consequently, Preventing of SQL Injection Attack from happening which would ultimately result in no data loss of an user.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"21 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85511762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Reddy, Song Shue Nee, Lim Zhi Min, Chew Xin Ying
The heart disease has been one of the major causes of death worldwide. The heart disease diagnosis has been expensive nowadays, thus it is necessary to predict the risk of getting heart disease with selected features. The feature selection methods could be used as valuable techniques to reduce the cost of diagnosis by selecting the important attributes. The objectives of this study are to predict the classification model, and to know which selected features play a key role in the prediction of heart disease by using Cleveland and statlog project heart datasets. The accuracy of random forest algorithm both in classification and feature selection model has been observed to be 90–95% based on three different percentage splits. The 8 and 6 selected features seem to be the minimum feature requirements to build a better performance model. Whereby, further dropping of the 8 or 6 selected features may not lead to better performance for the prediction model.
{"title":"Classification and Feature Selection Approaches by Machine Learning Techniques: Heart Disease Prediction","authors":"N. Reddy, Song Shue Nee, Lim Zhi Min, Chew Xin Ying","doi":"10.11113/IJIC.V9N1.210","DOIUrl":"https://doi.org/10.11113/IJIC.V9N1.210","url":null,"abstract":"The heart disease has been one of the major causes of death worldwide. The heart disease diagnosis has been expensive nowadays, thus it is necessary to predict the risk of getting heart disease with selected features. The feature selection methods could be used as valuable techniques to reduce the cost of diagnosis by selecting the important attributes. The objectives of this study are to predict the classification model, and to know which selected features play a key role in the prediction of heart disease by using Cleveland and statlog project heart datasets. The accuracy of random forest algorithm both in classification and feature selection model has been observed to be 90–95% based on three different percentage splits. The 8 and 6 selected features seem to be the minimum feature requirements to build a better performance model. Whereby, further dropping of the 8 or 6 selected features may not lead to better performance for the prediction model.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"14 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81213760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Machine learning based flight delay prediction is one of the numerous real-life application domains where the problem of imbalance in class distribution is reported to affect the performance of learning algorithms. However, the fact that learning algorithms have been reported to perform well on some class imbalance problems posits the possibility of other contributing factors. In this study, we visually explore air traffic data after dimensionality reduction with t-Distributed Stochastic Neighbour Embedding. Our initial findings suggest a high degree of overlapping between the delayed and on-time class instances which can be a greater problem for learning algorithms than class imbalance.
{"title":"A Preliminary Study on Learning Challenges in Machine Learning-based Flight Delay Prediction","authors":"Ismail B. Mustapha, S. Shamsuddin, S. Hasan","doi":"10.11113/IJIC.V9N1.204","DOIUrl":"https://doi.org/10.11113/IJIC.V9N1.204","url":null,"abstract":"Machine learning based flight delay prediction is one of the numerous real-life application domains where the problem of imbalance in class distribution is reported to affect the performance of learning algorithms. However, the fact that learning algorithms have been reported to perform well on some class imbalance problems posits the possibility of other contributing factors. In this study, we visually explore air traffic data after dimensionality reduction with t-Distributed Stochastic Neighbour Embedding. Our initial findings suggest a high degree of overlapping between the delayed and on-time class instances which can be a greater problem for learning algorithms than class imbalance.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"106 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86251117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.24507/IJICIC.15.01.143
Umi Laili Yuhana, S. Rochimah, E. M. Yuniarno, A. Rysbekova, A. Tormási, L. Kóczy, M. Purnomo
{"title":"A rule-based expert system for automatic question classification in mathematics adaptive assessment on indonesian elementary school environment","authors":"Umi Laili Yuhana, S. Rochimah, E. M. Yuniarno, A. Rysbekova, A. Tormási, L. Kóczy, M. Purnomo","doi":"10.24507/IJICIC.15.01.143","DOIUrl":"https://doi.org/10.24507/IJICIC.15.01.143","url":null,"abstract":"","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"23 1","pages":"143-161"},"PeriodicalIF":1.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72539720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.24507/IJICIC.15.01.261
Lei Xue, Xiao Yi, Yang-Cheng Lin, J. Drukker
{"title":"An approach of the product form design based on gra-fuzzy logic model: A case study of train seats","authors":"Lei Xue, Xiao Yi, Yang-Cheng Lin, J. Drukker","doi":"10.24507/IJICIC.15.01.261","DOIUrl":"https://doi.org/10.24507/IJICIC.15.01.261","url":null,"abstract":"","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"54 1","pages":"261-274"},"PeriodicalIF":1.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87033505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.24507/IJICIC.14.06.2025
Anas Al-Masarwah, A. Ahmad
In this paper, we introduce the notion of doubt bipolar fuzzy H-ideals of BCK/BCI-algebras and investigate some interesting properties. We characterize strong doubt positive t-level cut set, strong doubt negative s-level cut set, homomorphism and equivalence relation by considering doubt bipolar fuzzy H-ideals of BCK/BCI-algebras. Characterization theorem of characteristic doubt bipolar fuzzy H-ideals is also discussed. Particularly, the notion of Cartesian product of two doubt bipolar fuzzy H-ideals by using max-min operations is introduced, and some related properties are studied. Ordinary H-ideals are linked with doubt bipolar fuzzy H-ideals by means of doubt level cut set of Cartesian product of two bipolar-valued fuzzy sets.
{"title":"Novel concepts of doubt bipolar fuzzy H-ideals of BCK/BCI-algebras","authors":"Anas Al-Masarwah, A. Ahmad","doi":"10.24507/IJICIC.14.06.2025","DOIUrl":"https://doi.org/10.24507/IJICIC.14.06.2025","url":null,"abstract":"In this paper, we introduce the notion of doubt bipolar fuzzy H-ideals of BCK/BCI-algebras and investigate some interesting properties. We characterize strong doubt positive t-level cut set, strong doubt negative s-level cut set, homomorphism and equivalence relation by considering doubt bipolar fuzzy H-ideals of BCK/BCI-algebras. Characterization theorem of characteristic doubt bipolar fuzzy H-ideals is also discussed. Particularly, the notion of Cartesian product of two doubt bipolar fuzzy H-ideals by using max-min operations is introduced, and some related properties are studied. Ordinary H-ideals are linked with doubt bipolar fuzzy H-ideals by means of doubt level cut set of Cartesian product of two bipolar-valued fuzzy sets.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"33 1","pages":"2025-2041"},"PeriodicalIF":1.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77616519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.24507/IJICIC.14.06.2129
H. Nguyen, Thi-Thiet Pham, Van Vo, Bay Vo, T. Quan
Nowadays, learning activities at universities in Vietnam are mostly in the form of credit-based mode. That is, to graduate students have to complete the subjects specified in the curriculum including the compulsory and optional ones. Therefore, to achieve their best performance, students would need guidelines on study direction in the compulsory subjects and choose the optional courses appropriate to their interests and abilities. Based on these practical requirements, the paper proposes a tool to assist students in predicting their own academic performance in order to improve their academic ability and be more scientifically grounded. In addition, the tool also helps students choose the subjects for the next semester in a reasonable manner. This tool is based on a set of sequential rules derived from the learning result of the students. To evaluate the performance of the proposed model, this tool was tested from real students records in the Faculty of Information Technology in Ho Chi Minh City University of Industry.
{"title":"The predictive modeling for learning student results based on sequential rules","authors":"H. Nguyen, Thi-Thiet Pham, Van Vo, Bay Vo, T. Quan","doi":"10.24507/IJICIC.14.06.2129","DOIUrl":"https://doi.org/10.24507/IJICIC.14.06.2129","url":null,"abstract":"Nowadays, learning activities at universities in Vietnam are mostly in the form of credit-based mode. That is, to graduate students have to complete the subjects specified in the curriculum including the compulsory and optional ones. Therefore, to achieve their best performance, students would need guidelines on study direction in the compulsory subjects and choose the optional courses appropriate to their interests and abilities. Based on these practical requirements, the paper proposes a tool to assist students in predicting their own academic performance in order to improve their academic ability and be more scientifically grounded. In addition, the tool also helps students choose the subjects for the next semester in a reasonable manner. This tool is based on a set of sequential rules derived from the learning result of the students. To evaluate the performance of the proposed model, this tool was tested from real students records in the Faculty of Information Technology in Ho Chi Minh City University of Industry.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"26 1","pages":"2129-2140"},"PeriodicalIF":1.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74444010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.24507/IJICIC.14.06.2245
C. Kuo, Kai Chain, Chu-Sing Yang
. Although the convenience of the Internet has changed contemporary society, lifestyles, and interpersonal communications, it has also enabled various network intru-sions that attempt to seize fame or profits through manipulating Internet functionality, computers, software, or the social weaknesses of the users. Attackers have leveraged new technologies and developed new techniques to deploy an endless array of tactics and skills. However, conventional cybersecurity education often relies on classroom teaching instead of practical tasks using real machines, because actual machine practice often provokes attacks or abnormal network traffic. This article used Emulab as a testing platform to provide a controllable environment that enabled quick deployment, adjustment, and measurement of both offensive and defensive cybersecurity experiments. Through the integration of cyber-attack and defense maneuvers within predetermined scenarios, as well as related cybersecurity questions, this article compiled data regarding the operations and responses of the participants in the exercises. This enabled analysis and improvement of the attack and defense maneuvers, the scenarios, and the platform.
{"title":"Cyber attack and defense training: Using emulab as a platform","authors":"C. Kuo, Kai Chain, Chu-Sing Yang","doi":"10.24507/IJICIC.14.06.2245","DOIUrl":"https://doi.org/10.24507/IJICIC.14.06.2245","url":null,"abstract":". Although the convenience of the Internet has changed contemporary society, lifestyles, and interpersonal communications, it has also enabled various network intru-sions that attempt to seize fame or profits through manipulating Internet functionality, computers, software, or the social weaknesses of the users. Attackers have leveraged new technologies and developed new techniques to deploy an endless array of tactics and skills. However, conventional cybersecurity education often relies on classroom teaching instead of practical tasks using real machines, because actual machine practice often provokes attacks or abnormal network traffic. This article used Emulab as a testing platform to provide a controllable environment that enabled quick deployment, adjustment, and measurement of both offensive and defensive cybersecurity experiments. Through the integration of cyber-attack and defense maneuvers within predetermined scenarios, as well as related cybersecurity questions, this article compiled data regarding the operations and responses of the participants in the exercises. This enabled analysis and improvement of the attack and defense maneuvers, the scenarios, and the platform.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"54 1","pages":"2245-2258"},"PeriodicalIF":1.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84272888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The existence of technology such as social media platforms have led individuals and health experts to use it as a supplementary tool. Providing healthcare purposes through social media platforms can facilitate and encourage individuals to gather information as well as acquire social support. Integrating social media platforms into healthcare context is a developing area of behavioral research. It is also found that there is a limited number of studies that reported the benefit acquire from the utilization of social media platforms in healthcare context. Thus, this study reported several benefits that individuals can acquire from the usage of social media platforms for healthcare context.
{"title":"Benefits of Social Media Platform in Healthcare","authors":"Nur Ain Zulkefli, N. A. Iahad, Ahmad Fadhil Yusof","doi":"10.11113/IJIC.V8N3.201","DOIUrl":"https://doi.org/10.11113/IJIC.V8N3.201","url":null,"abstract":"The existence of technology such as social media platforms have led individuals and health experts to use it as a supplementary tool. Providing healthcare purposes through social media platforms can facilitate and encourage individuals to gather information as well as acquire social support. Integrating social media platforms into healthcare context is a developing area of behavioral research. It is also found that there is a limited number of studies that reported the benefit acquire from the utilization of social media platforms in healthcare context. Thus, this study reported several benefits that individuals can acquire from the usage of social media platforms for healthcare context.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"456 ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72431844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}