Академический Документы
Профессиональный Документы
Культура Документы
ITSim 10
4th INTERNATIONAL SYMPOSIUM ON INFORMATION TECHNOLOGY ITSim 10 Technical Programme & Abstracts
2010, Universiti Teknologi PETRONAS Institute of Technology PETRONAS Sdn. Bhd.
ISBN 978-983-2271-07-9
789832
271079
CONTENTS
FOREWORD
Assoc. Prof. Dr. Ahmad Kamil Mahmood Prof. Dato Dr. Halimah Badioze Zaman Prof. Dr. Zaiki Awang 4 5 6
ORGANISING COMMITTEE PROGRAMME COMMITTEE PLENARY NOTES TO DELEGATES VENUE LAYOUT CONFERENCE PROGRAMME TECHNICAL SESSIONS
Oral Presentations Poster Presentations 21 34
7 9 13 16 17 18 21
38 40 104
FOREWORD
n behalf of all the co-chairs, it gives me great pleasure to welcome all guests, speakers and delegates to Kuala Lumpur to attend the 4th International Symposium on Information Technology (ITSim10), in part of the World Engineering, Science & Technology Congress (ESTCON2010). This fourth ITSim symposium is hosted by Universiti Teknologi PETRONAS (UTP), co-host with Universiti Kebangsaan Malaysia (UKM) and jointly organized by 18 public and private universities in Malaysia. ITSim10 is also co-sponsored technically by the Institute of the Electronic Electrical Engineers (IEEE) with seven professors from Malaysia, the United Kingdom, Australia, Thailand and the United States being the co-chairs. The aim of this symposium is to provide an excellent platform for professionals, engineers, academicians and practitioners worldwide to share and exchange research knowledge and ideas in technologies and applications in the field of Information and Communication Technology (ICT). With the theme being Sustainable Informatics and Engineering: Harmonising Human and Natural Ecosystem and more than 300 papers presented, ITSim10 promises a wide variety of topics which reflect and contribute to a paradigm shift towards sustainable energy, human and ecosystem supporting the values of human life and activities in the global and social perspective. I would like to take this opportunity to thank the plenary speakers, workshop presenters and all participants who take part in this event. It is our hope that this conference can help shape a community that will lead to greater research in the field of sustainable energy and ICT. For all the hard work and dedication, I would like to once again thank each and every one of you for your valuable contribution towards the success of this symposium, and wish you a professionally rewarding and socially enjoyable stay in Kuala Lumpur.
Assoc. Prof. Dr. Ahmad Kamil Mahmood (UTP) Conference Co-Chair ITSim10
FOREWORD
n behalf of a dedicated team that organized this event, from both the public and private institutions of higher learning, locally and globally, I take great pleasure in welcoming all participants to the 4th International Symposium on Information Technology (ITSim10). ITSim10 this year has seen a tremendous change and growth in its organization, with joint collaboration from many more IT faculties of various public and private universities and colleges in the country, and co-sponsored by the Institute of the Electronic Electrical Engineers (IEEE) Computer Society, Institute of the Electronic Electrical Engineers (IEEE), MSC Malaysia (MDeC) and Malaysian Information Technology Society (MITS). This is an effort to bring together researchers and practitioners in this highly anticipated ICT event. ITSim10 with its theme Sustainable Informatics and Engineering: Harmonising Human and Natural Ecosystem is timely when the world research is changing and playing its part to conserve and maintain its balance in the ecosystem. ICT plays a big role in ensuring the sustainability of hardware and software systems which contributes to the development for the present without compromising the wellbeing of the future generation. Thinking of new methods and development of computer hardware and software systems brings breakthrough in terms of energy consumption and reusability. Let me take this opportunity to thank all the organizing committees from UTP and all the other IPTAs and IPTSs involved, program committees from universities in Asia, United States of America and Australia who have shown dedication in making this symposium a success. I would like to also thank the keynote speakers, workshop presenters and all participants who have made special effort to be here, making history in shaping, influencing and directing the future research and innovations in ICT. Last but not least, I would like to also convey a special thank you to all the sponsors who have kindly contributed to the symposium, making it a memorable one.
Prof. Dato Dr. Halimah Badioze Zaman (UKM) Conference Co-Chair ITSim10
FOREWORD
EEE Malaysia Section would like to express our gratification for being part of this event. This symposium is in its fourth year running and has proved to be successful. The initiative shown by all the public and private universities in making this event successful is commendable and it is an honor for IEEE to have been able to collaborate and contribute, working in concert with all of them. ITSim10 is a great avenue to showcase research findings for professionals and academicians, and a platform to exchange worthy and creditable knowledge and ideas to the world. On behalf of IEEE Malaysia Section and IEEE Computer Society of Malaysia I would like to express our sincere thanks and heartiest congratulations to each and everyone who were involved in organizing ITSim10 for their tireless and tremendous efforts. To the researchers, thank you for sharing your findings with us. I hope that you will take this opportunity to meet friends, exchange knowledge and at the same time enjoy what Malaysia has to offer during your stay here. I wish everyone a successful conference.
Prof. Dr. Zaiki Awang, SMIEE (IEEE Malaysia Section) Conference Co-Chair ITSim10
ORGANISING COMMITTEE
CONFERENCE CO-ChaiR: Ahmad Kamil Mahmood (UTP) Halimah Badioze Zaman (UKM) Peter Robinson (Cambridge University, UK) Peter Haddawy (Asian Institute of Technology, Thailand) Steve Elliot (University of Sydney, Australia) Stephan Olariu (Old Dominion University, USA) Zaiki Awang (IEEE Malaysia Section)
LOCaL COmmittEE: Chair: Ahmad Kamil Mahmood (UTP) Co-Chair: Halimah Badioze Zaman (UKM) SECREtaRy i: SECREtaRy ii: tREaSuRER: aSSt. tREaSuRERS: tEChNiCaL: Wan Fatimah Wan Ahmad (UTP) Azlina Ahmad (UKM) Rabiah Abdul Kadir (UPM) Dayang Rohaya Awang Rambli (UTP) Chen Yoke Yie (UTP) Halimah Badioze Zaman (UKM) Chair Abas Md Said (UTP) Abdul Razak Hamdan (UKM) Abdullah Sani Abdul Rahman (UTP) Ahmad Bakeri Abu Bakar (UIAM) Ahmad Kamil Mahmood (UTP) Ahmad Rafi Mohamed Eshaq (MMU) Azlina Ahmad (UKM) Azizah Jaafar (UKM) Baharuddin Aris (UTM) Choo Wou Onn (UTAR) Elankovan Sundararajan (UKM) Faaizah Shahbodin (UTeM) Fatimah Dato Ahmad (UPNM) Hajah Norasiken Bakar (UTeM) Halabi Hasbullah (UTP) Ho Chiung Ching (MMU) Jafreezal Jaafar (UTP) Jale Ahmad (UTP) Khalil Haji Awang (UiTM) Low Tan Jung (UTP) M Fadzil Hassan (UTP) Mahendhiran S Nair (Monash) Mohamad Farhan Mohamad Mohsin (UUM) Mohamed Redzwan Abdullah (MIMOS) Nursuriati Jamil (UiTM) Chair Khalil Hj Awang (UiTM) Syed Nasir Syed Alsagoff (UPNM) Chair Ahmad Rafi Mohamed Eshaq (MMU) Mohd Khatim Hassan (UKM) Mohd Hamdan Suhaimi (UMT) Mohd Hazali Mohamed Halip (UPNM) Murni Mahmud (UIAM) Ng Swee Chin (Kolej TAR) Noor Azhar Mohamed Shazlili (UMT) Noor Maizura Mohamad Noor (UMT) Noraida Haji Ali (UMT) Norshuhada Shiratuddin (UUM) Nursuriati Jamil (UiTM) Rabiah Abdul Kadir (UPM) Riza Sulaiman (UKM) Rohiza Ahmad (UTP) Rosni Abdullah (USM) Rozana Kasbon (UTP) Sameem Abdul Kareem (UM) Shahrul Azman Mohd Noah (UKM) Shuib Basri (UTP) Siti Maryam Hj Shamsuddin (UTM) Suziah Sulaiman (UTP) Syed Najmuddin Syed Hassan (UTeM) Syed Nasir Alsagoff (UPNM) Tengku Mohd Tengku Sembok (UPNM) Wan Fatimah Wan Ahmad (UTP) Zainab Abu Bakar (UiTM) Zulaiha Ali Othman (UKM) Low Tan Jung (UTP) Nurazzah Abd Rahman (UiTM) Mohd Fadzil Hassan (UTP) Mohd Hilmi Hasan (UTP) Riza Sulaiman (UKM)
ORGANISING COMMITTEE
pubLiCity: Norshuhada Siratuddin (UUM) Chair Ahmad Rafi Mohamed Eshaq (MMU) Alan Oxley (UTP) Arifah Dhe Alhadi (UMT) Azizah Jaafar (UKM) Choo Wou Onn (UTAR) Elankovan Sundarajan (UKM) Ho Chin Kuan (MMU) Kamarudin Saadan (USIM) Liana Jacinta (MyREN) Lim Soo King (UTAR) Maslina Abd Aziz (UiTM) Masita A Jalil (UMT) Md Yazid Mohd Saman (UMT) Mohamed Othman (UPM) Mohamed Redzwan Absullah (MIMOS) Mohd Hazrin Ismail (UTP) Mohd Rawidean Kassim (IEEE Malaysia Section) Jafreezal Jaafar (UTP) - Chair Aliza Sarlan (UTP) Choo Wou Onn (UTAR) Faaizah Shahbodin (UTeM) Faizal Ahmad Fadzil (UTP) Fakhrul Adli Mohd Zaki (UMT) Halimah Badioze Zaman (UKM) Hajah Norasiken Bakar (UTeM) Junaidi Abdullah (MMU) Marshima Mohd Rosli (UiTM) Mohd Fauzan Noordin (UIAM) Muhaiyuddeen Shaik Allaudin (UTP) Nazleeni Samiha Haron (UTP) Chair Chen Yoke Yie (UTP) Choo Wou Onn (UTAR) Elankovan Sundaraan (UKM) Muhaiyuddeen Shaik Allauddin (UTP) Chair Murni Mahmud (UIAM) Naimah Mohd Hussin (UiTM) Nazleeni Samiha Haron (UTP) Noramiza Hashim (MMU) Normaziah Abdul Aziz (UIAM) Norshahriah Wahab (UPNM) Norshidah Mohamed (UIAM) Norzilah Musa (UTM) Nur Azian Mior Aziz (UiTM) Raja Noor Ainon Zabariah (UM) Riza Sulaiman (UKM) Rozilawati Razali (UKM) Salimah Mokhtar (UM) Shahida Sulaiman (USM) Shakirah Mohd Taib (UTP) Siti Mariam Hj Shamsuddin (UTM) Zamri Mohamed (UTM)
SpONSORShip:
Nazlia Omar (UKM) Nasriah Zakaria (USM) Nasiroh Omar (UiTM) Noor Azhar Mohamed Shazlili (UMT) Roslan Ismail (UNITEN) Shahrul Azman Mohd Noah (UKM) Siti Salbiah Mohamed Shariff (UNITEN) Teh Raqamah Abdullah (OUM) Tengku Mohd Tengku Sembok (UPNM) Wan Fatimah Wan Ahmad (UTP) Yap Sing Nian (Limkokwing) Lim Yee Mei (KTAR) Norshariah Abdul Wahab (UPNM) Savita K. Sugathan (UTP) Goh Kim Nee (UTP) Safinaz Hamzah (UTP)
wORkShOp:
SECREtaRiat:
PROGRAMME COMMITTEE
INTERNATIONAL COMMITTEE Abid Ali Minhas (Bahria University, Pakistan) Akkihebbal L. Ananda (National University of Singapore, Singapore) Aliou Diop (Gaston Berger University, Senegal) Anton Satria Prabuwono (Budi Luhur University, Indonesia) Balasundaram Sadhu Ramakrishnan (National Institute of Technology, India) Cho-Li Wang (The University of Hong Kong, Hong Kong) Chris Gill (Washington University in St. Louis, USA) Dr. rer. nat. habil. Andreas Polze (University of Potsdam, Germany) Edward A Fox (Virginia Tech, USA) Ghossoon Mohammed Waleed Al-Saadoon (Applied Science University, Bahrain) Hang-Bong Kang (Catholic University of Korea, Korea) Iftikhar Azim Niaz (Riphah International University, Pakistan) Jen-Yao Chung (IBM, USA) Kazi. M. Ahmed (Asian Institute of Technology, Thailand) Mansoor Alam Ansari Ansari (Federal Urdu University of Arts, Science and Technology, Pakistan) Muhammad Zubair (Riphah International University, Pakistan) Norhayati Mohd Ali (University of Auckland, New Zealand) Paul Janecek (Asian Institute of Technology, Thailand) Rory V O'Connor (Dublin City University, Ireland) Sajjad Haider (National University of Modern Languages, Pakistan) Savarimuthu Nickolas (National Institute of Technology, India) Selvakumar Subramanian (National Institute of Technology, India) Stephan Olariu (Old Dominion University, USA) Stephane Bressan (National University of Singapore, Singapore) Thomas Noel (University of Strasbourg, France) LOCAL COMMITTEE A Singh (Curtin) Ab Razak Che Husin (UTM) Abdul Razak Hamdan (UKM) Abas Md Said (UTP) Abd. Samad Hasan Basari (UTeM) Abdul Azim Abd Ghani (UPM) Abdul Hanan Abdullah (UTM) Abdul Rahim Ahmad (UNITEN) Abdul Rashid Mohamed (USM) Abdul Razak Hussain (UTeM) Abdul Sahli Fakharudin (UMP) Abdul Samad Ismail (UTM) Abdul Samad Shibghatullah (UTeM) Abdullah Mat Safri (UMP) Abdullah Mohd Zin (UKM) Abdullah Muhammed (UPM) Abdullah Sani Abd Rahman (UTP) Abdullah Zawawi Talib (USM) Abrizah Abdullah (UM) Abu Bakar Md Sultan (UPM) Abu Bakar Sedek A Jamak (UTP) Adlina Ahmad (Monash) Afza Shafie (UTP) Ahamad Tajudin Khader (USM) Ahmad BakeriI Abu Bakar (UIAM) Ahmad Nurulazam Md Zain (USM) Ahmad Rafi Mohamed Eshaq (MMU) Ahmad Suhaimi Baharudin (USM) Ahmed Mansour Manasrah (USM) Aida Mustapha (UPM)
4th International Symposium on Information Technology 9
Aidanismah Yahya (UKM) Aini Hussain (UKM) Akcell Chiang Chii-Chung (UM) Alan Oxley (UTP) Alex Sim (UTM) Ali Selamat (UTM) Alicia Tang Yee Chong (UNITEN) Alvin Yeo (Unimas) Aman Jantan (USM) Ariffuddin Joret (UTHM) Amirah Ismail (UKM) Asma Hanee Ariffin (UPSI) Asmara Alias (UPSI) Asmidar Abu Bakar (UNITEN) Awanis Romli (UMP) Azali Saudi (UMS) Azhan Hasan (UTP) Aziman Abdullah (UMP) Azizah Abdul Rahman (UTM) Azizah Jaafar (UKM) Azizan Zainal Abidin (UTP) Azizol Abdullah (UPM) Azlan Iqbal (UNITEN) Azlina Ahmad (UKM) Azniah Ismail (UPSI) Aznoora Osman (UiTM) Azrul Hazri Jantan (UPM) Azuraliza Abu Bakar (UKM) Azween Abdullah (UTP) Badariah Solemon (UNITEN)
PROGRAMME COMMITTEE
Bahari Belaton (USM) Baharuddin Aris (UTM) Baharum Baharudin (UTP) Balsam A. Mustafa (Swinburne) Bariah Yusob (UMP) Biju Issac (Swinburne) Brahim Belhaouri Samir (UTP) Burairah Hussin (UTeM) Burhanuddin Mohd Aboobaider (UTeM) Chai Wei-Yen (Almon) (UTAR) Chan Lee Kwun (UTAR) Chee Weng Khong (MMU) Chien-Sing Lee (MMU) Chin-Kuan Ho (MMU) Chong Eng Tan (Unimas) Choo-Yee Ting (MMU) Chye Kok Ho (Monash) Dayang Norhayati Abg Jawawi (UTM) Dayang Rohaya Awang Rambli (UTP) Deepak Laxmi Narasimha (UM) Dhanapal Durai Dominic (UTP) Dhanesh Ramachandram (USM) Diana Wong (UTP) Edwin Mit (Unimas) Elankovan Sundararajan (UKM) Emaliana Kasmuri (UTeM) Emelia Akashah P Akhir (UTP) Eng Thiam Yeoh (MMU) Eswaran Eswaran (MMU) Etienne Schneider (UTP) Faaizah Shahbodin (UTeM) Faizal Ahmad Fadzil Farid Ghani (UniMAP) Farok Hj Azmat (UiTM) Fatihah Ramli (Unimas) Fatimah Khalid (UPM) Fatimah Saleh (USM) Fatimah Sidi (UPM) Fong Woon Lai (UTP) Ghazala Khan (Monash) Hafizul Fahri Hanafi (UPSI) Hairul Nizam Ismail (USM) Hairulliza Mohd. Judi (UKM) Hajar Mat Jani (Uniten) Halabi Hasbullah (UTP) Halimah Badioze Zaman (UKM) Halina Mohamed Dahlan (UTM) Hamid Abdulla Jallb Al-Tulea (UM) Hamidah Ibrahim (UPM) Hanita Daud (UTP) Haniza Nahar (UTeM) Hasiah Mohamed @ Omar (UiTM) Haslinda Sutan Ahmad Nawi (Unisel) Hasliza A Rahim (UniMAP) Hazura Zulzalil (UPM) Helmi Md Rais (UTP) Ho Chiung Ching (MMU) Hong Siang Chua (Swinburne)
4th International Symposium on Information Technology 10
Hong Tat Ewe (UTAR) Ibrahima Faye (UTP) Idawaty Ahmad (UPM) Imam Baihaqi (Monash) Imran Mohd Ibrahim (UTeM) Inson Din (Unimas) Jafreezal Jaafar (UTP) Jamalul-Lail Ab Manan (MIMOS Berhad) Jamilah Hamid (UPSI) Jane Labadin (Unimas) Jasni Mohamad Zain (UMP) Jiwa Abdullah (UTHM) John Ojur Dennis (UTP) Josefina Barnachea Janier (UTP) Juhana Salim (UKM) Juliana Jaafar (UTeM) Junaidi Abdullah (MMU) K. Y. Sim (Swinburne) Kalaivani Chellappan (UNIR AZAK) Kamalrulnizam Abu Bakar (UTM) Kamarul Jalal Abdul Jalil (UM) Kamarul Naemi Kamarudin (UNIR AZAK) Kamsuriah Ahmad (UKM) Kashif Nisar (UTP) Khairuddin Omar (UKM) Khairul Azhar Kasmiran (UPM) Khairul Shafee Kalid (UTP) Kim Nee Goh (UTP) Koo Ah Choo (MMU) Lee Lay Wah (USM) Lenin Gopal (Curtin) Lili Nurliyana Abdullah (UPM) Lilly Suriani Affendey (UPM) Mazeyanti Ariffin (UTP) M. L. Dennis Wong (Swinburne) Mahendhiran SNair (Monash) Mai Neo (MMU) Maizatul Hayati Mohamad Yatim (UPSI) Manas Kumar Haldar (Swinburne) Mandava Rajeswari (USM) Mandeep Singh (UKM) Manjit Singh Sidhu (UNITEN) Manoranjitham Muniandy (UTAR) Mardziah Hashim (UiTM) Marina Md. Din (UNITEN) Mashitah Sabdin (UTP) Masrah Azrifah Azmi Murad (UPM) Mastura Yunan (MMU) May Lin Yap (UiTM) Maziani Sabudin (USM) Mazran Esro (UTeM) Md Asri Ngadi (UTM) Md Yazid Mohamad Saman (UMT) Md Zahar Othman (UPSI) Md. Jan Nordin (UKM) Min Hooi Chuah (UTAR) Modi Lakulu (UPSI) Mohamad Fadli Zolkipli (UMP)
a conference of World Engineering, Science & Technology Congress
PROGRAMME COMMITTEE
Mohamad Nazri Khairuddin (Unimas) Mohamad Radzi Zainol (UTP) Mohamad Shahrul Shahidan (UNITEN) Mohamad Suhaizal Abu Hassan (UniMAP) Mohamed Nordin Zakaria (UTP) Mohamed Redzuan Abdullah (MIMOS Berhad) Mohammad Fadel Jamil Klaib (UMP) Mohammad Faidzul Nasrudin (UKM) Mohammad Faiz Liew Abdullah (UTHM) Mohammad Nazir Ahmad (UTM) Mohammad Reza Beik Zadeh (MIMOS Berhad) Mohammad Zohir Ahmad @ Shaari (USM) Mohd Adib Omar (USM) Mohd Alif (UniMAP) Mohd Azwan Mohamad@Hamza (UMP) Mohd Fadzil Hassan (UTP) Mohd Faizal Abdollah (UTeM) Mohd Fareq Abd Malek (UniMAP) Mohd Hazali Mohamed Halip (UPNM) Mohd Hazli Mohamed Zabil (UNITEN) Mohd Hilmi Hasan (UTP) Mohd Isa Mohd Samat (UiTM) Mohd Nazri Md Saad (UPSI) Mohd Norafizal Abd Aziz (UiTM) Mohd Sapiyan Baba (UM) Mohd Shafry Mohd Rahim (UTM) Mohd Shahizan Othman (UTM) Mohd Sharifuddin Ahmad (UNITEN) Mohd Syazwan Abdullah (UUM) Mohd Yunus Nayan (UTP) Mohd Yunus Sharum (UPM) Mohd Zamri Murah (UKM) Mohd Zuki Yusoff (UTP) Mohd. Hasan Selamat (UPM) Mohd. Khanapi Abd. Ghani (UTeM) Mohd. Marzuki Mustafa (UKM) Umi Asma Mokhtar (UKM) Muhammad Daniel Hafiz Abdullah (UPM) Muhammad Dhiauddin Mohamed Suffian (MIMOS Berhad) Muhammad Imran (UTP) Muhammad Yusof Ismail (UTHM) Muriati Mukhtar (UKM) Nader N Barsoum (Curtin) Naimah Mohd Hussin (UiTM) Nalini Dharmarajan (UiTM) Nana Suryana Herman (UteM) Narinderjit Singh Sawaran Singh (UTP) Nasharuddin Zainal (UKM) Nasuha Lee Abdullah (USM) Naziffa Raha Md Nasir (UNITEN) Nazleeni Haron (UTP) Nazlena Mohamad Ali (UKM) Nazlia Omar (UKM) Nazre Abdul Rashid (UPSI) Nazrita Ibrahim (UNITEN) Neo Tse Kian (MMU) Nik Marsyahariani Nik Daud (UiTM)
4th International Symposium on Information Technology 11
Noohul Basheer Zain Ali (UTP) Noor Habibah Hj Arshad (UiTM) Noor Maizura Mohamad Noor (UMT) Noorazizun Mohd. Saad (UNITEN) Noorminshah A.Iahad (UTM) Nor Azah Abdul Aziz (UPSI) Nor Azan Haji Mat Zin (UKM) Nor Azila Awang Abu Bakar (UiTM) Nor Fazlida Mohd. Sani (UPM) Nor Hasbiah Ubaidullah (UPSI) Nor Hawaniah Zakaria (UTM) Nor Khalidah Abu (UNIR AZAK) Nor Laila Md Noor (UiTM) Nor Laily Hashim (UUM) Nor Surayati Usop (Unimas) Noraida Ali (UMT) Noraidah Sahari @ Ashaari (UKM) Norasiken Bakar (UTeM) Norasikin Fabil (UPSI) Noraziah Ahmad (UMP) Nordin Abu Bakar (UiTM) Norhaziah Md. Salleh (UTeM) Norizan Esa (USM) Norlida Ahmad (USM) Norlina Mohd Sabri (UiTM) Normalia Samian (UTM) Norshidah Mohamed (UIAM) Norshuhada Siratuddin (UUM) Norshuhani Zamin (UTP) Norwati Mustapha (UPM) Novia Indriaty Admodisastro (UPM) Nur Izura Udzir (UPM) Nur Saadah Fathil (UPSI) Nur Syufiza Ahmad Syukur (Unisel) Nuraini AbdulRashid (USM) Nuraminah Ramli (UPSI) Nursuriati Jamil (UiTM) Oi Mean Foong (UTP) Omar Musa (UNIR AZAK) Ong Sing Goh (UTeM) Othman Ibrahim (UTM) Pathiah Abdul Samat (UPM) Peter Woods (MMU) Phon-Amnuaisuk Somnuk (MMU) Poon Wai Ching(Monash) Puteri Suhaiza Sulaiman (UPM) R Badlishah Ahmad (UniMAP) Rabiah Ahmad (UTM) Ramlah Mailok (UPSI) Rasyidi Johan (UPSI) Razali Yaakob (UPM) Razib M. Othman (UTM) Razulaimi Razali (UiTM) Ridha Omar (UNITEN) Rodziah Atan (UPM) Rohaya Latip (UPM) Rohiza Ahmad (UTP) Roliana Ibrahim (UTM)
a conference of World Engineering, Science & Technology Congress
PROGRAMME COMMITTEE
Rosalina Abd. Salam (USIM) Rosilah Hassan (UKM) Roslan Ismail (UNITEN) Rosliana Mohd Sidek (UM) Rosnah Idrus (USM) Rosni Abdullah (USM) Rozana Kasbon (UTP) Rozilawati Razali (UKM) Rozlan Alias (UTHM) Rusli Abdullah (UPM) Rusli Salleh (UM) Sa'adah Hassan (UPM) Saadiah Yahya (UiTM) Saipunidzam Mahamad (UTP) Salman Firdaus Sidek (UPSI) Salman Yussof (UNITEN) Salmiza Saleh (USM) Sameem Abdul Kareem (UM) Samsul Ariffin Abdul Karim (UTP) Santha Vaithilingam (Monash) Savita K Sugathan (UTP) Sazilah Salam (UTeM) Sazlinah Hasan (UPM) Sei Ping Lau (Unimas) Shafia Abdul Rahman (USM) Shaharuddin Salleh (UTM) Shahdan Md. Lani (UTeM) Shahida Sulaiman (USM) Shahnorbanun Sahran (UKM) Shahrin Sahib@Sahibuddin (UTeM) Shakirah Mohd Taib (UTP) Shamala Subramaniam (UPM) Sharifah Mumtazah Syed Ahmad (UNITEN) Sharifah Norhaidah Syed Idros (USM) Shing-Chiang Tan (MMU) Shuib Basri (UTP) Shukor Abd Razak (UTM) Shyamala C. Doraisamy (UPM) Siew Pei Hwa (UTAR) Siti Khaotijah Mohammad (USM) Siti Mariyam Shamsuddin (UTM) Siti Norul Huda Sheikh Abdullah (UTM) Siti Salbiah Mohamed Shariff (UNITEN) Siti Salwa Ismail (UNITEN) Sofianita Mutalib (UiTM) Subariah Ibrahim (UTM) Suhaidi Hassan (UUM)
Abbreviations: Curtin = Curtin University of Technology, Sarawak Campus KTAR = Kolej Tunku Abdul Rahman Limkokwing = Limkokwing University College of Creative Technology MMU = Multimedia University Monash = Monah University, Malaysia Sunway = Sunway University College Swinburne = Swinburne University of Technology, Sarawak Campus OUM = Open University Malaysia UIAM = Universiti Islam Antarabangsa Malaysia
Suhaila Zainudin (UKM) Sulaiman Sarkawi (UPSI) Su-Cheng Haw (MMU) Syahanim Mohd Salleh (UKM) Syariffanor Hisham (UTeM) Syed Ahmad Sheikh Aljunid (UiTM) Syed Nasir Alsagoff (UPNM) T. J. Iskandar Abdul Aziz (UNITEN) Tan Jung Low (UTP) Tan Tien Ping (USM) Tat-Chee Wan (USM) Teh Noranis Mohd Aris (UPM) Tieng Wei Koh (UPM) Tiong Teck Chai (Curtin) Umi Kalsom Yusof (USM) Uwe Dippel (UNITEN) Veeramani Shanmugam (Curtin) Vijanth Sagayan Asirvadam (UTP) Vincent KT Khoo (USM) Wafaa Al-Salihy (USM) Wahidah Husain (USM) Wai Khuen Cheng (UTAR) Wan Fatimah Wan Ahmad (UTP) Wan Nursaiedah Wan Ismail (Curtin) Wardah Zainal Abidin (UTM) Woo Chaw Seng (UM) Wou Onn Choo (UTAR) Yazrina Yahya (UKM) Yeong Tyng Ling (Unimas) Yoke Yie Chen (UTP) Yong Tien Fui (UTAR) Yu-N Cheah (USM) Yun Huoy Choo (UTeM) Yusmadi Yah Jusoh (UPM) Zainuddin Hassan (UNITEN) Zalinda Othman (UKM) Zarina Shukur (UKM) Zarinah Mohd Kasirun (UM) Zawiyah Mohd Yusof (UKM) Zhuquan Zang (Curtin) Ziyad Tariq Al-Khinalie (MMU) Zuhaidah Mohamed Zain (UPSI) Zulaiha Ali Othman (UKM) Zulkarnain Md Ali (UKM) Zulkifli Husin (UniMAP) Zurida Ismail (USM) Zurina Mohd. Hanapi (UPM)
UPNM = Universiti Pertahanan Nasional Malaysia USM = Universiti Sains Malaysia UPSI = Universiti Pendidikan Sultan Idris UTHM = Universiti Tun Hussein Onn UTP = Universiti Teknologi PETRONAS UTem = Universiti Teknikal Malaysia Melaka UTAR = Universiti Tunku Abdul Rahman UTM = Universiti Teknologi Malaysia USIM = Universiti Sains Islam Malaysia UUM = Universiti Utara Malaysia
UiTM = Universiti Teknologi MAR A UKM = Universiti Kebangsaan Malaysia UM = Universiti Malaya UMP = Universiti Malaysia Pahang UMS = Universiti Malaysia Sabah UMT = Universiti Malaysia Trengganu Unimas = Universiti Malaysia Sarawak UniMAP = Universiti Malaysia Perlis Unisel = Universiti Industri Selangor UNIR AZAK = Universiti Tun Abdul Razak UNITEN = Universiti Tenaga Nasional UPM = Universiti Putra Malaysia 12
PLENARY
Computation of Emotions in Man and Machines
PROf. DR. PETER RObINsON University of Cambridge, Computer Laboratory, William Gates Building, 15 JJ Thomson Avenue, Madingley Road, Cambridge CB3 0FD, England T: +44 1223 334 637 F: +44 1223 334 678 E: pr at cl.cam.ac.uk
AbsTRACT The importance of emotional expression as part of human communication has been understood since the seventeenth century, and has been explored scientifically since Charles Darwin and others in the nineteenth century. Advances in computer technology now allow machines to recognise and express emotions, paving the way for improved humancomputer and human-human communications. This talk presents some recent advances in theories of emotion and affect, their embodiment in computational systems, the implications for general communications, and broader applications. Recent advances in Psychology have greatly improved our understanding of the role of affect in communication, perception, decision-making, attention and memory. At the same time, advances in technology mean that it is becoming possible for machines to sense, analyse and express emotions. We can now consider how these advances relate to each other and how they can be brought together to influence future research in perception, attention, learning, memory, communication, decision-making and other applications. The computation of emotions includes both expression and recognition, using channels such as facial expressions, nonverbal aspects of speech, posture, gestures and general behaviour. The combination of new results in psychology with new techniques of computation on new technologies will enable new applications in commerce, education, entertainment, security, therapy and everyday life. However, there are important issues of privacy and personal expression that must also be considered.
bIOgRAPhy PROF. DR. PETER ROBINSON is Professor of Computer Technology in the Computer Laboratory at the University of Cambridge, where he leads the Rainbow Research Group working on computer graphics and interaction. His research concerns problems at the boundary between people and computers. This involves investigating new technologies to enhance communication between computers and their users, and new applications to exploit these technologies. The main focus for this is human-computer interaction, where he has been leading work for some years on the use of video and paper as part of the user interface. The idea is to develop augmented environments in which everyday objects acquire computational properties through user interfaces based on video projection and digital cameras. Recent work has included desk-size projected displays and inference of users' mental states from facial expressions, speech, posture and gestures. [http://www.cl.cam.ac.uk/~pr10/general/]
13
PLENARY
business Transformation Driven by Environmental sustainability: a Critical Topic for Information systems and Multi-Disciplinary Research
PROf. DR. sTEVE ELLIOT Business Information Systems, Faculty of Economics & Business, The University of Sydney, NSW 2006 Australia. Room 433, Economics & Business Building (H69), Corner Rose & Codrington Sts, Darlington, NSW 2008 Australia T: +61 2 9036 9347 F: +61 2 9351 6638 E: s.elliot@econ.usyd.edu.au W: www.econ.usyd.edu.au/bis/
AbsTRACT An imperative for business transformation to achieve environmental sustainability is recognized by: the governments of 192 countries as signatories to the United Nation Framework Convention on Climate Change; business thought leaders like Michael Porter; and by CEOs in global surveys by IBM and McKinsey rating this issue as one of their greatest challenges. Business leaders may proactively prepare their organizations for change or delay until legal directives are enacted, although delaying may not buy much time. Environmental legislation currently before the US Congress, could lead to profound changes in many sectors of the economy. Business opportunities will materialize through the process of transformation. Porter considers environmental sustainability has the potential to reshape the business world to the same degree as globalization and the Information Technology revolution and doubtless opportunities will similarly arise. A portfolio of current and emerging technologies is expected to play a significant role in transforming prevailing business practices, addressing many environmental problems, and generating new forms of wealth. Information Systems researchers have been called on undertake more high-visibility and high-impact research. To date, however, IS researchers have given little attention to the high-visibility, high impact challenges of environmental sustainability. This seminar aims to increase awareness and understanding of the potential roles of IS researchers and multi-disciplinary research teams as critical contributors to business transformation for environmental sustainability. A framework for relevant contributions is proposed.
bIOgRAPhy PROF. DR. STEVE ELLIOT is Professor of Business Information Systems at the University of Sydney, Australia. Previously, Steve had been Professor and Head of the School of Business, University of Newcastle and Director of the IT Research Centre at the University of New South Wales. Steve has extensive industry and international experience. His research work is directed toward the development of practice-based theory in the strategic management of technology-enabled business innovation. His multi-disciplinary research has been published in international journals, refereed conference proceedings and an internationally acclaimed book examining successful B2C electronic commerce initiatives in six countries. His research interests have been supported by grants from the Australian Research Council and from local and international corporate sponsorships. His current research projects focus on the development of strategic organisational capabilities for technology-enabled business innovation and on environmental sustainability as a driver of business transformation. [http://www.econ.usyd.edu.au/staff/stephene]
14
PLENARY
DATuk bADLIshAM ghAzALI Chief Executive Officer Multimedia Development Corporation(MDeC) Malaysia
bIOgRAPhy DATUK BADLISHAM GHAZALI was appointed as the Chief Executive Officer (CEO) of the Multimedia Development Corporation (MDeC) in January 2006. As the CEO, Datuk Badlisham provides the leadership to drive the organisation in translating the Governments vision of transforming the nation into a Knowledge-based Economy through the MSC Malaysia, the national ICT initiative. Apart from the vision to empower lives through ICT, Datuk Badlishams mission for MSC Malaysia is not limited to just encouraging the growth of ICT companies and positioning Malaysia as a global ICT player, but also to promote ICT as a career of choice amongst children and students. He is also a member of the Ministry of Educations Cluster School Advisory Board and the Ministry of Science, Technology and Innovations National Science Centre Advisory Board. For his vast experience and knowledge in the ICT industry, Datuk Badlisham was also appointed as an Adjunct Professor with the Multimedia Faculty of Limkokwing University of Creative Technology since February 2008. Prior to his appointment in MDeC, Datuk Badlisham was with HP Malaysia for 18 years where he was the Director and Country General Manager of HP Technology Solutions Group. Badlisham holds a B.Sc. degree majoring in Computer Science from the University of Northern Illinois, USA and a Diploma in Computer Science from Mara Institute of Technology.
15
NOTES TO DELEGATES
Registration and general information
The conference registration will be conducted at the Registration Counter at Level 3 of Kuala Lumpur Convention Centre (KLCC). Registration will start from 8.00am, Tuesday, 15th June 2010. There will be committee members assisting delegates with registration and general information. The committee members will be wearing ITSim10 identification tags. Other than the registration time, the ITSim10 secretariat can also be contacted for any inquiries at the Secretariat Room in Level 3. Conference costs: Your ITSim10 registration includes the cost of: Lunches Morning and afternoon teas ESTCON 2010 Programme Book ITSim10 Technical Programmes & Abstracts Book For presenters: full conference proceedings in CD-ROM and one volume of print version based on the presenters track. Additional CD-ROM version Additional print version RM50/copy RM250/volume
Instructions to Presenters
Oral Presenters: Time allocated for each presenter is 20 minutes including Q&A. Each presenter is required to prepare and submit Microsoft Power Point Presentation to Secretariat latest on the conference registration day. Save the Power Point presentation using the presentation session as the file name, e.g. if your paper is to be presented in session 1, track 1, paper number 2, then the file name should be ITSO1_T1_2. ppt. The presenter should be at the assigned room 15 minutes before the session starts. Note Book PC will be provided during the presentation sessions. Poster Exhibition: All exhibitors are responsible to print their own poster material(s) at their own costs. Poster materials must be printed on a single A0 sized paper. Poster exhibitors are responsible for setting up and dismantling their poster material at the time allocated. Poster exhibitors are requested to be on standby at their respective poster sites during Poster Q&A session. Punctuality: To ensure that the conference proceeds smoothly, the Organizing Committee specially requests your cooperation to be punctual. Announcements of any changes to the Program will be announced in the main conference room (CH1) before or after plenary sessions. Language: The official language of ITSim10 is English. No simultaneous interpretation services will be provided. Lunch/coffee/tea refreshment: Coffee/tea and lunch will be served at the times indicated in the Technical Programmes & Abstracts Book. Conference identification tag: The Organizing Committee requests that you wear your identification tag at all times during the conference. Your conference identification tag will serve as your admission to all conference paper presentation sessions. Conference Dress Code: Smart casual is recommended throughout the conference. Message board: A conference message board will be located near the main conference room (CH1). Insurance and Liability: The conference organizers do not accept responsibility for any individual, medical, travel or personal insurance policies as necessary. Personal Property: The Organizing Committee suggests that you take usual precautions with your personal belongings. Do not leave them unattended. The organizers and the venues staff will not take any responsibility for any loss or damage of your personal properties. smoking Policy: The Kuala Lumpur Convention Center is deemed as a Non-Smoking venue. Local Time: The local Kuala Lumpur time is +8 GMT. International Phone Calls: The country code for Malaysia is +60. To make a call within Kuala Lumpur or Selangor, a code 3 must be pressed after the country code followed by the local telephone number. To make a call to other states/cities outside of Kuala Lumpur and Selangor, the correct Malaysian State code must be entered in place of the 3. Electricity: Malaysian electrical power is 240 volts, 50 Hz. The connection for appliances is a 3 pin plug.
16
VENUE LAYOUT
room lift
301
(ea
st)
rooms lift
rooms lift
302 306
303
305 304
308
309
310
1 2
Ki
bla
17
1 2 3 4
2
CONFERENCE PROGRAMME
JuNE 15, 2010 (TuEsDAy) - DAy 1 TIME
9.00 - 11.30 11.30 - 12.00
EVENT
Opening Ceremony Morning Break
VENuE
PH
12.00 - 1.00
CH1
1.00 - 2.00
T1 (VI)
T2 (ET)
T3 (SDA)
T4 (KS)
T5 (VI)
T6 (ET)
T7 (SDA)
T8 (KS)
T1: 3-01 T2: 3-02 T3: 3-03 T4: 3-04 T5: 3-05 T6: 3-06 T7: 3-07 T8: 3-08
4.00 - 4.20
Evening Break
T1 (VI)
T2 (ET)
T3 (SDA)
T4 (KS)
T5 (VI)
T6 (ET)
T7 (ET)
T1: CH1 T2: 3-01 T3: 3-02 T4: 3-03 T5: 3-04 T6: 3-05 T7: 3-06
5.40
End of Day 1
18
CONFERENCE PROGRAMME
JuNE 16, 2010 (WEDNEsDAy) - DAy 2 TIME EVENT PLENARy LECTuRE 2 DATuk bADLIshAM (MALAysIAN DEVELOPMENT CORPORATION (MDEC)) ITsO3: PARALLEL ORAL sEssION 3
9.30 - 10.30 (3 X 6 = 18)
VENuE
8.30 - 9.30
CH1
T1 (VI)
T2 (ET)
T3 (SDA)
T4 (KS)
T5 (VI)
T6 (ET)
T1: CH1 T2: 3-01 T3: 3-02 T4: 3-03 T5: 3-04 T6: 3-05
10.30 - 10.50
Morning Break
T1 (VI)
T2 (ET)
T3 (SDA)
T4 (KS)
T5 (VI)
T6 (ET)
T7 (ET)
T1: 3-01 T2: 3-02 T3: 3-03 T4: 3-04 T5: 3-05 T6: 3-06 T7: 3-07
12.50 - 2.00
Lunch
T1 (VI)
T2 (ET)
T3 (SDA)
T4 (KS)
T6 (ET)
T7 (KS)
T1: CH1 T2: 3-01 T3: 3-02 T4: 3-03 T5: 3-04 T6: 3-05 T7: 3-06
4.00 - 4.20
Evening Break
T1 (VI)
T2 (ET)
T3 (SDA)
T4 (VI)
T5 (VI)
T6 (ET)
T7 (ET)
T1: 3-01 T2: 3-02 T3: 3-03 T4: 3-04 T5: 3-05 T6: 3-06 T7: 3-10
6.00
End of Day 2
19
CONFERENCE PROGRAMME
JuNE 17, 2010 (ThuRsDAy) - DAy 3 TIME EVENT PLENARy LECTuRE 3 PROf DR. PETER RObINsON (uNIVERsITy Of CAMbRIDgE, . uNITED kINgDOM) VENuE
9.30 -10.30
CH1
T1 (VI)
T2 (ET)
T3 (SDA)
T4 (VI)
T5 (VI)
T6 (VI)
T7 (ET)
T1: CH1 T2: 3-01 T3: 3-02 T4: 3-03 T5: 3-04 T6: 3-05 T7: 3-06
12.50 - 2.00
Lunch
WORkshOP
2.00 - 4.00 W1 4.00 - 4.20 4.20 - 6.00 6.00 Evening Break Closing Ceremony End of Symposium W2 W3
BH
sPECIAL EVENTs:
EVENT
General Meeting of Malaysian Information Technology Society (MITS)
VENuE
CH3
3-04
20
TECHNICAL SESSIONS
ORAL PREsENTATIONs
TuEsDAy, 15 JuNE 2010 ITsO1: PARALLEL ORAL sEssION 1 (2.00 PM 4.00 PM) T1 VIsuAL INfORMATICs VENuE: 3-01
2.00 pm 2.20 pm 2.40 pm 3.00 pm 3.20 pm ITSO1_T1_1 Mobile-based Interactive Learning using handwriting Recognition Noor Azam Zakaria, Wan Fatimah Wan Ahmad, Mohd Hilmi Hasan (UTP) ITSO1_T1_2 Multimedia Learning system (MMLs): Valuing the significance of Cognitive Task Analysis Technique and user Interface Design Norain Mohd Yusoff, Chui Yin Wong (MMU) ITSO1_T1_3 balancing between usability and Aesthetics of Web Design Umi Kalsom Yusof, Leng Khang Khaw , Hui Yang Chng , Boon Jiann Neow (USM) ITSO1_T1_4 Investigation of fingertip blobs on Optical Multitouch screen Ahsanullah, Ahmad Kamil Mahmood, Suziah Sulaiman (UTP) ITSO1_T1_5 Design and Implementation of Multi-Touch system using fTIR Technique for Optimization of finger Touch Detection Ahsanullah, Ahmad Kamil Mahmood, Suziah Sulaiman (UTP) ITSO1_T1_6 Exploring the Quantitative and Qualitative Measures for haptic systems Muzafar Khan, Suziah Sulaiman, Abas Md Said, Muhammad Tahir (UTP) ITSO1_T2_1 Investigation on Model selection Criteria for speaker Identification Z. Farhood, M. Abdulghafour (Bahrain) ITSO1_T2_2 hMM Parameters Estimation using hybrid baum- Welch genetic Algorithm Mourad Oudelha, Raja N. Ainon (UM) ITSO1_T2_3 esurvia: A Web-based survey service using fuzzy Conjoint Analysis Media A. Ayu , Teddy Mantoro, Abu Osman Md Tap, Siti Aisyah Ismail (UIAM) ITSO1_T2_4 RNA secondary structure Prediction using Dynamic Programming Algorithm A Review and Proposed Work Mohd Nizam Osman, Rosni Abdullah, NurAini Abd. Rashid (UiTM) ITSO1_T2_5 Arabic speech Recognition using hidden Markov Model Toolkit(hTk) Bassam A. Q. Al-Qatab, Raja N. Ainon (UM) ITSO1_T2_6 Rule-based Pattern Extractor and Named Entity Recognition: A hybrid Approach Yunita Sari, Mohd Fadzil Hassan, Norshuhani Zamin (UTP) ITSO1_T3_1 Issues with flexibility: A Reason for not using Online Reservation systems? Arif Mushtaq, Suziah Sulaiman, Jrn Loviscach (UTP) ITSO1_T3_2 Computation of Cryptosystem based on Lucas functions using Addition Chain Zulkarnain Md Ali, Mohamed Othman, Mohd Rushdan Muhd Said, Md Nasir Sulaiman (UKM) ITSO1_T3_3 Establishing A Defect Prediction Model using A Combination of Product Metrics As Predictors Via six sigma Methodology Muhammad Dhiauddin Mohamed Suffian, Mohamed Redzuan Abdullah (MIMOS) ITSO1_T3_4 Evaluating Playability on haptic user Interface for Mobile gaming Chui Yin Wong, Kimberly Chu, Chee Weng Khong, Tek Yong Lim (MMU) ITSO1_T3_5 Non-Repudiation in Order, Delivery and Payment Process for a sustainable Online business Abdullah Sani Abd Rahman, Suraya Masrom (UTP) ITSO1_T3_6 The Development of a Rule-based Asthma system Goh Kim Nee, Muhammad Azlil Syafiq, Savita K. Sugathan, Chen Yoke Yie, Emelia Akashah Patah Akhir (UTP) ITSO1_T4_1 Performance Analysis of Modulation schemes for Wireless Optical In-Cabin Aircraft Networks D.Marinos, C.Aidinis, C. Vassilopoulos, P. Kourus, N.Schmitt, T.Pistner,J.Schalk, J.Klaue (Greece)
3.40 pm
21
TECHNICAL SESSIONS
ORAL PREsENTATIONs
2.20 pm 2.40 pm 3.00 pm ITSO1_T4_2 Query Expansion using Thesaurus in Improving Malay hadith Retrieval system Nurazzah Abd Rahman, Zainab Abu Bakar, Tengku Mohd Tengku Sembok (UiTM) ITSO1_T4_3 Efficient Retrieval of Malay Language Documents using Latent semantic Indexing Roslan Sadjirin, Nurazzah Abd Rahman (UiTM) ITSO1_T4_4 An Ontology Driven, Multi-agent based framework for Automated Resource Allocation in Mobile Workforce Management systems Arash Mousavi, Md. Jan Nordin, Zulaiha Ali (UKM) ITSO1_T4_5 Pre-Considered factors Affecting ERP system Adoption in Malaysian sMEs using a Technology-Organisation-Environment framework Siti Shafrah Shahawai, Rosnah Idrus (USM) ITSO1_T4_6 framework of Intrinsic and Extrinsic Motivators of knowledge sharing A Case of a Training Institute of an Oil and gas Company in Malaysia Aamir Amin , Mohd Fadzil Hassan, Mazeyanti Ariffin (UTP) ITSO1_T5_1 A Method for Linking business Process Models and system Models Faisal Aburub (Jordan) ITSO1_T5_2 A simulated Annealing Approach to solve fuzzy Multi-Objective Linear Model for supplier selection in A supply Chain P.Parthiban, P.D.D.Dominic, R. Dhanalakshmi (India) ITSO1_T5_3 graphical Interface for gene Network Inference Application Suhaila Zainudin, Sim Kah Wei, Safaai Deris (UKM) ITSO1_T5_4 Agent-based Monitoring of Virtual Machines Anas Ayad, Uwe Dippel (UNITEN) ITSO1_T5_5 single and Replicated simulations for Colored Petri Nets Nondeterministic Network Dani Adhipta, Mohd Fadzil Hassan (UTP) ITSO1_T5_6 A service based framework for Integration of ITIL V3 and Enterprise Architecture Akbar Nabiollahi, Rose Alinda Alias, Shamsul Sahibuddin (UTM) ITSO1_T6_1 Energy balanced Clustering in Wireless sensor Network Babar Nazir, Halabi Hasbullah (UTP) ITSO1_T6_2 Multiple beams switching Double square Loop Antenna for uWb systems Arun Raaza, Pallawi, Animesh Rana, Gopal. S. Joshi, Amit Mehta (India) ITSO1_T6_3 An Efficient Energy Two Mode Error Correction Technique in underwater Wireless sensor Network Ammar Elyas Babiker, M. Nordin Zakaria (UTP) ITSO1_T6_4 On-Demand flexible Tiered Qos scheduling Algorithm for IEEE 802.16j Multi-hop Relay Networks Anas F. Bayan, Tat-Chee Wan (USM) ITSO1_T6_5 Deployment Density Estimation for -Covering Problem in Wireless sensor Network Hassan Chizari, Shukor Abd Razak, Arifah Bahar, Abdul Hanan Abdullah (UTM) ITSO1_T6_6 Customizing gINA for Authentication in Virtualization Siti Rohaidah Ahmad, Nor Fatimah Awang, Arniyati Ahmad, Nik Nur Aisyah Nik Ghazali (UPNM) ITSO1_T7_1 The Architecture of scientific Computing Library Portal on sequential Algorithm based on Partial Differential Equation Othman, M. S., Yusuf, L. M., Basitt, U. N. A., Alias, N. (UTM) ITSO1_T7_2 Cooperative Coalition formation on Value-based Decision Arazi Idrus, Christiono Utomo (UTP) ITSO1_T7_3 A survey on Different Interoperability frameworks of sOA systems Towards seamless Interoperability Najhan M.Ibrahim, Mohd Fadzil Hassan (UTP) ITSO1_T7_4 Agent based Monitoring framework for sOA Applications Quality Zain Balfagih, Mohd Fadzil Hassan (UTP) ITSO1_T7_5 A services-Oriented Platform for synergisation of Research and Development strengths Chua Chong Chai, Cheah Yu-N, Tang Enya Kong (USM)
22
3.20 pm 3.40 pm
TECHNICAL SESSIONS
ORAL PREsENTATIONs
3.40 pm ITSO1_T7_6 A Proposed Reusability Attribute Model for Aspect Oriented software Product Line Components Fazal-e-Amin, Ahmad Kamil Mahmood, Alan Oxley (UTP) ITSO1_T8_1 Region-based Energy-aware Clustering (REC) for Efficient Packet forwarding in WsN Halabi Hasbullah, Babar Nazir (UTP) ITSO1_T8_2 An Evaluation of End Point Detection Measures for Malay speech Recognition of an Isolated Words Noraini Seman, Zainab Abu Bakar, Nordin Abu Bakar (UiTM) ITSO1_T8_3 A Non Linear Model for the Classification of stored Items in supply Chain Management Seyed Yazir Bozorgi Rad, Abbas Bozorgi Rad, Mohammad Ishak Desa, Sarah Behnam, Sina Lesanibahri (UTM) ITSO1_T8_4 Information and Communications Technology (ICT) Policy Management Towards Enabling Research frameworks Reza Alinaghian, Azizah Abdul Rahman, Roliana Ibrahim (UTM) ITSO1_T8_5 A Web based safety Intervention Need Analysis system in Construction Design Azizah Jaafar, Normazlina Mohamed zi, Ismail Bahari, Asmalia Che Ahmad (UKM) ITSO1_T8_6 Predict the customer behavior in the shopping by Distributed Learning Automata Mansour Esmaeilpour, Vahideh Naderifar, Riza Sulaiman (UKM)
ITsO2: PARALLEL ORAL sEssION 2 (4.20 PM 5.40 PM) T1 VIsuAL INfORMATICs VENuE: Ch1
4.20 pm 4.40 pm 5.00 pm 5.20 pm ITSO2_T1_1 unifying Multimedia Player and Presentation system With Optimizing Dual-Display feature Rustam Asnawi, Wan Fatimah Wan Ahmad, Dayang Rohaya Awang Rambli (UTP) ITSO2_T1_2 Evaluation Method of Malaysian university Website Quality: hybrid Method Approach Dhanapal Durai Dominic,Handaru Jati (UTP) ITSO2_T1_3 As sketchy As Possible: Application Programming Interface (API) for sketch-based user Interface Lai Chan Yet, M. Nordin Zakaria (UTP) ITSO2_T1_4 Modeling optimization for real-time virtual heritage visualization content: A research on e-Warisan sENIbINA Ahmad Rafi, Azhar Salleh, Avijit Paul, Siti Noraisah, Yee Jun, Radzi Hanif , Mazlan Mahadzir (MMU) ITSO2_T2_1 Optimizing Machine utilization in semiconductor Assembly Industry using Constraint-Chromosome genetic Algorithms Umi Kalsom Yusof , Safaai Deris (USM) ITSO2_T2_2 VANET security framework for Trusted grouping using TPM hardware: group formation and Message Dissemination Asif Ali Wagan, Bilal Munir Mughal, Halabi Hasbullah (UTP) ITSO2_T2_3 Multi-Level security Algorithm for Random zigbee Wireless sensor Networks Tadiwa Elisha Nyamasvisva, Halabi Hasbullah (UTP) ITSO2_T2_4 A study on Threat Model for federated Identities in federated Identity Management system Zubair Ahmad Khattak, Suziah Sulaiman, Jamalul-Lail Ab Manan (UTP) ITSO2_T3_1 Conceptual Information system success Model for small and Medium Enterprise Clinic Information system Aliza Sarlan, Rohiza Ahmad, Wan Fatimah Wan Ahmad, P. D.D. Dominic (UTP) ITSO2_T3_2 student Problem Analyzer for Mathematics: The design perspective Siti Noor Arfah Umar, Norlia Mustaffa (USM) ITSO2_T3_3 A Taxonomy of Computer-supported Critics Norhayati Mohd Ali, John Hosking, John Grundy (New Zealand) ITSO2_T3_4 Extending Quality Data for Lot-based Traceability system in sME Khabbazi M.R., Hasan M.K., Sulaiman. R., Mousavi. S. A. (UKM)
TECHNICAL SESSIONS
ORAL PREsENTATIONs
4.20 pm 4.40 pm ITSO2_T4_1 Women Contributions to Open source software Innovation: A social Constructivist Perspective Musyrifah Mahmod, Shafiz Affendi Mohd. Yusof, Zulkhairi Md. Dahalin (UUM) ITSO2_T4_2 Decision support system framework for Implementation of Enterprise Resource Planning (ERP) system Muhammad Abdul Tawab Khalil, P. D. D. Dominic, Mohd Fadzil Hassan (UTP) ITSO2_T4_3 knowledge Management Catalyst for sustainable Development Diana M.L. Wong (UTP) ITSO2_T4_4 Identifying the social factors and Representation for knowledge based Coalition formation system Azleena Mohd Kassim, Yu-N Cheah, Intan Hashimah Mohd Hashim (USM) ITSO2_T5_1 flight Connections Multi-leg searching by Adopting Partial Constraint satisfaction Siti Zarinah Mohd Yusof, Vijanth Sagayan A/L Asirvadam, Mohd Fadzil Hassan (UTP) ITSO2_T5_2 A soft Computing Approach for the Memory storage of a sound signal Processor Hammuzamer Irwan Hamzah, Azween Abdullah (UTP) ITSO2_T5_3 security Challenges in Designing an Integrated Web Application for Multiple Online banking Annie Ng, Ai Bee, Nasuha Lee Abdullah (USM) ITSO2_T5_4 InterTvNet Ferhat Khenak (Algeria) ITSO2_T6_1 Intelligent Interpretation and Analysis of Child sexual Abuse forensic Evidence: A Preliminary study Noor Maizura Mohamad Noor, Salwana Mohamad @ Asmara (UMT) ITSO2_T6_2 Light Weight student Mobile Organizer for Netbook: A Preliminary study Dian Pradhana Sugijarto, Ahmed Moosajee Patel, Norleyza Jailani, Marini Abu Bakar (UKM) ITSO2_T6_3 An Integrated DNA Decision support system using grid Environment for Crime Investigation Ahmad Faiz Ghazali, Noor Maizura Mohamad Noor, Md Yazid Mohd Saman, Zafarina Zainuddin (UMT) ITSO2_T6_4 Development of simulation Environment for Agent Interaction Protocol Norizal Abd Latif, Mohd Fadzil Hassan, Hilmi Hasan (UTP) ITSO2_T7_1 Minimizing Discovery Time in bluetooth Networks using Localization Techniques Fazli Subhan, Halabi Hasbullah (UTP) ITSO2_T7_2 Efficient Congestion Control in VANET for safety Messaging Bilal Munir Mughal, Asif Ali Wagan, Halabi Hasbullah (UTP) ITSO2_T7_3 Implementation of IDs with Response for securing MANETs Yasir Abdelgadir Mohamed, Azween Abdullah (UTP) ITSO2_T7_4 The survival Of Communications In Ad hoc And M2M Networks: The fundamentals Design Of Architecture And Radio Technologies used for Low-Power Communication NOMOhI Devices. Juan Jos Martinez Castillo (Venezuela)
5.00 pm 5.20 pm
5.20 pm
WEDNEsDAy, 16 JuNE 2010 ITsO3: PARALLEL ORAL sEssION 3 (9.30 AM 10.30 AM) T1 VIsuAL INfORMATICs VENuE: Ch1
9.30 am 9.50 am ITSO3_T1_1 knowledge Management based Integration of heterogeneous healthcare systems in Malaysia Intan Najua binti Kamal Nasir, P. D. D. Dominic (UTP) ITSO3_T1_2 A study on knowledge flow and Its Implications on social Networking site Savita K.. Sugathan, Azaly Rezza Feisal Azlin, Goh Kim Nee, Emelia Akashah Patah Akhir, Chen Yoke Yie (UTP) ITSO3_T1_3 Visualization of fluid flow : Preliminary Analysis Siti Azila Zainudin, Abas Md Said, Suziah Sulaiman (UTP)
10.10 am
24
TECHNICAL SESSIONS
ORAL PREsENTATIONs
T2 ENgINEERINg TEChNOLOgy VENuE: 3-01
9.30 am 9.50 am 10.10 am ITSO3_T2_1 Workload Analysis of sPECmail2009 Hitoshi Oi, Sho Niboshi (Japan) ITSO3_T2_2 Improving Qos of VoWLAN via Cross-Layer Interaction Approach Sameha Ahmed Ali Alshakhsi, Halabi Hasbullah (UTP) ITSO3_T2_3 Improvements over Two Phase shortest Path Algorithm Muhammad Aasim Qureshi, Mohd Fadzil Hassan (UTP) ITSO3_T3_1 understanding Domain Experts Perspectives and Expectations in Assistive Technology Suziah Sulaiman, Siti Nur Syazana Mat Saei, Foong Oi Mean, Halabi Hasbullah (UTP) ITSO3_T3_2 formalization of uML Class Diagram using Description Logics Lusiana Efrizoni, Wan M.N. Wan-Kadir, Radziah Mohamad (Indonesia) ITSO3_T3_3 service Oriented Disributed Manager for grid systems Entisar S. Alkayal, Fathy A. Essa (Saudi Arabia) ITSO3_T4_1 Organizational Commitment Towards software Process Improvement - An Irish software VsEs Case study Shuib Basri, Rory V. OConnor (UTP) ITSO3_T4_2 The Level of ICT use by Museums in Malaysia Juliana Aida Abu Bakar, Puteri Shireen Jahn Kassim, Murni Mahmud (UIAM) ITSO3_T4_3 Enhanced CAf Indexing Algorithm using hashing functions Nuraini Abdul Rashid, Rana Ghadban, Hazrina Yusof Hamdani, Atheer A-Abdulrazaq (USM) ITSO3_T5_1 using Educational games in Learning Introductory Programming: A Pilot study on students Perceptions Roslina Ibrahim, Azizah Jaafar (UTM) ITSO3_T5_2 A Collaborative-Interaction Approach of software Project Development - An Extension to Agile based Methodologies Rehan Akbar, Mohd Fadzil Hassan (UTP) ITSO3_T5_3 Development of Mobile Learning Tool Sahilu Wendeson, Wan Fatimah Wan Ahmad, Nazleeni Samiha Haron (UTP) ITSO3_T6_1 Thematic Role to Assist Preparation of a business Letter based on genre Approach Tg Zatul Hidayah Tg Petra, Mohd Juzaiddin Ab Aziz, Siti Hamin Stapa (UKM) ITSO3_T6_2 Text-based Classification incoming Maintenance Requests to maintenance type Naghmeh Mahmoodian, Rusli Abdullah, Masrah Azrifah Azim Murad (UPM) ITSO3_T6_3 Ontology of Programming Resources for semantic searching of Programming Related Materials on the Web Siti Noradlina Mat Using, Rohiza Ahmad, Shakirah Mohd Taib (UTP)
ITsO4: PARALLEL ORAL sEssION 4 (10.50 AM 12.50 PM) T1 VIsuAL INfORMATICs VENuE: 3-01
10.50 am 11.10 am 11.30 am ITSO4_T1_1 fPgA Implementation of Pipelined 2D-DCT and Quantization Architecture for JPEg Image Compression Enas Dhuhri Kusuma, Thomas Sri Widodo (Indonesia) ITSO4_T1_2 Evaluating C2C e-commerce Website usability in Malaysia from users perspective: A case study Noorfadzilah Md Zainudin, Wan Fatimah Wan Ahmad, and Goh Kim Nee (UTP) ITSO4_T1_3 Non-Cooperative Iris Recognition system: A Review Abdulsamad Ebrahim Yahya, Md Jan Nordin (UKM) Abdulsamad
11.50 am ITSO4_T1_4 Improving Iris segmentation by specular Reflections Removable Ebrahim Yahya, Md Jan Nordin (UKM) 12.10 pm
ITSO4_T1_5 3D Reconstruction using Level-based Approach in Computational stereo Sayed Ali Kasaei Zadeh, Abas Md Said (UTP)
25
TECHNICAL SESSIONS
ORAL PREsENTATIONs
12.30 pm ITSO4_T1_6 3D Reconstruction of geometry from 2D image using genetic Algorithm Muhammad Tariq Siddique, Mohamed Nordin Zakaria (UTP) ITSO4_T2_1 sIDIf: Location based Technique as a Determinant of Effectiveness and Efficiency in Artificial Reefs Development Project W. Aezwani W. A. Bakar, Zailani Mohamed Sidek, Mustafa Man, Mohammad Zaidi Zakaria (UMT)
11.10 am ITSO4_T2_2 Multi-level Parallelism in PhyloCon Algorithm Hazrina Yusof Hamdani, NurAini Abdul Rashid (USM) 11.30 am 11.50 am 12.10 pm 12.30 pm ITSO4_T2_3 Dynamic service Placement and Redundancy to Ensure service Availability During Resource failures Boon Yaik Ooi, Huah Yong Chan, Yu-N Cheah (UTAR) ITSO4_T2_4 Divisible Load scheduling of Real-time Task on heterogeneous Clusters Suriayati Chuprat (UTM) ITSO4_T2_5 Optimal Parameters of Interline Power flow Controller using Particle swarm Optimization Khalid. H. Mohamed, K.S.Rama Rao, Khairul Nisak Md. Hasan (UTP) ITSO4_T2_6 An Interoperability study of Esb for C41 systems Abdullah Alghamdi, Muhammad Nasir, Iftikhar Ahmad Khalid A. Nafjan (Saudi Arabia) ITSO4_T3_1 Customer Relationship Management: Computer-Assisted Tools for Customer Lifetime Value Prediction Lim Chia Yean, Vincent KT Khoo (USM) ITSO4_T3_2 Automatic Programming Assessment and Test Data generation - A review on its approaches Rohaida Romli, Shahida Sulaiman, Kamal Zuhairi Zamli (UUM) ITSO4_T3_3 I-Wellness: A hybrid Case-based framework for Personalized Wellness Therapy Lim Thean Pheng, Wahidah Husain (USM) ITSO4_T3_4 Computer-Assisted Composing Process in business Writing Tuan Norhafizah Tuan Zakaria, Mohd Juzaiddin Ab Aziz, Tg Nor Rizan Tg Mohd Maasum (UKM) ITSO4_T3_5 Immune Multi Agent system for Intrusion Prevention and self healing system Implement a Non-Linear Classification Muna Elsadig, Azween Abdullah, Brahim Belhaouari Samir (UTP) ITSO4_T3_6 Information Extraction for Counter-Terrorism: A survey on Link Analysis Norshuhani Zamin, Alan Oxley (UTP) ITSO4_T4_1 strategic IT Alignment with business: service Oriented Architecture Approach Mohammed Abdi, P.D.D. Dominic (UTP) ITSO4_T4_2 A survey on Adaptive Qualitative Assessment and Dynamic Questions generation Approaches Diyana Syamsiyah Rozali, Mohd Fadzil Hassan, Norshuhani Zamin (UTP) ITSO4_T4_3 Conceptualization of the Antecedents and Impacts of kMs utilization: A Preliminary framework Ishaq O. Oyefolahan, P.D.D. Dominic (UTP)
12.30 pm
11.50 am ITSO4_T4_4 hybrid Approach Towards Ontology Mapping Shailendra Singh, Yu-N Cheah (USM) 12.10 pm ITSO4_T4_5 Co-creation Values in knowledge Management Elliyani Atan , Mohamad Shanudin Zakaria, Yazrina Yahya, Muriati Mukhtar (UKM) 12.30 pm ITSO4_T4_6 Identifying Effective software Engineering (sE) Team Personality Types Composition using Rough set Approach Mazni Omar, Sharifah-Lailee Syed Abdullah (UiTM) ITSO4_T5_1 The Effectiveness of zoom Visual flow (zVif) Technique in Program Comprehension Activities Rozita Kadar, Shahida Sulaiman (UiTM) ITSO4_T5_2 biologically Inspired Object Recognition system Hamada R. H. Al-Absi, Azween Abdullah (UTP)
26
TECHNICAL SESSIONS
ORAL PREsENTATIONs
11.30 am 11.50 am 12.10 pm ITSO4_T5_3 k-Means Clustering Visualization of Web-based OLAP Operations for hotspot Data Tsamrul Fuad, Imas Sukaesih Sitanggang, Annisa (Indonesia) ITSO4_T5_4 Visualizing the Design Pattern Interaction Roles Keen Ngee Loo, Sai Peck Lee (UM) ITSO4_T5_5 Compacted Dither Pattern Codes Versus Principal Component Analysis in Video Visual Depiction Lochandaka Ranathunga, Roziati Zainuddin, Nor Aniza Abdullah (UM)
12.30 pm ITSO4_T5_6 Improving a Web Application using Design Patterns: A Case study Phek Lan Thung, Chu Jian Ng, Swee Jing Thung, Shahida Sulaiman (USM)
ITsO5: PARALLEL ORAL sEssION 5 (2.00 PM PM 4.00 PM) T1 VIsuAL INfORMATICs VENuE: Ch1
2.00 pm 2.20 pm 2.40 pm 3.00 pm 3.20 pm 3.40 pm ITSO5_T1_1 A Novel hybrid fuzzy-sVM Image steganographic Model Hanizan Shaker Hussain, Syed Ahmad Aljunid, Saadiah Yahya, Fakariah Hani Mohd Ali (UiTM) ITSO5_T1_2 A Constructive shift sequence Approach with simulated Annealing for Nurse Rostering Problem Mohammed Hadwan, Masri Ayob (UKM) ITsO5_T1_3 handwriting Recognition system using fast Wavelets Transform Mohamed E. Gumah, Etienne Schneider, Abdurazzag Ali Aburas (UTP) ITSO5_T1_4 sequential Pattern Mining on Library Transaction Dataset Imas Sukaesih Sitanggang, Nor Azura Husin, Anita Agustina, Naghmeh Mahmoodian (Indonesia) ITSO5_T1_5 game-based Learning Courseware for Children with Learning Disabilities Wan Fatimah Wan Ahmad, Emelia Akashah P.Akhir, Sarah Azmee (UTP) ITSO5_T1_6 A study on students Motivation in Learning Mathematics using Multimedia Courseware Zuraini Hanim Zaini, Wan Fatimah Wan Ahmad (UTP)
27
TECHNICAL SESSIONS
ORAL PREsENTATIONs
T2 ENgINEERINg TEChNOLOgy VENuE: 3-01
2.00 pm 2.20 pm 2.40 pm 3.00 pm 3.20 pm 3.40 pm ITSO5_T2_1 Design of an Autonomic services Oriented Architecture Muhammad Agni Catur Bhakti, Azween Abdullah (UTP) ITSO5_T2_2 Portable Plant Preventive Maintenance Management system Nazleeni Haron, Mazeyanti M. Ariffin, Mohd. H. Hasan, Siti N. Abdullah (UTP) ITSO5_T2_3 A Novel Maxmin Definition to Achieve an Optimum fairness in scheduling Packets over the Internet Yaser Miaji, Suhaidi Hassan (UUM) ITSO5_T2_4 Quality of service Metrics using generalized Pareto Distribution Abdelmahamoud Youssouf Dahab, Abas Md Said, Halabi Hasbullah (UTP) ITSO5_T2_5 Power Optimization in Multi-Processor systems Adrian Siong Min Wee, Sei Ping Lau, Chong Eng Tan (Unimas) ITSO5_T2_6 Numerical Technique for Robot Path Planning using four Point-Eg Iterative Method Azali Saudi, Jumat Sulaiman (UMS) ITSO5_T3_1 self-Organizing Map Approach for determining Mobile user Location using IEEE 802.11 signals Teddy Mantoro, Media A. Ayu, Asma Nuraini, Sulafa Mohd Amin (UIAM) ITSO5_T3_2 An e-book personalization architecture with digital rights and encryption procedures Hameed, N., Cheah, Y.-N., Rafie, M. (USM) ITSO5_T3_3 Two-tier bitwise Interest Oriented QRP with firework Model Query for a small world Peer-to-peer system to reduce message flooding and improve recall rate Choong Yong Liang, Lim Tong Ming (Sunway University College) ITSO5_T3_4 Os-MDAsO: An Algorithm that guarantees Correctness for P2P Object-Oriented Database systems in a Wireless Local Area Network Environment Wong Wai Keong, Lim Tong Ming (Sunway University College) ITSO5_T3_5 Comparisons of Routing Protocols for Child Tracking in Wireless sensor Network Azat Rozyyev, Halabi Hasbullah (UTP) ITSO5_T3_6 Mobile government services in Malaysia: Challenges and Opportunities Ahmad Al Thunibat, Nor Azan Mat Zin, Noraidah Sahari @ Ashari (UKM) ITSO5_T4_1 semantic search in Digital Library semantic technology Nurul Aida Osman, Shahrul Azman Mohd Noah, Nazlia Omar (UKM) ITSO5_T4_2 Transformation of L2 Writers to Correct English: The Need for A Computer-Assisted Writing Tool Tuan Norhafizah Tuan Zakaria, Mohd Juzaiddin Ab Aziz, Tg Nor Rizan Tg Mohd Maasum (UKM) ITSO5_T4_3 Application of semantic Technology in Digital Library Nor Afni Raziah Alias, Shahrul Azman Noah, Zuraidah Abdulah, Nazlia Omar, Maryati Mohd Yusof, Yazrina Yahya (UKM) ITSO5_T4_4 Agent based Meeting scheduling in hierarchical Organizations Ozgur Koray Sahingoz (Turkey) ITSO5_T4_5 A case study on Implementation of grid Computing to Academic Institution Ahmed Mohammed Al-Iesawi , Mohd Isa Mohd Samat (UiTM) ITSO5_T4_6 Attribute Value Weighting in k-Modes Clustering for y-short Tandem Repeats (y-sTR) surname Ali Seman, Zainab Abu Bakar, Azizian Mohd. Sapawi (UiTM) ITSO5_T5_1 Determining the fittest frontal View face Adaboost Classifier for Adoption in Personage Detector Norizan Mohamad, Muthukkaruppan Annamalai, Siti Salwa Salleh (UiTM) ITSO5_T5_2 Development of Virtual Learning for Chemistry subject based on ConstructivismContextual Approach Rozie Ezrina Shuhimi, Norasiken Bakar, Faaizah Shahbodin, Sazilah Salam, Ibrahim Ahmad (UTeM)
3.00 pm
3.20 pm 3.40 pm
28
TECHNICAL SESSIONS
ORAL PREsENTATIONs
2.40 pm 3.00 pm 3.20 pm 3.40 pm ITSO5_T5_3 A study and Result of Image Processing Visualising Topology Algorithm based on satellite geographical Data Tew Yiqi, Ahmed Moosajee Patel, Christopher Wills (UKM) ITSO5_T5_4 An Accurate Infant Cry Classification system based on Continuous hidden Markov Model Yousra Abdulaziz, Sharifah Mumtazah Syed Ahmad (UNITEN) ITSO5_T5_5 Locating geometrical Descriptors for hand biometrics in a Contactless Environment Goh Kah Ong Michael, Tee Connie, Andrew Teoh Beng Jin (MMU) ITSO5_T5_6 Analysing the Effectiveness of COMA++ on the Mapping between Traditional Malay Textile (TMT) knowledge Model and CIDOC CRM Syerina Azlin Md Nasir, Nor Laila Md Noor (UiTM) ITSO5_T6_1 MALIM - A New Computational Approach of Malay Morphology Mohd Yunus Sharum, Muhammad Taufik Abdullah, Md Nasir Sulaiman, Masrah Azrifah Azmi Murad, Zaitul Azma Zainon Hamzah (UPM) ITSO5_T6_2 Indexing Protein sequence/ structure Databases using Decision Tree: A Preliminary study Khalid Jaber, Rosni Abdullah, NurAini Abdul Rashid (USM) ITSO5_T6_3 semantic based features selection and Weighting Method for Text Classification Aurangzeb Khan, Baharum Baharudin, Khairullah Khan (UTP) ITSO5_T6_4 seed-based Region growing study for brain Abnormalities segmentation Noor Elaiza Abdul Khalid, Shafaf Ibrahim, Mazani Manaf, Umi Kalthum Ngah (UiTM) ITsO5_T6_5 Agent based Negotiation In E-commerce Moustapha Tahir (UTP) ITSO5_T6_6 Transforming unstructured Query to Mediated Query for structured Retrieval Gan Keng Hoon, Phang Keat Keong (UM) ITSO5_T7_1 Information security Considerations for higher Learning Institutions Zuraini Ismail, Maslin Masrom, Dayang Suhana Hamzah, Zailani Mohammed Sidek (UTM) ITSO5_T7_2 Assessing knowledge Management Readiness in Organizations Mohamed Jalaldeen Mohamed Razi, Nor Shahriza Abdul Karim (UIAM) ITSO5_T7_3 hCI Practices in Malaysia: A Reflection of IT Professional Perspective Idyawati Hussein, Murni Mahmud, Alvin W. Yeo (UMS) ITSO5_T7_4 Evaluating heuristic for Eg Portal Design Model Murni Mahmud, Ab Razak Che Hussin, Noor Khairunnisa Othman, Halina M. Dahlan (UTM) ITSO5_T7_5 Designing a Computer Literacy Course Alan Oxley (UTP) ITSO5_T7_6 The Challenges in Transferring Technical knowledge: A university Teknologi PETRONAs Case study Khairul Shafee Kalid (UTP)
ITsO6: PARALLEL ORAL sEssION 6 (4.20 PM 6.00 PM) T1 VIsuAL INfORMATICs VENuE: 3-01
4.20 pm 4.40 pm 5.00 pm 5.20 pm ITSO6_T1_1 Live solar system (Lss): Evaluation of an Augmented Reality book-based Educational Tool Aw Kien Sin, Halimah Badioze Zaman (UKM) ITsO6_T1_2 Developing Augmented Reality book for Deaf in science: The Determining factors Norziha Megat Mohd. Zainuddin, Halimah Badioze Zaman, Azlina Ahmad (UKM) ITSO6_T1_3 Courseware Accessibility for hearing Impaired Siti Zaharah Mohid, Nor Azan Mat Zin (Kolej Universiti Islam Antarabangsa) ITSO6_T1_4 Mobile Tourism Directory based on the LuCID Methodology: A Preliminary study Juhana Salim, Ahmad Bazli Arifin, Onn Azraai Puade (UKM) ITSO6_T2_1 Traceability in Agri-food sector using RfID Arun N. Nambiar (USA)
29
TECHNICAL SESSIONS
ORAL PREsENTATIONs
4.40 pm 5.00 pm 5.20 pm 4.20 pm ITSO6_T2_2 Decision Making using fuzzy Logic for stock Trading Shuhadah Othman, Etienne Schneider (UTP) ITSO6_T2_3 Evaluating Neural Network Intrusion Detection Approaches using Analytic hierarchy Process Iftikhar Ahmad, Azween Abdullah, Abdullah S Alghamdi (UTP) ITSO6_T2_4 Moving Towards Two Dimensional Passwords Sohail Safdar, Mohd Fadzil Hassan (UTP) ITSO6_T3_1 A P2P Object-Oriented Database system that supports Multi-Attribute and Range Queries with Improved Query Response Time Goh Chiao Wei, Lim Tong Ming (Sunway University College) ITSO6_T3_2 functional Requirements Analysis for Developing English Language Diagnosis Tool Roshini Rajamanicam, Norlia Mustaffa, Wahidah Husain, Nasriah Zakaria (USM) ITSO6_T3_3 E-Cost Estimation using Expert Judgment and COCOMO II Zulkefli Mansor, Zarinah Mohd Kasirun, Noor Habibah Hj Arshad, Saadiah Yahya (UNISEL) ITSO6_T3_4 Design and Development of e-RuE as a Web-based Evaluation Tool Rafidah Ramli, Azizah Jaafar (UKM) ITSO6_T3_5 Implementing Rapid Application Development(Rad) Methodology In Developing Practical Training Application system Nik Marsyahariani Nik Daud, Nor Azila Awang Abu Bakar, Hazlifah Mohd Rusli (UiTM) ITSO6_T4_1 social Interaction in E-learning: An Overview Noorihan Abdul Rahman @ Abdul Rashid , Shamsul Sahibuddin (UiTM) ITSO6_T4_2 A Proposed semantic Recommendation system for E-Learning (A Rule and Ontology based E-learning Recommendation system) Saman Shishehchi, Seyed Yashar Banihashem and Nor Azan Mat Zin (UKM) ITSO6_T4_3 Accessible e-learning Approach for handicaps (A Proposed Interaction Technique for Arm muscle disorders, Parkinson and hand tremors) Seyed Yashar Banihashem, Saman Shishehchi, Nor Azan Mat Zin (UKM) ITSO6_T4_4 Refining Technical and Learning Accessibility Elements on E-learning for user with Visual Impairment Khairuddin Kamaludin, Noor Faezah Mohd Yatim, Md. Jan Nordin (UKM) ITSO6_T4_5 MINDA: A Cognitive Tool for solving Mathematical Word Problems Azlina Ahmad, Halimah Badioze Zaman, Siti Salwah Salim, Roziati Zainuddin (UKM) ITSO6_T5_1 Proposed Model for Courseware Development of Virtual Teaching And Learning Traditional Craft Salyani Osman, Nor Azan MZ (UKM) ITsO6_T5_2 sMs-based final exam retrieval system on mobile phones Rohiza Ahmad, Aliza Sarlan, Khairul Aiman Ab Maulod, Eliza Mazmee Mazlan, Rozana Kasbon (UTP) ITSO6_T5_3 A service science Approach for e-Learning Mohamed Nazul Ismail, Yazrina Yahya, Muriati Mukhtar, Mohamad Shanudin Zakaria, Ali Ahmad Zahrawi (IPTEKNIK) ITSO6_T5_4 Mathematical knowledge Representation for Education semantic Web based on Learning style Ili Farhana Md Mahtar, Nor Azan Mat Zin (UKM) ITSO6_T5_5 Evaluation of hiCORE: Multi-tiered holistic Islamic banking system based on user Acceptance Test Halimah B.Z.,Azlina A.,T.M.Sembok, Suffian I.,Shahrul Azman M.N., Azuraliza A.B.,Zulaiha A.O.,Nazlia O. Salwani A.,Sanep A., Hailani M.T.,Zaher M.Z., Azizah J., Norfaezah M.Y., Choo,W.O., C.Abdullah, Sopian B. (UKM) ITSO6_T6_1 A survey of simulators, Emulators and Testbeds for Wireless sensor Networks Muhammad Imran, Abas Md Said, Halabi Hasbullah (UTP) ITSO6_T6_2 strategy for Efficient Routing in VANET Nur Diana Mohd. Nuri, Halabi Hasbullah (UTP)
30
5.00 pm
5.20 pm 5.40 pm
TECHNICAL SESSIONS
ORAL PREsENTATIONs
5.00 pm 5.20 pm ITSO6_T6_3 Multilayer Packet Tagging for Network behaviour Analysis Maznan Deraman, Jalil Md Desa, Zulaiha Ali Othman (TM Research and Development Sdn Bhd) ITSO6_T6_4 A Capable, high-Level scheduling Concept for Application-specific Wireless sensor Networks Matthias Vodel, Mirko Lippmann, Mirko Caspar, Wolfram Hardt (Germany) ITSO6_T7_1 using Change Tracking Component to Manage Object-Oriented Driven user Interface Layout Management system Liang Ying Oh, Tong Ming Lim ( Sunway University College) ITSO6_T7_2 An Improved Traditional Worm Attack Pattern Robiah Y., Siti Rahayu S., Shahrin Sahib, Mohd Zaki M., Faizal M.A., Marliza R. (UTEM) ITSO6_T7_3 Architecture of seMeja Desktop system Sufian Idris, Marini Abu Bakar, Zarina Shukur (UKM)
ThuRsDAy, 17 JuNE 2010 ITsO7: PARALLEL ORAL sEssION 7 (10.50 AM 12.50 PM) T1 VIsuAL INfORMATICs VENuE: Ch1
10.50 am 11.10 am 11.30 am 11.50 am 12.10 pm ITSO7_T1_1 Evaluating the Accessibility and Visibility of Quran Websites Ahmad Bakeri Abu Bakar (UIAM) ITSO7_T1_2 formative Evaluation for Accounting Courseware Enhancement Norlina Mohd Sabri, Hasiah Mohamed @ Omar, Noraidah Md Bati (UiTM) ITSO7_T1_3 Challenges in the Evaluation of Educational Computer games Hasiah Mohamed @ Omar, Azizah Jaafar (UiTM) ITSO7_T1_4 Investigating the Redundancy Effect in Multimedia Learning on a Computer science Domain Riaza Mohd Rias, Halimah Badioze Zaman (UiTM) ITSO7_T1_5 Wi-fi Load balancing using Cognitive Radio Techniques Rafiza Ruslan, Tat-Chee Wan (UiTM)
12.30 pm ITSO7_T1_6 Design of interactive board system for collaborative learning T. Puckdeepun, J. Jaafar, M. F. Hassan, F. A. Hussin (UTP)
11.30 am ITSO7_T2_3 Optimal Path selection in bluetooth scatternet based on fuzzy set Masood Ur Rehman, Halabi Hasbullah (UTP) 11.50 am 12.10 pm ITSO7_T2_4 The Importance of TALIb sysTEM using Computer Controlled for Visual Impaired Community Muhamad Lazim Talib, Norshahriah Wahab, Muslihah Wook (UPNM) ITS07_T2_5 forecasting Method selection using ANOVA and Duncan Multiple Range Tests on Time series Dataset Adhistya Erna Permanasari, Dayang Rohaya Awang Rambli, P. Dhanapal Durai Dominic (UTP) ITS07_T2_6 A New Delayed ACk strategy for TCP Multi-hop Wireless Networks Ammar Mohammed Al-Jubari, Mohamed Othman (UPM) ITSO7_T3_1 smart Card Technology Integration in a higher Education Institution Ili Hawa Ahmad, Normie Azura Abdul Jamil, Muna Azuddin, Norshidah Mohamed (UIAM)
12.30 pm
11.10 am ITSO7_T3_2 A conceptual framework of an e-mentoring system for orphan children using ARCs Motivational Model Nursakirah Ab.Rahman Muton, Nasriah Zakaria, Faten Damanhoori (USM)
31
TECHNICAL SESSIONS
ORAL PREsENTATIONs
11.30 am 11.50 am 12.10 pm 12.30 pm ITSO7_T3_3 semantic-based grid Resource Discovery systems - A literature review and taxonomy Mahamat Issa Hassan, Azween Abdullah (UTP) ITSO7_T3_4 Extended function Point Analysis Prototype - With security Costing Estimation Nur Atiqah Sia Abdullah, Rusli Abdullah, Mohd Hasan Selamat, Azmi Jaafar (UiTM) ITSO7_T3_5 A framework for building Multilingual Domain Ontologies for Islamic Portal Juhana Salim, Siti Farhana Mohamad Hashim, Akmal Aris (UKM) ITSO7_T3_6 semantically Indexed and searched of Digital Images using Lexical Ontologies and Named Entity Recognition Datul Aida Ali, Sharul Azman Ali (UKM) ITSO7_T4_1 Adoption of E-commerce in Malaysia and its Affect on the business Performance: An Organizational Perspective Muhammad Jehangir Khan, P.D.D. Dominic, Alamghir Khan, Naseebullah (UTP) ITsO7_T4_2 ICT Dimension and Indicators towards building a knowledge society in Malaysia: A Measurement Model Norsiah Abdul Hamid, Halimah Badioze Zaman (UKM) ITSO7_T4_3 A Preliminary study on the Implementation of Enterprise Resource Planning in Malaysian Private higher Institution-A Case study Raja Mohd Tariqi Raja Lope Ahmad, Zalinda Othman, Muriati Mukhtar (UKM) ITSO7_T4_4 If Professors knew What They know: A Technique for Capturing university Teachers' Tacit knowledge of students supervision Ibraheem M. Dooba, Alan G. Downe, Ahmad Kamil Mahmood (UTP) ITSO7_T4_5 Instructors Acceptance of Distance Learning Management system Ibrahim Abood Almrashdah, Noraidah Shaari@ Ashaari, Nor Azan Hj.Mat Zin , Mutasem Alsmadi (UKM)
11.10 am 11.30 am
11.50 am
12.10 pm
12.30 pm ITS07_T4_6 An Evaluation of the usage of Web 2.0 Among Tertiary Level students in Malaysia Kamaluddeen Usman Danyaro, Jafreezal Jaafar, Rod Allan A. De Lara , Alan G. Downe (UTP)
11.10 am ITSO7_T6_2 Trailblazers and Laggards in Internet sophistication Among Rural society: Empirical Evidence from Malaysia Mahendhiran Nair, Gil-Soo Han, Patricia Goon (Monash University) 11.30 am ITSO7_T6_3 Application of Clickstream Analysis as Web Page Importance Metric in Parallel Crawlers Ali Selamat, Fatemeh Ahmadi-Abkenari (UTM) 11.50 pm ITSO7_T6_4 Electronic Land Administration system In Malaysia: A Proposed Review from ICT and Legal Perspectives Nor Shahriza Abdul Karim, Zainal Abidin Nordin, Ainul Jaria Maidin, Mohd Shukri Ismail (UIAM)
32
TECHNICAL SESSIONS
ORAL PREsENTATIONs
12.10 pm ITSO7_T6_5 Value co-Creation: Embedding the Value Elements in Critical success factor for E-government system Development Cik Nora Salleh, Yazrina Yahya, Mohammed Alaa H. Altemimi, Muriani Mukhtar (UKM) ITSO7_T6_6 Proposed Development Methodology for higher Education and Library Mash-ups Rabiu Ibrahim, Alan Oxley (UTP)
12.30 pm
11.50 pm ITSO7_T7_4 sociability Aspects in e-health Community: A Review Nor Athiyah Abdullah, Nasriah Zakaria (USM ) 12.10 pm ITSO7_T7_5 briefly Introduced and Comparatively Analysed: Agile sD, Component-based sE, Aspect-Oriented sD and Mashups Ali Seyfi, Ahmed Patel ( UKM )
33
TECHNICAL SESSIONS
POsTER PREsENTATIONs
TuEsDAy, 15 JuNE 2010 ITsP1: POsTER sEssION 1 (2.00 PM 5.00 PM) VENuE: fOyER
ITsP1_1 ITsP1_2 ITsP1_3 ITsP1_4 ITsP1_5 ITsP1_6 ITsP1_7 ITsP1_8 ITsP1_9 3D reconstruction of a scene from multiple uncalibrated images Abdoulaye Mahamat Zakaria , Abas Md Said (UTP) The Enhancement of Assistive Courseware for Visually Impaired Learners Nur Hazwani Mohamad Roseli, Nurulnadwan Aziz Aziz, Ariffin Abdul Mutalib (UiTM) survey on Visualization: Lines and Planes in 3-Dimensions Syazwan Noordin, Wan Fatimah Wan Ahmad, Yew Kwang Hooi (UTP) Applying Virtual Reality Panorama simulation Environment in Technical Communication Wan Norazlinawati Wan Abd Arif, Wan Fatimah Wan Ahmad, Shahrina Md Nordin (UTP) software Risk Assessment Visualization Tool using Probabilistic Model Nuridawati Mustafa , Nurazlina Md Sanusi, Intan Ermahani A. Jalil (UTeM) Architecture and uML Models of Mobile Learning Application for Course Content Ahmad Sobri Hashim, Wan Fatimah Wan Ahmad , Rohiza Ahmad (UTP) gIs-based Mobile Tourism Architecture Prototype for Libya (A Case study) Abubaker Agil Emhmed, Kalaivani Chellapan (UNIR AZAK) A guided Digital storytelling Prototype system using Illustrated flashcards Jumail Wastam, Dayang Rohaya Awang Rambli, Suziah Sulaiman (UTP) An Overview of Augmented Reality of underwater habitat Norsila Shamsuddin, Mohd Kushairi Mohd Rajuddin, Farahwahida Mohd, Faudzi Ahmad, Wan Fatimah Wan Ahmad, Baharum Baharudin (Unisel)
ITsP1_10 Enhanced signature Verification Technique using Data glove Shohel Sayeed, Rosli Besar, Nidal Kamel (MMU) ITsP1_11 Development of Multimedia Messaging service (MMs) -based Receipt system for Mobile banking Mohd Hilmi Hasan , Aklili Khalid (UTP) ITsP1_12 Performance of AODV Routing Protocol in Mobile Ad hoc Network Zahian Ismail, Rosilah Hassan (UKM) ITsP1_13 Evaluation of Real-Time Visio-haptic Deformable bovine Rectal Palpation simulator Irshad Ahmad, Suziah Sulaiman (UTP) ITsP1_14 Multimedia Courseware for slow Learners:A Preliminary Analysis Fatimah Wan Ahmad, Emelia Akashah Patah Akhir (UTP) Norfarhana Abdollah, Wan
ITsP1_15 Developing A Virtual Laboratory for biology (VLab-bio): A Preliminary study Murniza Muhamad, Halimah Badioze Zaman, Azlina Ahmad (UKM)
34
TECHNICAL SESSIONS
POsTER PREsENTATIONs
WEDNEsDAy, 16 JuNE 2010 ITsP2: POsTER sEssION 2 (8.30 AM 12.00 PM) VENuE: fOyER
ITsP2_1 ITsP2_2 ITsP2_3 statistical Analysis for the key Representation Database and the Original Database Asim Elshiekh, P. D. D. Dominic (UTP) Query Translation Architecture for Malay-English Cross-Language Information Retrieval system Nurjannaton Hidayah Rais, Muhamad Taufik Abdullah, Rabiah Abdul Kadir (UPM) A comparison of feed-forward back-propagation and radial basis artificial neural networks: A Monte Carlo study Osman Ahmed Abdalla, M. Nordin Zakaria, Suziah Sulaiman, Wan Fatimah Wan Ahmad (UTP) A Multidimensional search space using Interactive genetic Algorithm Humera Farooq, M. Nordin Zakaria, Mohd Fadzil Hassan (UTP) Enhanced Performance of Packet Transmission using system Model Over VoIP Network Kashif Nisar, Abas Md Said, Halabi Hasbullah (UTP) Temporary Cluster based Routing for underwater Wireless sensor Networks Muhammad Ayaz, Azween Abdullah, Low Tang Jung (UTP) Trust challenges and issues of E-government: E-Tax prospective Dinara Berdykhanova, Ali Dehghantanha, Kumaresh, Hariraj (Asia- Pacific University College of Technology and Innovation) Review on finger Vein Authentication system by Applying Neural Network Azadeh Noori Hoshyar, Riza Sulaiman (UKM) Climate control and Monitoring with Wireless sensor Network: A Case study Asfandyar Khan, Azween Abdullah, Nurul Hasan (UTP)
ITsP2_10 A New framework to Extract WordNet Lexicographer files for semi-formal Notation: A Preliminary study Noor Maizura Mohamad Noor, Noraida Ali, Noor Syakirah Ibrahim (UMT) ITsP2_11 Development of a Manufacturing Industry success Rate Analyzer using Data Mining Technique Eliza Mazmee Mazlan, Rohiza Ahmad, Rozana Kasbon (UTP) ITsP2_12 sentiment Classification of Customer Reviews based on fuzzy logic Samaneh Nadali,Masrah Azrifah Azmi Murad, Rabiah Abdul Kadir (UPM) ITsP2_13 using Multi-Coordinated Views with Agent Communication Protocol to Detect and Resolve Inconsistent Requirements to Improve Accuracy Tan Lai Heng, Lim Tong Ming (Sunway University College) ITsP2_14 The Development of hashing Indexing Technique in Case Retrieval Mohamad Farhan Mohamad Mohsin, Maznie Manaf, Norita Md Norwawi, Mohd Helmy Abd Wahab (UUM) ITsP2_15 Conceptual Architecture Design and Configuration of Thin Client system for schools in Malaysia: A Pilot Project Abdul Rahman Ahlan, Yusri Arshad, Murni Mahmud (UIAM) ITsP2_16 Evaluation of Theoretical Isotope generator as Alternative for Isotope Pattern Calculator K. Massila, K.C. Soong, I. Nor Haslinda (UTeM) ITsP2_17 An Extension To Mobile IPv6 Micro-Mobility Management Zulkeflee Kusin, Mohamad Shanudin Zakaria (UKM)
35
TECHNICAL SESSIONS
POsTER PREsENTATIONs
ITsP3: POsTER sEssION 3 (2.00 PM 5.00 PM) VENuE: fOyER
ITsP3_1 The Design of fingerprint biometric Authentication on smart Card for PuLAPOT Main Entrance system Mohd Rizal, Mohd Isa, Yuhanim Hani Yahaya, Mohd Hazali Mohamed Halip, Mohammad Adib Khairuddin, Kamaruzaman Maskat (UPNM) A survey of game Theory using Evolutionary Algorithms Sally Hassan A., Muhammad Rafie M.A. (USM) Malware self Protection Mechanism Issues in Conducting Malware behaviour Analysis in a Virtual Environment As Compared To a Real Environment Syed Nasir Alsagoff (UPNM) Industrial-based Object-oriented software Quality Measurement system and Its Importance Nor Fazlina Iryani Abdul Hamid, Mohammad Khatim Hasan (UKM) Practical Database Design for Industrial Maintenance system Abd. Samad Hasan Basari, Nanna Suryana Herman, Ariff Idris (UTeM) Model Driven security frameworks for Addressing security Problems of service Oriented Architecture Muhammad Qaiser Saleem, Jafreezal Jaafar, Mohd Fadzil Hassan (UTP) Effectiveness of blog for programming course in supporting engineering students Janagiammal Ramasamy, Sangeetha Valloo, Jaya Malathy Polaha Nadan (Kuala Lumpur Infrastructure University College) Domain Analysis with Archetype Pattern based zachman framework for Enterprise Architecture Gunnar Piho; Jaak Tepandi, Mart Roost (University of Leeds / Tallinn University of Technology, UK) Intelligent Decision support for Tourism Destination Choice: A Preliminary study Noor Maizura Mohamad Noor, Ily Amalina Ahmad Sabri, Noraida Ali, Fathilah Ismail, (UMT)
ITsP3_8 ITsP3_9
ITsP3_10 simulating the effect of supply Chain Risk and Disruption: A Malaysian Case study Afsaneh Noori Houshyar, Muriati Mukhtar, Riza Sulaiman (UKM) ITsP3_11 Design of Web Intervention to Influence youth behavior Toward Online gaming Chen Yoke Yie, Subarna Sivapalan, Kajendra Ganeson, Goh Kim Nee, Savita K Sugathan; Emelia Akashah P Akhir (UTP) ITsP3_12 A Proposed framework for E-business supply Chain Integrator Norshakirah Ab Aziz, Rohiza Ahmad (UTP) ITsP3_13 safeJourney A Pedestrian Map using safety Annotation for Route Determination Kwang Hooi Yew, Ta Thu Ha, S.D. Silva Jose Paua (UTP) ITsP3_14 The Development of the short Messaging service (sMs) Application for the school usage Salman Firdaus Sidek (UPSI) ITsP3_15 futuristic Model for school's Content Management systems - A beginning Yuhanis Omar, Noraidah Sahari @ Ashaari (UKM) ITsP3_16 To Enable formal Verification of semi-formal Requirements by using Pre-defined Template and Mapping Rules to map to Promela specification to Reduce Rework Lin Cheng Hong, Lim Tong Ming (Sunway University College) ITsP3_17 Extended balancing Ontological and Operational factors in Refining Multiagent Neighborhood using ACO Lee Chee Yean , Lim Tong Ming, Lay-Ki Soon (Sunway University College)
36
TECHNICAL SESSIONS
POsTER PREsENTATIONs
ThuRsDAy, 17 JuNE 2010 ITsP4: POsTER sEssION 4 (8.30 AM 12.00 PM) VENuE: fOyER
ITsP4_1 ITsP4_2 ITsP4_3 ITsP4_4 ITsP4_5 ITsP4_6 ITsP4_7 ITsP4_8 ITsP4_9 ICT, knowledge society, and good governance: Relationship and Interaction Pattern Aziz Perdana (Gadjah Mada University,Indonesia) Information sharing through football Website Equatorial guinea (Eg) Case study Emelia Akashah P Akhir, Yoke Yie Chen, Kim Nee Goh , Savita K Sugathan, Salvador Nguema Obama(UTP) Limitations and Measures in Outsourcing Projects to geographically Distributed Offshore Teams Rehan Akbar, Mohd Fadzil Hassan (UTP) An Improved security framework for Data Warehouse: A hybrid Approach Ahmad Sajjad, Rohiza Ahmad (UTP) A Review On The fairness Of The Nurse Rostering Problem Mohd Hakimi Aiman Ibrahim, Robiah Ahmad, Suriayati Chuprat, Habibollah Haron, Nuzulha Khilwani Ibrahim (UTM) Applying zachman's framework to Determine the Content of semantic Theses Digital Library QurratuAini Adibah Ahmad Fazil, Zuraidah Abdullah, Shahrul Azman Noah, (UKM) Integrating National Culture into Information and Communication Technology Adoption Model Mohamed Hussain Thowfeek, Azizah Jaafar (UKM) factors Influencing knowledge sharing in higher Learning A.H Azni, Azreena Abu Bakar, Nuradli Shah, Hanifah Abd Hamid (USIM) Information security Risk Management- An Empirical study on the Importance and Practices in ICT Outsourcing Nik Zulkarnaen Khidzir, Noor Habibah Arshad, Azlinah Mohamed (UiTM)
ITsP4_10 Defining Information system failure in Malaysia: Results from Delphi Technique Norshita Mat Nayan, Halimah Badioze Zaman, Tengku Sembok (UKM) ITsP4_11 formal specification Languages for Real Time system Rabia Sammi, Iram Rubab, Muhammad Aasim Qureshi (Pakistan) ITsP4_12 histogram Matching for Color Detection: A Preliminary study Fatma Susilawati Mohamad, Azizah Abdul Manaf & Suriayati Chuprat (UTM)
37
38
WORKSHOPS
WORkshOP 3 (2.00 PM 4.00 PM) VENuE : 3-03
39
ABSTRACTS
VIsuAL INfORMATICs ITsO1_T1: 15 JuNE 2010 (2.00 PM 4.00 PM) VENuE: 3-01
ITSO1_T1_1 ITSO1_T1_3
Multimedia Learning system (MMLs): Valuing the significance of Cognitive Task Analysis Technique and user Interface Design
Norain Mohd Yusoff, Chui Yin Wong
This paper presents a development of e-Learning System and significant contributions of task analysis and user interface design elements for the deployment of a novel Multimedia Learning System (MMLS). An overview of MMLS starting from the content development flow to the implementation stage is discussed in details. This project is currently being deployed at the Multimedia University (MMU) Malaysia. Adobe Dreamweaver and Adobe Flash were used by the teaching staff to develop the interactive learning environment within the two campuses in MMU. Cognitive Task Analysis (CTA) is introduced as a means of capturing the psychological complexity of tasks that involved significant cognitive activities such as planning, diagnosis and decision-making during the human-system interaction design process. Human Factors approach (i.e. effectiveness and efficiency) and Design approach (i.e. affect and hedonistic qualities of products) are also identified as factors contributing to the development of MMLS. This paper concludes that MMLS is able to increase efficiency, and empowers a geographically and temporally dispersed group of educators, administrators, and students to participate in a dynamic learning organization. Hence, looking at these two contributing factors, MMU is also gearing towards a more dynamic educational environment by offering the MMLS as a feasible alternative learning system in both campuses.
40
ABSTRACTS
ITSO1_T1_5
Design and Implementation of Multi-Touch system using fTIR Technique for Optimization of finger Touch Detection
Ahsanullah Abro, Ahmad Mahmood, Suziah Sulaiman In recent years, multi-touch screens are emerging and seem to be ubiquitous in near future. The intuitive surfaces provide collaborative workspace for users to perform natural style of multi-touch interaction simultaneously. Users can access the interactive elements such as WIMP (window, icon, menus and pointing) using their bare fingers. At the same time multitouch screens have ambiguity in multiple finger touch detection. Users acquire the accuracy in the fingers touch detection during the selection of interactive elements. In order to optimize the multiple finger touch detection, we propose the system and its architecture using the Frustrated Total Internal Reflection (FTIR) sensing technique. The system surface is improved by superimposing the transparent layers on acrylic surface. In addition, we modify the architecture of multi-touch surface by configuring the infrared light emitting diodes against the clean edges of acrylic surface. In order to test the system we conduct the experiment by involving the subjects and investigate the quality of fingertip blobs. The proposed system may increase the image quality of fingertip blobs which may
help in achieving the fidelity for sensing the multiple fingers on interactive surface.
ITSO1_T1_6
ITsO1_T5:
ITSO1_T5_1
A simulated annealing approach to solve fuzzy multi-objective linear model for supplier selection in a supplu chain
Parthiban P, Dhanapal Durai Dominic, Dhanalakshmi Ramasamy Suppliers play a key role in achieving the objective of supply chain. Hence selecting the right suppliers and their quota allocation is a very important in achieving corporate competition. Supplier selection is a multiple criteria decision-making (MCDM) problem which is affected by several factors. At the same time due to the presence of vague and imprecise input parameters, makes the supplier selection complicated. During this project a fuzzy Multi-objective linear model is developed to achieve three important goals: Cost minimization, Quality maximization
4th International Symposium on Information Technology 41
ABSTRACTS
enhances the understanding on genomic function and directly helps development in bioinformatics and medical field.
ITSO1_T5_4
at higher communication performance. The nondeterministic characteristics of client-server data transfer is modeled and simulated using Colored Petri Nets modified Simplesend for performance analysis. However, the verification and validation of the particular statistics involving random generated variate values must first be investigated; hence independent and identically distributed values must be confirmed by analysing the results of single versus replicated simulations.
ITSO1_T5_6
single and Replicated simulations for Colored Petri Nets Nondeterministic Network
Dani Adhipta, Mohd Fadzil Hassan This paper presents an investigation of the independent and identically distributed random variate values in Colored Petri Nets nondeterministic network behavior when single and replicated simulations are performed. The results will be utilized and be part of larger research titled Extended Common Instrument Middleware Architecture toward Heterogeneous Data Sources and the Grid Integration, a proposed architecture extension between remote laboratory instrument connected to the grid for facility sharing aimed
unifying Multimedia Player and Presentation system with Optimizing Dual-Display feature
Rustam Asnawi, Wan Fatimah Wan Ahmad, Dayang Rohaya Awang Rambli In the future, utilization of dual display tends to be more popular. Optimizing the use of this feature, and designing a specific control panel user interface (UI), provide a possibility to develop an application that is able to unify the behavior of PC based multimedia player and presentation system. Since the view of the control panel and its output display occupied a different monitor, it is possible to create a single-compact control panel UI. Each multimedia element (video, image, slide, animation) have a particular controller and to be integrated in one window. This paper presents the Integrated Multimedia Player (IMPlayer) an application that has been developed based on channel controller model and exploits the dual-display feature. We examined that the IMPlayer has inherent double function i.e. as multimedia player and presentation system simultaneously. Lastly, the IMplayer can unify the behavior of multimedia player and presentation system in single application.
ABSTRACTS
website are neglecting performance and quality criteria. By applying Hybrid model between FAHP and LWM approach for website evaluation has resulted in significant acceleration of implementation, raised the overall effectiveness with respect to the underlying methodology and ultimately enabled more efficient and significantly equal or better procedure compared with other methods.
ITSO2_T1_3
The proposed sketch-based API will be tested by building a sketchbased user interface.
ITSO2_T1_4
Modeling optimization for real-time virtual heritage visualization content: A research on e-Warisan sENIbINA
Ahmad Rafi Mohamed Eshaq, Azhar Salleh, Avijit Paul, Siti Noraishah Musa, Yee-Jun Wong, Radzi Hanif, Mazlan Mahadzir
This research suggests a concept of virtual heritage experience within the field of architecture in a collaborative virtual environment. A realtime virtual reality application is adopted based on the fundamentals of virtual heritage metadata structure suggested by the UNESCO guidelines that encompassed both cultural and natural heritage of a digital dataset and are thus useful as a starting point for most virtual heritage application. This paper focuses on the technical challenges and requirement particularly on the optimization of modeling for real-time visualization to represent heritage buildings of the preindependence period in architecture built within the period of 80 to 200 years. This e-Content Fund research awarded by the Ministry of Science, Technology and Innovation (MOSTI) Malaysian named e-Warisan SENIBINA will demonstrate the early finding results of two shortlisted buildings that influenced the direction of traditional Malay Muslim architecture in Peninsular Malaysia.
As sketchy As Possible: Application Programming Interface (API) for sketch-based user Interface
Chan Yet Lai, M. Nordin Zakaria This paper proposed an Application Programming Interface (API) for sketch-based user interface. A recent research direction in modeling interfaces is to automate or assist the sketch-to-3D translation process. This trend, known as sketchbased interfaces for modeling, is motivated by the ease of sketching and the ability of human viewers to imbue so much meaning into a sketch. In sketch-based user interface, user expresses visual ideas or messages as freeform strokes on penbased systems, and the computer takes appropriate action by analyzing the perceptual features of the strokes. Although sketch-based system is powerful, it came with the cost of code complexity. The two main contributors to code complexity are: pen-tablet display and the difficulties in interpreting the sketches. This paper proposed a sketch-based API to reduce the code complexity in sketch-based user interface application.
A soft Computing Approach for sound signal Processing and the Memory storage
Hammuzamer Irwan Hamzah, Azween Abdullah This paper tries to create a new biologically-inspired abstract model for the sound signal processing and completes the model with an architectural design of the memory storage. This research adapts the functions from the biologicallyinspired entities, which are the human auditory system and the human brain. This research aims to provide integrated and structured database to store the sound signal processing data. This research provides the framework to the implementation of the soft computing approach for the sound signal processing and the memory storage. Therefore, this research creates the abstract model for the Biologically-Inspired Sound Signal Analyzer (BISSA) as a new idea for information gathering.
ITSO2_T5_3
security Challenges in Designing an Integrated Web Application for Multiple Online banking
Annie Ng, Ai Bee, Nasuha Lee Abdullah Current online banking only allows payment to be made from a single bank account hence user needs to log in to several banking sites to settle the dues monthly. Paying bills/loans from multiple bank accounts in a single login would provide greater convenience. This paper reviewed the current on line
43
ABSTRACTS
banking system and discussed the challenges in designing an integrated web based application for independent personal financial organizer called I-PFO. I-PFO allows users to settle their financial commitments from multiple banks in a single website. It also provides ease of use, tracking due dates, organizing and personalization. The challenges of such system are security, value proposition to attract collaboration from banks and user acceptance. This paper focuses on security solutions for I-PFO.
ITSO2_T5_4
and the education sciences, according to a new concept of digital video. Gifted of a network InterTvNet, of a global scheme of order WhoDoWhat and of a system SecuRights, this triptych concept is very economic for an education of mass (for more of pedagogic places), for a mutualisation of the quality teachers (for a better quality education), for a fairness between universities (for an equal opportunities) and for an openness to the world (for a better integration in world society of information and communication). The InterTvNet, or the network of TV Endpoints, is a tool of visual informatics that proposes in the framework of the V-Learning, a model of installation of transmitters and receivers in order to carry the audiovisual signal in multimode to multisite, in a relative security and confidentiality, to meet the requirements of the quality assurance in higher education for now. To support this contribution, we will introduce here our experimental device of national scale: Algerian VLearning Network with his InterTvNet of 77 nodes.
InterTvNet
Ferhat Khenak The V-Learning concept or the Online/Video Learning, via Internet and/or by satellite, is a tool of the information and communication technologies for education (ICTE) that ingeniously combines the computer science, the audiovisual
ITsO3_T1:
ITSO3_T1_1
ABSTRACTS
ITsO3_T5:
ITSO3_T5_1
using Educational games in Learning Introductory Programming: A Pilot study on students Perceptions
Roslina Ibrahim, Azizah Jaafar
Studies of using games for learning have being widely discussed in various literatures. This is due to believes that educational games can offer many learning benefits such as highly motivated, engaging and fun. Learning Programming requires many skills such as logical thinking and problem solving as well as understanding of abstract concepts. As a result, many students found that Programming is a challenging subject which resulted in low motivation to study the subject. Thus, it is worth to study how educational games help to enhance our students learning attitude towards Programming. This paper will discuss our pilot study of students perceptions towards using educational games as their learning medium. Findings indicated that the attitude of most students are positive and they are also more motivated to learn Programming by using games compared to conventional method. Hopefully, this research provides some insights to understand our students perceptions regarding educational games usage in their learning. ITSO3_T5_2
ITsO4_T1:
ITSO4_T1_1
fPgA Implementation of Pipelined 2D-DCT and Quantization Architecture for JPEg Image Compression
Enas Dhuri Kusuma,Thomas Sri Widodo
Two dimensional DCT takes important role in JPEG image compression. Architecture and VHDL design of 2-D DCT, combined with quantization and zig-zag arrangement, is described in this paper. The architecture is used in JPEG image compression. DCT calculation used in this paper is made using scaled DCT. The output of DCT module needs to be multiplied with post-scaler value to get the real DCT coefficients. Post-scaling process is done together with quantization process. 2-D DCT is computed by combining two 1-D DCT that connected by a transpose buffer. This design aimed to be implemented in cheap Spartan-3E XC3S500 FPGA. The 2-D DCT architecture uses 3174 gates, 1145 Slices, 21 I/O pins, and 11 multipliers of one Xilinx Spartan-3E XC3S500E FPGA and reaches an operating frequency of 84.81 MHz. One input block with 8 x 8
Evaluating C2C e-commerce Website usability in Malaysia from users perspective: A case study
Noorfadzilah Md Zainudin, Wan Fatimah Wan Ahmad, and Goh Kim Nee The main challenges of e-commerce are to attract customers and maintain a good relationship with existing customer as user only interact with electronic device. Therefore designing a good and usable website is the most crucial part to succeed in this highly competitive environment. The objectives of this study are to evaluate C2C e-commerce website usability and to study problems faced by potential customer in process of purchasing online. In this study, a number of university students were asked to evaluate the usability of two Malaysian C2C websites. Two local websites were chosen, one is a
45
ABSTRACTS
prominent website and the other one is randomly picked from the internet. A framework for evaluating e-commerce usability was implemented in this study. The website is rated based on criteria of system quality, information quality, service quality and attractiveness. Users need to complete a number of tasks on the websites and think- aloud was encouraged during the evaluation process. Results show a number of usability issues encountered by users while completing the task given. From these findings, ecommerce developers may look at the issues seriously before designing their e-commerce website.
ITSO4_T1_3
ITsO4_T5:
ITSO4_T5_1
The Effectiveness of zoom Visual flow (zVif) Technique in Program Comprehension Activities
Rozita Kadar, Shahida Sulaiman
Many techniques and tools have been developed to improve program comprehension but most tools are unsuitable for novices. Some tools are not user friendly, some designs are more suitable to expert programmers and some integrated development environments (IDEs) are very simple and fail to support program comprehension needs among the users. These factors hinder the learning process and may become obstacles to users who have no programming background. This paper attempts to improve program comprehension by using Zoom Visual Flow (ZViF) technique that represents source code in graphical views. It also gives some insights on how to improve visual presentation method in a program editor or an IDE. Lab experiments were conducted to determine the effectiveness of the technique. The
46
ABSTRACTS
been inspired by the feed-forward and feedback mechanisms in the human visual system is presented.
ITSO4_T5_3 ITSO4_T5_5
Compacted Dither Pattern Codes Versus Principal Component Analysis in Video Visual Depiction
Lochandaka Ranathunga, Roziati Zainuddin, Nor Aniza Abdullah Requirement of reduction of feature space of visual descriptors gets attention due to negative effects of high dimensional feature space. This paper reports the performance of Compacted Dither Pattern Code (CDPC) over Principal Component Analysis (PCA) based compact colour descriptor. There are several competitive advantages of CDPC in feature extraction and classification stages when compared to PCA feature vectors. The embedded texel properties, spatial colour arrangements, high compactness, and robust feature representation of CDPC have proven its performances in our experimental study. Visual description experiments were conducted for ten irregular shapes based visual concepts in videos with three setups namely CDPC with Bhattacharyya classifier, PCA with Support Vector Machine (SVM) classifier and PCA with Bhattacharyya classifier. The experimental results were presented based on three common performance measures. The results depict that CDPC with Bhattacharyya classifier provides a good generalized performance for irregular shape based visual description as compared to the other two experimental setups.
ITSO4_T5_6
ITsO5_T1:
ITSO5_T1_1
ABSTRACTS
normally used to increase the imperceptibility of the stego image via its strength to classify the image blocks by learning the relationship between the secret-message and cover-image to be used in the embedding and extracting procedures. A few works have been done in FL especially in preserving the imperceptibility and the number is increasing. Based on this review and leveraging the complementary strengths of FCM in clustering and SVM in classification, we propose a novel hybrid fuzzy c-means (FCM) and SVM (F-SVM) model in image steganography. The model uses the F-SVM as its main engine that is capable of embedding the secret-message imperceptible to human eyes while increasing the payload capacity. Currently, work is being done to develop and test this model. ITSO5_T1_2 ITSO5_T1_4
A Constructive shift Patterns Approach with simulated Annealing for Nurse Rostering Problem
Mohammed Hadwan, Masri Ayob Nurse Rostering problem (NRP) is an NP-Hard problem which is difficult to solve for optimality. This work aims to ensure the availability of enough nurses during the roster period and treating those nurses fairly. In order to achieve this, we proposed a greedy constructive heuristic algorithm based on the idea of generating the most required shift patterns first to solve the nurse rostering problem at Universiti Kebangsaan Malaysia Medical Center (UKMMC). That is, this approach attempt to reduce the complexity of the solution search space by generates all allowed two-day and three-day shift patterns to build up the roster. We then use simulated annealing algorithm to improve the quality of the roster. The resulting roster demonstrates that our proposed approach generates a good quality roster in a reasonable time for our case study.
ITSO5_T1_3
48
ABSTRACTS
ITsO5_T5:
ITSO5_T5_1
Determining the fittest frontal View face Adaboost Classifier for Adoption in Personage Detector
Norizan Mohamad, Muthukkaruppan Annamalai, Siti Salwa Salleh
A big challenge in many face detection applications is how well faces can be reliably detected. An increasing number of algorithms have been published and many such face detectors have been made publicly available in the form of open source applications, such as the OpenCV classifiers. In this work, we attempt to compare four frontal face OpenCV classifiers and determine the most fit for adoption in personage detector. We focus on frontal view following the experts rule of thumb when looking for any person of interest in an image. We chose AdaBoost classifiers because AdaBoost algorithm often results in improved performance. We measured the classifiers performance on the accuracy in terms of recall, precision and harmonic mean. We performed testing over four heterogeneous datasets to obtain a reasonably accurate estimation of the performance of the classifiers that will help us in identifying the most suitable classifier meeting our needs. ITSO5_T5_3
A study and Result of Image Processing Visualising Topology Algorithm based on satellite geographical Data
Tew Yiqi, Ahmed Moosajee Patel, Christopher Wills The performance of processing and visualizing techniques in present satellite receiving systems is not very well developed for the benefit of end users, especially for critical observation and analysis purpose. Currently, the existing satellite receiving system uses an enclosed method to process the incoming data which requires the whole packet of earth globe data to be fully received before retrieving geographical information and only allows the display of this data as a normal image file which cannot be further processed for better visualising purpose. To overcome this problem, we have devised an integrated software application with a smart visualisation topology algorithm embedded to provide the flexibility on data merging capable of displaying in different overlays. The benefit of this data combination is to allow users to directly evaluate the geographical data in user determined visual mode. It also has the capability to provide information for historical reporting and forecasting purpose in real time scheduled operation. The initial result reported in this paper shows that a better and faster way to visualise data at almost the same time as it is received is possible using the adapted algorithm.
Analysing the Effectiveness of COMA++ on the Mapping between Traditional Malay Textile (TMT) knowledge Model and CIDOC CRM
Syerina Azlin Md Nasir, Nor Laila Md Noor
The existence of state-of-the art mapping tools facilitate in finding correspondences between ontology entities. COMA++ among others is a tool that accommodates both schemas and ontologies matching with additional enhancements and provides a platform to evaluate different match algorithms. COMA++ is asserted to be a useful support tool due to its availability online, capability to integrate large variety of similarity algorithms and feasibility for complex metadata management problems. Thus, COMA++ is chosen in this study based on the input type, output type, interaction and availability. The findings show that COMA++ is an efficient tool in finding similarity between schemas in terms of element and structural aspects with its single hybrid matchers and combination matchers. However, there are several limitations identified during the experiments that drive this study for further enhancement to be carried out in the future to test its true potential.
49
ABSTRACTS
ITsO6_T1:
ITSO6_T1_1
Live solar system (Lss): Evaluation of an Augmented Reality book-based Educational Tool
Kien Sin Aw, Halimah Badioze Zaman
Live Solar System (LSS) is an Augmented Reality book-based educational tool to learn Astronomy. Augmented Reality (AR) has its own potential in the education field. In this paper, we review on Tangible Augmented Reality (TAR) which is a combination of Tangible User Interface and AR interface. By applying TAR in LSS, it was able to provide intuitive interaction which became a new learning experience for users. A user study was conducted to test on the usability of LSS based on three constructs namely: ease of use, learnability, and effectiveness. Findings of the study showed that LSS is easy to use and learn, and it also helped users in learning Astronomy. ITSO6_T1_2
Developing Augmented Reality book for Deaf in science: The Determining factors
Norziha Megat Mohd. Zainuddin, Halimah Badioze Zaman, Azlina Ahmad Augmented Reality book is one of augmented reality applications. Augmented reality is a current technology which is based on visually oriented technique. Its visual capability is useful in many applications such as in teaching abstract concepts in learning Science. This article is a part of continuous work in the development of AR book for deaf students. This paper describes the investigation conducted in identifying the determining factors in designing the AR book for deaf students. The qualitative approaches such as observation and interaction techniques were conducted with three deaf students. From the observation and interaction, the researcher found that they preferred to use sign language video compared to text. The students preferred English text to Malay text and they preferred to watch the Whole Communication sign language video instead of the American Sign Language video. However, their performance was not so much different in their given answer. This prompted the researcher to design and develop an AR-Book called AR-SiD in two languages; Bahasa Malaysia and English. The designed AR-SiD is aimed to enhance the understanding of deaf students in learning Microorganisms topic in Science.
ITSO6_T1_3
50
ABSTRACTS
ITsO6_T4:
ITSO6_T4_1
Refining Technical and Learning Accessibility Elements on E-learning for user with Visual Impairment
Khairuddin Kamaludin, Noor Faezah Mohd Yatim, Md. Jan Nordin This paper reviews the elements on accessibility issues in e-learning for individual with visual impairment. With current approaches to accessibility are related to technical perspective, this paper examined the fundamental elements on technical accessibility. When physical characteristic of visual impairment affecting user task and ability, it is suggested that learning perspective should be defined by their ability and performance in task, rather than looking at technical accessibility only. The limitation in task and ability leads to accessibility issues in learning process for user with visual impairment. This paper proposed the accessibility requirement for user with visual impairment should be defined by combining both issues of technical and learning accessibility that based on user task and ability. Technical accessibility may relate to individual physical impairment, but learning accessibility should focus on user ability to perform task related to cognitive, perceptual and psychomotor.
ITSO6_T4_5
A Proposed semantic Recommendation system for E-Learning (A Rule and Ontology based E-learning Recommendation system)
Saman Shishehchi, Seyed yashar Bani Hashem, Nor Azan Haji Mat Zin With proliferation of learning contents on the web, finding suitable learning contents has become a very difficult and complicated task for online learners for better performance. Nevertheless, recommender systems can be a solution to the problem. However, recommendation systems havent been sufficiently used in e-learning, in comparison with other fields (i.e. commerce, medicine and so on). In this paper, we propose a semantic recommender system for e-learning by means of which, learners will be able to accurately find and choose learning materials suitable to their field of interest. The proposed web based recommendation system comprises ontology and web ontology language (OWL) rules. Rule filtering will be used as recommendation technique. Our proposed recommendation system architecture consists of two subsystems; Semantic Based System and Rule Based System. Modules for either subsystem are; Observer, Learner profile, Recommendation storage and User interface.
ITSO6_T4_3
Accessibile e-learning Approach for handicaps (A ProposedInteractionTechniqueforArm muscle disorders, Parkinson and hand tremors)
Seyed Yashar Bani Hashem, Saman Shishehchi, Nor Azan Haji Mat Zin In the present century the differences between healthy and handicapped people become more obvious due to rapid growth of digital information technologies. Contrary to what some people think, this difference is not about their body deformity or disability to hear or talk. The difference is just in their accessibility level to digital information throughout computers and networks. Information and communication technology (ICT) prepares great opportunities to improve the quality of handicapped people learning process and their life. In this paper we will talk about a technique that facilitates human and
4th International Symposium on Information Technology 51
ABSTRACTS
ITsO6_T5:
ITSO6_T5_1
Proposed Model for Courseware Development Of Virtual Teaching And Learning Traditional Craft
Salyani Osman, Nor Azan MZ
Preservation and conservation of traditional craft in our community is greatly important and need further attention to ensure the continuity of traditional heritage remains to future generations. Thus, to conserve teaching and learning of traditional crafts, a new model of virtual teaching and learning traditional craft will be developed. In order to capture the learning components for the model, this research focus on related conceptual theories, review existing models, and analyzing digital application of teaching and learning traditional craft. A proposed model also will be developed by concentrating on multimedia technology used as well as strategic learning using cognitive apprenticeship approach. A significant contribution in this research is providing development strategy to courseware designer and producing new learning approach that will motivate adult learners and enhance their skills learning process. ITSO6_T5_2
Mathematical knowledge Representation for Education semantic Web based on Learning style
Ili Farhana Md Mahtar, Nor Azan Haji Mat Zin The ontology language RDFS and OWL are widely used in education semantic web but are limited in their mathematical expressivity. To represent the mathematical knowledge while preserving the semantic, Open Mathematical Document (OMDoc) is used as an ontology language. OMDoc is a contentbased markup which focuses on representing the semantic of mathematical formulae instead of the formulae appearance. Previous researchers have demonstrated that learning style in education is effective in helping the learning process. In this research, we represent the mathematical knowledge using OMDoc format an create learning style ontology as a metadata. In metadata annotation, we use new metadata framework for OMDoc. By embedding learning style metadata, the formal semantic of metadata vocabularies is made available to OMDoc applications. We also transformed OMDoc files into HTML files.
ITSO6_T5_5
Evaluation of hiCORE: Multi-tiered holistic Islamic banking system based on user Acceptance Test
Halimah Badioze Zaman, Azlina Ahmad, Tengku Sembok, Sufian Idris, Azuraliza Abu Bakar, Zulaiha Ali Othman, Shahrul Azman Noah, Nazlia Omar, Salwani Abdullah, Sanep Ahmad, Azizah Jaafar, Noor Faezah Mohd Yatim, Wou Onn Choo
Holistic Islamic Banking System (HiCORE) is a virtual multi-tiered system adopting the Services Orientation Architecture (SOA) and parameter driven modules to create new Islamic banking products based on Syariah laws. Islamic banking or Islamic finance reflects banking or financial business that is not contradictory to the principles of Islamic law. This is statutorily mentioned in both the Islamic Banking Act 1983 and the Banking and Financial Institutions Act 1989. In Malaysia, for the creation of Islamic banking products, flexibility is given to practitioners, regulators and Syariah advisors to create and introduce unlimited Islamic banking products to support Islamic banking business. If in the conventional manner, banks may take at least six months for new Islamic products to be created, HiCORE can ensure the possibility of creating an Islamic product at less than a quarter of the time span taken or less (taking into consideration that all policies and processes needed to carry out the transactions are in place). HiCORE went through the normal evaluation process: unit testing, System Integration Test (SIT) and User Acceptance Test (UAT). This paper highlights the latter but unique to the testing of HiCORE, as the UAT is conducted by a Panel of Experts, represented by 15 members from the Islamic Banking industry in the country. Generally, results of the UAT conducted, indicated positive results by the panel of experts. However, there were some specific features and
52
ABSTRACTS
functionalities that needed improvement. In fact one of the features of the system on new product creation which allows users to see the Source of the Dalil (Al-Quran verses or Sunnah), Hukum dan the Syarat during new product creation makes HiCORE novel.
ITsO7_T1:
ITSO7_T1_1
ABSTRACTS
ITSO7_T1_5 ITSO7_T1_6
ITsO7_T4:
ITSO7_T4_1
Adoption of E-commerce in Malaysia and its Affect on the business Performance: An Organizational Perspective
Muhammad Jehangir Khan, P.D.D. Dominic, Naseebullah This paper reviews the elements on accessibility issues in e-learning for individual with visual impairment. With current approaches to accessibility are related to technical perspective, this paper examined the fundamental elements on technical accessibility. When physical characteristic of visual impairment affecting user task and ability, it is suggested that learning perspective should be defined by their ability and performance in task, rather than looking at technical accessibility only. The limitation in task and ability leads to accessibility issues in learning process for user with visual impairment. This paper proposed the accessibility requirement for user with visual impairment should be defined by combining both issues of technical and learning accessibility that based on user task and ability. Technical accessibility may relate to individual physical impairment, but learning accessibility should focus on user ability to perform task related to cognitive, perceptual and psychomotor. ITSO7_T4_2
A Preliminary study on the Implementation of Enterprise Resource Planning in Malaysian Private higher Institution-A Case study
Raja Mohd Tariqi Raja Lope Ahmad, Zalinda Othman, Muriati Mokhtar Institutions of Higher education are facing a challenging environment which demands an integration of business processes. Most institutions are facing reduced budgets, yet at the same time they have an increased need for technology and business services. They had experienced the rapid development of typical and complex technology over the past several years. Enterprise resource planning (ERP) is one particular type of business technology that is rapidly catching the attention of the institutions of higher education for the administrative and academic functions. This system is complex, expensive and usually requires changes in the organizational culture in order to be implemented successfully. The complexity and comprehensiveness of ERP systems encompasses virtually every aspect of what organizations do today. ERP systems support most industries including airlines, banking, hospitality, insurance, manufacturing, retail, telecommunications, utilities, public services and education. Beside its success and usefulness, the cost of implementing ERP is high. Without a solid history of successes and failures, implementers are at a disadvantage in knowing how best to implement ERP systems so that they will provide operational and strategic benefits to their owners. This makes the task of implementing these systems
54
ICT Dimension and Indicators towards building a knowledge society in Malaysia: A Measurement Model
Norsiah Abdul Hamid, Halimah Badioze Zaman This paper outlines the research conducted to test a measurement model of ICT in an attempt to develop a framework for Knowledge Society (KS) in the Malaysian context. In discussing the KS, one of the most important enabling aspects is ICT. ICT is a powerful driver for social change. The content domain for the ICT measure was developed based on the Delphi technique and semistructured interviews with experts, and previous literature on ICT. It was then empirically tested using a sample of 470 respondents from government officials, private sector personnel and NGOs. Five factors were extracted from the exploratory factor analysis based on 39 items proposed in
4th International Symposium on Information Technology
ABSTRACTS
even more challenging. Due to these problems, this research is carried out in order to examine the applicability of ERP in a Malaysian institution of higher education and to develop an implementation framework. In this preliminary study, one institution is being taken as a case study. The needs of this institution in implementing ERP and the problems faced by the institution are being documented. As a result, the findings will be used as a ground work for more intensive study throughout Malaysian Institutions.
ITSO7_T4_4
to Use. Using data from a survey to distance learning instructors (N=110), a path analysis revealed that perceived ease of use of the system had a significant impact on perceived usefulness suggested by TAM. In addition, this study confirmed that Perceived Ease of Use and Perceived Usefulness have positive effect on Behavioural Intention to Use.
ITSO7_T4_6
An evaluation of the usage of Web 2.0 among tertiary level students in Malaysia
Kamaluddeen Usman Danyaro, Rod De Lara, Jafreezal Jaafar Web 2.0 is increasingly becoming a tool of pedagogy that increases interactions between educators and learners. This leveraging power of Web 2.0 in academy allows students to share, collaborate or participate in developing scientific thinking or critical thinking skills. While, at the same time, increasing the rate of plagiarism, cyber-bullying, privacy abuse and other Internet problems. This research evaluated the patterns of Web 2.0 usage and academic behavior among students at tertiary institutions with a case study of KDU College students. The researchers collected data by administering a questionnaire to 92 students. Data were analyzed using histogram, frequency and charts. Authors used Deci and Ryans Self-Determination Theory (SDT) to assess academic behavior. We found that most of the students use social Websites for chatting, gaming and sharing contents. Students use Facebook, YouTube and Wikipedia for social interactions, downloading and remixing videos/audio, and research/assignments more often respectively. The choice of acknowledging students feeling and social activities was the adopted strategy for enhancing the students autonomy. It is also found that students feel competent during e-learning activities which lead to the observation in assigning students with work or research with proper feedback. We further found that students were having fun, during their social interaction. Further, there is a presence of independence due to the nature of their participation; students like to study alone. Implications for academic learning and interaction are discussed. Web 2.0 support traditional learning such as constructivism and also creates new learning methodologies like connectivism and collective intelligence. The cognitive development structures depend on the intrinsic behavior of students through dynamic expression and demographic features. Its very trivial to set up Web 2.0 services among tertiary level students, but the pedagogical and moral justification most be considered.
If Professors knew What They know: A Model for Capturing university Teachers Tacit knowledge of students supervision
Ibraheem M. Dooba, Alan G. Downe, Ahmad Kamil Mahmood Research indicates that conflict happens in graduate student and faculty supervisor relationships. Some of these conflicts are resolved through dialogue and arbitration. Others lead to termination of studentships and change of supervisor. Yet some faculty have conflict-free supervisory relationships with their students. In both cases the supervisors concerned hold distinct tacit knowledge about the strategies and techniques they used or would have used in resolving such problems. Significant as this knowledge may seem, paucity of research exists to capture the supervisory knowledge. To address this gap, we introduced a technique to capture facultys tacit knowledge on graduate students supervision. In doing so, we hope that the technique would benefit fellow supervisors and newly recruited faculty members to avoid supervisory breakdown and to minimize error.
ITSO7_T4_5
ITsO7_T5:
ITSO7_T5_1
A Conceptual Model for behavioral Intention to use 3g Mobile Multimedia services in Indonesia
Indrawati, Murali Raman, Kok-Wai Chew
The number of subscribers to 3G mobile multimedia services in Indonesia is still low, at 3% of the total population. Currently there are 7.5 million 3G subscribers, compared to the population of 238 million people in Indonesia. Hence, this potential huge market has yet to be 4th International Symposium on Information Technology
ABSTRACTS
Indonesia, a new conceptual model of behavioral intention to use 3G mobile multimedia services (MMS) in Indonesia is proposed. It is expected that customers behavioral intention to adopt 3G MMS in Indonesia are based on performance expectancy, effort expectancy, social influence, facilitating conditions, price of the services and devices, and content. These factors are expected to be moderated by age and gender. ITSO7_T5_2 such development is in understanding how the users behave and interact with the system. This paper presents a mental model for blind users to assist designers in developing better systems for blind computer users. An explanation on mental model as generally is presented. Related papers on mental model for blind user were reviewed to examine the strengths and weaknesses. Kurniawan and Sutcliffes work was chosen as a basis to investigate on mental model of blind users. This paper also provides a discussion on the implication of the proposed mental model to designers in designing system applications for the blinds. This includes the need to get domain experts involvement in the design phase of the mental model proposed. ITSO7_T5_5
A Learning system Platform or Automated Data Analysis: A Practical Application on historical solar Data
Yahya Tashtoush, O.A. Younis, M.H. Alomari This paper presents a computer platform for the automated analysis of associations among different solar events and activities. This computer tool enables the advanced learning by implementing many associations algorithms to analyze years of solar catalogues data and to study the associations among solar flares, eruptive filaments per prominences and Coronal Mass Ejections (CMEs). The aim is to combine all solar data catalogues in one dynamic space weather database that can be easily used in the analysis of solar activities and features. The computer tool identifies patterns of associations and provides numerical representations that can be used as inputs to the machine learning algorithms to provide computerized learning rules that can be developed in the future within the context of a real-time prediction system.
ITsO7_T6:
ITSO7_T6_1
ABSTRACTS
business and government agencies and becoming one of todays most widespread IT solutions for business procurement operations. However, not every firm has been successful in E-procurement implementation. A number of factors have been identified to hinder E-procurement implementation, especially within the context of Business to Business (B2B). This paper attempted to provide a comprehensive survey on existing literature with regards to this issue. Eventually, a proposed model is developed that consolidates all the relevant factors which have been categorized into organizational, technological and environmental perspective.
ITSO7_T6_2 ITSO7_T6_4
Electronic Land Administration system In Malaysia: A Proposed Review from ICT and Legal Perspectives
Nor Shahriza Abdul Karim, Zainal Abidin Nordin, Ainul Jaria Maidin, Mohd Shukri Ismail This paper illustrates the scenario of ICT application in land administration in Malaysia in support for effective and efficient administrative processes and development of land in the country. Land administration system, being heavily regulated through the provision of law, is seen as complicated and requires thorough analysis from both the ICT and legal perspectives, if the government were to move towards effective e-government services. A research is, therefore, proposed and preliminary works conducted to investigate the legal provisions and the existing ICT applications in land administration nationwide in order to provide solutions for the government to be better prepared for the future integrated electronic environment.
ITSO7_T6_5
Trailblazers and Laggards in Internet sophistication Among Rural society: Empirical Evidence from Malaysia
Mahendhiran Nair, Gil-Soo Han, Patricia Goon Studies have shown that more sophisticated internet users are able to reap better socioeconomic benefits from the internet in a knowledge economy. Using a sample of 1020 respondents from four diverse rural areas in Malaysia and the Ordinal Probit Model, this study examine the key determinants that impact internet sophistication among rural communities in Malaysia. The empirical analysis shows that the type of rural communities, ethnicity, education, type of occupation and language proficiency have significant effect on the internet sophistication level among rural communities in Malaysia. Based on the empirical results the trailblazers and laggards in internet use in these communities are identified. Key policies to enhance the level of internet sophistication among Malaysian rural society are discussed in the paper.
ITSO7_T6_3
Value co-creation: Embedding the value elements in critical success factor for e-government system Development
Cik Nora Salleh, Yazrina Yahya The success of electronic government initiative depends on many factors, among other is critical success factor (CSF). CSF refers to the limited number of areas in which satisfactory results will ensure successful competitive performance for the individual, department or organization [1]. It had been used significantly to present or identify a few key factors that organizations should focus on in order to be successful. CSF can be categorized into groups of factor such as human factors, technology, culture and infrastructure. Based on analysis conducted there are many CSF available to aid in the e-Government system development. However available CSF does not promote the value-in-use element as such current systems developed using the existing CSF are lacked in the value-in-use aspect. Value-in-use is the satisfaction of wants and needs provided by the direct consumption of goods and services [15]. Value in use should be contrasted with the similar phrase, value in exchange [15]. This research will indentify the CSF in terms of co-creation value between system provider and the customer. The Service Dominant Logic (S-D Logic) and co-creation value insights will be used to establish co-creation value CSFs and therefore it will aid the system development by ensuring the value-in-use is embedded in the system.
ITSO7_T6_6
ABSTRACTS
from university and library user perspectives. The second part focuses on plans to formulate a mash-up application methodology for using information mash-up editors to develop business mash-ups. This part has evolved during our work in creating experimental mash-ups at University Technology PETRONAS (UTP). Initially, the research considered a large number of candidate mash-up editors, two of which were selected. As the research progressed, the mash-up development methodology took shape in an incremental manner until it reached its final form. The work can hopefully be used to guide both researchers and Higher Education and library users in developing mash-ups.
ITsP1:
ITSP1_ 1
ABSTRACTS
depends on the critical risk elements category sets by users based on their assumption and experience working in the software projects. ITSP1_ 6
Architecture and uML Models of Mobile Learning Application for Course Content
Ahmad Sobri Hashim, Wan Fatimah Wan Ahmad, Rohiza Ahmad Mobile learning (M-learning) is getting famous as a method of giving learners study materials at anytime and anywhere. In providing at anytime and anywhere way of study, there are various architectures and Unified Modeling Languages (UML) models that have been introduced by the developers. This paper presents a study of the architectures and the UML models that are designed by the developers for m-learning applications. Other than that, this paper also proposes suitable architecture and UML models of m-learning application for course content. Several literatures studies have been done in order to get information regarding the architectures and UML models those have been used, and based on the studies, a suitable architecture and UML models for m-learning for course content was proposed.
ITSP1_ 7
system is comprised of two sections; first is the instructor section as the guardian of the story topic. The second is children section; the users who implement the topic of the story assigned by the instructor section. This prototype uses illustrated flashcards as a media to tell story. The illustrated flashcards consist of two design models: story topic design model and single scene design model. The prototype is developed on a web-based platform.
ITSP1_9
ABSTRACTS
ITSP1_11 model the entire reproductive tract and to find efficient algorithms for interactive deformation. ITSP1_14
Development of Multimedia Messaging service (MMs) -based Receipt system for Mobile banking
Mohd Hilmi Hasan, Aklili Khalid Mobile devices are becoming more important in daily lives and they also have gained increasing acceptance in banking services, for example Short Messaging Service (SMS)-based m-banking system. In this particular system, an SMS receipt will be delivered to users for any transactions done. Though we could gain many benefits out of it, SMS is considered as informal receipt for banking services which could not be used as reference in nowadays formal businesses or transactions. Therefore, this paper proposes a Multimedia Messaging Services (MMS)-based receipt system for m-banking that produces transaction receipt in PDF document and sends it to users via MMS.
ITSP1_12
60
ABSTRACTS
ENgINEERINg TEChNOLOgy ITsO1_T2: 15 JuNE 2010 (2.00 PM 4.00 PM) VENuE: 3-02
ITSO1_T2_1 ITSO1_T2_4
RNA secondary structure Prediction using Dynamic Programming Algorithm A Review and Proposed Work
Mohd Nizam Osman, Rosni Abdullah, NurAini Abd. Rashid Ribonucleic acid (RNA) plays fundamental and important role in cellular life forms and their function is directly related to their structure. RNA secondary structure prediction is a significant area of study for many scientists seeking insights into potential drug interactions or innovative new treatment methodologies. Predicting structure can overcome many issues related with physical structure determination and their study yields information useful in prediction of the full three dimensional structures and also in the interpretation of the biochemical abilities of the molecules. Therefore, predicting the secondary structure of RNA is very important for understanding their function. Furthermore secondary structures are discrete and therefore well suited for computational methods. In this paper we present a review on RNA secondary structure prediction using Dynamic Programming (DP) algorithm. An analysis of DP algorithm from previous work is discussed. We will present our proposed work for RNA secondary structure prediction using DP algorithm and special-purposed hardware of multicore and Graphical Processing Unit (GPU). We proposed to implement the DP algorithm approach on a hybrid of multicore and GPU platform to speed up the computational process of RNA secondary structure prediction.
ITSO1_T2_5
61
ABSTRACTS
ITSO1_T2_6 to automatically generate extraction pattern from a limited corpus and label the pre-defined entities in a collection of accident documents. Link Grammar parser and Stanford Part- of-Speech tagger are used in the pattern extractor to identify named entity and construct extraction pattern. The extraction pattern then feed to SemiSupervised NER to categorize the entities into some predefined categories. Performance is evaluated using Exact Match evaluation and tested on two different entities- DATE and LOCATION. Using only two features, the system shows promising result.
ITsO1_T6:
ITSO1_T6_1
Multiple beams switching Double square Loop Antenna for uWb systems
Arun Raaza, Pallawi, Animesh Rana, Gopal. S. Joshi, Amit Mehta A novel method of producing multiple axial and tilted beams using eight feed double square loop (DSL) antenna is proposed. With varying permittivity value of dielectric substrate, the DSL antenna produces multiple beams and steer each of the beam produced at step of 45 throughout the 360 of space, thus offering wide range of option for any modern wireless device integrated with this antenna to focus the beam in target direction. Also the antenna operates in four different frequencies providing multi-channel operation in UWB region.
ITSO1_T6_3
On-Demand flexible Tiered Qos scheduling Algorithm for IEEE 802.16j Multi-hop Relay Networks
Anas F. Bayan, Tat-Chee Wan WiMAX is a wireless technology that provides broadband access for services having different QoS requirements and different traffic priorities. Since the QoS demands of different traffic flows vary, it is the responsibility of the medium access control (MAC) layer to schedule the traffic flows and allocate bandwidth such that the QoS requirements of each flow is satisfied. This scenario is even more complex when multihop relays are introduced into the network. Nonetheless, the IEEE 802.16j standard does not specify any QoS architectures or scheduling mechanisms. In this paper, we propose an OnDemand Flexible Tiered (ODFT) QoS scheduling algorithm for WiMAX Multi-hop Relay networks to guarantee the QoS demands of various applications by utilizing QoS tiers for the relay network. The ODFT (1) classifies the user requests from various wireless zones based on the zone ID and service flow types, (2) calculate the QoS weights of the service flows, (3) schedule service flows based on the calculated weights, and (4) allocate suitable bandwidth for each service flow type.
An Efficient Energy Two Mode Error Correction Technique in underwater Wireless sensor Network
Ammar Babiker, Mohamed Nordin Zakaria Research in underwater acoustic networks has developed quickly to support large variety of applications such as mining equipment and environmental monitoring. As in terrestrial sensor networks; reliable data transport is demanded in underwater sensor networks. The energy efficiency of error correction techniques should be considered because of the severe energy constraints of underwater wireless sensor networks. FEC and ARQ are the two main error correction techniques in underwater networks. In this paper, a mathematical energy
4th International Symposium on Information Technology 62
ABSTRACTS
ITSO1_T6_5 ITSO1_T6_6
ITsO2_T2:
ITSO2_T2_1
Optimizing Machine utilization in semiconductor Assembly Industry using Constraint-Chromosome genetic Algorithms
Umi Kalsom Yusof, Safaai Deris
Semiconductor manufacturing is always aiming for an accurate capacity planning that able to optimize the utilization of the resources especially in machine loading problem. There are two main approaches being studied to solve the problem: linear programming-based and bio-inspired approaches. Recently more studies are focusing on bioinspired approaches; where amongst them; genetic algorithm (GA) is being the most popular one. We propose a constraint-chromosome (CCGA) to solve this problem by applying the workable chromosome representation to the domain problem. The approach developed helps avoid getting trapped at local minima and able to search for more solutions. The method is chosen to allow the running of GA in original form as well as to ensure the computation is straight forward and simple. The objective of the algorithm is to optimize the utilization of the machines that leads to increase the company overall profit. It has been found that the proposed CCGA is able to propose good solution to the problem. ITSO2_T2_2
VANET security framework for Trusted grouping using TPM hardware: group formation and Message Dissemination
Asif Wagan, Bilal Mughal, Halabi Hasbullah Vehicular ad hoc network (VANET) has attracted much attention from academia and industries in recent years. Security remain are major concern for VANET application due innate time constraints. Researchers have proposed a number of solutions for different aspect of security i.e. authentication, privacy, non-repudiation etc. Some of solution based on group formation concept but most of these solution work under the simple assumption of an existent group formation method. Furthermore role of group leader is expected to be
4th International Symposium on Information Technology 63
ABSTRACTS
ITSO2_T2_4 in identity providers and service providers, and trustworthiness of subject, identity providers and service providers are active concerns in federated identity management systems. In addition, we had explored trusted computing technology, which covers Trusted Platform Module security features such as Trusted Platform Module Identity, Integrity Measurement and Key certification as well as Trusted Network Connect. In this paper, we presented conceptual threat model for inter-domain web single sign-on in federate identity management system. For this, we set identity theft, misused of identity information, and trust relationship scenarios and in the end, we discussed how trusted computing technology use can effectively resolve identity theft, misused of identity information, and trust relationship concerns in federated identity management system.
A study on Threat Model for federated Identities in federated Identity Management system
Zubair Ahmad Khattak, Suziah Sulaiman, Jamalul-Lail Ab Manan
Federated Identity Management (FIM) based on standards allows and facilitates participating federated organizations to share users identity attributes, facilitate authentication and grant or deny service access requests. Using single sign-on facility users authenticates only once to home identity provider and logged into access successive service providing service providers within federation. Users identity theft, misused of user identity information via single sign-on facility
ITsO2_T6:
ITSO2_T6_1
Intelligent Interpretation and Analysis of Child sexual Abuse forensic Evidence: A Preliminary study
Noor Maizura Mohamad Noor, Salwana Mohamad @ Asmara In sexual abuse case, the victims body is the most important source of physical evidence. Meanwhile, medical personnel play a role as part of the police investigation in forensic examination. Forensic evidence in sexual assault will be collected because of intimate nature of this evidence and different special expertises are needed to conduct a detail examination. Therefore, in child sexual abuse cases, uncertainties regarding of various context in decision making can lead to failure of successful investigation. Various types of evidence data need to be analyzed and interpreted to come out a reliable and precise report. Thus, this paper present a preliminary study of this topic in order to gain a solution of decision making in child sexual abuse forensic field through intelligent decision support system.
ITSO2_T6_2
An Integrated DNA Decision support system using grid Environment for Crime Investigation
Noor Maizura Mohamad Noor, Md Yazid Mohd Saman, Ahmad Faiz Ghazali, Zafarina Zainuddin Decision support system (DSS) has been applied in a wide range of computer applications that commonly manipulate information in variety fields. This is including computer-based systems that are being used in handling data in order to achieve an optimization for decision-making in crime investigation. Deoxyribonucleic acid (DNA) profile analysis using computer programming is not a new research in biology and information technology. Projects have been done in developed countries and around the world to develop software tools to analyze DNA data. The main purpose for this research is to design a new architecture of integrated system in handling DNA profile match for identifying possible criminal and convicted offenders. Furthermore, a new visual forensic DNA analysis tool will be developed to help criminal investigators to analyze DNA data and DNA profile. Finally, the proposed architecture and software tool will be evaluated. The need of a high performance computing in a time-critical situation presents a challenge to grid environment
ITSO2_T6_4
64
ABSTRACTS
second GUI, the dynamic one, where the users are able to enter their desired values in order to run the simulation. The values entered represent the number of agents and documents that is available at certain time. The purpose of having these values is to see whether the interaction protocol specified for these goal: to automate the document downloading and notifying in the e-learning system is capable of handling diverse complexity of environments. In addition, this paper also describes a formal approach to validate the protocol, that is model checking.
ITsO2_T7:
ITSO2_T7_1
The survival of Communications In Ad hoc And M2M Networks: The fundamentals Design of Architecture And Radio Technologies used for Low-Power Communication NOMOhI Devices
Juan Jose Martinez Castillo
Always under a Telecommunication view, in this paper will be show an introduction to the need to develop survival strategies in sensor networks and machine to machine (M2M), later, a descriptions of the NOMOHI architecture (Node, Mobile, Hybrid, Intelligent), able to use a cooperative control system based on Fuzzy Neural Network and other strategies of artificial intelligence; then, a descriptive studio of the different communication techniques that could be used to develop the system Management for the operations and survival functions in such networks; finally the conclusions and the lines of investigation should be followed to support the development of this technology.
65
ABSTRACTS
ITsO3_T2:
ITSO3_T2_1
ITsO3_T6:
ITSO3_T6_1
Ontology of Programming Resources for semantic searching of Programming Related Materials on the Web
Siti Noradlina Mat Using, Rohiza Ahmad, Shakirah Mohd Taib
This paper discusses about the development of ontology for semantic searching of programming related materials on the Web. As today, more and more businesses as well as organizations have become computerized, thus programming or system development knowledge is becoming an added advantage for job seekers to have. However, teaching and learning programming has always been a challenge. Since
ABSTRACTS
programming need more practical aptitude rather than theoretical, classroom learning is not enough to groom good programmers. Hence, supplementary materials would need to be explored by students and one common source of these materials is the Internet. However, looking for suitable materials among the abundance information on the Internet is not that easy especially to novice users. Therefore, this research explores the concept of Semantic Web in assisting user search. In this research, ontology will be developed along with a website to help students and lecturers to find online information and materials related to programming.
ITsO4_T2:
ITSO4_T2_1
sIDIf: Location based Technique as a Determinant of Effectiveness and Efficiency in Artificial Reefs Development Project
W. Aezwani W. A. Bakar, Zailani Mohamed Sidek, Mustafa Man, Mohammad Zaidi Zakaria
Evaluation for effectiveness and efficiency of artificial reefs (AR) development is quite difficult and troublesome. This is because of high cost incurred. As for common practice, evaluation process is done by special diving task force unit to conduct diving activity to observe on how AR has developed. The paper presents framework architecture to integrate location coordinate data (longitude and latitude) of AR with the fish catches data at all identified jetty. In SIDIF, the data of fish catches will be mapped with data on location coordinate of AR as a whole via mapping and integration of these two (2) different databases. Using this methodology, the effectiveness and efficiency of AR development will be achieved as well as the evaluation will be measured. ITSO4_T2_2
Optimal Parameters of Interline Power flow Controller using Particle swarm Optimization
Khalid Haroun Mohamed Abdelgadir, K S Rama Rao, Khairul Nisak Md Hasan In this paper, optimal parameters of interline power flow controller using particle swarm optimization is presented. Basic and inertia weight approach particle swarm optimization techniques are applied to optimal power flow control in an electrical power system. Based on the steady state model, the sizing of the controller in the network is formulated as an optimization problem to minimize the transmission line loss in the network. The power flow control constraints due to the use of interline power flow controller are included in optimal power flow problem in addition to the normal conventional constraints. Simulations results are obtained on standard IEEE 30-bus system to minimizing the transmission line losses and optimal parameters of the controller are derived.
Dynamic service Placement and Redundancy to Ensure service Availability During Resource failures
Boon Yaik Ooi, Huah Yong Chan, Yu-N Cheah Service placement algorithms have been introduced to automatically manage services in distributed environments. However, most of these algorithms aim to improve service performance or to reduce operation cost and do not consider the reliability and availability of their resources. Most of them do not consider events when machines in their resource pool malfunction. These malfunctioned machines could cause services to halt or, worse, to produce transient and intermittent
4th International Symposium on Information Technology 67
ABSTRACTS
ITSO4_T2_6 came into picture, with the advent of this not of the efficiency but also the factors like stability, reliability, resource utilization were also of pivotal importance. This paper reviews a critical and comparative analysis of the current ESBs keeping in view the C4I System as a base, so as to ascertain which ESB fulfills the requirements of the system of systems. In comparison we try to analyze Mule ESB, GlassFish ESB and Fuse ESB with respect to interoperability. This study demonstrates that Mule is more feasible to C4I systems because it is simple, easy to integrate, no adopter requirement and flexible.
ITsO4_T6:
ITSO4_T6_1
Average Late Acceptance Randomized Descent Algorithm for solving Course Timetabling Problems
Anmar Abuhamdah, Masri Ayob This work proposes an average late acceptance randomized descent algorithm (ALARD) to solve university course timetabling problems. The aim of this work is to produce an effective algorithm for assigning a set of courses (events) and students to a specific number of rooms and timeslots, subject to a set of constraints. The idea is based on the late acceptance strategy in hill climbing (LAHC). ALARD differs from the
4th International Symposium on Information Technology 68
ABSTRACTS
burst, as well as to minimize operational cost. The NORSOK CO2 corrosion rate model is used as a basic reference model and the devices that will measure the value of pressure and temperature is wireless sensor. Simulation will be developed to see the performance of the model.
ITSO4_T6_6 has created new difficulties to internet users about retrieving the latest, relevant and excellent web information. This is due to the enormous contents of web information that have caused problems in the restructuring of web information. Thus, in order to ensure the latest, quality and relevant web information is optimally retrievable, it is necessary to undertake the task of web document classification. This paper discusses the result of classifying web document using the extraction and machine learning techniques. Four types of kernels namely the Radial Basis Function (RBF), linear, polynomial and sigmoid are applied to test the accuracy of the classification. The results show that the accuracy percentage of web document classification will increase whenever more web document is used. The results also show that linear kernel technique is the best in web document classification compared to RBF, polynomial and sigmoid.
ITsO4_T7:
ITSO4_T7_1
Decreasing Packet Loss for Qos sensitive IP Traffic in Diffserv Enabled Network using MPLs TE
Muhammad Tanvir, Abas M. Said More telecommunication services are using Internet as single network for voice, video and data transmission. Quality of Service guarantee is necessary for such transmission over the internet backbone. Internet is not a simple best-effort network only for web traffic anymore. It is generally understood that present internet best-effort infrastructure is not sufficient to provide QoS-guaranteed services. DiffServ is developed to classify internet traffic into different classes, where each class has predefined QoS parameters. DiffServ can be deployed to ensure QoS, but it is unable deliver QoS guarantees for the network as whole. Using MPLS Traffic Engineer we can have the dynamic overview of network resources and so we can route the traffic in the whole network satisfying QoS needs for each
69
ABSTRACTS
traffic class, like voice, video, real time etc. In this paper we have demonstrated the usefulness of applying DiffServ and MPLS TE in the network to reduce packet drops for drop sensitive applications keeping the network resources utilization optimized. After application of MPLS TE in a DiffServ enabled network IP backbone we have significantly reduced packet loss.
ITSO4_T7_5
capacity as part of its decision making. The result shows that DACS3 has achieve a better solution for most of the datasets. Applying elitist concept, rearrangement of candidate selection and vehicle capacity as part of its decision making can influence its achievement to reach an optimal distance.
ITSO4_T7_6
ITsO5_T2:
ITSO5_T2_1
A Novel Maxmin Definition to Achieve an Optimum fairness in scheduling Packets over the Internet
Yaser Miaji, Suhaidi Hassan In this paper we analytically propose an alternative approach to achieve better fairness in scheduling mechanisms which could provide better quality of service particularly for real time applications. Our proposal opposes the allocation of the bandwidth which adopted by all previous scheduling mechanisms. It rather adopts the opposition approach by proposing the notion of Maxmin-charge which fairly distributes the congestion. Furthermore, analytical proposition of novel mechanism named as Just Queueing is been demonstrated.
ITSO5_T2_4
ABSTRACTS
This method is based on the extreme value theory. We simulated external and collected internal network traffic traces. We found that GPD models these two types of traffic correctly and with clear differences between them. New measures and metrics can be defined out of the GPD modeling to be included in the service level agreement between provider and users. This will have the impact of enhancing in the expected quality of service, especially for mission critical applications.
ITSO5_T2_5
and test cases are presented to confirm and support the power optimization algorithm using frequency scaling and processor affinity with the optimum configuration.
ITSO5_T2_6
Numerical Technique for Robot Path Planning using four Point-Eg Iterative Method
Azali Saudi, Jumat Sulaiman
Path planning is an important issue as it allows a robot to get from start point to goal point. In this work, we attempt to solve robot path planning problem iteratively using numerical technique. It is based on the use of Laplaces Equation to compute potential function in the configuration space of a mobile robot. This paper proposed a block iterative method known as 4 Point-EG for solving robot path planning problem. By employing a finite-difference technique, the experiment shows that it able to generate smooth path between the start and goal points. Furthermore, the simulation results show that 4 PointEG performs faster than the previous method in generating path for mobile robot motion.
ITsO5_T6:
ITSO5_T6_1
semantic based features selection and Weighting Method for Text Classification
Aurangzeb Khan, Baharum Baharudin, Khairullah Khan (UTP) Feature selection and weighting is of vital concern in text classification process which improves the efficiency and accuracy of text classifier. Vector Space Model is used to represent the documents using Bag of Word BOW model with term weighting phenomena. Documents representation through this model has some limitations that are, ignoring term dependencies, structure and ordering of the terms in documents. To overcome this problem, Semantics Base Feature Vector using Part of Speech (POS), is proposed, which is used to extract the concept of terms using WordNet, co-occurring and associated terms. The proposed method is applied on small documents dataset which shows that this method outperforms then term frequency/ inverse document frequency (TF-IDF) with BOW feature selection method for text classification.
Indexing Protein sequence/ structure Databases using Decision Tree: A Preliminary study
Khalid Jaber, Rosni Abdullah and NurAini Abdul Rashid Currently, the size of biological databases has increased significantly with the growing number of users and the rate of queries where some databases are of terabyte size. Hence, there is an increasing need to access databases at the fastest possible rate. Where biologists are concerned, the need is more of a means to fast, scalable and accuracy searching in biological databases. This may seem to be a simple task, given the speed of current available gigabytes processors. However, this is far from
71
ABSTRACTS
ITSO5_T6_4
agents based on fuzzy logic. Likewise its predecessors, this paper will take agent negotiation to another height making it more efficient and effective. By efficient and effective, we mean the use of fuzzy logic which allows dealing with ambiguity and the natural approximation of common sense reasoning. To achieve this objective we customized our reasoning model in a way that all the negotiation process follows a unique protocol based on fuzzy logic.
ITSO5_T6_6
ITsO6_T2:
ITSO6_T2_1
72
ABSTRACTS
ITSO6_T2_3 ITSO6_T2_4
Evaluating Neural Network Intrusion Detection Approaches using Analytic hierarchy Process
Iftikhar Ahmad, Azween Abdullah, Abdullah S Alghamdi At present age, security in computer and network systems is a pressing concern because a solo attack may cause an immense destruction in computer and network systems. Various intrusion detection approaches be present to resolve this serious issue but the dilemma is which one is more appropriate in the field of intrusion. Therefore, in this paper, we evaluated and compared different neural network (NN) approaches to intrusion detection. This work describes the concepts, tool and methodology being used for assay of different NN intrusion detection approaches using Analytic Hierarchy Process (AHP). Further, conclusion on results is made and direction for future works is presented. The outcome of this work may help and guide the security implementers in two possible ways, either by using the results directly obtained in this paper or by extracting the results using similar mechanism but on different intrusion detection systems or approaches.
ITsO6_T6:
ITSO6_T6_1
ABSTRACTS
ITSO6_T6_4 quality for the merged sensor information. One essential requirement for any kind of scheduling scheme is a synchronised time base in the entire network topology. In order to define capable measurement schemes for any kind of available sensor node hardware, lightweight synchronisation concepts are necessary. In this paper we present a scheduling concept for distributed, resource-limited sensor networks based on a capable time synchronisation approach. The concepts operate on the application layer and enable application-specific, energy-efficient sensor measurement schemes. For proof of concept, the approaches were implemented on a sensor node hardware platform. Several test scenarios evaluate the feasibility and clarify an excellent usability in wireless sensor network environments.
ITsO6_T7:
ITSO6_T7_1
using Change Tracking Component to Manage Object-Oriented Driven user Interface Layout Management system
Liang Ying Oh, Tong Ming Lim
User Interfaces (UI) layout design is one of the most important part of any software requirement activities. User interfaces (UI) emerged as an essential accomplice in fulfilling the potential of an application. Layout design of UI screens has always been very expensive and time consuming activities. However, owing to the ad-hoc nature of UI design process coupled with user involvement throughout the process have inevitably surfaced in the UI construction and management phases. This includes the amount of effort involved in fulfilling multiple user requirements which in turn lead to the generation of a large number of screen layout designs with numerous similarities among them. Taking into considerations on the amount of effort required in maintaining masses of UI layouts with plentiful commonalities, this paper focuses on the integration of an object-oriented approach towards UI layout design along with an evolution tracking system to address the issues projected. Cases were used at the end of this paper to evaluate the effectiveness and accomplishments of the proposed approach so that future research work could be planned.
ITsO7_T2:
ITSO7_T2_1
Incorporation of Multimedia Approaches to Literature Online via E-learning for foundation Level Literature Courses: The Case of a Private Institution of higher Learning in Malaysia
Nur Athirah Radzi, Subarna Sivapalan, Wan Fatimah Wan Ahmad, Azrai Hj Abdullah Literature Online via E-learning (L.O.V.E.) is a web portal
4th International Symposium on Information Technology
ABSTRACTS
to provide them with an interactive way of learning English literature by incorporating multimedia features together with the syllabus. For this project; modified waterfall model has been used as a methodology of the L.O.V.E. portal; with 5 steps of requirement analysis, design, implementation, testing and maintenance. The major areas of focus in the methodology are the analysis and product development (implementation); since the result of the final product will be reflected from what had been worked on these two phases. A survey had been done in the UTP campus to identify problems of the original method, and find better solutions to students in the future. The completed portal will contain lecture materials, students forum, lecturers teaching video, clips of drama scenes, and quizzes. It would stimulate an improvement in learning literature that had been considered as the boring subject if there is an online, multimedia application created for the benefit of learning English literature. L.O.V.E portal would benefit the students in term of the way they learn and interact with each other on the literature subject, apart from learning the theoretical aspects in the classroom. It would allow them to express their thoughts and feelings in a different way, thus maximizing potential and possibilities of excelling in literature in English.
ITSO7_T2_2
The ultimate objective of this work is to determine the net result of the optimal path selection when the all these parameters are combined together as logical unit. We want to determine whether and how paths are selected and what changes take place with the mobility of the nodes. Finally the results show that our approach of selecting the optimal path proves better in terms of data delivery from a given sender to the receiver.
ITSO7_T2_4
The Importance of TALIb sysTEM using Computer Controlled for Visual Impaired Community
Muhamad Lazim Talib, Norshahriah Wahab, Muslihah Wook This paper presents the advantages and importance of the information technology to the visual impaired community to transform the knowledge from normal text document to the Braille document. Based on the architecture of modified manual brailler controlled via computer, all normal text documents will be translated to Braille printed documents are will be discussed in this paper. The algorithm designed named Translating alphabet in Braille (TALIB) will conduct all translation process for this platform. The result is the use of Perkins Brailler to join with computer to emboss the Braille document easily through electronic part.
ITSO7_T2_5
Developing a simulation game to facilitate the Acquisition and Transfer of Road safety knowledge
Mazeyanti Ariffin, Alan G. Downe, Irzan Ashraf Abd Aziz Concern over the risk of fatality and injury among children has focused attention on resources for effecting the transfer of safety knowledge. This paper reports on the development of a simulation game, RoadsTrain, designed to transfer knowledge about safe pedestrian behaviour to school children aged 7 to 12. The paper compares current modes of safety learning to game-based approaches and identifies areas for future research and innovation.
ITSO7_T2_3
forecasting Method selection using ANOVA and Duncan Multiple Range Tests on Time series Dataset
Adhistya Erna Permanasari, Dayang Rohaya Awang Rambli, P. Dhanapal Durai Dominic Selection of a suitable forecasting technique is of prime importance in order to obtain a better prediction result. This paper demonstrated the use of two statistical approaches namely, Analysis of Variance (ANOVA) and Duncan multiple range tests for determining the performance of different forecasting methods. Three forecasting methods were chosen and compared: regression, decomposition, and ARIMA. Data from monthly incidence of Salmonellosis in US from 1993 to 2006 was collected and used for technical analysis. ANOVA was initially used to identify significant difference between the actual data and three forecasting methods. Based on the results from ANOVA, selection of appropriate method was conducted using Duncan multiple range tests. The results showed that both regression and ARIMA could be used in the Salmonellosis data. On the contrary, decomposition method yielded the least performance and is not suitable for being applied on the available dataset.
ITSO7_T2_6
75
ABSTRACTS
resources as much as the long Data packets. Moreover, generating acknowledgement for each data packet reduces TCP throughput. The main factor affecting the TCP performance in multi-hop wireless networks is the contention and collision between ACK and data packets caused ACKs using the delayed acknowledgment option defined in IETF RFC 1122 will improve TCP throughout. On the other hand, the large cumulative ACKs will induce packet loss. Motivated by this understanding, we propose an adaptive delay ACK algorithm for our strategy can improve TCP throughput up to 233% compared to the regular TCP.
ITsO7_T7:
ITSO7_T7_1
Network Analyzer Development Comparison with Independent Data and benchmark Products: Network Traffic utilization
Mohd Nazri Ismail, Abdullah Mohd Zin This paper presents a complete network analyzer development for heterogeneous services in campus environment. The purpose of this study is to define the accuracy of network analyzer development with independent data, real network and OPNET simulation tool. This network analyzer software will test based on traffic and utilization performance. The reliability of this network analyzer will test with web service. The results show that network analyzer software has accuracy and same trend with independent data, real network and OPNET simulation tool. Finally, this software is able to measure the network resources during preparation, proposal and planning phases.
ITSO7_T7_2
briefly Introduced and Comparatively Analysed: Agile sD, Component-based sE, Aspect-Oriented sD and Mashups
Ali Seyfi, Ahmed Patel
This paper compares Agile Methods, Component- Based SE, AspectOriented SD, and Mashups as the latest four software development methods. These different approaches depend very heavily on the application domain. The comparison accordingly gives a brief review of these four methodologies, taking their definition, characteristics, advantages and disadvantages into consideration and generating a conceptual mind-map and preparing the foundation to assist in formulating and designing a new integrated software development approach and supportive techniques. It is a basis to initiate new research in the software engineering subject field
ABSTRACTS
ITsP2:
ITSP2_ 1
statistical Analysis for the key Representation Database and the Original Database
Asim Elshiekh, P. D. D. Dominic A statistical database (SDB) is a database that allows its users to retrieve aggregate statistics (such as sum, average, count, etc) on subsets of records, and data in individual records should be remained secret. The key representation auditing scheme (KR AS) is proposed to protect the privacy of online and dynamic SDBs. The core idea is to convert the original database into key representation database (KRDB), also this scheme involves converting each new user query from string representation into key representation query (KRQ), and stores it in the Audit Query table (AQ table). Three audit stages are proposed to repel the attacks of the snooper to the confidentiality of the individuals. In this paper, we provide statistical analysis to compare between the means and variances of the original database and the KRDB populations. We test the null hypothesis, that there will be no significant difference between the two populations means/variances, against the alternative hypothesis, that there will be a significant difference between the two populations means/variances. The results of the tests showed that the differences are statistically significant.
ITSP2_ 2
Enhanced Performance of Packet Transmission using system Model Over VoIP Network
Kashif Nisar, Abas Md Said, Halabi Hasbullah Transmission of multimedia data in Voice over Internet Protocol (VoIP) network is challenging. The issues of packet loss, delay, jitter etc highly degrades the performance VoIP network. They require more robust techniques to provide a better level of service quality. One of the crucial parameter to measure its service quality is packet loss. In this paper, we have analyzed the impact of packet loss in VoIP that can corrupt the voice application. The objective of this paper is to analyze the impact of packet loss and identify proper codec techniques for VoIP traffic. We have used a packet analyzer tool (wireshark) to analyze the voice traffic. We have come to the conclusion that wireshark can serve as an effective tool for packet loss analysis. It helps us in identifying proper Codec technique that should be used for enhanced performance in VoIP network.
A comparison of feed-forward backpropagation and radial basis artificial neural networks: A Monte Carlo study
Osman Ahmed Abdalla, M. Nordin Zakaria, Suziah Sulaiman, Wan Fatimah Wan Ahmad Interest in soft computing techniques, such as artificial neural networks (ANN) is growing rapidly. Feed-forward backpropagation and radial basis ANN are the most often used applications in this regard. They have been utilized to solve a number of real problems, although they gained a wide use,
4th International Symposium on Information Technology 77
ABSTRACTS
ITSP2_6
demand for automated human identification include finger, face, hand, iris, and other identifiers. Therefore, this paper reviews the system based on finger vein leads towards authentication of an individual. This system capture image of finger vein by shining a near-infrared light, then some image processing is done on vein image and finally trained Back propagation Neural Network (BPN) verify whether the person is authorized.
ITSP2_9
Climate control and Monitoring with Wireless sensor Network: A Case study
Asfandyar Khan, Azween Abdullah, Nurul Hasan Climate control and monitoring is one of the promising area of wireless sensor networks. This paper describes the development of a system for controlling different climate control variables. Several measurement points are required to trace down the local climate parameters to make the system work properly. In this paper we have consider different control variables, which are air temperature, CO2 concentration, soil temperature, light intensity, air humidity and crop temperature. The system are able to stored both event based data and automatic data. LabVIEW software is used for the development of this system.
ITSP2_10
A New framework to Extract WordNet Lexicographer files for semi-formal Notation: A Preliminary study
Noor Maizura Mohamad Noor, Noraida Ali, Noor Syakirah Ibrahim Despite its original use, which was very different, WordNet is used and used today as ontology. WordNet has a complex concepts concerning specific knowledge on semantic domain. The main objective is to analyze and recognize the most suitable and easier method for extracting WordNet lexicographer files which is very useful in developing the propose framework. In this paper, we describe the methodologies of this research. They are information binding, WordNet forensic, case analysis and method analysis. Some benefits are expected from this study are the development of framework for extracting WordNet lexicographer files for semi-formal notation, the development of middleware for extracting WordNet lexicographer files, the creation of own database for storing extracted lexicographer files from WordNet. The proposed framework will make WordNet efficiently exploitable in several applications.
ITSP2_11
Development of a Manufacturing Industry success Rate Analyzer using Data Mining Technique
Eliza Mazmee Mazlan, Rohiza Ahmad, Rozana Kasbon Starting up new businesses can be resource consuming. There are risks involved whenever new businesses are to be set up. This paper presents the development of a success rate analyzer to calculate the successful rate of setting up new manufacturing businesses particularly in Perak, Malaysia. Demographic data of Perak population is used and the data undergoes data mining process using the clustering technique and linear regression
a conference of World Engineering, Science & Technology Congress
ABSTRACTS
methods in analyzing the success rate of a manufacturing industry in Perak. With the result given by the application, new entrepreneurs can decide suitable location/district to set up the manufacturing business.
ITSP2_ 12
the inconsistent requirements detection is helps stakeholders and requirements analysts improve their effort in requirements conflicts detection, 2) to improve the understanding of what inconsistent requirements are detected during elicitation helps stakeholders improve the awareness of requirements conflicts.
ITSP2_14
using Multi-Coordinated Views with Agent Communication Protocol to Detect and Resolve Inconsistent Requirements to Improve Accuracy
Tan Lai Heng, Lim Tong Ming (Sunway University College) There are few challenges with eliciting requirements from stakeholders. Firstly, inconsistent requirements are usually not realized by stakeholders at the point of requirement specification compilation. Secondly, existing inconsistency checking techniques are usually mathematically or formally validated in a non-collaborative environment which is less practical and not productive for multiple stakeholders. In this research, a proposed requirements conflict detection and resolution solution is provided. The requirements from multiple stakeholders are captured as views on the functional requirements of a business domain using a proposed Semi-formal Ontology Driven Domain-Specific Requirements Specification Language. The proposed language will capture other relevant requirements includes domain, actors, relationships, processes, condition, and data fields to enable consistency checking. The proposed solution enables proper consistency checking in two ways: 1) Inter-Check (check within captured ontology), and 2) IntraCheck (check among stakeholders views) so that stakeholders can resolve detected conflicts collaboratively through Agent Communication Protocol. Lab test will be conducted with a selected group of novice users to measure the learning curve (hours) for adopting the proposed solution as well as the accuracy and the consistency. A few set of requirements will be given to the group of selected users and a prototype for proposed solution will be produced. The values of this research are: 1) to improve the understanding of how much accuracy
4th International Symposium on Information Technology
Conceptual Architecture Design and Configuration of Thin Client system for schools in Malaysia: A Pilot Project
Abdul Rahman Ahlan, Yusri Arshad, Murni Mahmud Thin client systems have advanced recently with new innovative design extensions such as virtualisation and cloud computing. Client-server architecture is the basis for thin client system to connect remote multi-workstations to administrative servers located in headquarters or data center. This paper first presents a literature review on thin client concept and virtualization. In the next section, we describe the Wyse Technology and Linux thin client for windows-based and open source solution respectively. We then proceed with description of proposed conceptual architecture design and implementation for primary and secondary schools in Malaysia taking into account International Telecommunication Union and other International standards or benchmarks for high quality of service (QoS) delivery. Finally, our recommendation is that each system design and implementation is unique and thus requires different sets of decision-making criteria before designing an architecture. Networked-schools across a country like Malaysia with heavy users requirements pose high specification in architecture and system design planning to IT divisions.
79
ABSTRACTS
ITSP2_ 16 ITSP2_17
sOfTWARE DEVELOPMENT & APPLICATION ITsO1_T3: 15 JuNE 2010 (2.00 PM 4.00 PM) VENuE: 3-03
ITSO1_T3_1
Issues with flexibility: A Reason for not using Online Reservation systems
Arif Mushtaq, Suziah Sulaiman, Jrn Loviscach
In the discipline of systems engineering, the flexibilityof a system is considered its ability to respond to change. However, Transaction Processing Systems (TPS) are left to be inflexible up to a certain extent to avoid non-standard operations. This leads to the dilemma that incorporation of more Functional Requirements (FR) into TPS could cause systems to become more inflexible, which in turn could affect the usage of, for instance, online airline reservation systems. We conducted a survey in order to examine the physiological, cognitive, social experiences and perceptions of a selected group of people who have booked their tickets either through travel agents or through online reservation systems. The findings indicate that flexibility has a significant impact on the perceived usability of online reservation systems, much more than functional requirements. ITSO1_T3_2
computation. At the same time, it also reduces some iteration that is involved in LUC Cryptosystem computation.
ITS_O1_T3_3
Establishing A Defect Prediction Model using A Combination of Product Metrics As Predictors Via six sigma Methodology
Muhammad Dhiauddin Mohamed Suffian, Mohamed Redzuan Abdullah
Defect prediction is an important aspect of the Product Development Life Cycle. The rationale in knowing predicted number of functional defects earlier on in the lifecycle, rather than to just find as many defects as possible during testing phase is to determine when to stop testing and ensure all the in-phase defects have been found in-phase before a product is delivered to the intended end user. It also ensures that wider test coverage is put in place to discover the predicted defects. This research is aimed to achieve zero known post release defects of the software delivered to the end user by MIMOS Berhad. To achieve the target, the research effort focuses on establishing a test defect prediction model using Design for Six Sigma methodology in a controlled environment where all the factors contributing to the defects of the product is within MIMOS Berhad. It identifies the requirements for the prediction model and how the model can benefit them. It also outlines the possible predictors associated with defect discovery in the testing phase. Analysis of the repeatability and capability of test engineers in finding defects are demonstrated. This research also describes the process of identifying characteristics of data that need to be collected and how to obtain them. Relationship of customer needs with the technical requirements of the proposed model is then clearly analyzed and explained. Finally, the proposed test defect prediction model is demonstrated via multiple regression analysis. This is achieved by incorporating testing metrics and development-related metrics as the predictors. The achievement of the whole research effort
ABSTRACTS
is described at the end of this study together with challenges faced and recommendation for future research work. ITSO1_T3_4
limitation. In this paper we propose a new model for the implementation of online business. The solutions can also be adapted to any country for the most part except for the delivery process that requires the use of a smartcard-based national identity card. The non-repudiation evidences that are generated from the system can be used by both the consumer and the merchant to resolve possible future disputes. The evidence is also admissible in the court of law since they are generated from the Public Key Infrastructure (PKI) that is recognized by the authority as legally binding.
ITSO1_T3_6
Non-Repudiation in Order, Delivery and Payment Process for a sustainable Online business
Abdullah Sani Abd Rahman, Suraya Masrom Online businesses in Malaysia suffer from the lack of nonrepudiation in the ordering, delivery and payment process. Most businesses cannot sustain their growth because of this
ITsO1_T7:
ITSO1_T7_1
The Architecture of scientific Computing Library Portal on sequential Algorithm based on Partial Differential Equation
Othman, M.S., Yusuf, L.M., Basitt, U.N.A., Alias, N. Scientific Computing Library Portal (SCLP) is a system for scientific researchers to obtain, contribute, share, store, and analyze scientific algorithm through a portal platform. Due to incomplete existing scientific computing library, not so centralized massive knowledge resources, and distributed data analyses for a science team, it is desired that the development of SCLP as a centralized database for computing discipline could overcome the problems highlighted previously. Four disciplines of scientific computing are included in SCLP which are mathematics, engineering, computer science, and bioinformatics. Data collection was gathered from the expert in each discipline. This paper also highlights the importance of metadata to ease the process of obtaining the data. Result from this paper is about the architecture of scientific computing library portal for sequential algorithm which covers the four mentioned disciplines.
81
ABSTRACTS
ITSO1_T7_3 ITSO1_T7_5
A Proposed Reusability Attribute Model for Aspect Oriented software Product Line Components
Fazal e Amin, Ahmad Mahmood, Alan Oxley
Reusability assessment is vital for software product line due to reusable nature of its core components. Reusability being a high level quality attribute is more relevant to the software product lines as the entire set of individual products depend on the software product line core assets. Recent research proposes the use of aspect oriented techniques for product line development to provide better separation of concerns, treatment of crosscutting concerns and variability management. There are quality models available which relate the software reusability to its attributes. These models are intended to assess the reusability of software or a software component. The assessment of aspect oriented software and a core asset differs from the traditional software or component. There is need to develop a reusability model to relate the reusability attributes of aspect oriented software product line assets. This research work is an effort towards the development of reusability attribute model for software product line development using aspect oriented techniques.
ITsO2_T3:
ITSO2_T3_1
Conceptual Information system success Model for small and Medium Enterprise Clinic Information system
Aliza Sarlan, Rohiza Ahmad, Wan Fatimah Wan Ahmad, P.D.D. Dominic
In general, small and medium enterprise (SME) business face substantially greater risks in Information Communication and Technology (ICT) implementation than large businesses do because of 4th International Symposium on Information Technology 82
ABSTRACTS
then outlines the proposed conceptual Success Model for SME Clinics Information System. ITSO2_T3_2
artifacts. The concept of a critic has been adopted in various domains, including: medical (ATTENDING, ONCONCIN), programming (Lisp-Critic, RevJava), software engineering (Argo/UML, ABCDE-Critic), design sketching (Design Evaluator) and others. Critics have proven to be an effective mechanism in providing feedback to users. In this paper we propose an initial critic taxonomy based on our review of the critic literature. We present the groups and elements of the critic taxonomy and explain the groups and critic elements together some examples. We believe our taxonomy will assist others in identifying, categorizing, developing and deploying computer-supported critics in a range of domains.
ITSO2_T3_4
ITsO3_T3:
ITSO3_T3_1
83
ABSTRACTS
PCs in their infrastructures. With advanced in hardware, software and network gird computing are developed to benefits from these futures in idle computers in an efficient way to solve complex problems that need powerful computing requirements. Grid technology, which connects a number of personal computers, can achieve the same computing power as a supercomputer does, also with a lower cost. The goal of grid computing is to aggregate idle resources on the Internet or Intranet such as CPU cycles, storage spaces, etc. to facilitate utilization. In this research we present computational grid framework that used to utilize idle computers in Intranet to execute jobs in an efficient way than a single computer. We design and implement Service Oriented Distributed Grid Manager (SODGM) framework based on web services technology to manage resources and jobs in the system. SODGM balance the load among available resources to increase computers utilization in the system and minimize jobs response time. To evaluate the SODGM system, we performed tests on the Computers Laboratory in the Faculty of Computing and Information Technology in King Abdul Aziz University. The tests show that SODGM system provides good performance compared with using single computer in terms of execution time, resource utilization and system throughput.
ITsO4_T3:
ITSO4_T3_1
Customer Relationship Management: Computer-Assisted Tools for Customer Lifetime Value Prediction
Lim Chia Yean, Vincent KT Khoo
A customer lifetime value (CLV) can be used as an indicator for assessing a customers worthiness. It is often used among the medium to large organizations for predicting future revenues from their customers. Many research projects have been conducted to enhance the individual prediction models and formulae. However, there are no obvious formal approaches to ensure the consistency and customizability of a prediction process and its major elements. This paper proposes a basic set of computer-assisted tools for a CLV prediction process. The semi-automated tools could be used by the business analysts of an organization to customize the existing templates; record, monitor, and track the work done in each phase of the process. In this paper, various challenges are discussed together with their possible solutions. The tools are specifically designed and implemented for the derivation of customizable formulae and models among the different customer segments of a non-profit organization. In the near future, more research work would be conducted to enhance the capabilities of the tools to cater for possible collaborative CLV predictions among the interested parties on the variables, algorithms, and the subsystems of a model base management system and the associated knowledge base management system. ITSO4_T3_2
Automatic Programming Assessment and Test Data generation - A review on its approaches
Rohaida Romli, Shahida Sulaiman, Kamal Zuhairi Zamli Automatic programming assessment has recently become an important method in assisting lecturers and instructors of programming courses to automatically mark and grade students programming exercises as well as to provide useful feedbacks on students programming solutions. As part of the method, test data generation process plays as an integral part to perform a dynamic testing on students programs. To date, various automated methods for test data generation particularly in software testing field are available. Unfortunately, they are seldom used in the context of automatic programming assessment research area. Nevertheless, there have been limited studies taking a stab to integrate both of them due to more useful features and to include a better quality program testing coverage. Thus, this paper provides a review on approaches that have been implemented in various studies with regard to
4th International Symposium on Information Technology
ABSTRACTS
Second language writers (L2) tend to translate directly from first language (L1) to English. It is difficult to stop this process because this is the nature of L2 writers. Currently, the writing documents will be proofread by someone who is fluent in English (lecturers or translators). The proofreading process is difficult and costly. This paper discusses an approach for developing a computer-assisted writing tool for non-native writers. Sample of sentences in business letters have been collected. Sentences according to the type of letters will be classified and the result of this study will be stored into an electronic thesaurus. This thesaurus will provide words for writers during writing where the word appears are related to the environment of sub-sentences. The software that will be developed will assist L2 writers to choose appropriate words during the preparation of the document. ITSO4_T3_5
of multi agent system, Dendritic cell, Cluster-K-NearestNeighbor, K-mean and Gaussion mixture methods which are give an autonomous, highly accurate and fast classifier security system. This is based on intelligent agents that exploit known functional features of the immune system and the self-healing system to detect, prevent and heal harmful or dangerous events in network systems A combination of features between the IPS and self healing (SH) mechanism to ensure continuity of the networked systems have been established.
ITSO4_T3_6
Immune Multi Agent system for Intrusion Prevention and self healing system Implement a Non-Linear Classification
Muna Elsadig, Azween Abdullah, Brahim Belhaouari Samir Artificial immune systems have recently been implemented in the field of computer security system particularly in intrusion detection and prevention systems. In this paper researchers present an approach to an intrusion prevention system (IPS) which is inspired by the Danger model of immunology. This novel approach used a multi immune agent system that implements a non-linear classification method to identify the abnormality behavior of network system. The authors look into Dendritic Cell (DC) which is a cell in Innate Immune system (IIS) as a classifier cell. Our approach takes the advantages
ITsO5_T3:
ITSO5_T3_1
self-Organizing Map Approach for determining Mobile user Location using IEEE 802.11 signals
Teddy Mantoro, Media A. Ayu, Asma Nuraini, Sulafa Mohd Amin
This paper describes a study towards user location system based on Kohonen Self-Organizing Maps (SOM) algorithm for locating user location with the existing Wi-Fi signals. With the novel use of Wi-Fi based on the IEEE 802.11 standards: inferring the location of a wireless client from signal quality measures, the Kohonen SOM paradigms were used. SOM as an unsupervised learning technique of Artificial Neural Network (ANN) capable for summarizing high-dimensional data which cause region of the network to respond similarly to certain input patterns by analyzing the signal strength or signal-to-noise (SNR) of the wireless access points (AP) that enable a wireless networked device to infer the location of wireless client. Location estimation is then computed using SOM on sample sets. We outline the study leading to the system and provide location performance metrics where a user who is using wireless local area network (WLAN) will be able to detect with the existing of Wi-Fi signal nodes with the SOM technique, highlighting position at the current time.
85
ABSTRACTS
ITSO5_T3_3
Two-tier bitwise Interest Oriented QRP with firework Model Query for a small world Peerto-peer system to reduce message flooding and improve recall rate
Choong Yong Liang, Lim Tong Ming Small-World paradigm was adopted by many peer-to-peer (P2P) systems such as Freenet in order to improve performance of the P2P system. To adopt Small world as part of the architecture of a P2P system, the overlay network must archive high cluster coefficient and low average hop between any two randomly chosen peers. In this research, we propose to enhance Limewire by incorporating the Small world concept to improve several aspects of the overlay network. The Query Routing Protocol (QRP) table in the Limewire will be adopted and enhanced to hold interest information of leaf peers files for all the peers. Aggregation of leaf peers QRP will stay with the SuperPeer so that such interest information could be used to form short-range, medium-range and long-range links with other SuperPeers to achieve low average hop criteria as required by the Small world paradigm. Firework Query model is adopted in the search activity of the proposed enhanced Limewire P2P system through various links established between SuperPeers. Tests will be carried out using P2P simulation software on performance and scalability factors such as reducing message flooding and improving accurate recall rate. A prototype will be produced in this research to complete a lab-based test for concept proofing. Tests will be carried out comparing with the original Limewire and the improved Limewire so that potential future works could be recommended.
ITSO5_T3_4
transactions on a P2P protocol. This paper proposes a preliminary approach called One-Stop Multiversion Dynamic Adjustment of Serialization Order (OS-MDASO) which eliminates conflicts between read-only and update transactions to increase degree of concurrency and resolves data conflicts using multiversion dynamic adjustment of serialization order to guarantees database correctness. This approach improves response time by reducing peers involvement in transaction processing and increases tolerance of disconnection by implementing timeout value.
ITSO5_T3_5
Os-MDAsO: An Algorithm that guarantees Correctness for P2P Object-Oriented Database systems in a Wireless Local Area Network Environment
Wong Wai Keong, Lim Tong Ming Concurrency Control is one of the core areas of study in P2P object-oriented database system. Although classical optimistic concurrency control has the advantages of non-blocking and deadlock free, it has the problems of late conflict detection and wasted transaction restarts. Peers in an overlay wireless network are faced with low bandwidth connection and frequent disconnection problems, hence, conventional concurrency control cannot be applied correctly to provide concurrency control management for long-duration transactions of a P2P object-oriented database system. Although some new approaches reduce the number of transactions restarts and improve response time by dynamically adjusting the sequential order, they are still some unnecessary transactions restarts and delay in response time which affects correctness of distributed
ITsO5_T5:
ITSO5_T5_2
ABSTRACTS
simulation that involved in learning process using computer. They are also able to interact with the material and apparatus for the experiment. Discussion involved on theoretical framework modeling where it divided into four parts that is analysis, design, development and evaluation. For the second objective, researcher will explained the architecture of development of this Virtual Learning. While designing the development of Virtual Learning, researcher has used learning theory approach such as constructivism and contextual. The learning concept that are used in this Virtual Learning is education, simulation, animation to create virtual based on learning.
ITSO5_T5_4
an automatic infant cry classification system which main task is to classify and differentiate between pain and non-pain cries belonging to infants. The classification system is trained based on Baum Welch algorithm on a pair of local feature vectors. In this study, Mel Frequency Cepstral Coefficient (MFCC) and Linear Prediction Cepstral Coefficients (LPCC) are extracted from the audio samples of infants cries and are fed into the classification module. The system accuracy reported in this study varies from 71.8% up to 92.3% under different parameter settings, whereby in general the system that are bases on MFCC features performs better than the one that utilizes LPCC features. The encouraging results demonstrate that indeed Hidden Markov Model provides for a robust and accurate infant cry classification system.
An Accurate Infant Cry Classification system based on Continuos hidden Markov Model
Yousra Abdulaziz, Sharifah Mumtazah Syed Ahmad This paper describes the feasibility study of applying a novel continuous Hidden Markov Model algorithm as a classifier to
ITsO6_T3:
ITSO6_T3_1
A P2P Object-Oriented Database system that supports Multi-Attribute and Range Queries with Improved Query Response Time
Goh Chiao Wei, Lim Tong Ming
Nowadays, the demand for the processing and storing demand of these data has limited the traditional way of storing and processing data based on client/server architecture. To overcome this bottleneck, a peer-to-peer object-oriented database is proposed because of its robustness, fault-tolerance, scalability and less administrative nature. Chord is a structured P2P overlay network providing indexing facility enables users to locate a piece of data based on a given key through an efficient routing algorithm. The proposed object-oriented database is built on the openChord, a Chord implementation. In this paper, we present a preliminary design for a P2P object-oriented database on the openChord which supports multi-attribute and range queries. The storing and processing of objects are managed locally to reduce the network traffic. Pointers of objects are stored around the routing path of nodes to efficiently access to a desired object to reduce storage cost and to preserve the object-oriented features. Nodes holding the object pointers are distributed around the network to reduce the lookup time. Nodes are organized into logical class hubs where each hub handles pointers to nodes storing objects belonging to a particular class. Queries involving multi-attributes and ranges are routed to the related class hubs to retrieve the desired objects. Our proposed system will be tested using an Order Picking application for a warehouse with only dozens of nodes connected in a wireless local area network. Tests were carried out with another P2P database system measured on reliability and performance of both P2P database systems.
ABSTRACTS
a cost, the tool considers all variables in COCOMO II and requires expert judgment to key-in the input of the variables such as project size, project type, cost adjustment factor and cost driven factor. Developed in JAVA, WebCost is proven able to estimate cost and generate its estimation result. The usability evaluation conducted had shown that WebCost is usable when compared with other tools; it has its own advantages. WebCost is evidence suitable for everyone especially the project managers, software practitioners or software engineering student in handling the cost estimation tasks.
ITSO6_T3_4 ITSO6_T3_5
Implementing Rapid Application Development(Rad) Methodology In Developing Practical Training Application system
Nik Marsyahariani Nik Daud, Nor Azila Awang Abu Bakar, Hazlifah Mohd Rusli
Practical training objective is to prepare students for their future jobs. Many university programs integrate practical training as a course component due to its benefits. Application is one of the main processes in practical training. Managing application process manually is a tedious task, thus a system to manage practical training application is proposed to be developed using Rapid Application Development methodology. This methodology is chosen as it allows fast implementation of the system in real environment. The development had started in the mid of semester December-April 2009 and the development process had been iterated based on the requirements acquired. The practical training application system had been implemented for three semesters and the rapid application development is proved to be a right methodology for this project as it serves the goal of fast implementation for a small size system.
ITsO7_T3:
ITSO7_T3_1
A conceptual framework of an e-mentoring system for orphan children using ARCs Motivational Model
Nursakirah Ab.Rahman Muton, Nasriah Zakaria, Faten Damanhoori This paper discusses the conceptual framework that guides the design of an e-mentoring system specifically for orphan children as protg with their adult mentors. We are proposing ARCS motivational model as the theoretical guidelines because motivation is one of the most important aspect to be considered
ABSTRACTS
technology in grid RD system components and presents the current works in this perspective. It also presents a detailed analysis of these systems and the future research directions in this field. Finally, the paper discusses future applications of the semantic-based RD system on emerging technologies such as Meta-brokers and Clouds.
ITSO7_T3_4 documents provide several advantages. One advantage is document specific representations no longer affect the search. This is extremely important in the case of multilingual representations. Keywords of several languages are mapped to the same concept in an ontology and are therefore given the same meaning. Multilingual search portal can be established to produce the same results, no matter which language is used for retrieval. This research aim to identify and analyze ontology that relates to Islam to enhance the use of exact vocabularies and to develop an ontology based Islamic semantic retrieval that can retrieve Islamic web in 3 different languages simultaneously through a multilingual search portal. This research emphasizes on semantic web technologies and the development of ontology using thesaurus such as Library Congress Subject Heading and other reference sources such as Index Islamicus, thesaurus, encyclopaedia, biographies etc. as the basis for implementing novel mechanism for retrieving Islamic web in 3 different languages simultaneously. In this research, existing knowledge sources such as documents, reports, etc. are mapped into the domain ontology and semantically enriched. This semantically enriched information enables better knowledge indexing and searching process and implicitly a better management of knowledge. ITSO7_T3_6
semantically Indexed and searched of Digital Images using Lexical Ontologies and Named Entity Recognition
Datul Aida Ali, Shahrul Azman Noah
Using low-level features to support semantic search of images is a difficult task. As a result, textual content is used to provide semantic description or annotation of images. Such textual description of what we may call as surrounding text is a value added features available in most web images particularly on-line newspaper images. Most search engines used them as a feature to provide textual meaning of images. Relying on surrounding text alone, however, unable to provide support for semantic search that go beyond indexed terms. Lexical resources and ontology are potential sources to enhance searching for images. This paper discusses the use of WordNet and ConceptNet to enhance searching for on-line newspaper images. This is further improved with named entity recognition (NER) technique to annotate important entities such as name if a person, location and organization among image searchers. Results show that our semantic search approaches outperform the normal approach for searching images.
ITsP3:
ITSP3_ 1
The Design of fingerprint biometric Authentication on smart Card for PuLAPOT Main Entrance system
Mohd Rizal Mohd Isa, Yuhanim Hani Yahaya, Kamaruzaman Mohamed Hali , Mohd Hazali Mohammad Adib, Khairuddin Maskat
Biometrics personal authentication utilizing fingerprints have been thoroughly studied and applied. Exploiting the unique features of a fingerprint and the pleasant way of capturing the required information permits it to be used in numerous applications. Smart card is also being widely adopted in many applications and refers as an essential platform to hold biometrics information. This paper presents a fingerprint
ABSTRACTS
Theory is tightly related to Evolutionary Algorithms, especially Genetic Algorithm. Genetic Algorithm was mainly utilized for finding an absolute optimal strategy by virtually applying a game against a known strategy.
ITSP3_ 3 ITSP3_5
Malware self Protection Mechanism Issues in Conducting Malware behaviour Analysis in a Virtual Environment As Compared To a Real Environment
Syed Nasir Alsagoff Malware writers are constantly trying to defeat and hinder malware analysis with malware self protection mechanism. There are two main methods of malware analysis which are reverse engineering and behaviour analysis. Reverse engineering consists of static and dynamic code analysis. Behaviour analysis studies the malwares interaction in and out of the infected host. Behaviour analysis will always be a faster method compared to reverse engineering due to its more visual approach. This study will analyse issues related to malware self protection mechanism in conducting malware behaviour analysis in a virtual environment as compared to a real environment and suggestion(s), on how to overcome the problem.
ITSP3_4
Model Driven security frameworks for Addressing security Problems of service Oriented Architecture
Muhammad Qaiser Saleem, Jafreezal Jaafar, Mohd Fadzil Hassan Service Oriented Architecture based on Web Services technology gained popularity because business work flows can easily be executed as an orchestration of Web Services. These Web Services are independently developed and may be internal or external. With increase in connectivity among the Web Services, security risks rise exponentially. Moreover the security requirements are not defined at organizational level rather they left until the technical level. Many security problems related to SOA applications are highlighted by different authors which if not properly managed might have serious consequences. Many Model Driven Security Frameworks are presented by different research groups to overcome the security problems of SOA based applications. In this survey paper we have highlighted the security problems for SOA based applications and few Model Driven Security Frameworks are presented; their working style and security goals are also discussed in the course of paper.
ITSP3_7
ABSTRACTS
observation, conceptualization of the relevant knowledge, and active experimentation which validate the gained knowledge. The key stage is the reflection stage which is defined as a process where the students make connection between experience and abstract concepts. To measure the effectiveness of the blog as a discussion tool, two set of data used. The effectiveness of blog is evaluated using two important measures which are student performance and blog performance. This paper discuss on the early stage of development of the blog and measurement elements.
ITSP3_ 8
system. This research is rated highly on the effectiveness and the usability of the system.
ITSP3_10
simulating the effect of supply Chain Risk and Disruption: A Malaysian Case study
Afsaneh Noori Houshyar, Muriati Mukhtar, Riza Sulaiman As competitions between firms become more fierce, they are constantly finding new ways to win the competition. They employed various initiatives such as outsourced manufacturing and increased product variety for increasing profit and customer satisfaction. Another strategy employed is supply chain management. However, managing a supply chain presents certain challenges. There are a lot of risks like demand changes, transportation disruptions and natural disasters which can threat the stability of a chain member and increases the vulnerability of the whole supply chain. Examples of this include the terrorist attacks on the world trade center on September 11, 2001, the SARS epidemic in south-East Asia and the recent H1N1 epidemic which led to costly disruptions in the supply chain. In this research, via an examination of the literature, paper investigates the probable reasons of disruptions in a supply chain, and then classifies the risks which can cause disruption in a supply chain, paper will also highlight the strategies which can control and mitigate the risk effect on the chain.. Finally, an automotive supply chain in Malaysia is used as a case study and paper will simulate the conceptual model of that for highlighting these elements of supply chain disruption.
ITSP3_11
Domain Analysis with Archetype Pattern based zachman framework for Enterprise Architecture
Gunnar Piho, Jaak Tepandi, Mart Roost The software factories approach is one of a number of the automated software development methods, which promise greater gains in productivity and predictability by making application assembly more cost effective through systematic reuse and by enabling the formation of supply chains. In our research work on archetypes based development we investigate methods and applications of business archetypes and business archetype patterns (originally described by Arlow and Neustadt) in the development of software factories. In the current paper we describe and explain the Zachman Framework (ZF) from the archetype patterns perspective, explain how we use this archetype patterns based ZF in domain analysis and compare the ZF based approach with Dines Bjrners domain facets based approach. The business domain in our studies consists of a clinical laboratory. Our research is based on Laboratory Information Management System developments for the Clinical and Biomedical Proteomics Group, University of Leeds, UK. Our studies show, that ZF with archetypes and archetype patterns helps developers to better understand business domains, to design more robust and cost effective enterprise applications through systematic reuse of archetypal components by enabling supply chains of product families and to explain solutions to domain experts. ITSP3_9
91
ABSTRACTS
players are able to reduce their number of hours in playing online games. ITSP3_ 12 ITSP3_15
The Development of the short Messaging service (sMs) Application for the school usage
Salman Firdaus Sidek
This research has outlined 2 objectives: to develop a personal Short Messaging Service (SMS) server that is easy to manage by school IT teacher and to develop an SMS application system which is cost effective and does not tied up to the SMS Gateway Service Provider. The Rational Unified Process (RUP) methodology is implemented in this research where the researcher cans iteratively doing the system development during each phase. The literature review shows most of the Content Delivery SMS services used by people nowadays are rely on the commercial system developer and the SMS Gateway Provider which provides the expensive 5 digits unique number. But the SMS application system developed through this research only need a minimum development and maintenance cost and suitable to be used in the school environment. The product of this research is the SMS application system that can avoid the reliance of the Content Delivery SMS application of the student examination result to the SMS Gateway Provider and the commercial SMS application developer. This system can be managed totally by school staff via Maxis telco without involving the third party as SMS Gateway Provider as well as the commercial SMS application developer. This system also can be expanded to be another SMS application that is suitable to be implemented in school by only creating tables in the database provided and developing some simple user interface.
To Enable formal Verification of semi-formal Requirements by using Pre-defined Template and Mapping Rules to map to Promela specification to Reduce Rework
Lin Cheng Hong, Lim Tong Ming Gap has always been found between semi-formal requirements and formal specification. Semi-formal or informal requirements are not able to do formal verification as imprecise and ambiguity is always found. The proposed research is to carry out the mapping of semi-formal requirements to Promela specification in order to enable early verification before the requirements analysis process take place and to obtain highly accurate and complete requirements specification. The proposed solutions include a set of pre-define requirements templates that helps analysts to collect requirements and a set of mapping rules to bridge semi-formal and formal specification. The inputs are a set of semi-formal requirements specifications called Swimlane Domain-specific Requirements Language based on business processes, business actor, flow of processes and simple formula or logics within a process. The target language is Promela, a Process Meta language that can be verified using SPIN tool to perform formal verification. Inconsistency of requirements will be identified before the inputs are mapped to Promela language. The supporting tool will be included and tested with a group of novice users by applying different formalization strategies like generation of OCL specification from UML diagram set, generation of Z specification from UML and the proposed solution to measure the hours required to finalized
92
ABSTRACTS
requirements, accuracy of the generated specification and the completeness of requirements comparing to the prepared requirements set for measuring purpose.
ITSP3_ 17
Extended balancing Ontological and Operational factors in Refining Multiagent Neighborhood using ACO
Lee Chee Yean, Lim Tong Ming, Lay-Ki Soon In this paper, we present our work extended balancing ontological and operational factors using Ant Colony Optimization (ACO) in building collaborations within multiagent neighborhoods.
This innovation overcomes the previous versions problem on better collaboration among agents, reducing message flooding, increase scalability and resolved the hidden boundary problem. The domain of application is multiagent, distributed information retrieval, where agents safeguarding their own information or data resources, improve their local services by collaborating with others. Information retrieval is like a food finding for ants. Foods are not always available at the same location and there might be a better location with more foods. Same thing apply to information. In this paper, we adopted ACO as our agents collaboration technique to enhance the previous work.
kNOWLEDgE sOCIETy ITsO1_T4: 15 JuNE 2010 (2.00 PM 4.00 PM) VENuE: 3-04
ITSO1_T4_1 ITSO1_T4_3
Performance Analysis of Modulation schemes for Wireless Optical In-Cabin Aircraft Networks
D.Marinos, C.Aidinis, C.Vassilopoulos, P.Kouros, N.Schmitt, T.Pistner, J.Schalk, J.Klaue
One of the major tasks in the future of aircraft in-flight entertainment is to provide wireless connectivity throughout the cabin. In this work an optical OFDM modulation scheme for cellular network architecture is investigated in comparison to other conventional optical modulation techniques (PPM, OOK). An analysis of efficient cabin link layout with respect to seat rows per cell and available data rates, allowing high quality services for specific application (e.g. Video, data transfer), is presented for an implemented minimum of 10Mbit/s per cell. A wireless optical OFDM communication prototype has also been implemented in a laboratory experiment and compared to a conventional diffuse optical 2PPM, achieving 17.2Mbit/s data transmission, thus doubling the previously achieved performance, but being based on line of sight links in the laboratory only. Both implementations prove the usefulness of the investigated modulation schemes. ITSO1_T4_2
An Ontology Driven, Multi-agent based framework for Automated Resource Allocation in Mobile Workforce Management systems
Arash Mousavi, Md. Jan Nordin, Zulaiha Ali Rapid advancement in Mobile Information and Communication Technology (ICT) caused an enormous increment in mobile workforce population of the world. Consequently, this rapid increment created a high-demand for reliable and automated mobile workforce management (MWM) systems. An MWM system consists of several subsystems amongst which, Resource Allocation (R A), which is the focus of this paper, is of high importance. The better performance and reliability that an R A system exhibits the more reliable its corresponding MWM will be. A reliable resource allocation process in a mobile environment however, should be able to adequately challenge human resource risks as well as environmental risks, such as frequent disconnection, caused by mobility of the resources. In this paper an ontology driven multiagent based framework
93
ABSTRACTS
for such R A systems is proposed. The main emphasis of this frame work is to describe a dynamic coordination model for a multi-agent system which is utilized to automate the resource allocation process in presence of the above mentioned risks and challenges.
ITSO1_T4_5 ITSO1_T4_6
framework of Intrinsic and Extrinsic Motivators of knowledge sharing - A Case of Training Institutes of an Oil and gas Company in Malaysia
Aamir Amin, Mohd Fadzil Hassan, Mazeyanti Ariffin
Knowledge sharing is vital for the success of Knowledge Management (KM) initiatives. But it is inconceivable to flourish knowledge sharing without individuals motivation to share his knowledge. Individuals are motivated through intrinsic as well as extrinsic motivation. Due to this reason researchers have underlined the importance of extrinsic rewards and Organization Citizenship Behavior (OCB) to influence individuals decision to share his knowledge. Apart from extrinsic and intrinsic motivations, it is important to understand individual differences in knowledge sharing behavior based on demographic variables. The relationships of these variables with knowledge sharing have been tested in past research works, however there are a number of limitations which need to be addressed. Using the case of training institutes of an oil and Gas Company in Malaysia, the aim of the study is to propose a framework of intrinsic and extrinsic motivators of knowledge sharing. The proposed framework will overcome the limitations in the literature by revisiting the impact of extrinsic rewards, OCB and demographic variables on knowledge sharing. Hence the proposed framework has encompassed intrinsic motivators (OCB), extrinsic motivators (extrinsic rewards) and personality attributes (demographic variables). Six major and in total 20 hypotheses has been tested. The data was gathered from the knowledge workers, working as trainers and practitioners, at three training institutes. Questionnaire method was used to gather data. Later the data was tested using regression analysis through SPSS. The results have shown that OCB is a very strong predictor of knowledge sharing, whereas extrinsic rewards moderately affect individuals intention to share his knowledge. At the same time demographic variables including gander, race and education level affect the relationship between knowledge sharing intention and knowledge sharing behavior as a moderating variable except experience level, which has no impact on the relationship. The study will help us to understand the role of an individuals intrinsic attributes (i.e. OCBs), personality attributes (Demographic variable) and external motivators (i.e. extrinsic rewards) to affect his decision to share his knowledge. The study will help the theorists and practitioners to develop strategies to foster knowledge sharing in their organizations.
Pre-Considered factors Affecting ERP system Adoption in Malaysian sMEs using a Technology-Organization-Environment framework
Siti Shafrah Shahawai, Rosnah Idrus The adoption of Enterprise Resource Planning (ERP) system among large organizations around the world has gradually increased due to the number of its implementation successes. An integration of a primary technology that effectively utilizes an ICT system in the organization such as ERP system will have a huge positive long-term result on any large, medium or small enterprises. However, most Small Medium Enterprises (SMEs) in Malaysia are still lagging behind. This paper aims to discuss the proposed pre-considered factors affecting ERP system adoption in Malaysian SMEs by using a technologyorganization-environment (TOE) framework. Based on this framework, each factor will be looked at and discussed further in this paper on how the elements in the framework affect the adoption of ERP system in SMEs. This paper also explains how the factors will be used in a survey to be conducted later. The findings will help outline the strategies that should be considered to increase the understanding on the successful adoption of ERP among Malaysian SMEs.
ITsO1_T8:
ITSO1_T8_1
Energy (battery) of the sensor node is considered as the scarcest resource in Wireless Sensor Network (WSN), hence a communication protocol that efficiently uses the limited energy must be developed. In this paper, Region-based Energyaware Clustering (REC) scheme is presented to optimize the energy usage, with clustering has been identified as an effective data forwarding technique in WSN. With REC, algorithms for energy efficient cluster formation, cluster head selection, and inter-cluster communication is proposed. Using OMNet-4.0 simulation tool, the performance of REC is compared with
An Evaluation of Endpoint Detection Measures for Malay speech Recognition of an Isolated Words
Noraini Seman, Zainab Abu Bakar, Nordin Abu Bakar
This paper presents the endpoint detection approaches specifically for an isolated word uses Malay spoken speeches from Malaysian Parliamentary session. Currently, there are 34,466 vocabularies of utterances in the database collection and for the purpose of this 94
ABSTRACTS
study; the vocabulary is limited to 25 words which are most frequently spoken selected from ten speakers. Endpoint detection, which aims to distinguish the speech and non-speech segments of digital speech signal, is considered as one of the key preprocessing steps in speech recognition system. Proper estimation of the start and end of the speech (versus silence or background noise) avoids the waste of speech recognition evaluations on preceding or ensuing silence. In this study, the endpoint detection and speech segmentation task is achieved by using the three different algorithms, namely combination between Short-time Energy (STE) and Zero Crossing Rate (ZCR) measures, frame-based Teagers Energy (FTE), and Energy-Entropy feature (EEF). Three experiments were conducted separately to investigate the overall recognition rate obtained with a Discrete-Hidden Markov Model (DHMM) classifier approach on the testing data set that consists of 1250utterances. The results show that EEF algorithm performs quite satisfactory and acceptable where average recognition rate is 80.76% if compared with other two algorithms. Each of the algorithms have the advantages and disadvantages and there are still misdetection of word boundaries for the words with weak fricative, plosive and nasal sounds and not robust enough to implement in Malaysian Parliamentary speech data. However, improvement is still possible to increase the performance of these algorithms. ITSO1_T8_3
constituent of successful ICT utilization in an organization but yet their development, implementation, monitoring and evaluation is a challenging concern. This paper proposes a framework to shape further researches and the important considerations in conducting additional exploration on ICT policy.
ITSO1_T8_5
A Non-Linear Model for the Classification of stored Items in supply Chain Management
Seyed Yaser Bozorgi Rad, Mir Abbas Bozorgi Rad, Mohammad Ishak Desa, Sarah Behnam, Sina Lessanibahri
With the significant role that warehouse plays in connection to suppliers, distributors, and clients, and considering the costliness of storage systems, efforts have focused on the reduction of procedural expenses. Among the most significant expenses, one involves the distance traveled by operators or S/R machinery for the selection of ordered items; the common solution to which has been through the classification of stored items. Previous articles have focused on linear solutions to the abovementioned problem, such as PMedian.This article shall focus on the problems arising from the said solution, and instead a non-linear method proposed. Further, a heuristic algorithm is produced for the solution that will be compared to similar solutions through Lingo, proving acceptable results. ITSO1_T8_4
Information and Communications Technology (ICT) Policy Management Towards Enabling Research frameworks
Reza Alinaghian, Azizah Abdul Rahman, Roliana Ibrahim This paper discusses the topic ICT Policy that has captured very little attention to date. ICT policies are the crucial
ITsO2_T4:
ITSO2_T4_1
ABSTRACTS
innovation might be more complex than what it seems, as female contributors are often experience hybrid discriminations, both from the male dominated OSS community and socio-cultural patriarchy. This paper concerns the questions of how innovation is achieved in open source software communities through social constructionist perspectives focusing on feminist views. ITSO2_T4_2
Decision support system framework for Implementation of Enterprise Resource Planning (ERP) system
Muhammad Abdul Tawab Khalil, P. D. D. Dominic, Mohd Fadzil Bin Hassan A growing challenge for todays complex decision making is the successful implementation of ERP (Enterprise Resource Planning) system. Many problems that arise in ERP implementation have been discussed and tackled by researchers in recent times. An emerging threat to the successful implementation of ERP is the wicked problems. Wicked problems manifest in somewhat enormous projects or applications. These wicked problems can lead to a huge loss of organizational intellectual property and finance. In order to counter these wicked problems, a preemptive decision making strategy needs to be adopted to anticipate these problems in ERP implementation. As such, a research investigation requires to be carried out to address the complexity and multiplicity in projects which may lead it to wicked problems and ultimately turning it into a wicked project. As of todays expanding globalization, multiple stakeholders with conflicting standpoints increase; each one linked with the organization(s) is affected by the different customs, behaviours, laws and environmental concerns. Globalization also leads to the wicked problems for the organization. Methods to help decision makers deal with wicked problems are greatly needed. In pursuit of that some elastically open ended, participative, collaborative and adaptive approaches are needed to anticipate wicked problems in ERP implementation. This paper focuses on a decision support system model for implementation of ERP system. ERP often serves as a happy hunting ground for wicked problems because of its complex and multi-pronged nature. Other than that, we are reviewing some techniques and methodologies that are recommended to assist decision makers understand the unstructured and poorly defined complexity in ERP implementation. Comparative analyses of these techniques will not only assist in better understanding wicked problems, they are also being used to provide a framework for a suitable and sustainable decision support system for implementation.
ITSO2_T4_3
involvement of all different parties and major change practices and beliefs. The foundation of knowledge management, however, is to transform information and intellectual capital to achieve organizations goal. Knowledge management acts as the catalyst for organization change It entails processes associated with sharing, exchanging, creation and disseminating of knowledge. The study presents the correlation of knowledge management and sustainable development for developing business competitive advantage. This paper sample cases from industries mapping out the essence of these two stipulations in their solution to prevailing challenges in the economy. Finally, a framework is developed based on the underlying principles of McKinsey 7S framework justifying the best practices of knowledge management provides a very good foundation to sustainable development.
ITSO2_T4_4
Identifying the social factors and Representation for knowledge based Coalition formation system
Azleena Mohd Kassim, Yu-N Cheah, Intan Hashimah Mohd Hashim In order to form a collaborative team working on a specific task, we need to identify individuals that will be able to form groups and work together based on certain criteria such as their knowledge and personal role. Coalition formation is an approach dedicated to achieve optimal group arrangement. We are working in the direction of identifying strategies to build a coalition formation system taking into consideration the social factors. Computational cultural dynamics (CCD) is a research area that intertwines computer technology with behavioral and social sciences. We find that this research has potential to be further expanded to study and build a group setting. At the same time, the value of knowledge is seen as an important factor to determine the success of such coalition especially from the social setting. Therefore, with the motivation to achieve a CCD setting of a knowledge based coalition formation, social factors are studied, where the knowledge derived from this process will be identified, represented and stored. In this paper, we present a framework for the knowledge based coalition formation focusing on structuring the social factors chosen to initiate the knowledge process of the coalition formation system.
ABSTRACTS
ITsO3_T4:
ITSO3_T4_1
Organizational Commitment Towards software Process Improvement - An Irish software VsEs Case study
Shuib Bin Basri, Rory V. OConnor This paper presents a study of the software development processes of very small software companies, with a focus on the companys Software Process Improvement (SPI) activities. SPI has gained an increasing importance in software engineering domain. However, recent studies show that the obligation and commitment towards SPI especially in small companies is weak and not always taken seriously. This situation is often related to insufficient availability of resources either in term of financial, human and time in this type of companies. Accordingly, this paper explores the current situation in very small companies and gauges their acceptance levels towards SPI actions and the underlying reasons behind this. In this research we carried out a survey which contains open and close ended questions in a series of very small software development companies in Ireland. A quantitative analysis; that use a statistical analysis, and qualitative analysis; that adopt the qualitative content analysis method have been followed throughout this study. The results indicate that the SPI initiatives in very small software development companies are done on a small scale manner, informally and indirectly. In addition, the results also indicate that commitment and involvement of people in these organizations towards SPI is high.
ITSO3_T4_2
ITsO4_T4:
ITSO4_T4_1
ABSTRACTS
ITSO4_T4_2
present a result aggregation engine which can either present results of the individual algorithms separately or fuse the results of the composite algorithm.
ITSO4_T4_5
Identifying Effective software Engineering (sE) Team Personality Types Composition using Rough set Approach
Mazni Omar, Sharifah-Lailee Syed Abdullah
This paper presents an application of rough sets in identifying effective software engineering (SE) teams personality types composition. Identifying effective team personality composition is important to determine software project success. It was revealed that balance of members in personality types composition, which were Sensing (S) and Intuitive (N), Thinking (T) and Feeling (F) has assisted the teams to achieve higher software quality. In addition, Extroverted (E) members also gave an impact towards team performance. Even though size of empirical data was too small, the rough set technique allows generating significant personality types composition rules in assisting decision makers to form effective teams. Future works will include more empirical data in order to develop teams performance predicting model based on personality types.
ABSTRACTS
ITsO5_T4:
ITSO5_T4_1
Transformation of L2 Writers to Correct English: The Need for A Computer-Assisted Writing Tool
Tuan Norhafizah Tuan Zakaria, Mohd Juzaidin Ab Aziz, Tg Nor Rizan Tg Mohd Maasum Most of current existing writing tools are developed by native speakers of English (L1). Some of these writing tools may not be suitable for non-native writers (L2) who used English as a second language (L2). The writing styles of L2 writers are different from the writing styles of L1 writers. One of the main problems faced by L2 writers were generating ideas while writing. They tended to generate ideas in L1 and later translated into English as L2. They also lack in vocabulary which make the problem further. People with limited vocabularies are often forced to use the relatively few words they know without knowing their precise meaning. The objective of this paper is to discuss an approach to develop a computer-assisted writing tool for L2 writers. The vocabulary used in business letters will be investigated based on the part of letter, genre analysis and effective sentences and words for business letters. The collection of sentences and words based on these three aspects will be used to develop an electronic dictionary and develop rules to check the sentences and provide suggestive example sentences. Some techniques will be used in order to automatically detect and correct sentences.
ITSO5_T4_3
ABSTRACTS
ITSO5_T4_6 Value Frequency (RVF); (2) Uncommon Attribute Value Matches (UAVM); (3) Hybrid I (H1) and; (4) Hybrid II (HII) Weighting Schema are evaluated for Y-STR Surname data. The overall results show that the clustering accuracy of all methods is in between 40 44% only. None of the methods produces a significant good clustering result for Y-STR data.
Attribute Value Weighting in k-Modes Clustering for y-short Tandem Repeats (y-sTR) surname
Ali Seman, Zainab Abu Bakar, Azizian Mohd. Sapawi
This paper evaluates Y-STR Surname data for attribute value weighting in K-Modes clustering algorithm. Four weighting methods: (1) Relative
ITsO5_T7:
ITSO5_T7_1
ABSTRACTS
those charged with designing a new course as well as those re-designing an existing one. The author was employed at the university until recently. The steps taken to design the course are given and the syllabus is compared to that of the European Computer Driving License.
ITSO5_T7_6 transferring technical knowledge between the lecturers to the students for programming courses conducted at Universiti Teknologi PETRONAS (UTP). The purpose of this study is to present academics and practitioners insights on the challenges of transferring technical knowledge to learners. Programming lecturers are considered as a person with technical knowledge because they have the ability to explain theoretically and practically technical concepts and also has theoretical ability to face a technical problem, analyze it, describe it and solve it.
The Challenges in Transferring Technical knowledge: A universiti Teknologi PETRONAs Case study
Khairul Shafee Kalid
This paper reports a case study on the challenges of transferring technical knowledge. The study focuses on the challenges of
ITsP4:
ITSP4_ 1
ICT, knowledge society, and good governance: Relationship and Interaction Pattern
Aziz Perdana In todays digital era, the community becomes an important basis for development. Development funding is no longer rely on natural resources but also on the creative economy based on knowledge. Therefore, people are expected to take advantage of the use of ICT (Information And Communication Technology) as a tool to be able to create a knowledge society. There are many research discussed about knowledge society, but none of them can provide a clear mapping about relationship and the pattern of interaction among ICT usage, knowledge society, and good governance. This paper tried to summarize previous research about knowledge society and its supporting components, and then make a map of relationship among ICT usage, knowledge society, and good governance. This paper also identifies obstacles based on the map in implementing the knowledge society as well as offering strategies to overcome these obstacles.
ITSP4_2
Information sharing through football Website Equatorial guinea (Eg) Case study
Emelia Akashah P.Akhir, Y.Y.Chen, Goh Kim Nee, Savita K.Sugathan,Salvador Nguema Obama This paper demonstrates the needs of football websites in Equatorial Guinea (EG) which is one of the smallest country in African continent. The websites is designed with the purpose to encourage information sharing and promoting EG football team among football fans from inside and outside of EG. This research is initiated based on three (3) key factors : 1) EG people would like to promote their football national team; 2) the lack of medium to share the football news; 3) need a platform to keep themselves updated and exchange opinion with other fan. Implementing a football website also could give benefit in terms of promoting the league to the outside world. Pre-implementation questionnaires were distributed to EG citizens and the result is analyzed to evaluate the needs. The feedback from the respondents on the websites features and design will be evaluated before it is transformed into a portal
101
ABSTRACTS
been given towards improved and optimal implementation of security measures in data warehouses. This paper highlights some of the security approaches, like classical security models and implementation of filter over data before they are kept in statistical form in a data warehouse. The comparison of these approaches and introduction of a hybrid approach of the security implementation in data warehouses is the main focus of this paper.
ITSP4_5
lead to a comprehensive and fully utilized theses digital library that support users, both as information producers and as information users.
ITSP4_7
Integrating National Culture into Information and Communication Technology Adoption Model
Mohamed Hussain Thowfeek, Azizah Jaafar This paper focuses on the importance of positioning culture as one of the vital factors that influences the adoption of information and communication technology (ICT). The analysis of various models has made it to believe that cultural factors were not given importance to the development of adoption models. But it is understood that the national culture influences the actual behavior and it can provide additional explanatory power in explaining the variation of the behavior towards adopting a technology.
ITSP4_ 8
Applying zachmans framework to Determine the Content of semantic Theses Digital Library
QurratuAini Adibah Ahmad Fazil, Zuraidah Abdullah,Shahrul Azman Mohd. Noah Digital library brought a high impact phenomena as it contributes a lot in term of new way in dealing with knowledge. Bazillion (2001) stated that libraries built after 1995 have a different look and feel that defines intellectual information centre where people and technology interact. Most scholars believed that the way knowledge been created and disseminated fundamentally were altered by a series of innovation begins by Michael S. Hart, with his Project Gutenberg as the first producer of free electronic books in 1971 (Bazillion, 2001). Apart from being the oldest digital library developed, Project Gutenberg also works as a catalyst in rapid development of multiple kind of digital libraries nowadays. Since then, digital library plays a vital role in supporting academia activities including creation, organization, preservation and dissemination of knowledge. As part of the extensive development and deployment of digital libraries initiatives over the past decades, attention should be drawn to its massive growth in content design and storage capacity. This study proposed a framework to determine the content of a semantic theses digital library based on the Zachmans Framework data dimension. Six artifacts in Zachmans Framework which are Data, Process, Place, People, Time and Motivation are applied to represent six layers of semantic digital library architecture. Twenty-four public and private institutions of higher learning in Malaysia were selected for data collection and further evaluation. A framework which is more robust, offers user friendly interface besides adaptable search and browsing interface empowered by semantic can
4th International Symposium on Information Technology 102
Information security Risk Management An Empirical study on the Importance and Practices in ICT Outsourcing
Nik Zulkarnaen Khidzir, Noor Habibah Hj Arshad, Azlinah Mohamed There are many organizations opt for outsourcing in order to cut cost and improve efficiency for their ICT services. On the other hand, ICT outsourcing could also contribute to some risks especially information risks that could jeopardize information asset in the company. An appropriate information security risk management (ISRM) in ICT outsourcing should be in place in order to minimize the potential risks and their impact to business operation as well as ICT services. The objective of this research is to conduct an empirical study on the relationship between importance and practices of ISRM in ICT Outsourcing. Questionnaires were distributed to various private companies and government agencies in Malaysia for the study. Findings of the study show that importance of ISRM process influences its practices in ICT outsourcing. Through the findings, information security risk professional would be able to identify the importance of ISRM and improve
a conference of World Engineering, Science & Technology Congress
ABSTRACTS
their practices in managing information security risk for ICT outsourcing projects. Finally, companies and government agencies need to improve their practices managing information risks in ICT Outsourcing.
ITSP4_10 ITSP4_11
103
AUTHOR INDEX
A
Aamir Amin 94 Abas Md Said 41, 44, 46, 58, 73, 77 Abas M. Said 69 Abdelmahamoud Youssouf Dahab 70 Abdoulaye Mahamat Zakaria 58 Abd. Samad Hasan Basari 90 Abdul Hanan Abdullah 63 Abdullah Alghamdi 68 Abdullah Mohd Zin 76 Abdullah S Alghamdi 73 Abdullah Sani Abd Rahman 81 Abdul Rahman Ahlan 79 Abdul Razak Hamdan 70 Abdulsamad Ebrahim Yahya 46 Abdurazzag Ali Aburas 48 Abdurazzaq A. Aburas 76 A. Bijari 68 Ab Razak Che Hussin 100 Abubaker Agil Emhmed Ali 59 Abu Osman Md Tap 61 Adhistya Erna Permanasari 75 Adrian Siong Min Wee 71 Afsaneh Noori Houshyar 91 A.H Azni 102 Ahmad Al Thunibat 86 Ahmad Bakeri Abu Bakar 53 Ahmad Bazli Arifin 50 Ahmad Faiz Ghazali 64 Ahmad Kamil Mahmood 55 Ahmad Mahmood 40, 41, 82 Ahmad Rafi Mohamed Eshaq 43 Ahmad Sobri Hashim 59 Ahmed Mohammed Al-iesawi 99 Ahmed Moosajee Patel 49, 64 Ahmed Patel 76 Ahsanullah Abro 40, 41 Ai Bee 43 Ainul Jaria Maidin 57 Akbar Nabiollahi 42 Aklili Khalid 60 Akmal Aris 89 Alan G. Downe 55, 75 Alan Oxley 57, 82, 85, 100 Ali Ahmad Zahrawi 52 Alias, N. 81 Ali Dehghantanha 78 Ali Selamat 57 Ali Seman 100 Ali Seyfi 76 Aliza Sarlan 52, 82 Alvin W. Yeo 100 Amit Mehta 62 Ammar Babiker 62 Ammar Mohammed Al-Jubari 75 A.Mohades 68 Anas Ayad 42 Anas F. Bayan 62 and Noraidah Sahari @ Ashaari 86 Andrew Teoh Beng Jin 49 Animesh Rana 62 Anita Agustina 48 Anmar Abuhamdah 68 Annie Ng 43 Annisa 47 Arash Mousavi 93 Arazi Idrus 81 Ariff Idris 90 Ariffin Abdul Mutalib 58 Arif Mushtaq 80 Arniyati Ahmad 63 Arun Nambiar 72 Arun Raaza 62 Asfandyar Khan 78 Asif Wagan 63, 65 Asim Elshiekh 77 Asmalia Che Ahmad 95 Asma Nuraini 85 Atheer A-Abdulrazaq 97 Aurangzeb khan 71 Avijit Paul 43 Ayad Turky 68 Azadeh Noori Hoshyar 78 Azali Saudi 71 Azaly Rezza Feisal Azlin 44 Azam Zakaria 40 Azat Rozyyev 86 Azhar Salleh 43 Azizah Abdul Manaf 103 Azizah Abdul Rahman 95 Azizah Jaafar 45, 52, 53, 88, 95, 102 Azizian Mohd. Sapawi 100 Aziz Perdana 101 Azleena Mohd Kassim 96 Azlina Ahmad 50, 51, 52, 60 Azlinah Mohamed 102
104
Azmi Jaafar 89 Azrai Hj Abdullah 74 Azreena Abu bakar 102 Azuraliza Abu Bakar 52 Azween Abdullah 43, 46, 65, 70, 73, 78, 85, 88
b
Babar Nazir 62, 94 Bahar Arifah 63 Baharum Baharudin 59, 71 Bashar Tahayna 69 Basitt, U.N.A. 81 Bassam Ali Qasem Al-Qatab 61 Bilal Mughal 63, 65 Boon Jiann Neow 40 Boon Yaik Ooi 67 Brahim Belhaouari Samir 85
C
C.Aidinis 93 Chan Yet Lai 43 Cheah, Y.-N. 85 Cheah Yu-N 82 Chee Weng Khong 81 Chen Yoke Yie 44, 81, 91 Chong Eng Tan 71 Choong Yong Liang 86 Christiono Utomo 81 Christopher Wills 49 Chua Chong Chai 82 Chui Yin Wong 40, 81 Chu Jian Ng 47 Cik Nora Salleh 57 C.Vassilopoulos 93
D
Dani Adhipta 42 Datul Aida Ali 89 Dayang Rohaya Awang Rambli 42, 59, 75 Dayang Suhana Hamzah 100 Dhanalakshmi Ramasamy 41 Dhanapal Dominic 42, 44 Dhanapal Durai Dominic 41
AUTHOR INDEX
Diana M.L. Wong 96 Dian Sugijarto 64 Dinara Berdykhanova 78 Diyana Syamsiyah Rozali 98 D.Marinos 93
h
Habibollah Haron 102 Hajah Norasiken Bakar 56 Halabi Hasbullah 56, 62, 63, 65, 66, 68, 69, 70, 73, 75, 77, 83, 86, 94 Halimah Badioze Zaman 50, 51, 52, 53, 54, 60, 103 Halina M. Dahlan 100 Hamada Al-Absi 46 Hameed, N. 85 Hammuzamer Irwan Hamzah 43 Handaru Jati 42 Hanifah Abd Hamid 102 Hanita Daud 56 Hanizan Shaker Hussain 47 Hariraj 78 Hasan 83 Hasiah Mohamed @ Omar 53, 56 Hassan Chizari 63 Hazlifah Mohd Rusli 88 Hazrina Yusof Hamdani 67, 97 Helmi Md Rais 70 Hesham Awadh Bahamish 68 Hitoshi Oi 66 Huah Yong Chan 67 Hui Yang Chng 40 Humera Farooq 77
Irshad Ahmad 60 Irshad Ahmed Soomro 70 Irzan Ashraf Abd Aziz 75 Ismail Bahari 95
E
Elisha Tadiwa Nyamasvisva 63 Eliza Mazmee Mazlan 52, 78 Elliyani Atan Awang 98 Emelia Akashah Patah Akhir 44, 48, 60, 81, 91, 101 Enas Dhuri Kusuma 45 Entisar S. Alkayal 83 Etienne Schneider 48, 72
J
Jaak Tepandi 91 Jafreezal Jaafar 55, 90 Jalil Md Desa 73 Jamalul-lail Ab Manan 70 Jamalul-Lail Ab Manan 64 Janagiammal Ramasamy 90 Jaya Malathy Poloha Nadan 90 J. Jaafar 54 J.Klaue 93 John Grundy 83 John Hosking 83 Jrn Loviscach 80 J.Schalk 93 Juan Jose Martinez Castillo 65 Juhana Salim 50, 69, 89 Juliana Aida Abu Bakar 97 Jumail Wastam 59 Jumat Sulaiman 71
f
Faaizah Shahbodin 56, 86 F. A. Hussin 54 Faisal A Abu Rub 41 Faizal M.A. 74 Fakariah Hani Mohd Ali 47 Farahwahida Mohd 59 Fatemeh Ahmadi-Abkenari 57 Faten Damanhoori 88 Fathilah Ismail 91 Fathy A. Essa 83 Fatma Susilawati Mohamad 103 Faudzi Ahmad 59 Fazal e Amin 82 Fazli Subhan 65 Ferhat Khenak 44 F. Maleki 68 Foong Oi Mean 83
k
Kajendra Ganeson 91 Kalaivani Chellapan 59 Kamaluddeen Usman Danyaro 55 Kamal Zuhairi Zamli 84 Kamaruzaman Mohamed Hali 89 Kashif Nisar 77 K.C. Soong 80 Keat Keong Phang 72 Keen Ngee Loo 47 Keng Hoon Gan 72 Khabbazi M.R. 83 Khairuddin Kamaludin 51 Khairuddin Maskat 89 Khairul Aiman Ab Maulod 52 Khairullah khan (UTP) 71 Khairul Nisak Md Hasan 67 Khairul Shafee Kalid 101 Khalidah Khalid Ali 56 Khalid Haroun Mohamed Abdelgadir 67 Khalid Jaber 71
I
Ibraheem M. Dooba 55 Ibrahim Abood Almrashdah 55 Ibrahim Ahmad 86 Idyawati Hussein 100 Iftikhar Ahmad 73 Iftikhar Ahmad Khalid A. Nafjan 68 Ili Farhana Md Mahtar 52 Ili Hawa Ahmad 88 Ily Amalina Ahmad Sabri 91 Imas Sukaesih Sitanggang 47, 48 Indrawati 55 I. Nor Haslinda 80 Intan Ermahani A. Jalil 58 Intan Hashimah Mohd Hashim 96 Intan Najua Kamal Nasir 44 Iram Rubab 103
105
g
Gil-Soo Han 57 Goh Chiao Wei 87 Goh Kah Ong Michael 49 Goh Kim Nee 44, 45, 81, 91, 101 Gopal. S. Joshi 62 Gunnar Piho 91
AUTHOR INDEX
Kien Sin Aw 50 Kimberly Chu 81 K. Massila 80 Kok-Wai Chew 55 K S Rama Rao 67 Kumaresh 78 Kwang Hooi Yew 92 Md Nasir Sulaiman 71, 80 Md Yazid Mohd Saman 64 Media A. Ayu 61, 85 M.E.Shiri 68 M. F. Hassan 54 M.H. Alomari 56 Mir Abbas Bozorgi Rad 95 Mirko Caspar 74 Mirko Lippmann 74 M. Nordin Zakaria 43, 77 Mohamad Farhan Mohamad Mohsin 79 Mohamad Shanudin Zakaria 52, 80, 98 Mohamed E. Gumah 48 Mohamed Hussain Thowfeek 102 Mohamed Jalaldeen Mohamed Razi 100 Mohamed Nazul Ismail 52 Mohamed Nordin Zakaria 46, 62 Mohamed Othman 75, 80 Mohamed Redzuan Abdullah 80 Mohammad Ishak Desa 95 Mohammad Khatim Hasan 90 Mohammad Zaidi Zakaria 67 Mohammed Abdi 97 Mohammed Hadwan 48 Mohd Fadzil Hassan 42, 43, 45, 56, 62, 64, 66, 73, 77, 82, 90, 94, 96, 98, 101 Mohd Hakimi Aiman Ibrahim 102 Mohd Hasan Selamat 89 Mohd Hazali Mohammad Adib 89 Mohd Helmy Abd Wahab 79 Mohd Hilmi Hasan 40, 60, 64, 70 Mohd Isa Mohd Samat 99 Mohd Juzaiddin Ab Aziz 66, 84 Mohd Juzaidin Ab Aziz 99 Mohd Kushairi Mohd Rajuddin 59 Mohd Nazri Ismail 76 Mohd Nizam Osman 61 Mohd Rizal Mohd Isa 89 Mohd Rushdan Muhd Said 80 Mohd Saiful Abdul Rahman 68 Mohd Shahizan Othman 69 Mohd Sharifuddin Ahmad 68 Mohd Shukri Ismail 57 Mohd Yunus Sharum 71 Mohd Zaki M. 74 Mourad Oudelha 61
106
L
Lay-Ki Soon 93 Lee Chee Yean 93 Leng Khang Khaw 40 Liang Ying Oh 74 Lim Chia Yean 84 Lim Thean Pheng 84 Lim Tong Ming 79, 86, 87, 92, 93 Lin Cheng Hong 92 Lizawati M. Yusof 69 Lochandaka Ranathunga 47 Low Tan Jung 56, 78 Lusiana Efrizoni 83
M
M. Abdulghafour 61 Mahamat Issa Hassan 88 Mahendhiran Nair 57 Mansour Esmaeilpour 95 Marini Abu Bakar 74 Marini Bakar 64 Marliza R. 74 Mart Roost 91 Maryati Mohd Yusof 99 Maslin Masrom 100 Masood Ur Rehman 75 Masrah Azrifah Azim Murad 66 Masrah Azrifah Azmi Murad 71, 79 Masri Ayob 48, 68 Matthias Vodel 74 Mazani Manaf 72 Mazeyanti Ariffin 70, 75, 94 Mazlan Mahadzir 43 Maznan Deraman 73 Maznie Manaf 79 Mazni Omar 98 Md Jan Nordin 46 Md. Jan Nordin 51, 93
Mousavi 83 Moustapha Tahir 72 Muhamad Lazim Talib 75 Muhamad Taufik Abdullah 77 Muhammad Aasim Qureshi 66, 103 Muhammad Abdul Tawab Khalil 96 Muhammad Agni Catur Bhakti 70 Muhammad Ayaz 78 Muhammad Azlil Syafiq 81 Muhammad Dhiauddin Mohamed Suffian 80 Muhammad Imran 73 Muhammad Jehangir Khan 54 Muhammad Nasir 68 Muhammad Qaiser Saleem 90 Muhammad Rafie M.A. 89 Muhammad Tahir 41 Muhammad Tanvir 69 Muhammad Tariq Siddique 46 Muhammad Taufik Abdullah 71 Muna Azuddin 88 Muna Elsadig 85 Murali Raman 55 Muriati Mokhtar 54 Muriati Mukhtar 52, 91, 98 Murni Mahmud 79, 97, 100 Murniza Muhamad 60 Muslihah Wook 75 Mustafa Man 67 Musyrifah Mahmod 95 Mutasem Alsmadi 55 Muthukkaruppan Annamalai 49 Muzafar Khan 41
N
Naghmeh Mahmoodian 48, 66 Najhan M.Ibrahim 82 Nanna Suryana Herman 90 Naseebullah 54, 56 Nasriah Zakaria 76, 87, 88 Nasuha Lee Abdullah 43 Nazleeni Haron 70 Nazleeni Samiha Haron 45 Nazlia Omar 99 Nazlia Omar 52, 99 Nidal Kamel 59
AUTHOR INDEX
Nik Marsyahariani Nik Daud 88 Nik Nur Aisyah Nik Ghazali 63 Nik Zulkarnaen Khidzir 102 Noor Elaiza Abdul Khalid 72 Noorfadzilah Md Zainudin 45 Noor Faezah Mohd Yatim 51, 52 Noor Habibah Hj Arshad 87, 102 Noorihan Abdul Rahman @ Abdul Rashid 51 Noor Khairunnisa Othman 100 Noor Maizura Mohamad Noor 64, 78, 91 Noor Syakirah Ibrahim 78 Nor Afni Raziah Alias 99 Noraida Ali 78, 91 Noraidah Md Bati 53 Noraidah Shaari @ Ashaari 55, 92 Noraini Seman 94 Norain Mohd Yusoff 40 Nor Aniza Abdullah 47 Norasiken Bakar 86 Nor Athiyah Abdullah 76 Nor Azan Mat Zin 51, 52, 55, 50, 86 Nor Azila Awang Abu Bakar 56, 88 Nor Azura Husin 48 Nordin Abu Bakar 94 Norfarhana Abdollah 60 Nor Fatimah Awang 63 Nor Fazlina Iryani Abdul Hamid 90 Norhayati Mohd Ali 83 Norita Md Norwawi 79 Norizal Abd Latif 64 Norizan Mohamad 49 Nor Laila Md Noor 49 Norleyza Jailani 64 Norlia Mustaffa 83, 87 Norlina Mohd Sabri 53 Normazlina Mohamed zi 95 Normie Azura Abdul Jamil 88 Norshahriah Wahab 75 Nor Shahriza Abdul Karim 57, 100 Norshakirah Ab Aziz 92 Norshidah Mohamed 88 Norshita bt Mat Nayan 103 Norshuhani Zamin 62, 85, 98 Norsiah Abdul Hamid 54 Norsila Shamsuddin 59 Norziha Megat Mohd. Zainuddin 50 N.Schmitt 93 Nudzul Izaney M.Z. 56 Nuradli Shah 102 NurAini Abdul Rashid 61, 67, 71, 97 Nur Athirah Radzi 74 Nur Atiqah Sia Abdullah 89 Nurazlina Md Sanusi 58 Nurazzah Abd Rahman 93 Nur Diana Mohd. Nuri 73 Nurfarhana Mohd Nor 56 Nurhazirah Mohd Bakri 56 Nur Hazwani Mohamad Roseli 58 Nuridawati Mustafa 58 Nurjannaton Hidayah Rais 77 Nursakirah Ab.Rahman Muton 88 Nurul Aida Osman 99 Nurul Hasan 78 Nurulnadwan Aziz 58 Nuzulha Khilwani Ibrahim 102
Q
QurratuAini Adibah Ahmad Fazil 102
R
Rabiah Abdul Kadir 77, 79 Rabiah Ahmad 102 Rabia Sammi 103 Rabiu Ibrahim 57 Radziah Mohamad 83 Radzi Hanif 43 Rafidah Mohd Ramli 88 Rafie, M. 85 Rafiza Ruslan 54 Raja Mohd Tariqi Raja Lope Ahmad 54 Raja N. Ainon 61 Raja Noor Ainon 61 Ramesh Kumar Ayyasamy 69 Rana Ghadban 97 Rehab Shreef 76 Rehan Akbar 45, 101 Reza Alinaghian 95 Riaza Mohd Rias 53 Riza Sulaiman 78, 91, 95 Robiah Y. 74 Rod De Lara 55 Rohaida Romli 84 Rohiza Ahmad 52, 59, 66, 78, 82, 92, 101 Roliana Ibrahim 95 Rory V. OConnor 97 Rose Alinda Alias 42 Roshini Rajamanicam 87 Rosilah Hassan 60 Roslan Sadjirin 93 Rosli Besar 59 Roslina Ibrahim 45 Rosnah Idrus 94 Rosni Abdullah 61, 68, 71 Rozana Kasbon 52, 78 Roziati Zainuddin 47, 51 Rozie Ezrina Shuhimi 86 Rozita Kadar 46 Rusli Abdullah 66, 89 Rustam Asnawi 42
O
O.A. Younis 56 Ola Younis 58 Onn Azraai Puade 50 Osman Ahmed Abdalla 77 Othman, M.S. 81 Ozgur Koray Sahingoz 99
P
Pallawi 62 Parthiban P 41 Patricia Goon 57 P. D. D. Dominic 77, 96 P.D.D. Dominic 54, 82, 97, 98 P.D.D.Dominic 56 P. Dhanapal Durai Dominic 75 Phek Lan Thung 47 P.Kouros 93 Puteri Shireen Jahn Kassim 97
107
AUTHOR INDEX
s
Saadat Alhashmi 69 Saadiah Yahya 47, 87 Safaai Deris 41, 63 Sahilu Wendeson 45 Sai Peck Lee 47 Sajjad Ahmad 101 Sally Hassan A. 89 Salman Firdaus Sidek 92 Salvador Nguema Obama 101 Salwana Mohamad @ Asmara 64 Salwani Abdullah 52 Salyani Osman 52 Samaneh Nadali 79 Saman Shishehchi 51 Sameha Ahmed Ali Alshakhsi 66 Sanep Ahmad 52 Sangeetha Valloo 90 Sarah Azmee 48 Sarah Behnam 95 Savita K. Sugathan 44, 81, 91, 101 Sayed Ali Kasaei Zadeh 46 Sazilah Salam 86 S. D. Silva Jose Paua 92 Sei Ping Lau 71 Seyed Yaser Bozorgi Rad 95 Seyed yashar Bani hashem 51 Shafaf Ibrahim 72 Shafiz Affendi Mohd. Yusof 95 Shahida Sulaiman 46, 47, 84 Shahrina Md Nordin 58 Shahrin Sahib 74 Shahrul Azman Noah 52, 89, 99, 102 Shailendra Singh 98 Shakirah Mohd Taib 66 Shamsul Sahibuddin 42, 51 Sharifah-Lailee Syed Abdullah 98 Sharifah Mumtazah Syed Ahmad 87 Sharifah Suhaila Mohd Ramli 69 Sheikh Tahir Bakhsh 69 Shohel Sayeed 59 Sho Niboshi 66 Shuhadah Othman 72 Shuib Bin Basri 97 Shukor Abd Razak 63 Siew Eu-Gene 69 Sim Kah Wei 41 Sina Lessanibahri 95 Siong Hoe Lau 49 Siti Aisyah Ismail 61 Siti Azila Zainudin 44 Siti Farhana Mohamad Hashim 89 Siti Hamin Stapa 66 Siti N. Abdullah 70 Siti Noor Arfah Umar 83 Siti Noradlina Mat Using 66 Siti Noraishah Musa 43 Siti Nur Syazana Mat Saei 56, 83 Siti Rahayu S. 74 Siti Rohaidah Ahmad 63 Siti Salwa Salim 51 Siti Salwa Salleh 49 Siti Shafrah Shahawai 94 Siti Zaharah Mohid 50 Siti Zarinah Mohd Yusof 43 Sohail Safdar 73 Subarna Sivapalan 74, 91 Sufian Idris 52, 74 Suhaidi Hassan 70 Suhaila Zainudin 41 Sulafa Mohd Amin 85 Sulaiman 83 Suraya Masrom 81 Suriayati Chuprat 67, 102, 103 Suziah Sulaiman 40, 41, 44, 56, 59, 60, 64, 76, 77, 80, 83 Swee Jing Thung 47 Syed Ahmad Aljunid 47 Syed Nasir Alsagoff 90 Syerina Azlin Md Nasir 49 Thomas Sri Widodo 45 Tong Ming Lim 74 T.Pistner 93 T. Puckdeepun 54 Tsamrul Fuad 47 Tuan Norhafizah Tuan Zakaria 84, 99
u
Umi Kalsom Yusof 40, 63 Umi Kalthum Ngah 72 Uwe Dippel 42
V
Vahideh Naderifar 95 Vijanth Sagayan A/L Asirvadam 43 Vincent KT Khoo 84
W
W. Aezwani W. A. Bakar 67 Wahidah Husain 84, 87 Wan Fatimah Wan Ahmad 40, 42, 45, 48, 58, 59, 60, 74, 77, 82 Wan M.N. Wan-Kadir 83 Wan Norazlinawati Wan Abd Arif 58 Waskito Adi 76 Wolfram Hardt 74 Wong Wai Keong 86 Wou Onn Choo 52
T
Tang Enya Kong 82 Tan Lai Heng 79 Tat-Chee Wan 54, 62 Ta Thu Ha 92 Teddy Mantoro 61, 85 Tee Connie 49 Tek Yong Lim 81 Tengku Mohd Tengku Sembok 93 Tengku Sembok 52, 93 Tew Yiqi 49 Tg Nor Rizan Tg Mohd Maasum 84, 99 Tg Zatul Hidayah Tg Petra 66
y
Yahya Tashtoush 56, 58 Yaser Miaji 70 Yasir Abdelgadir Mohamed 65 Yazrina Yahya 52, 57, 98, 99 Yee-Jun Wong 43 Yousra Abdulaziz 87 Yuhanim Hani Yahaya 89 Yuhanis Omar 92 Yu-N Cheah 67, 96, 98 Yunita Sari 62
108
AUTHOR INDEX
Yusri Arshad 79 Yusuf, L.M. 81 Y.Y.Chen 101
z
Zafarina Zainuddin 64 Zahian Ismail 60 Zailani Mohamed Sidek 67 Zailani Mohammed Sidek 100 Zainab Abu Bakar 93, 94, 100 Zainal Abidin Nordin 57 Zain Balfagih 82 Zaitul Azma Zainon Hamzah 71 Zalinda Othman 54 Zaman, Azlina Ahmad 50, 52, 60 Zarinah Mohd Kasirun 87 Zarina Shukur 74 Z. Farhood 61 Zubair Ahmad Khattak 64 Zulaiha Ali 93 Zulaiha Ali Othman 52, 70, 73 Zulkarnain Md Ali 80 Zulkeflee Kusin 80 Zulkefli Mansor 87 Zulkhairi Md. Dahalin 95 Zuraidah Abdullah 99, 102 Zuraini Hanim Zaini 48 Zuraini Ismail 100
109