You are on page 1of 110

4th International Symposium on Information Technology

ITSim 10

TECHNICAL PROGRAMME & AbsTRACTs

4th INTERNATIONAL SYMPOSIUM ON INFORMATION TECHNOLOGY ITSim 10 Technical Programme & Abstracts
2010, Universiti Teknologi PETRONAS Institute of Technology PETRONAS Sdn. Bhd.

Copyright and Reprint Permission:


In compliance with the terms of the Copyright Act 1987 and the IP Policy of the university, the copyright of this publication has been reassigned by the author to the legal entity of the university, Institute of Technology PETRONAS Sdn. Bhd. Due acknowledgement shall always be made of the use of any material contained in, or derived from this publication. All materials are copyright of Universiti Teknologi PETRONAS. Reproduction in whole or in part is not permitted without the written permission from the university.

ISBN 978-983-2271-07-9

789832

271079

CONTENTS
FOREWORD
Assoc. Prof. Dr. Ahmad Kamil Mahmood Prof. Dato Dr. Halimah Badioze Zaman Prof. Dr. Zaiki Awang 4 5 6

ORGANISING COMMITTEE PROGRAMME COMMITTEE PLENARY NOTES TO DELEGATES VENUE LAYOUT CONFERENCE PROGRAMME TECHNICAL SESSIONS
Oral Presentations Poster Presentations 21 34

7 9 13 16 17 18 21

WORKSHOPS ABSTRACTS AUTHOR INDEX

38 40 104

FOREWORD

n behalf of all the co-chairs, it gives me great pleasure to welcome all guests, speakers and delegates to Kuala Lumpur to attend the 4th International Symposium on Information Technology (ITSim10), in part of the World Engineering, Science & Technology Congress (ESTCON2010). This fourth ITSim symposium is hosted by Universiti Teknologi PETRONAS (UTP), co-host with Universiti Kebangsaan Malaysia (UKM) and jointly organized by 18 public and private universities in Malaysia. ITSim10 is also co-sponsored technically by the Institute of the Electronic Electrical Engineers (IEEE) with seven professors from Malaysia, the United Kingdom, Australia, Thailand and the United States being the co-chairs. The aim of this symposium is to provide an excellent platform for professionals, engineers, academicians and practitioners worldwide to share and exchange research knowledge and ideas in technologies and applications in the field of Information and Communication Technology (ICT). With the theme being Sustainable Informatics and Engineering: Harmonising Human and Natural Ecosystem and more than 300 papers presented, ITSim10 promises a wide variety of topics which reflect and contribute to a paradigm shift towards sustainable energy, human and ecosystem supporting the values of human life and activities in the global and social perspective. I would like to take this opportunity to thank the plenary speakers, workshop presenters and all participants who take part in this event. It is our hope that this conference can help shape a community that will lead to greater research in the field of sustainable energy and ICT. For all the hard work and dedication, I would like to once again thank each and every one of you for your valuable contribution towards the success of this symposium, and wish you a professionally rewarding and socially enjoyable stay in Kuala Lumpur.

Assoc. Prof. Dr. Ahmad Kamil Mahmood (UTP) Conference Co-Chair ITSim10

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

FOREWORD

n behalf of a dedicated team that organized this event, from both the public and private institutions of higher learning, locally and globally, I take great pleasure in welcoming all participants to the 4th International Symposium on Information Technology (ITSim10). ITSim10 this year has seen a tremendous change and growth in its organization, with joint collaboration from many more IT faculties of various public and private universities and colleges in the country, and co-sponsored by the Institute of the Electronic Electrical Engineers (IEEE) Computer Society, Institute of the Electronic Electrical Engineers (IEEE), MSC Malaysia (MDeC) and Malaysian Information Technology Society (MITS). This is an effort to bring together researchers and practitioners in this highly anticipated ICT event. ITSim10 with its theme Sustainable Informatics and Engineering: Harmonising Human and Natural Ecosystem is timely when the world research is changing and playing its part to conserve and maintain its balance in the ecosystem. ICT plays a big role in ensuring the sustainability of hardware and software systems which contributes to the development for the present without compromising the wellbeing of the future generation. Thinking of new methods and development of computer hardware and software systems brings breakthrough in terms of energy consumption and reusability. Let me take this opportunity to thank all the organizing committees from UTP and all the other IPTAs and IPTSs involved, program committees from universities in Asia, United States of America and Australia who have shown dedication in making this symposium a success. I would like to also thank the keynote speakers, workshop presenters and all participants who have made special effort to be here, making history in shaping, influencing and directing the future research and innovations in ICT. Last but not least, I would like to also convey a special thank you to all the sponsors who have kindly contributed to the symposium, making it a memorable one.

Prof. Dato Dr. Halimah Badioze Zaman (UKM) Conference Co-Chair ITSim10

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

FOREWORD

EEE Malaysia Section would like to express our gratification for being part of this event. This symposium is in its fourth year running and has proved to be successful. The initiative shown by all the public and private universities in making this event successful is commendable and it is an honor for IEEE to have been able to collaborate and contribute, working in concert with all of them. ITSim10 is a great avenue to showcase research findings for professionals and academicians, and a platform to exchange worthy and creditable knowledge and ideas to the world. On behalf of IEEE Malaysia Section and IEEE Computer Society of Malaysia I would like to express our sincere thanks and heartiest congratulations to each and everyone who were involved in organizing ITSim10 for their tireless and tremendous efforts. To the researchers, thank you for sharing your findings with us. I hope that you will take this opportunity to meet friends, exchange knowledge and at the same time enjoy what Malaysia has to offer during your stay here. I wish everyone a successful conference.

Prof. Dr. Zaiki Awang, SMIEE (IEEE Malaysia Section) Conference Co-Chair ITSim10

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

ORGANISING COMMITTEE
CONFERENCE CO-ChaiR: Ahmad Kamil Mahmood (UTP) Halimah Badioze Zaman (UKM) Peter Robinson (Cambridge University, UK) Peter Haddawy (Asian Institute of Technology, Thailand) Steve Elliot (University of Sydney, Australia) Stephan Olariu (Old Dominion University, USA) Zaiki Awang (IEEE Malaysia Section)

LOCaL COmmittEE: Chair: Ahmad Kamil Mahmood (UTP) Co-Chair: Halimah Badioze Zaman (UKM) SECREtaRy i: SECREtaRy ii: tREaSuRER: aSSt. tREaSuRERS: tEChNiCaL: Wan Fatimah Wan Ahmad (UTP) Azlina Ahmad (UKM) Rabiah Abdul Kadir (UPM) Dayang Rohaya Awang Rambli (UTP) Chen Yoke Yie (UTP) Halimah Badioze Zaman (UKM) Chair Abas Md Said (UTP) Abdul Razak Hamdan (UKM) Abdullah Sani Abdul Rahman (UTP) Ahmad Bakeri Abu Bakar (UIAM) Ahmad Kamil Mahmood (UTP) Ahmad Rafi Mohamed Eshaq (MMU) Azlina Ahmad (UKM) Azizah Jaafar (UKM) Baharuddin Aris (UTM) Choo Wou Onn (UTAR) Elankovan Sundararajan (UKM) Faaizah Shahbodin (UTeM) Fatimah Dato Ahmad (UPNM) Hajah Norasiken Bakar (UTeM) Halabi Hasbullah (UTP) Ho Chiung Ching (MMU) Jafreezal Jaafar (UTP) Jale Ahmad (UTP) Khalil Haji Awang (UiTM) Low Tan Jung (UTP) M Fadzil Hassan (UTP) Mahendhiran S Nair (Monash) Mohamad Farhan Mohamad Mohsin (UUM) Mohamed Redzwan Abdullah (MIMOS) Nursuriati Jamil (UiTM) Chair Khalil Hj Awang (UiTM) Syed Nasir Syed Alsagoff (UPNM) Chair Ahmad Rafi Mohamed Eshaq (MMU) Mohd Khatim Hassan (UKM) Mohd Hamdan Suhaimi (UMT) Mohd Hazali Mohamed Halip (UPNM) Murni Mahmud (UIAM) Ng Swee Chin (Kolej TAR) Noor Azhar Mohamed Shazlili (UMT) Noor Maizura Mohamad Noor (UMT) Noraida Haji Ali (UMT) Norshuhada Shiratuddin (UUM) Nursuriati Jamil (UiTM) Rabiah Abdul Kadir (UPM) Riza Sulaiman (UKM) Rohiza Ahmad (UTP) Rosni Abdullah (USM) Rozana Kasbon (UTP) Sameem Abdul Kareem (UM) Shahrul Azman Mohd Noah (UKM) Shuib Basri (UTP) Siti Maryam Hj Shamsuddin (UTM) Suziah Sulaiman (UTP) Syed Najmuddin Syed Hassan (UTeM) Syed Nasir Alsagoff (UPNM) Tengku Mohd Tengku Sembok (UPNM) Wan Fatimah Wan Ahmad (UTP) Zainab Abu Bakar (UiTM) Zulaiha Ali Othman (UKM) Low Tan Jung (UTP) Nurazzah Abd Rahman (UiTM) Mohd Fadzil Hassan (UTP) Mohd Hilmi Hasan (UTP) Riza Sulaiman (UKM)

LOgiStiC: EvENt mgt & pROtOCOL:

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

ORGANISING COMMITTEE
pubLiCity: Norshuhada Siratuddin (UUM) Chair Ahmad Rafi Mohamed Eshaq (MMU) Alan Oxley (UTP) Arifah Dhe Alhadi (UMT) Azizah Jaafar (UKM) Choo Wou Onn (UTAR) Elankovan Sundarajan (UKM) Ho Chin Kuan (MMU) Kamarudin Saadan (USIM) Liana Jacinta (MyREN) Lim Soo King (UTAR) Maslina Abd Aziz (UiTM) Masita A Jalil (UMT) Md Yazid Mohd Saman (UMT) Mohamed Othman (UPM) Mohamed Redzwan Absullah (MIMOS) Mohd Hazrin Ismail (UTP) Mohd Rawidean Kassim (IEEE Malaysia Section) Jafreezal Jaafar (UTP) - Chair Aliza Sarlan (UTP) Choo Wou Onn (UTAR) Faaizah Shahbodin (UTeM) Faizal Ahmad Fadzil (UTP) Fakhrul Adli Mohd Zaki (UMT) Halimah Badioze Zaman (UKM) Hajah Norasiken Bakar (UTeM) Junaidi Abdullah (MMU) Marshima Mohd Rosli (UiTM) Mohd Fauzan Noordin (UIAM) Muhaiyuddeen Shaik Allaudin (UTP) Nazleeni Samiha Haron (UTP) Chair Chen Yoke Yie (UTP) Choo Wou Onn (UTAR) Elankovan Sundaraan (UKM) Muhaiyuddeen Shaik Allauddin (UTP) Chair Murni Mahmud (UIAM) Naimah Mohd Hussin (UiTM) Nazleeni Samiha Haron (UTP) Noramiza Hashim (MMU) Normaziah Abdul Aziz (UIAM) Norshahriah Wahab (UPNM) Norshidah Mohamed (UIAM) Norzilah Musa (UTM) Nur Azian Mior Aziz (UiTM) Raja Noor Ainon Zabariah (UM) Riza Sulaiman (UKM) Rozilawati Razali (UKM) Salimah Mokhtar (UM) Shahida Sulaiman (USM) Shakirah Mohd Taib (UTP) Siti Mariam Hj Shamsuddin (UTM) Zamri Mohamed (UTM)

SpONSORShip:

Nazlia Omar (UKM) Nasriah Zakaria (USM) Nasiroh Omar (UiTM) Noor Azhar Mohamed Shazlili (UMT) Roslan Ismail (UNITEN) Shahrul Azman Mohd Noah (UKM) Siti Salbiah Mohamed Shariff (UNITEN) Teh Raqamah Abdullah (OUM) Tengku Mohd Tengku Sembok (UPNM) Wan Fatimah Wan Ahmad (UTP) Yap Sing Nian (Limkokwing) Lim Yee Mei (KTAR) Norshariah Abdul Wahab (UPNM) Savita K. Sugathan (UTP) Goh Kim Nee (UTP) Safinaz Hamzah (UTP)

wORkShOp:

SECREtaRiat:

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

PROGRAMME COMMITTEE
INTERNATIONAL COMMITTEE Abid Ali Minhas (Bahria University, Pakistan) Akkihebbal L. Ananda (National University of Singapore, Singapore) Aliou Diop (Gaston Berger University, Senegal) Anton Satria Prabuwono (Budi Luhur University, Indonesia) Balasundaram Sadhu Ramakrishnan (National Institute of Technology, India) Cho-Li Wang (The University of Hong Kong, Hong Kong) Chris Gill (Washington University in St. Louis, USA) Dr. rer. nat. habil. Andreas Polze (University of Potsdam, Germany) Edward A Fox (Virginia Tech, USA) Ghossoon Mohammed Waleed Al-Saadoon (Applied Science University, Bahrain) Hang-Bong Kang (Catholic University of Korea, Korea) Iftikhar Azim Niaz (Riphah International University, Pakistan) Jen-Yao Chung (IBM, USA) Kazi. M. Ahmed (Asian Institute of Technology, Thailand) Mansoor Alam Ansari Ansari (Federal Urdu University of Arts, Science and Technology, Pakistan) Muhammad Zubair (Riphah International University, Pakistan) Norhayati Mohd Ali (University of Auckland, New Zealand) Paul Janecek (Asian Institute of Technology, Thailand) Rory V O'Connor (Dublin City University, Ireland) Sajjad Haider (National University of Modern Languages, Pakistan) Savarimuthu Nickolas (National Institute of Technology, India) Selvakumar Subramanian (National Institute of Technology, India) Stephan Olariu (Old Dominion University, USA) Stephane Bressan (National University of Singapore, Singapore) Thomas Noel (University of Strasbourg, France) LOCAL COMMITTEE A Singh (Curtin) Ab Razak Che Husin (UTM) Abdul Razak Hamdan (UKM) Abas Md Said (UTP) Abd. Samad Hasan Basari (UTeM) Abdul Azim Abd Ghani (UPM) Abdul Hanan Abdullah (UTM) Abdul Rahim Ahmad (UNITEN) Abdul Rashid Mohamed (USM) Abdul Razak Hussain (UTeM) Abdul Sahli Fakharudin (UMP) Abdul Samad Ismail (UTM) Abdul Samad Shibghatullah (UTeM) Abdullah Mat Safri (UMP) Abdullah Mohd Zin (UKM) Abdullah Muhammed (UPM) Abdullah Sani Abd Rahman (UTP) Abdullah Zawawi Talib (USM) Abrizah Abdullah (UM) Abu Bakar Md Sultan (UPM) Abu Bakar Sedek A Jamak (UTP) Adlina Ahmad (Monash) Afza Shafie (UTP) Ahamad Tajudin Khader (USM) Ahmad BakeriI Abu Bakar (UIAM) Ahmad Nurulazam Md Zain (USM) Ahmad Rafi Mohamed Eshaq (MMU) Ahmad Suhaimi Baharudin (USM) Ahmed Mansour Manasrah (USM) Aida Mustapha (UPM)
4th International Symposium on Information Technology 9

Aidanismah Yahya (UKM) Aini Hussain (UKM) Akcell Chiang Chii-Chung (UM) Alan Oxley (UTP) Alex Sim (UTM) Ali Selamat (UTM) Alicia Tang Yee Chong (UNITEN) Alvin Yeo (Unimas) Aman Jantan (USM) Ariffuddin Joret (UTHM) Amirah Ismail (UKM) Asma Hanee Ariffin (UPSI) Asmara Alias (UPSI) Asmidar Abu Bakar (UNITEN) Awanis Romli (UMP) Azali Saudi (UMS) Azhan Hasan (UTP) Aziman Abdullah (UMP) Azizah Abdul Rahman (UTM) Azizah Jaafar (UKM) Azizan Zainal Abidin (UTP) Azizol Abdullah (UPM) Azlan Iqbal (UNITEN) Azlina Ahmad (UKM) Azniah Ismail (UPSI) Aznoora Osman (UiTM) Azrul Hazri Jantan (UPM) Azuraliza Abu Bakar (UKM) Azween Abdullah (UTP) Badariah Solemon (UNITEN)

a conference of World Engineering, Science & Technology Congress

PROGRAMME COMMITTEE
Bahari Belaton (USM) Baharuddin Aris (UTM) Baharum Baharudin (UTP) Balsam A. Mustafa (Swinburne) Bariah Yusob (UMP) Biju Issac (Swinburne) Brahim Belhaouri Samir (UTP) Burairah Hussin (UTeM) Burhanuddin Mohd Aboobaider (UTeM) Chai Wei-Yen (Almon) (UTAR) Chan Lee Kwun (UTAR) Chee Weng Khong (MMU) Chien-Sing Lee (MMU) Chin-Kuan Ho (MMU) Chong Eng Tan (Unimas) Choo-Yee Ting (MMU) Chye Kok Ho (Monash) Dayang Norhayati Abg Jawawi (UTM) Dayang Rohaya Awang Rambli (UTP) Deepak Laxmi Narasimha (UM) Dhanapal Durai Dominic (UTP) Dhanesh Ramachandram (USM) Diana Wong (UTP) Edwin Mit (Unimas) Elankovan Sundararajan (UKM) Emaliana Kasmuri (UTeM) Emelia Akashah P Akhir (UTP) Eng Thiam Yeoh (MMU) Eswaran Eswaran (MMU) Etienne Schneider (UTP) Faaizah Shahbodin (UTeM) Faizal Ahmad Fadzil Farid Ghani (UniMAP) Farok Hj Azmat (UiTM) Fatihah Ramli (Unimas) Fatimah Khalid (UPM) Fatimah Saleh (USM) Fatimah Sidi (UPM) Fong Woon Lai (UTP) Ghazala Khan (Monash) Hafizul Fahri Hanafi (UPSI) Hairul Nizam Ismail (USM) Hairulliza Mohd. Judi (UKM) Hajar Mat Jani (Uniten) Halabi Hasbullah (UTP) Halimah Badioze Zaman (UKM) Halina Mohamed Dahlan (UTM) Hamid Abdulla Jallb Al-Tulea (UM) Hamidah Ibrahim (UPM) Hanita Daud (UTP) Haniza Nahar (UTeM) Hasiah Mohamed @ Omar (UiTM) Haslinda Sutan Ahmad Nawi (Unisel) Hasliza A Rahim (UniMAP) Hazura Zulzalil (UPM) Helmi Md Rais (UTP) Ho Chiung Ching (MMU) Hong Siang Chua (Swinburne)
4th International Symposium on Information Technology 10

Hong Tat Ewe (UTAR) Ibrahima Faye (UTP) Idawaty Ahmad (UPM) Imam Baihaqi (Monash) Imran Mohd Ibrahim (UTeM) Inson Din (Unimas) Jafreezal Jaafar (UTP) Jamalul-Lail Ab Manan (MIMOS Berhad) Jamilah Hamid (UPSI) Jane Labadin (Unimas) Jasni Mohamad Zain (UMP) Jiwa Abdullah (UTHM) John Ojur Dennis (UTP) Josefina Barnachea Janier (UTP) Juhana Salim (UKM) Juliana Jaafar (UTeM) Junaidi Abdullah (MMU) K. Y. Sim (Swinburne) Kalaivani Chellappan (UNIR AZAK) Kamalrulnizam Abu Bakar (UTM) Kamarul Jalal Abdul Jalil (UM) Kamarul Naemi Kamarudin (UNIR AZAK) Kamsuriah Ahmad (UKM) Kashif Nisar (UTP) Khairuddin Omar (UKM) Khairul Azhar Kasmiran (UPM) Khairul Shafee Kalid (UTP) Kim Nee Goh (UTP) Koo Ah Choo (MMU) Lee Lay Wah (USM) Lenin Gopal (Curtin) Lili Nurliyana Abdullah (UPM) Lilly Suriani Affendey (UPM) Mazeyanti Ariffin (UTP) M. L. Dennis Wong (Swinburne) Mahendhiran SNair (Monash) Mai Neo (MMU) Maizatul Hayati Mohamad Yatim (UPSI) Manas Kumar Haldar (Swinburne) Mandava Rajeswari (USM) Mandeep Singh (UKM) Manjit Singh Sidhu (UNITEN) Manoranjitham Muniandy (UTAR) Mardziah Hashim (UiTM) Marina Md. Din (UNITEN) Mashitah Sabdin (UTP) Masrah Azrifah Azmi Murad (UPM) Mastura Yunan (MMU) May Lin Yap (UiTM) Maziani Sabudin (USM) Mazran Esro (UTeM) Md Asri Ngadi (UTM) Md Yazid Mohamad Saman (UMT) Md Zahar Othman (UPSI) Md. Jan Nordin (UKM) Min Hooi Chuah (UTAR) Modi Lakulu (UPSI) Mohamad Fadli Zolkipli (UMP)
a conference of World Engineering, Science & Technology Congress

PROGRAMME COMMITTEE
Mohamad Nazri Khairuddin (Unimas) Mohamad Radzi Zainol (UTP) Mohamad Shahrul Shahidan (UNITEN) Mohamad Suhaizal Abu Hassan (UniMAP) Mohamed Nordin Zakaria (UTP) Mohamed Redzuan Abdullah (MIMOS Berhad) Mohammad Fadel Jamil Klaib (UMP) Mohammad Faidzul Nasrudin (UKM) Mohammad Faiz Liew Abdullah (UTHM) Mohammad Nazir Ahmad (UTM) Mohammad Reza Beik Zadeh (MIMOS Berhad) Mohammad Zohir Ahmad @ Shaari (USM) Mohd Adib Omar (USM) Mohd Alif (UniMAP) Mohd Azwan Mohamad@Hamza (UMP) Mohd Fadzil Hassan (UTP) Mohd Faizal Abdollah (UTeM) Mohd Fareq Abd Malek (UniMAP) Mohd Hazali Mohamed Halip (UPNM) Mohd Hazli Mohamed Zabil (UNITEN) Mohd Hilmi Hasan (UTP) Mohd Isa Mohd Samat (UiTM) Mohd Nazri Md Saad (UPSI) Mohd Norafizal Abd Aziz (UiTM) Mohd Sapiyan Baba (UM) Mohd Shafry Mohd Rahim (UTM) Mohd Shahizan Othman (UTM) Mohd Sharifuddin Ahmad (UNITEN) Mohd Syazwan Abdullah (UUM) Mohd Yunus Nayan (UTP) Mohd Yunus Sharum (UPM) Mohd Zamri Murah (UKM) Mohd Zuki Yusoff (UTP) Mohd. Hasan Selamat (UPM) Mohd. Khanapi Abd. Ghani (UTeM) Mohd. Marzuki Mustafa (UKM) Umi Asma Mokhtar (UKM) Muhammad Daniel Hafiz Abdullah (UPM) Muhammad Dhiauddin Mohamed Suffian (MIMOS Berhad) Muhammad Imran (UTP) Muhammad Yusof Ismail (UTHM) Muriati Mukhtar (UKM) Nader N Barsoum (Curtin) Naimah Mohd Hussin (UiTM) Nalini Dharmarajan (UiTM) Nana Suryana Herman (UteM) Narinderjit Singh Sawaran Singh (UTP) Nasharuddin Zainal (UKM) Nasuha Lee Abdullah (USM) Naziffa Raha Md Nasir (UNITEN) Nazleeni Haron (UTP) Nazlena Mohamad Ali (UKM) Nazlia Omar (UKM) Nazre Abdul Rashid (UPSI) Nazrita Ibrahim (UNITEN) Neo Tse Kian (MMU) Nik Marsyahariani Nik Daud (UiTM)
4th International Symposium on Information Technology 11

Noohul Basheer Zain Ali (UTP) Noor Habibah Hj Arshad (UiTM) Noor Maizura Mohamad Noor (UMT) Noorazizun Mohd. Saad (UNITEN) Noorminshah A.Iahad (UTM) Nor Azah Abdul Aziz (UPSI) Nor Azan Haji Mat Zin (UKM) Nor Azila Awang Abu Bakar (UiTM) Nor Fazlida Mohd. Sani (UPM) Nor Hasbiah Ubaidullah (UPSI) Nor Hawaniah Zakaria (UTM) Nor Khalidah Abu (UNIR AZAK) Nor Laila Md Noor (UiTM) Nor Laily Hashim (UUM) Nor Surayati Usop (Unimas) Noraida Ali (UMT) Noraidah Sahari @ Ashaari (UKM) Norasiken Bakar (UTeM) Norasikin Fabil (UPSI) Noraziah Ahmad (UMP) Nordin Abu Bakar (UiTM) Norhaziah Md. Salleh (UTeM) Norizan Esa (USM) Norlida Ahmad (USM) Norlina Mohd Sabri (UiTM) Normalia Samian (UTM) Norshidah Mohamed (UIAM) Norshuhada Siratuddin (UUM) Norshuhani Zamin (UTP) Norwati Mustapha (UPM) Novia Indriaty Admodisastro (UPM) Nur Izura Udzir (UPM) Nur Saadah Fathil (UPSI) Nur Syufiza Ahmad Syukur (Unisel) Nuraini AbdulRashid (USM) Nuraminah Ramli (UPSI) Nursuriati Jamil (UiTM) Oi Mean Foong (UTP) Omar Musa (UNIR AZAK) Ong Sing Goh (UTeM) Othman Ibrahim (UTM) Pathiah Abdul Samat (UPM) Peter Woods (MMU) Phon-Amnuaisuk Somnuk (MMU) Poon Wai Ching(Monash) Puteri Suhaiza Sulaiman (UPM) R Badlishah Ahmad (UniMAP) Rabiah Ahmad (UTM) Ramlah Mailok (UPSI) Rasyidi Johan (UPSI) Razali Yaakob (UPM) Razib M. Othman (UTM) Razulaimi Razali (UiTM) Ridha Omar (UNITEN) Rodziah Atan (UPM) Rohaya Latip (UPM) Rohiza Ahmad (UTP) Roliana Ibrahim (UTM)
a conference of World Engineering, Science & Technology Congress

PROGRAMME COMMITTEE
Rosalina Abd. Salam (USIM) Rosilah Hassan (UKM) Roslan Ismail (UNITEN) Rosliana Mohd Sidek (UM) Rosnah Idrus (USM) Rosni Abdullah (USM) Rozana Kasbon (UTP) Rozilawati Razali (UKM) Rozlan Alias (UTHM) Rusli Abdullah (UPM) Rusli Salleh (UM) Sa'adah Hassan (UPM) Saadiah Yahya (UiTM) Saipunidzam Mahamad (UTP) Salman Firdaus Sidek (UPSI) Salman Yussof (UNITEN) Salmiza Saleh (USM) Sameem Abdul Kareem (UM) Samsul Ariffin Abdul Karim (UTP) Santha Vaithilingam (Monash) Savita K Sugathan (UTP) Sazilah Salam (UTeM) Sazlinah Hasan (UPM) Sei Ping Lau (Unimas) Shafia Abdul Rahman (USM) Shaharuddin Salleh (UTM) Shahdan Md. Lani (UTeM) Shahida Sulaiman (USM) Shahnorbanun Sahran (UKM) Shahrin Sahib@Sahibuddin (UTeM) Shakirah Mohd Taib (UTP) Shamala Subramaniam (UPM) Sharifah Mumtazah Syed Ahmad (UNITEN) Sharifah Norhaidah Syed Idros (USM) Shing-Chiang Tan (MMU) Shuib Basri (UTP) Shukor Abd Razak (UTM) Shyamala C. Doraisamy (UPM) Siew Pei Hwa (UTAR) Siti Khaotijah Mohammad (USM) Siti Mariyam Shamsuddin (UTM) Siti Norul Huda Sheikh Abdullah (UTM) Siti Salbiah Mohamed Shariff (UNITEN) Siti Salwa Ismail (UNITEN) Sofianita Mutalib (UiTM) Subariah Ibrahim (UTM) Suhaidi Hassan (UUM)
Abbreviations: Curtin = Curtin University of Technology, Sarawak Campus KTAR = Kolej Tunku Abdul Rahman Limkokwing = Limkokwing University College of Creative Technology MMU = Multimedia University Monash = Monah University, Malaysia Sunway = Sunway University College Swinburne = Swinburne University of Technology, Sarawak Campus OUM = Open University Malaysia UIAM = Universiti Islam Antarabangsa Malaysia

Suhaila Zainudin (UKM) Sulaiman Sarkawi (UPSI) Su-Cheng Haw (MMU) Syahanim Mohd Salleh (UKM) Syariffanor Hisham (UTeM) Syed Ahmad Sheikh Aljunid (UiTM) Syed Nasir Alsagoff (UPNM) T. J. Iskandar Abdul Aziz (UNITEN) Tan Jung Low (UTP) Tan Tien Ping (USM) Tat-Chee Wan (USM) Teh Noranis Mohd Aris (UPM) Tieng Wei Koh (UPM) Tiong Teck Chai (Curtin) Umi Kalsom Yusof (USM) Uwe Dippel (UNITEN) Veeramani Shanmugam (Curtin) Vijanth Sagayan Asirvadam (UTP) Vincent KT Khoo (USM) Wafaa Al-Salihy (USM) Wahidah Husain (USM) Wai Khuen Cheng (UTAR) Wan Fatimah Wan Ahmad (UTP) Wan Nursaiedah Wan Ismail (Curtin) Wardah Zainal Abidin (UTM) Woo Chaw Seng (UM) Wou Onn Choo (UTAR) Yazrina Yahya (UKM) Yeong Tyng Ling (Unimas) Yoke Yie Chen (UTP) Yong Tien Fui (UTAR) Yu-N Cheah (USM) Yun Huoy Choo (UTeM) Yusmadi Yah Jusoh (UPM) Zainuddin Hassan (UNITEN) Zalinda Othman (UKM) Zarina Shukur (UKM) Zarinah Mohd Kasirun (UM) Zawiyah Mohd Yusof (UKM) Zhuquan Zang (Curtin) Ziyad Tariq Al-Khinalie (MMU) Zuhaidah Mohamed Zain (UPSI) Zulaiha Ali Othman (UKM) Zulkarnain Md Ali (UKM) Zulkifli Husin (UniMAP) Zurida Ismail (USM) Zurina Mohd. Hanapi (UPM)
UPNM = Universiti Pertahanan Nasional Malaysia USM = Universiti Sains Malaysia UPSI = Universiti Pendidikan Sultan Idris UTHM = Universiti Tun Hussein Onn UTP = Universiti Teknologi PETRONAS UTem = Universiti Teknikal Malaysia Melaka UTAR = Universiti Tunku Abdul Rahman UTM = Universiti Teknologi Malaysia USIM = Universiti Sains Islam Malaysia UUM = Universiti Utara Malaysia

UiTM = Universiti Teknologi MAR A UKM = Universiti Kebangsaan Malaysia UM = Universiti Malaya UMP = Universiti Malaysia Pahang UMS = Universiti Malaysia Sabah UMT = Universiti Malaysia Trengganu Unimas = Universiti Malaysia Sarawak UniMAP = Universiti Malaysia Perlis Unisel = Universiti Industri Selangor UNIR AZAK = Universiti Tun Abdul Razak UNITEN = Universiti Tenaga Nasional UPM = Universiti Putra Malaysia 12

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

PLENARY
Computation of Emotions in Man and Machines
PROf. DR. PETER RObINsON University of Cambridge, Computer Laboratory, William Gates Building, 15 JJ Thomson Avenue, Madingley Road, Cambridge CB3 0FD, England T: +44 1223 334 637 F: +44 1223 334 678 E: pr at cl.cam.ac.uk

AbsTRACT The importance of emotional expression as part of human communication has been understood since the seventeenth century, and has been explored scientifically since Charles Darwin and others in the nineteenth century. Advances in computer technology now allow machines to recognise and express emotions, paving the way for improved humancomputer and human-human communications. This talk presents some recent advances in theories of emotion and affect, their embodiment in computational systems, the implications for general communications, and broader applications. Recent advances in Psychology have greatly improved our understanding of the role of affect in communication, perception, decision-making, attention and memory. At the same time, advances in technology mean that it is becoming possible for machines to sense, analyse and express emotions. We can now consider how these advances relate to each other and how they can be brought together to influence future research in perception, attention, learning, memory, communication, decision-making and other applications. The computation of emotions includes both expression and recognition, using channels such as facial expressions, nonverbal aspects of speech, posture, gestures and general behaviour. The combination of new results in psychology with new techniques of computation on new technologies will enable new applications in commerce, education, entertainment, security, therapy and everyday life. However, there are important issues of privacy and personal expression that must also be considered.

bIOgRAPhy PROF. DR. PETER ROBINSON is Professor of Computer Technology in the Computer Laboratory at the University of Cambridge, where he leads the Rainbow Research Group working on computer graphics and interaction. His research concerns problems at the boundary between people and computers. This involves investigating new technologies to enhance communication between computers and their users, and new applications to exploit these technologies. The main focus for this is human-computer interaction, where he has been leading work for some years on the use of video and paper as part of the user interface. The idea is to develop augmented environments in which everyday objects acquire computational properties through user interfaces based on video projection and digital cameras. Recent work has included desk-size projected displays and inference of users' mental states from facial expressions, speech, posture and gestures. [http://www.cl.cam.ac.uk/~pr10/general/]

4th International Symposium on Information Technology

13

a conference of World Engineering, Science & Technology Congress

PLENARY
business Transformation Driven by Environmental sustainability: a Critical Topic for Information systems and Multi-Disciplinary Research
PROf. DR. sTEVE ELLIOT Business Information Systems, Faculty of Economics & Business, The University of Sydney, NSW 2006 Australia. Room 433, Economics & Business Building (H69), Corner Rose & Codrington Sts, Darlington, NSW 2008 Australia T: +61 2 9036 9347 F: +61 2 9351 6638 E: s.elliot@econ.usyd.edu.au W: www.econ.usyd.edu.au/bis/

AbsTRACT An imperative for business transformation to achieve environmental sustainability is recognized by: the governments of 192 countries as signatories to the United Nation Framework Convention on Climate Change; business thought leaders like Michael Porter; and by CEOs in global surveys by IBM and McKinsey rating this issue as one of their greatest challenges. Business leaders may proactively prepare their organizations for change or delay until legal directives are enacted, although delaying may not buy much time. Environmental legislation currently before the US Congress, could lead to profound changes in many sectors of the economy. Business opportunities will materialize through the process of transformation. Porter considers environmental sustainability has the potential to reshape the business world to the same degree as globalization and the Information Technology revolution and doubtless opportunities will similarly arise. A portfolio of current and emerging technologies is expected to play a significant role in transforming prevailing business practices, addressing many environmental problems, and generating new forms of wealth. Information Systems researchers have been called on undertake more high-visibility and high-impact research. To date, however, IS researchers have given little attention to the high-visibility, high impact challenges of environmental sustainability. This seminar aims to increase awareness and understanding of the potential roles of IS researchers and multi-disciplinary research teams as critical contributors to business transformation for environmental sustainability. A framework for relevant contributions is proposed.

bIOgRAPhy PROF. DR. STEVE ELLIOT is Professor of Business Information Systems at the University of Sydney, Australia. Previously, Steve had been Professor and Head of the School of Business, University of Newcastle and Director of the IT Research Centre at the University of New South Wales. Steve has extensive industry and international experience. His research work is directed toward the development of practice-based theory in the strategic management of technology-enabled business innovation. His multi-disciplinary research has been published in international journals, refereed conference proceedings and an internationally acclaimed book examining successful B2C electronic commerce initiatives in six countries. His research interests have been supported by grants from the Australian Research Council and from local and international corporate sponsorships. His current research projects focus on the development of strategic organisational capabilities for technology-enabled business innovation and on environmental sustainability as a driver of business transformation. [http://www.econ.usyd.edu.au/staff/stephene]

4th International Symposium on Information Technology

14

a conference of World Engineering, Science & Technology Congress

PLENARY
DATuk bADLIshAM ghAzALI Chief Executive Officer Multimedia Development Corporation(MDeC) Malaysia

bIOgRAPhy DATUK BADLISHAM GHAZALI was appointed as the Chief Executive Officer (CEO) of the Multimedia Development Corporation (MDeC) in January 2006. As the CEO, Datuk Badlisham provides the leadership to drive the organisation in translating the Governments vision of transforming the nation into a Knowledge-based Economy through the MSC Malaysia, the national ICT initiative. Apart from the vision to empower lives through ICT, Datuk Badlishams mission for MSC Malaysia is not limited to just encouraging the growth of ICT companies and positioning Malaysia as a global ICT player, but also to promote ICT as a career of choice amongst children and students. He is also a member of the Ministry of Educations Cluster School Advisory Board and the Ministry of Science, Technology and Innovations National Science Centre Advisory Board. For his vast experience and knowledge in the ICT industry, Datuk Badlisham was also appointed as an Adjunct Professor with the Multimedia Faculty of Limkokwing University of Creative Technology since February 2008. Prior to his appointment in MDeC, Datuk Badlisham was with HP Malaysia for 18 years where he was the Director and Country General Manager of HP Technology Solutions Group. Badlisham holds a B.Sc. degree majoring in Computer Science from the University of Northern Illinois, USA and a Diploma in Computer Science from Mara Institute of Technology.

4th International Symposium on Information Technology

15

a conference of World Engineering, Science & Technology Congress

NOTES TO DELEGATES
Registration and general information
The conference registration will be conducted at the Registration Counter at Level 3 of Kuala Lumpur Convention Centre (KLCC). Registration will start from 8.00am, Tuesday, 15th June 2010. There will be committee members assisting delegates with registration and general information. The committee members will be wearing ITSim10 identification tags. Other than the registration time, the ITSim10 secretariat can also be contacted for any inquiries at the Secretariat Room in Level 3. Conference costs: Your ITSim10 registration includes the cost of: Lunches Morning and afternoon teas ESTCON 2010 Programme Book ITSim10 Technical Programmes & Abstracts Book For presenters: full conference proceedings in CD-ROM and one volume of print version based on the presenters track. Additional CD-ROM version Additional print version RM50/copy RM250/volume

Instructions to Presenters
Oral Presenters: Time allocated for each presenter is 20 minutes including Q&A. Each presenter is required to prepare and submit Microsoft Power Point Presentation to Secretariat latest on the conference registration day. Save the Power Point presentation using the presentation session as the file name, e.g. if your paper is to be presented in session 1, track 1, paper number 2, then the file name should be ITSO1_T1_2. ppt. The presenter should be at the assigned room 15 minutes before the session starts. Note Book PC will be provided during the presentation sessions. Poster Exhibition: All exhibitors are responsible to print their own poster material(s) at their own costs. Poster materials must be printed on a single A0 sized paper. Poster exhibitors are responsible for setting up and dismantling their poster material at the time allocated. Poster exhibitors are requested to be on standby at their respective poster sites during Poster Q&A session. Punctuality: To ensure that the conference proceeds smoothly, the Organizing Committee specially requests your cooperation to be punctual. Announcements of any changes to the Program will be announced in the main conference room (CH1) before or after plenary sessions. Language: The official language of ITSim10 is English. No simultaneous interpretation services will be provided. Lunch/coffee/tea refreshment: Coffee/tea and lunch will be served at the times indicated in the Technical Programmes & Abstracts Book. Conference identification tag: The Organizing Committee requests that you wear your identification tag at all times during the conference. Your conference identification tag will serve as your admission to all conference paper presentation sessions. Conference Dress Code: Smart casual is recommended throughout the conference. Message board: A conference message board will be located near the main conference room (CH1). Insurance and Liability: The conference organizers do not accept responsibility for any individual, medical, travel or personal insurance policies as necessary. Personal Property: The Organizing Committee suggests that you take usual precautions with your personal belongings. Do not leave them unattended. The organizers and the venues staff will not take any responsibility for any loss or damage of your personal properties. smoking Policy: The Kuala Lumpur Convention Center is deemed as a Non-Smoking venue. Local Time: The local Kuala Lumpur time is +8 GMT. International Phone Calls: The country code for Malaysia is +60. To make a call within Kuala Lumpur or Selangor, a code 3 must be pressed after the country code followed by the local telephone number. To make a call to other states/cities outside of Kuala Lumpur and Selangor, the correct Malaysian State code must be entered in place of the 3. Electricity: Malaysian electrical power is 240 volts, 50 Hz. The connection for appliances is a 3 pin plug.

4th International Symposium on Information Technology

16

a conference of World Engineering, Science & Technology Congress

VENUE LAYOUT

room lift

kuala Lumpur Convention Centre


Level 3 poster presentations (foyer)
1

301

Banquet Hall (BH) lift

(ea

st)

rooms lift

rooms lift

ter s pos at ion t sen ) pre (foyer (w est )


1 2 3
307

302 306

303

305 304

308

309

310

1 2

Conference Halls (CH)

Ki

bla

4th International Symposium on Information Technology

17

a conference of World Engineering, Science & Technology Congress

1 2 3 4
2

Plenary Halls (PH)

CONFERENCE PROGRAMME
JuNE 15, 2010 (TuEsDAy) - DAy 1 TIME
9.00 - 11.30 11.30 - 12.00

EVENT
Opening Ceremony Morning Break

VENuE
PH

12.00 - 1.00

PLENARy LECTuRE 1 PROf DR. sTEVE ELLIOT (uNIVERsITy Of syDNEy, AusTRALIA) .


Lunch

CH1

1.00 - 2.00

ITsO1: PARALLEL ORAL sEssION 1

2.00 - 4.00 (6 X 8 = 48)

T1 (VI)

T2 (ET)

T3 (SDA)

T4 (KS)

T5 (VI)

T6 (ET)

T7 (SDA)

T8 (KS)

T1: 3-01 T2: 3-02 T3: 3-03 T4: 3-04 T5: 3-05 T6: 3-06 T7: 3-07 T8: 3-08

4.00 - 4.20

Evening Break

ITsO2: PARALLEL ORAL sEssION 2

4.20 - 5.40 (4 X 7 = 28)

T1 (VI)

T2 (ET)

T3 (SDA)

T4 (KS)

T5 (VI)

T6 (ET)

T7 (ET)

T1: CH1 T2: 3-01 T3: 3-02 T4: 3-03 T5: 3-04 T6: 3-05 T7: 3-06

5.40

End of Day 1

4th International Symposium on Information Technology

18

a conference of World Engineering, Science & Technology Congress

CONFERENCE PROGRAMME
JuNE 16, 2010 (WEDNEsDAy) - DAy 2 TIME EVENT PLENARy LECTuRE 2 DATuk bADLIshAM (MALAysIAN DEVELOPMENT CORPORATION (MDEC)) ITsO3: PARALLEL ORAL sEssION 3
9.30 - 10.30 (3 X 6 = 18)

VENuE

8.30 - 9.30

CH1

T1 (VI)

T2 (ET)

T3 (SDA)

T4 (KS)

T5 (VI)

T6 (ET)

T1: CH1 T2: 3-01 T3: 3-02 T4: 3-03 T5: 3-04 T6: 3-05

10.30 - 10.50

Morning Break

ITsO4: PARALLEL ORAL sEssION 4

10.50 - 12.50 (6 X 7 = 42)

T1 (VI)

T2 (ET)

T3 (SDA)

T4 (KS)

T5 (VI)

T6 (ET)

T7 (ET)

T1: 3-01 T2: 3-02 T3: 3-03 T4: 3-04 T5: 3-05 T6: 3-06 T7: 3-07

12.50 - 2.00

Lunch

ITsO5: PARALLEL ORAL sEssION 5


2.00 - 4.00 (6 X 7 = 42) T5 (VI & SDA)

T1 (VI)

T2 (ET)

T3 (SDA)

T4 (KS)

T6 (ET)

T7 (KS)

T1: CH1 T2: 3-01 T3: 3-02 T4: 3-03 T5: 3-04 T6: 3-05 T7: 3-06

4.00 - 4.20

Evening Break

ITsO6: PARALLEL ORAL sEssION 6


4.20 - 6.00 (5 X 7 = 35)

T1 (VI)

T2 (ET)

T3 (SDA)

T4 (VI)

T5 (VI)

T6 (ET)

T7 (ET)

T1: 3-01 T2: 3-02 T3: 3-03 T4: 3-04 T5: 3-05 T6: 3-06 T7: 3-10

6.00

End of Day 2
19

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

CONFERENCE PROGRAMME
JuNE 17, 2010 (ThuRsDAy) - DAy 3 TIME EVENT PLENARy LECTuRE 3 PROf DR. PETER RObINsON (uNIVERsITy Of CAMbRIDgE, . uNITED kINgDOM) VENuE

9.30 -10.30

CH1

10.30 - 10.50 Morning Break

ITsO7: PARALLEL ORAL sEssION 7

10.50 - 12.50 (6 X 7 = 42)

T1 (VI)

T2 (ET)

T3 (SDA)

T4 (VI)

T5 (VI)

T6 (VI)

T7 (ET)

T1: CH1 T2: 3-01 T3: 3-02 T4: 3-03 T5: 3-04 T6: 3-05 T7: 3-06

12.50 - 2.00

Lunch

WORkshOP
2.00 - 4.00 W1 4.00 - 4.20 4.20 - 6.00 6.00 Evening Break Closing Ceremony End of Symposium W2 W3

W1: 3-01 W2: 3-02 W3: 3-03

BH

sPECIAL EVENTs:

EVENT
General Meeting of Malaysian Information Technology Society (MITS)

DATE & TIME


Wed, 16 June 2010 12.30 pm 1.30 pm Thurs, 17 June 2010 2.30 pm 4.00 pm

VENuE
CH3

Round-table Meeting of Majlis Profesor Negara (ICT Cluster)

3-04

4th International Symposium on Information Technology

20

a conference of World Engineering, Science & Technology Congress

TECHNICAL SESSIONS
ORAL PREsENTATIONs
TuEsDAy, 15 JuNE 2010 ITsO1: PARALLEL ORAL sEssION 1 (2.00 PM 4.00 PM) T1 VIsuAL INfORMATICs VENuE: 3-01
2.00 pm 2.20 pm 2.40 pm 3.00 pm 3.20 pm ITSO1_T1_1 Mobile-based Interactive Learning using handwriting Recognition Noor Azam Zakaria, Wan Fatimah Wan Ahmad, Mohd Hilmi Hasan (UTP) ITSO1_T1_2 Multimedia Learning system (MMLs): Valuing the significance of Cognitive Task Analysis Technique and user Interface Design Norain Mohd Yusoff, Chui Yin Wong (MMU) ITSO1_T1_3 balancing between usability and Aesthetics of Web Design Umi Kalsom Yusof, Leng Khang Khaw , Hui Yang Chng , Boon Jiann Neow (USM) ITSO1_T1_4 Investigation of fingertip blobs on Optical Multitouch screen Ahsanullah, Ahmad Kamil Mahmood, Suziah Sulaiman (UTP) ITSO1_T1_5 Design and Implementation of Multi-Touch system using fTIR Technique for Optimization of finger Touch Detection Ahsanullah, Ahmad Kamil Mahmood, Suziah Sulaiman (UTP) ITSO1_T1_6 Exploring the Quantitative and Qualitative Measures for haptic systems Muzafar Khan, Suziah Sulaiman, Abas Md Said, Muhammad Tahir (UTP) ITSO1_T2_1 Investigation on Model selection Criteria for speaker Identification Z. Farhood, M. Abdulghafour (Bahrain) ITSO1_T2_2 hMM Parameters Estimation using hybrid baum- Welch genetic Algorithm Mourad Oudelha, Raja N. Ainon (UM) ITSO1_T2_3 esurvia: A Web-based survey service using fuzzy Conjoint Analysis Media A. Ayu , Teddy Mantoro, Abu Osman Md Tap, Siti Aisyah Ismail (UIAM) ITSO1_T2_4 RNA secondary structure Prediction using Dynamic Programming Algorithm A Review and Proposed Work Mohd Nizam Osman, Rosni Abdullah, NurAini Abd. Rashid (UiTM) ITSO1_T2_5 Arabic speech Recognition using hidden Markov Model Toolkit(hTk) Bassam A. Q. Al-Qatab, Raja N. Ainon (UM) ITSO1_T2_6 Rule-based Pattern Extractor and Named Entity Recognition: A hybrid Approach Yunita Sari, Mohd Fadzil Hassan, Norshuhani Zamin (UTP) ITSO1_T3_1 Issues with flexibility: A Reason for not using Online Reservation systems? Arif Mushtaq, Suziah Sulaiman, Jrn Loviscach (UTP) ITSO1_T3_2 Computation of Cryptosystem based on Lucas functions using Addition Chain Zulkarnain Md Ali, Mohamed Othman, Mohd Rushdan Muhd Said, Md Nasir Sulaiman (UKM) ITSO1_T3_3 Establishing A Defect Prediction Model using A Combination of Product Metrics As Predictors Via six sigma Methodology Muhammad Dhiauddin Mohamed Suffian, Mohamed Redzuan Abdullah (MIMOS) ITSO1_T3_4 Evaluating Playability on haptic user Interface for Mobile gaming Chui Yin Wong, Kimberly Chu, Chee Weng Khong, Tek Yong Lim (MMU) ITSO1_T3_5 Non-Repudiation in Order, Delivery and Payment Process for a sustainable Online business Abdullah Sani Abd Rahman, Suraya Masrom (UTP) ITSO1_T3_6 The Development of a Rule-based Asthma system Goh Kim Nee, Muhammad Azlil Syafiq, Savita K. Sugathan, Chen Yoke Yie, Emelia Akashah Patah Akhir (UTP) ITSO1_T4_1 Performance Analysis of Modulation schemes for Wireless Optical In-Cabin Aircraft Networks D.Marinos, C.Aidinis, C. Vassilopoulos, P. Kourus, N.Schmitt, T.Pistner,J.Schalk, J.Klaue (Greece)

3.40 pm

T2 ENgINEERINg TEChNOLOgy VENuE: 3-02


2.00 pm 2.20 pm 2.40 pm 3.00 pm 3.20 pm 3.40 pm

T3 sysTEM DEVELOPMENT AND APPLICATION VENuE: 3-03


2.00 pm 2.20 pm 2.40 pm

3.00 pm 3.20 pm 3.40 pm

T4 kNOWLEDgE sOCIETy VENuE: 3-04


2.00 pm

4th International Symposium on Information Technology

21

a conference of World Engineering, Science & Technology Congress

TECHNICAL SESSIONS
ORAL PREsENTATIONs
2.20 pm 2.40 pm 3.00 pm ITSO1_T4_2 Query Expansion using Thesaurus in Improving Malay hadith Retrieval system Nurazzah Abd Rahman, Zainab Abu Bakar, Tengku Mohd Tengku Sembok (UiTM) ITSO1_T4_3 Efficient Retrieval of Malay Language Documents using Latent semantic Indexing Roslan Sadjirin, Nurazzah Abd Rahman (UiTM) ITSO1_T4_4 An Ontology Driven, Multi-agent based framework for Automated Resource Allocation in Mobile Workforce Management systems Arash Mousavi, Md. Jan Nordin, Zulaiha Ali (UKM) ITSO1_T4_5 Pre-Considered factors Affecting ERP system Adoption in Malaysian sMEs using a Technology-Organisation-Environment framework Siti Shafrah Shahawai, Rosnah Idrus (USM) ITSO1_T4_6 framework of Intrinsic and Extrinsic Motivators of knowledge sharing A Case of a Training Institute of an Oil and gas Company in Malaysia Aamir Amin , Mohd Fadzil Hassan, Mazeyanti Ariffin (UTP) ITSO1_T5_1 A Method for Linking business Process Models and system Models Faisal Aburub (Jordan) ITSO1_T5_2 A simulated Annealing Approach to solve fuzzy Multi-Objective Linear Model for supplier selection in A supply Chain P.Parthiban, P.D.D.Dominic, R. Dhanalakshmi (India) ITSO1_T5_3 graphical Interface for gene Network Inference Application Suhaila Zainudin, Sim Kah Wei, Safaai Deris (UKM) ITSO1_T5_4 Agent-based Monitoring of Virtual Machines Anas Ayad, Uwe Dippel (UNITEN) ITSO1_T5_5 single and Replicated simulations for Colored Petri Nets Nondeterministic Network Dani Adhipta, Mohd Fadzil Hassan (UTP) ITSO1_T5_6 A service based framework for Integration of ITIL V3 and Enterprise Architecture Akbar Nabiollahi, Rose Alinda Alias, Shamsul Sahibuddin (UTM) ITSO1_T6_1 Energy balanced Clustering in Wireless sensor Network Babar Nazir, Halabi Hasbullah (UTP) ITSO1_T6_2 Multiple beams switching Double square Loop Antenna for uWb systems Arun Raaza, Pallawi, Animesh Rana, Gopal. S. Joshi, Amit Mehta (India) ITSO1_T6_3 An Efficient Energy Two Mode Error Correction Technique in underwater Wireless sensor Network Ammar Elyas Babiker, M. Nordin Zakaria (UTP) ITSO1_T6_4 On-Demand flexible Tiered Qos scheduling Algorithm for IEEE 802.16j Multi-hop Relay Networks Anas F. Bayan, Tat-Chee Wan (USM) ITSO1_T6_5 Deployment Density Estimation for -Covering Problem in Wireless sensor Network Hassan Chizari, Shukor Abd Razak, Arifah Bahar, Abdul Hanan Abdullah (UTM) ITSO1_T6_6 Customizing gINA for Authentication in Virtualization Siti Rohaidah Ahmad, Nor Fatimah Awang, Arniyati Ahmad, Nik Nur Aisyah Nik Ghazali (UPNM) ITSO1_T7_1 The Architecture of scientific Computing Library Portal on sequential Algorithm based on Partial Differential Equation Othman, M. S., Yusuf, L. M., Basitt, U. N. A., Alias, N. (UTM) ITSO1_T7_2 Cooperative Coalition formation on Value-based Decision Arazi Idrus, Christiono Utomo (UTP) ITSO1_T7_3 A survey on Different Interoperability frameworks of sOA systems Towards seamless Interoperability Najhan M.Ibrahim, Mohd Fadzil Hassan (UTP) ITSO1_T7_4 Agent based Monitoring framework for sOA Applications Quality Zain Balfagih, Mohd Fadzil Hassan (UTP) ITSO1_T7_5 A services-Oriented Platform for synergisation of Research and Development strengths Chua Chong Chai, Cheah Yu-N, Tang Enya Kong (USM)
22

3.20 pm 3.40 pm

T5 VIsuAL INfORMATICs VENuE: 3-05


2.00 pm 2.20 pm 2.40 pm 3.00 pm 3.20 pm 3.40 pm

T6 ENgINEERINg TEChNOLOgy VENuE: 3-06


2.00 pm 2.20 pm 2.40 pm 3.00 pm 3.20 pm 3.40 pm

T7 sOfTWARE DEVELOPMENT AND APPLICATION VENuE: 3-07


2.00 pm

2.20 pm 2.40 pm 3.00 pm 3.20 pm

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

TECHNICAL SESSIONS
ORAL PREsENTATIONs
3.40 pm ITSO1_T7_6 A Proposed Reusability Attribute Model for Aspect Oriented software Product Line Components Fazal-e-Amin, Ahmad Kamil Mahmood, Alan Oxley (UTP) ITSO1_T8_1 Region-based Energy-aware Clustering (REC) for Efficient Packet forwarding in WsN Halabi Hasbullah, Babar Nazir (UTP) ITSO1_T8_2 An Evaluation of End Point Detection Measures for Malay speech Recognition of an Isolated Words Noraini Seman, Zainab Abu Bakar, Nordin Abu Bakar (UiTM) ITSO1_T8_3 A Non Linear Model for the Classification of stored Items in supply Chain Management Seyed Yazir Bozorgi Rad, Abbas Bozorgi Rad, Mohammad Ishak Desa, Sarah Behnam, Sina Lesanibahri (UTM) ITSO1_T8_4 Information and Communications Technology (ICT) Policy Management Towards Enabling Research frameworks Reza Alinaghian, Azizah Abdul Rahman, Roliana Ibrahim (UTM) ITSO1_T8_5 A Web based safety Intervention Need Analysis system in Construction Design Azizah Jaafar, Normazlina Mohamed zi, Ismail Bahari, Asmalia Che Ahmad (UKM) ITSO1_T8_6 Predict the customer behavior in the shopping by Distributed Learning Automata Mansour Esmaeilpour, Vahideh Naderifar, Riza Sulaiman (UKM)

T8 kNOWLEDgE sOCIETy VENuE: 3-08


2.00 pm 2.20 pm 2.40 pm

3.00 pm 3.20 pm 3.40 pm

ITsO2: PARALLEL ORAL sEssION 2 (4.20 PM 5.40 PM) T1 VIsuAL INfORMATICs VENuE: Ch1
4.20 pm 4.40 pm 5.00 pm 5.20 pm ITSO2_T1_1 unifying Multimedia Player and Presentation system With Optimizing Dual-Display feature Rustam Asnawi, Wan Fatimah Wan Ahmad, Dayang Rohaya Awang Rambli (UTP) ITSO2_T1_2 Evaluation Method of Malaysian university Website Quality: hybrid Method Approach Dhanapal Durai Dominic,Handaru Jati (UTP) ITSO2_T1_3 As sketchy As Possible: Application Programming Interface (API) for sketch-based user Interface Lai Chan Yet, M. Nordin Zakaria (UTP) ITSO2_T1_4 Modeling optimization for real-time virtual heritage visualization content: A research on e-Warisan sENIbINA Ahmad Rafi, Azhar Salleh, Avijit Paul, Siti Noraisah, Yee Jun, Radzi Hanif , Mazlan Mahadzir (MMU) ITSO2_T2_1 Optimizing Machine utilization in semiconductor Assembly Industry using Constraint-Chromosome genetic Algorithms Umi Kalsom Yusof , Safaai Deris (USM) ITSO2_T2_2 VANET security framework for Trusted grouping using TPM hardware: group formation and Message Dissemination Asif Ali Wagan, Bilal Munir Mughal, Halabi Hasbullah (UTP) ITSO2_T2_3 Multi-Level security Algorithm for Random zigbee Wireless sensor Networks Tadiwa Elisha Nyamasvisva, Halabi Hasbullah (UTP) ITSO2_T2_4 A study on Threat Model for federated Identities in federated Identity Management system Zubair Ahmad Khattak, Suziah Sulaiman, Jamalul-Lail Ab Manan (UTP) ITSO2_T3_1 Conceptual Information system success Model for small and Medium Enterprise Clinic Information system Aliza Sarlan, Rohiza Ahmad, Wan Fatimah Wan Ahmad, P. D.D. Dominic (UTP) ITSO2_T3_2 student Problem Analyzer for Mathematics: The design perspective Siti Noor Arfah Umar, Norlia Mustaffa (USM) ITSO2_T3_3 A Taxonomy of Computer-supported Critics Norhayati Mohd Ali, John Hosking, John Grundy (New Zealand) ITSO2_T3_4 Extending Quality Data for Lot-based Traceability system in sME Khabbazi M.R., Hasan M.K., Sulaiman. R., Mousavi. S. A. (UKM)

T2 ENgINEERINg TEChNOLOgy VENuE: 3-01


4.20 pm 4.40 pm 5.00 pm 5.20 pm

T3 sOfTWARE DEVELOPMENT AND APPLICATION VENuE: 3-02


4.20 pm

4.40 pm 5.00 pm 5.20 pm

T4 kNOWLEDgE sOCIETy VENuE: 3-03


4th International Symposium on Information Technology 23

a conference of World Engineering, Science & Technology Congress

TECHNICAL SESSIONS
ORAL PREsENTATIONs
4.20 pm 4.40 pm ITSO2_T4_1 Women Contributions to Open source software Innovation: A social Constructivist Perspective Musyrifah Mahmod, Shafiz Affendi Mohd. Yusof, Zulkhairi Md. Dahalin (UUM) ITSO2_T4_2 Decision support system framework for Implementation of Enterprise Resource Planning (ERP) system Muhammad Abdul Tawab Khalil, P. D. D. Dominic, Mohd Fadzil Hassan (UTP) ITSO2_T4_3 knowledge Management Catalyst for sustainable Development Diana M.L. Wong (UTP) ITSO2_T4_4 Identifying the social factors and Representation for knowledge based Coalition formation system Azleena Mohd Kassim, Yu-N Cheah, Intan Hashimah Mohd Hashim (USM) ITSO2_T5_1 flight Connections Multi-leg searching by Adopting Partial Constraint satisfaction Siti Zarinah Mohd Yusof, Vijanth Sagayan A/L Asirvadam, Mohd Fadzil Hassan (UTP) ITSO2_T5_2 A soft Computing Approach for the Memory storage of a sound signal Processor Hammuzamer Irwan Hamzah, Azween Abdullah (UTP) ITSO2_T5_3 security Challenges in Designing an Integrated Web Application for Multiple Online banking Annie Ng, Ai Bee, Nasuha Lee Abdullah (USM) ITSO2_T5_4 InterTvNet Ferhat Khenak (Algeria) ITSO2_T6_1 Intelligent Interpretation and Analysis of Child sexual Abuse forensic Evidence: A Preliminary study Noor Maizura Mohamad Noor, Salwana Mohamad @ Asmara (UMT) ITSO2_T6_2 Light Weight student Mobile Organizer for Netbook: A Preliminary study Dian Pradhana Sugijarto, Ahmed Moosajee Patel, Norleyza Jailani, Marini Abu Bakar (UKM) ITSO2_T6_3 An Integrated DNA Decision support system using grid Environment for Crime Investigation Ahmad Faiz Ghazali, Noor Maizura Mohamad Noor, Md Yazid Mohd Saman, Zafarina Zainuddin (UMT) ITSO2_T6_4 Development of simulation Environment for Agent Interaction Protocol Norizal Abd Latif, Mohd Fadzil Hassan, Hilmi Hasan (UTP) ITSO2_T7_1 Minimizing Discovery Time in bluetooth Networks using Localization Techniques Fazli Subhan, Halabi Hasbullah (UTP) ITSO2_T7_2 Efficient Congestion Control in VANET for safety Messaging Bilal Munir Mughal, Asif Ali Wagan, Halabi Hasbullah (UTP) ITSO2_T7_3 Implementation of IDs with Response for securing MANETs Yasir Abdelgadir Mohamed, Azween Abdullah (UTP) ITSO2_T7_4 The survival Of Communications In Ad hoc And M2M Networks: The fundamentals Design Of Architecture And Radio Technologies used for Low-Power Communication NOMOhI Devices. Juan Jos Martinez Castillo (Venezuela)

5.00 pm 5.20 pm

T5 VIsuAL INfORMATICs VENuE: 3-04


4.20 pm 4.40 pm 5.00 pm 5.20 pm 4.20 pm 4.40 pm 5.00 pm

T6 ENgINEERINg TEChNOLOgy VENuE: 3-05

5.20 pm

T7 ENgINEERINg TEChNOLOgy VENuE: 3-06


4.20 pm 4.40 pm 5.00 pm 5.20 pm

WEDNEsDAy, 16 JuNE 2010 ITsO3: PARALLEL ORAL sEssION 3 (9.30 AM 10.30 AM) T1 VIsuAL INfORMATICs VENuE: Ch1
9.30 am 9.50 am ITSO3_T1_1 knowledge Management based Integration of heterogeneous healthcare systems in Malaysia Intan Najua binti Kamal Nasir, P. D. D. Dominic (UTP) ITSO3_T1_2 A study on knowledge flow and Its Implications on social Networking site Savita K.. Sugathan, Azaly Rezza Feisal Azlin, Goh Kim Nee, Emelia Akashah Patah Akhir, Chen Yoke Yie (UTP) ITSO3_T1_3 Visualization of fluid flow : Preliminary Analysis Siti Azila Zainudin, Abas Md Said, Suziah Sulaiman (UTP)

10.10 am

4th International Symposium on Information Technology

24

a conference of World Engineering, Science & Technology Congress

TECHNICAL SESSIONS
ORAL PREsENTATIONs
T2 ENgINEERINg TEChNOLOgy VENuE: 3-01
9.30 am 9.50 am 10.10 am ITSO3_T2_1 Workload Analysis of sPECmail2009 Hitoshi Oi, Sho Niboshi (Japan) ITSO3_T2_2 Improving Qos of VoWLAN via Cross-Layer Interaction Approach Sameha Ahmed Ali Alshakhsi, Halabi Hasbullah (UTP) ITSO3_T2_3 Improvements over Two Phase shortest Path Algorithm Muhammad Aasim Qureshi, Mohd Fadzil Hassan (UTP) ITSO3_T3_1 understanding Domain Experts Perspectives and Expectations in Assistive Technology Suziah Sulaiman, Siti Nur Syazana Mat Saei, Foong Oi Mean, Halabi Hasbullah (UTP) ITSO3_T3_2 formalization of uML Class Diagram using Description Logics Lusiana Efrizoni, Wan M.N. Wan-Kadir, Radziah Mohamad (Indonesia) ITSO3_T3_3 service Oriented Disributed Manager for grid systems Entisar S. Alkayal, Fathy A. Essa (Saudi Arabia) ITSO3_T4_1 Organizational Commitment Towards software Process Improvement - An Irish software VsEs Case study Shuib Basri, Rory V. OConnor (UTP) ITSO3_T4_2 The Level of ICT use by Museums in Malaysia Juliana Aida Abu Bakar, Puteri Shireen Jahn Kassim, Murni Mahmud (UIAM) ITSO3_T4_3 Enhanced CAf Indexing Algorithm using hashing functions Nuraini Abdul Rashid, Rana Ghadban, Hazrina Yusof Hamdani, Atheer A-Abdulrazaq (USM) ITSO3_T5_1 using Educational games in Learning Introductory Programming: A Pilot study on students Perceptions Roslina Ibrahim, Azizah Jaafar (UTM) ITSO3_T5_2 A Collaborative-Interaction Approach of software Project Development - An Extension to Agile based Methodologies Rehan Akbar, Mohd Fadzil Hassan (UTP) ITSO3_T5_3 Development of Mobile Learning Tool Sahilu Wendeson, Wan Fatimah Wan Ahmad, Nazleeni Samiha Haron (UTP) ITSO3_T6_1 Thematic Role to Assist Preparation of a business Letter based on genre Approach Tg Zatul Hidayah Tg Petra, Mohd Juzaiddin Ab Aziz, Siti Hamin Stapa (UKM) ITSO3_T6_2 Text-based Classification incoming Maintenance Requests to maintenance type Naghmeh Mahmoodian, Rusli Abdullah, Masrah Azrifah Azim Murad (UPM) ITSO3_T6_3 Ontology of Programming Resources for semantic searching of Programming Related Materials on the Web Siti Noradlina Mat Using, Rohiza Ahmad, Shakirah Mohd Taib (UTP)

T3 sOfTWARE DEVELOPMENT AND APPLICATION VENuE: 3-02


9.30 am 9.50 am 10.10 am

T4 kNOWLEDgE sOCIETy VENuE: 3-03


9.30 am 9.50 am 10.10 am

T5 VIsuAL INfORMATICs VENuE: 3-04


9.30 am 9.50 am 10.10 am

T6 ENgINEERINg TEChNOLOgy VENuE: 3-05


9.30 am 9.50 am 10.10 am

ITsO4: PARALLEL ORAL sEssION 4 (10.50 AM 12.50 PM) T1 VIsuAL INfORMATICs VENuE: 3-01
10.50 am 11.10 am 11.30 am ITSO4_T1_1 fPgA Implementation of Pipelined 2D-DCT and Quantization Architecture for JPEg Image Compression Enas Dhuhri Kusuma, Thomas Sri Widodo (Indonesia) ITSO4_T1_2 Evaluating C2C e-commerce Website usability in Malaysia from users perspective: A case study Noorfadzilah Md Zainudin, Wan Fatimah Wan Ahmad, and Goh Kim Nee (UTP) ITSO4_T1_3 Non-Cooperative Iris Recognition system: A Review Abdulsamad Ebrahim Yahya, Md Jan Nordin (UKM) Abdulsamad

11.50 am ITSO4_T1_4 Improving Iris segmentation by specular Reflections Removable Ebrahim Yahya, Md Jan Nordin (UKM) 12.10 pm

ITSO4_T1_5 3D Reconstruction using Level-based Approach in Computational stereo Sayed Ali Kasaei Zadeh, Abas Md Said (UTP)
25

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

TECHNICAL SESSIONS
ORAL PREsENTATIONs
12.30 pm ITSO4_T1_6 3D Reconstruction of geometry from 2D image using genetic Algorithm Muhammad Tariq Siddique, Mohamed Nordin Zakaria (UTP) ITSO4_T2_1 sIDIf: Location based Technique as a Determinant of Effectiveness and Efficiency in Artificial Reefs Development Project W. Aezwani W. A. Bakar, Zailani Mohamed Sidek, Mustafa Man, Mohammad Zaidi Zakaria (UMT)

T2 ENgINEERINg TEChNOLOgy VENuE: 3-02


10.50 am

11.10 am ITSO4_T2_2 Multi-level Parallelism in PhyloCon Algorithm Hazrina Yusof Hamdani, NurAini Abdul Rashid (USM) 11.30 am 11.50 am 12.10 pm 12.30 pm ITSO4_T2_3 Dynamic service Placement and Redundancy to Ensure service Availability During Resource failures Boon Yaik Ooi, Huah Yong Chan, Yu-N Cheah (UTAR) ITSO4_T2_4 Divisible Load scheduling of Real-time Task on heterogeneous Clusters Suriayati Chuprat (UTM) ITSO4_T2_5 Optimal Parameters of Interline Power flow Controller using Particle swarm Optimization Khalid. H. Mohamed, K.S.Rama Rao, Khairul Nisak Md. Hasan (UTP) ITSO4_T2_6 An Interoperability study of Esb for C41 systems Abdullah Alghamdi, Muhammad Nasir, Iftikhar Ahmad Khalid A. Nafjan (Saudi Arabia) ITSO4_T3_1 Customer Relationship Management: Computer-Assisted Tools for Customer Lifetime Value Prediction Lim Chia Yean, Vincent KT Khoo (USM) ITSO4_T3_2 Automatic Programming Assessment and Test Data generation - A review on its approaches Rohaida Romli, Shahida Sulaiman, Kamal Zuhairi Zamli (UUM) ITSO4_T3_3 I-Wellness: A hybrid Case-based framework for Personalized Wellness Therapy Lim Thean Pheng, Wahidah Husain (USM) ITSO4_T3_4 Computer-Assisted Composing Process in business Writing Tuan Norhafizah Tuan Zakaria, Mohd Juzaiddin Ab Aziz, Tg Nor Rizan Tg Mohd Maasum (UKM) ITSO4_T3_5 Immune Multi Agent system for Intrusion Prevention and self healing system Implement a Non-Linear Classification Muna Elsadig, Azween Abdullah, Brahim Belhaouari Samir (UTP) ITSO4_T3_6 Information Extraction for Counter-Terrorism: A survey on Link Analysis Norshuhani Zamin, Alan Oxley (UTP) ITSO4_T4_1 strategic IT Alignment with business: service Oriented Architecture Approach Mohammed Abdi, P.D.D. Dominic (UTP) ITSO4_T4_2 A survey on Adaptive Qualitative Assessment and Dynamic Questions generation Approaches Diyana Syamsiyah Rozali, Mohd Fadzil Hassan, Norshuhani Zamin (UTP) ITSO4_T4_3 Conceptualization of the Antecedents and Impacts of kMs utilization: A Preliminary framework Ishaq O. Oyefolahan, P.D.D. Dominic (UTP)

T3 sOfTWARE DEVELOPMENT AND APPLICATION VENuE: 3-03


10.50 am 11.10 am 11.30 am 11.50 am 12.10 pm

12.30 pm

T4 kNOWLEDgE sOCIETy VENuE: 3-04


10.50 am 11.10 am 11.30 am

11.50 am ITSO4_T4_4 hybrid Approach Towards Ontology Mapping Shailendra Singh, Yu-N Cheah (USM) 12.10 pm ITSO4_T4_5 Co-creation Values in knowledge Management Elliyani Atan , Mohamad Shanudin Zakaria, Yazrina Yahya, Muriati Mukhtar (UKM) 12.30 pm ITSO4_T4_6 Identifying Effective software Engineering (sE) Team Personality Types Composition using Rough set Approach Mazni Omar, Sharifah-Lailee Syed Abdullah (UiTM) ITSO4_T5_1 The Effectiveness of zoom Visual flow (zVif) Technique in Program Comprehension Activities Rozita Kadar, Shahida Sulaiman (UiTM) ITSO4_T5_2 biologically Inspired Object Recognition system Hamada R. H. Al-Absi, Azween Abdullah (UTP)

T5 VIsuAL INfORMATICs VENuE: 3-05


10.50 am 11.10 am

4th International Symposium on Information Technology

26

a conference of World Engineering, Science & Technology Congress

TECHNICAL SESSIONS
ORAL PREsENTATIONs
11.30 am 11.50 am 12.10 pm ITSO4_T5_3 k-Means Clustering Visualization of Web-based OLAP Operations for hotspot Data Tsamrul Fuad, Imas Sukaesih Sitanggang, Annisa (Indonesia) ITSO4_T5_4 Visualizing the Design Pattern Interaction Roles Keen Ngee Loo, Sai Peck Lee (UM) ITSO4_T5_5 Compacted Dither Pattern Codes Versus Principal Component Analysis in Video Visual Depiction Lochandaka Ranathunga, Roziati Zainuddin, Nor Aniza Abdullah (UM)

12.30 pm ITSO4_T5_6 Improving a Web Application using Design Patterns: A Case study Phek Lan Thung, Chu Jian Ng, Swee Jing Thung, Shahida Sulaiman (USM)

T6 ENgINEERINg TEChNOLOgy VENuE: 3-06


10.50 am 11.10 am 11.30 am 11.50 am 12.10 pm 12.30 pm ITSO4_T6_1 Rule Discovery for Pseudorandom Number generator based on Cellular Automata F. Maleki, A. Bijari, A.Mohades, M.E.Shiri (Iran) ITSO4_T6_2 using genetic Algorithm for solving N-Queens Problem Ayad M. Turky, Mohd Sharifuddin Ahmad (Iraq) ITSO4_T6_3 Average Late Acceptance Randomized Descent Algorithm for solving Course Timetabling Problems Anmar Abuhamdah , Masri Ayob (UKM) ITSO4_T6_4 Prediction of C-peptide structure using Artificial bee Colony Algorithm Hesham Awadh A. Bahamish, Rosni Abdullah (USM) ITSO4_T6_5 Early Detection Method of Corrosion on buried Pipeline Mohd Saiful Abdul Rahman, Halabi Hasbullah (UTP) ITSO4_T6_6 Web Classification using Extraction and Machine Learning Techniques Lizawati M. Yusof, Mohd Shahizan Othman, Juhana Salim (UTM)

T7 ENgINEERINg TEChNOLOgy VENuE: 3-07


10.50 am ITSO4_T7_1 An Improved Inquiry Procedure in Device Discovery bluetooth Network Sharifah Suhaila Mohd Ramli, Halabi Hasbullah (UTP) 11.10 am 11.30 am 11.50 am 12.10 pm 12.30 pm ITsO4_T7_2 Dynamic stable Relay selection in bluetooth scatternet Sheikh Tahir Bakhsh, Halabi Hasbullah (UTP) ITSO4_T7_3 A Novel Weighting scheme for Efficient Document Indexing and Classification Bashar Tahayna, Ramesh Kumar Ayyasamy, Saadat Alhashmi, Siew Eu-Gene (Monash) ITSO4_T7_4 Decreasing Packet Loss for Qos sensitive IP Traffic in Diffserv Enabled Network using MPLs TE Muhammad Tanvir, Abas Md Said (UTP) ITSO4_T7_5 suitability factor on the Capacitated Vehicle Routing Problem Helmi Md Rais, Zulaiha Ali Othman, Abdul Razak Hamdan (UTP) ITSO4_T7_6 user Requirements Model for Vehicular Ad hoc Network Applications Irshad Ahmed Soomro, Halabi Hasbullah, Jamalul-lail Ab Manan (UTP)

ITsO5: PARALLEL ORAL sEssION 5 (2.00 PM PM 4.00 PM) T1 VIsuAL INfORMATICs VENuE: Ch1
2.00 pm 2.20 pm 2.40 pm 3.00 pm 3.20 pm 3.40 pm ITSO5_T1_1 A Novel hybrid fuzzy-sVM Image steganographic Model Hanizan Shaker Hussain, Syed Ahmad Aljunid, Saadiah Yahya, Fakariah Hani Mohd Ali (UiTM) ITSO5_T1_2 A Constructive shift sequence Approach with simulated Annealing for Nurse Rostering Problem Mohammed Hadwan, Masri Ayob (UKM) ITsO5_T1_3 handwriting Recognition system using fast Wavelets Transform Mohamed E. Gumah, Etienne Schneider, Abdurazzag Ali Aburas (UTP) ITSO5_T1_4 sequential Pattern Mining on Library Transaction Dataset Imas Sukaesih Sitanggang, Nor Azura Husin, Anita Agustina, Naghmeh Mahmoodian (Indonesia) ITSO5_T1_5 game-based Learning Courseware for Children with Learning Disabilities Wan Fatimah Wan Ahmad, Emelia Akashah P.Akhir, Sarah Azmee (UTP) ITSO5_T1_6 A study on students Motivation in Learning Mathematics using Multimedia Courseware Zuraini Hanim Zaini, Wan Fatimah Wan Ahmad (UTP)
27

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

TECHNICAL SESSIONS
ORAL PREsENTATIONs
T2 ENgINEERINg TEChNOLOgy VENuE: 3-01
2.00 pm 2.20 pm 2.40 pm 3.00 pm 3.20 pm 3.40 pm ITSO5_T2_1 Design of an Autonomic services Oriented Architecture Muhammad Agni Catur Bhakti, Azween Abdullah (UTP) ITSO5_T2_2 Portable Plant Preventive Maintenance Management system Nazleeni Haron, Mazeyanti M. Ariffin, Mohd. H. Hasan, Siti N. Abdullah (UTP) ITSO5_T2_3 A Novel Maxmin Definition to Achieve an Optimum fairness in scheduling Packets over the Internet Yaser Miaji, Suhaidi Hassan (UUM) ITSO5_T2_4 Quality of service Metrics using generalized Pareto Distribution Abdelmahamoud Youssouf Dahab, Abas Md Said, Halabi Hasbullah (UTP) ITSO5_T2_5 Power Optimization in Multi-Processor systems Adrian Siong Min Wee, Sei Ping Lau, Chong Eng Tan (Unimas) ITSO5_T2_6 Numerical Technique for Robot Path Planning using four Point-Eg Iterative Method Azali Saudi, Jumat Sulaiman (UMS) ITSO5_T3_1 self-Organizing Map Approach for determining Mobile user Location using IEEE 802.11 signals Teddy Mantoro, Media A. Ayu, Asma Nuraini, Sulafa Mohd Amin (UIAM) ITSO5_T3_2 An e-book personalization architecture with digital rights and encryption procedures Hameed, N., Cheah, Y.-N., Rafie, M. (USM) ITSO5_T3_3 Two-tier bitwise Interest Oriented QRP with firework Model Query for a small world Peer-to-peer system to reduce message flooding and improve recall rate Choong Yong Liang, Lim Tong Ming (Sunway University College) ITSO5_T3_4 Os-MDAsO: An Algorithm that guarantees Correctness for P2P Object-Oriented Database systems in a Wireless Local Area Network Environment Wong Wai Keong, Lim Tong Ming (Sunway University College) ITSO5_T3_5 Comparisons of Routing Protocols for Child Tracking in Wireless sensor Network Azat Rozyyev, Halabi Hasbullah (UTP) ITSO5_T3_6 Mobile government services in Malaysia: Challenges and Opportunities Ahmad Al Thunibat, Nor Azan Mat Zin, Noraidah Sahari @ Ashari (UKM) ITSO5_T4_1 semantic search in Digital Library semantic technology Nurul Aida Osman, Shahrul Azman Mohd Noah, Nazlia Omar (UKM) ITSO5_T4_2 Transformation of L2 Writers to Correct English: The Need for A Computer-Assisted Writing Tool Tuan Norhafizah Tuan Zakaria, Mohd Juzaiddin Ab Aziz, Tg Nor Rizan Tg Mohd Maasum (UKM) ITSO5_T4_3 Application of semantic Technology in Digital Library Nor Afni Raziah Alias, Shahrul Azman Noah, Zuraidah Abdulah, Nazlia Omar, Maryati Mohd Yusof, Yazrina Yahya (UKM) ITSO5_T4_4 Agent based Meeting scheduling in hierarchical Organizations Ozgur Koray Sahingoz (Turkey) ITSO5_T4_5 A case study on Implementation of grid Computing to Academic Institution Ahmed Mohammed Al-Iesawi , Mohd Isa Mohd Samat (UiTM) ITSO5_T4_6 Attribute Value Weighting in k-Modes Clustering for y-short Tandem Repeats (y-sTR) surname Ali Seman, Zainab Abu Bakar, Azizian Mohd. Sapawi (UiTM) ITSO5_T5_1 Determining the fittest frontal View face Adaboost Classifier for Adoption in Personage Detector Norizan Mohamad, Muthukkaruppan Annamalai, Siti Salwa Salleh (UiTM) ITSO5_T5_2 Development of Virtual Learning for Chemistry subject based on ConstructivismContextual Approach Rozie Ezrina Shuhimi, Norasiken Bakar, Faaizah Shahbodin, Sazilah Salam, Ibrahim Ahmad (UTeM)

T3 sOfTWARE DEVELOPMENT AND APPLICATION VENuE: 3-02


2.00 pm 2.20 pm 2.40 pm

3.00 pm

3.20 pm 3.40 pm

T4 kNOWLEDgE sOCIETy VENuE: 3-03


2.00 pm 2.20 pm

2.40 pm 3.00 pm 3.20 pm 3.40 pm

T5 VIsuAL INfORMATICs & sOfTWARE DEV. AND APP VENuE: 3-04 .


2.00 pm 2.20 pm

4th International Symposium on Information Technology

28

a conference of World Engineering, Science & Technology Congress

TECHNICAL SESSIONS
ORAL PREsENTATIONs
2.40 pm 3.00 pm 3.20 pm 3.40 pm ITSO5_T5_3 A study and Result of Image Processing Visualising Topology Algorithm based on satellite geographical Data Tew Yiqi, Ahmed Moosajee Patel, Christopher Wills (UKM) ITSO5_T5_4 An Accurate Infant Cry Classification system based on Continuous hidden Markov Model Yousra Abdulaziz, Sharifah Mumtazah Syed Ahmad (UNITEN) ITSO5_T5_5 Locating geometrical Descriptors for hand biometrics in a Contactless Environment Goh Kah Ong Michael, Tee Connie, Andrew Teoh Beng Jin (MMU) ITSO5_T5_6 Analysing the Effectiveness of COMA++ on the Mapping between Traditional Malay Textile (TMT) knowledge Model and CIDOC CRM Syerina Azlin Md Nasir, Nor Laila Md Noor (UiTM) ITSO5_T6_1 MALIM - A New Computational Approach of Malay Morphology Mohd Yunus Sharum, Muhammad Taufik Abdullah, Md Nasir Sulaiman, Masrah Azrifah Azmi Murad, Zaitul Azma Zainon Hamzah (UPM) ITSO5_T6_2 Indexing Protein sequence/ structure Databases using Decision Tree: A Preliminary study Khalid Jaber, Rosni Abdullah, NurAini Abdul Rashid (USM) ITSO5_T6_3 semantic based features selection and Weighting Method for Text Classification Aurangzeb Khan, Baharum Baharudin, Khairullah Khan (UTP) ITSO5_T6_4 seed-based Region growing study for brain Abnormalities segmentation Noor Elaiza Abdul Khalid, Shafaf Ibrahim, Mazani Manaf, Umi Kalthum Ngah (UiTM) ITsO5_T6_5 Agent based Negotiation In E-commerce Moustapha Tahir (UTP) ITSO5_T6_6 Transforming unstructured Query to Mediated Query for structured Retrieval Gan Keng Hoon, Phang Keat Keong (UM) ITSO5_T7_1 Information security Considerations for higher Learning Institutions Zuraini Ismail, Maslin Masrom, Dayang Suhana Hamzah, Zailani Mohammed Sidek (UTM) ITSO5_T7_2 Assessing knowledge Management Readiness in Organizations Mohamed Jalaldeen Mohamed Razi, Nor Shahriza Abdul Karim (UIAM) ITSO5_T7_3 hCI Practices in Malaysia: A Reflection of IT Professional Perspective Idyawati Hussein, Murni Mahmud, Alvin W. Yeo (UMS) ITSO5_T7_4 Evaluating heuristic for Eg Portal Design Model Murni Mahmud, Ab Razak Che Hussin, Noor Khairunnisa Othman, Halina M. Dahlan (UTM) ITSO5_T7_5 Designing a Computer Literacy Course Alan Oxley (UTP) ITSO5_T7_6 The Challenges in Transferring Technical knowledge: A university Teknologi PETRONAs Case study Khairul Shafee Kalid (UTP)

T6 ENgINEERINg TEChNOLOgy VENuE: 3-05


2.00 pm

2.20 pm 2.40 pm 3.00 pm 3.20 pm 3.40 pm

T7 kNOWLEDgE sOCIETy VENuE: 3-06


2.00 pm 2.20 pm 2.40 pm 3.00 pm 3.20 pm 3.40 pm

ITsO6: PARALLEL ORAL sEssION 6 (4.20 PM 6.00 PM) T1 VIsuAL INfORMATICs VENuE: 3-01
4.20 pm 4.40 pm 5.00 pm 5.20 pm ITSO6_T1_1 Live solar system (Lss): Evaluation of an Augmented Reality book-based Educational Tool Aw Kien Sin, Halimah Badioze Zaman (UKM) ITsO6_T1_2 Developing Augmented Reality book for Deaf in science: The Determining factors Norziha Megat Mohd. Zainuddin, Halimah Badioze Zaman, Azlina Ahmad (UKM) ITSO6_T1_3 Courseware Accessibility for hearing Impaired Siti Zaharah Mohid, Nor Azan Mat Zin (Kolej Universiti Islam Antarabangsa) ITSO6_T1_4 Mobile Tourism Directory based on the LuCID Methodology: A Preliminary study Juhana Salim, Ahmad Bazli Arifin, Onn Azraai Puade (UKM) ITSO6_T2_1 Traceability in Agri-food sector using RfID Arun N. Nambiar (USA)

T2 ENgINEERINg TEChNOLOgy VENuE: 3-02


4.20 pm

4th International Symposium on Information Technology

29

a conference of World Engineering, Science & Technology Congress

TECHNICAL SESSIONS
ORAL PREsENTATIONs
4.40 pm 5.00 pm 5.20 pm 4.20 pm ITSO6_T2_2 Decision Making using fuzzy Logic for stock Trading Shuhadah Othman, Etienne Schneider (UTP) ITSO6_T2_3 Evaluating Neural Network Intrusion Detection Approaches using Analytic hierarchy Process Iftikhar Ahmad, Azween Abdullah, Abdullah S Alghamdi (UTP) ITSO6_T2_4 Moving Towards Two Dimensional Passwords Sohail Safdar, Mohd Fadzil Hassan (UTP) ITSO6_T3_1 A P2P Object-Oriented Database system that supports Multi-Attribute and Range Queries with Improved Query Response Time Goh Chiao Wei, Lim Tong Ming (Sunway University College) ITSO6_T3_2 functional Requirements Analysis for Developing English Language Diagnosis Tool Roshini Rajamanicam, Norlia Mustaffa, Wahidah Husain, Nasriah Zakaria (USM) ITSO6_T3_3 E-Cost Estimation using Expert Judgment and COCOMO II Zulkefli Mansor, Zarinah Mohd Kasirun, Noor Habibah Hj Arshad, Saadiah Yahya (UNISEL) ITSO6_T3_4 Design and Development of e-RuE as a Web-based Evaluation Tool Rafidah Ramli, Azizah Jaafar (UKM) ITSO6_T3_5 Implementing Rapid Application Development(Rad) Methodology In Developing Practical Training Application system Nik Marsyahariani Nik Daud, Nor Azila Awang Abu Bakar, Hazlifah Mohd Rusli (UiTM) ITSO6_T4_1 social Interaction in E-learning: An Overview Noorihan Abdul Rahman @ Abdul Rashid , Shamsul Sahibuddin (UiTM) ITSO6_T4_2 A Proposed semantic Recommendation system for E-Learning (A Rule and Ontology based E-learning Recommendation system) Saman Shishehchi, Seyed Yashar Banihashem and Nor Azan Mat Zin (UKM) ITSO6_T4_3 Accessible e-learning Approach for handicaps (A Proposed Interaction Technique for Arm muscle disorders, Parkinson and hand tremors) Seyed Yashar Banihashem, Saman Shishehchi, Nor Azan Mat Zin (UKM) ITSO6_T4_4 Refining Technical and Learning Accessibility Elements on E-learning for user with Visual Impairment Khairuddin Kamaludin, Noor Faezah Mohd Yatim, Md. Jan Nordin (UKM) ITSO6_T4_5 MINDA: A Cognitive Tool for solving Mathematical Word Problems Azlina Ahmad, Halimah Badioze Zaman, Siti Salwah Salim, Roziati Zainuddin (UKM) ITSO6_T5_1 Proposed Model for Courseware Development of Virtual Teaching And Learning Traditional Craft Salyani Osman, Nor Azan MZ (UKM) ITsO6_T5_2 sMs-based final exam retrieval system on mobile phones Rohiza Ahmad, Aliza Sarlan, Khairul Aiman Ab Maulod, Eliza Mazmee Mazlan, Rozana Kasbon (UTP) ITSO6_T5_3 A service science Approach for e-Learning Mohamed Nazul Ismail, Yazrina Yahya, Muriati Mukhtar, Mohamad Shanudin Zakaria, Ali Ahmad Zahrawi (IPTEKNIK) ITSO6_T5_4 Mathematical knowledge Representation for Education semantic Web based on Learning style Ili Farhana Md Mahtar, Nor Azan Mat Zin (UKM) ITSO6_T5_5 Evaluation of hiCORE: Multi-tiered holistic Islamic banking system based on user Acceptance Test Halimah B.Z.,Azlina A.,T.M.Sembok, Suffian I.,Shahrul Azman M.N., Azuraliza A.B.,Zulaiha A.O.,Nazlia O. Salwani A.,Sanep A., Hailani M.T.,Zaher M.Z., Azizah J., Norfaezah M.Y., Choo,W.O., C.Abdullah, Sopian B. (UKM) ITSO6_T6_1 A survey of simulators, Emulators and Testbeds for Wireless sensor Networks Muhammad Imran, Abas Md Said, Halabi Hasbullah (UTP) ITSO6_T6_2 strategy for Efficient Routing in VANET Nur Diana Mohd. Nuri, Halabi Hasbullah (UTP)
30

T3 sOfTWARE DEVELOPMENT AND APPLICATION VENuE: 3-03

4.40 pm 5.00 pm 5.20 pm 5.40 pm

T4 VIsuAL INfORMATICs VENuE: 3-04


4.20 pm 4.40 pm

5.00 pm

5.20 pm 5.40 pm

T5 VIsuAL INfORMATICs VENuE: 3-05


4.20 pm 4.40 pm 5.00 pm 5.20 pm 5.40 pm

T6 ENgINEERINg TEChNOLOgy VENuE: 3-06


4.20 pm 4.40 pm

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

TECHNICAL SESSIONS
ORAL PREsENTATIONs
5.00 pm 5.20 pm ITSO6_T6_3 Multilayer Packet Tagging for Network behaviour Analysis Maznan Deraman, Jalil Md Desa, Zulaiha Ali Othman (TM Research and Development Sdn Bhd) ITSO6_T6_4 A Capable, high-Level scheduling Concept for Application-specific Wireless sensor Networks Matthias Vodel, Mirko Lippmann, Mirko Caspar, Wolfram Hardt (Germany) ITSO6_T7_1 using Change Tracking Component to Manage Object-Oriented Driven user Interface Layout Management system Liang Ying Oh, Tong Ming Lim ( Sunway University College) ITSO6_T7_2 An Improved Traditional Worm Attack Pattern Robiah Y., Siti Rahayu S., Shahrin Sahib, Mohd Zaki M., Faizal M.A., Marliza R. (UTEM) ITSO6_T7_3 Architecture of seMeja Desktop system Sufian Idris, Marini Abu Bakar, Zarina Shukur (UKM)

T7 ENgINEERINg TEChNOLOgy VENuE: 3-10


4.20 pm 4.40 pm 5.00 pm

ThuRsDAy, 17 JuNE 2010 ITsO7: PARALLEL ORAL sEssION 7 (10.50 AM 12.50 PM) T1 VIsuAL INfORMATICs VENuE: Ch1
10.50 am 11.10 am 11.30 am 11.50 am 12.10 pm ITSO7_T1_1 Evaluating the Accessibility and Visibility of Quran Websites Ahmad Bakeri Abu Bakar (UIAM) ITSO7_T1_2 formative Evaluation for Accounting Courseware Enhancement Norlina Mohd Sabri, Hasiah Mohamed @ Omar, Noraidah Md Bati (UiTM) ITSO7_T1_3 Challenges in the Evaluation of Educational Computer games Hasiah Mohamed @ Omar, Azizah Jaafar (UiTM) ITSO7_T1_4 Investigating the Redundancy Effect in Multimedia Learning on a Computer science Domain Riaza Mohd Rias, Halimah Badioze Zaman (UiTM) ITSO7_T1_5 Wi-fi Load balancing using Cognitive Radio Techniques Rafiza Ruslan, Tat-Chee Wan (UiTM)

12.30 pm ITSO7_T1_6 Design of interactive board system for collaborative learning T. Puckdeepun, J. Jaafar, M. F. Hassan, F. A. Hussin (UTP)

T2 ENgINEERINg TEChNOLOgy VENuE: 3-01


10.50 am ITSO7_T2_1 Incorporation of Multimedia Approaches to Literature Online via E-learning for foundation Level Literature Courses: The Case of a Private Institution of higher Learning in Malaysia Nur Athirah Radzi, Subarna Sivapalan, Wan Fatimah Wan Ahmad, Azrai Hj Abdullah (UTP) 11.10 am ITSO7_T2_2 Developing a simulation game to facilitate the Acquisition and Transfer of Road safety knowledge Mazeyanti M Ariffin, Alan G. Downe, Irzan Ashraf Abd Aziz (UTP)

11.30 am ITSO7_T2_3 Optimal Path selection in bluetooth scatternet based on fuzzy set Masood Ur Rehman, Halabi Hasbullah (UTP) 11.50 am 12.10 pm ITSO7_T2_4 The Importance of TALIb sysTEM using Computer Controlled for Visual Impaired Community Muhamad Lazim Talib, Norshahriah Wahab, Muslihah Wook (UPNM) ITS07_T2_5 forecasting Method selection using ANOVA and Duncan Multiple Range Tests on Time series Dataset Adhistya Erna Permanasari, Dayang Rohaya Awang Rambli, P. Dhanapal Durai Dominic (UTP) ITS07_T2_6 A New Delayed ACk strategy for TCP Multi-hop Wireless Networks Ammar Mohammed Al-Jubari, Mohamed Othman (UPM) ITSO7_T3_1 smart Card Technology Integration in a higher Education Institution Ili Hawa Ahmad, Normie Azura Abdul Jamil, Muna Azuddin, Norshidah Mohamed (UIAM)

12.30 pm

T3 sOfTWARE DEVELOPMENT AND APPLICATION VENuE: 3-02


10.50 am

11.10 am ITSO7_T3_2 A conceptual framework of an e-mentoring system for orphan children using ARCs Motivational Model Nursakirah Ab.Rahman Muton, Nasriah Zakaria, Faten Damanhoori (USM)

4th International Symposium on Information Technology

31

a conference of World Engineering, Science & Technology Congress

TECHNICAL SESSIONS
ORAL PREsENTATIONs
11.30 am 11.50 am 12.10 pm 12.30 pm ITSO7_T3_3 semantic-based grid Resource Discovery systems - A literature review and taxonomy Mahamat Issa Hassan, Azween Abdullah (UTP) ITSO7_T3_4 Extended function Point Analysis Prototype - With security Costing Estimation Nur Atiqah Sia Abdullah, Rusli Abdullah, Mohd Hasan Selamat, Azmi Jaafar (UiTM) ITSO7_T3_5 A framework for building Multilingual Domain Ontologies for Islamic Portal Juhana Salim, Siti Farhana Mohamad Hashim, Akmal Aris (UKM) ITSO7_T3_6 semantically Indexed and searched of Digital Images using Lexical Ontologies and Named Entity Recognition Datul Aida Ali, Sharul Azman Ali (UKM) ITSO7_T4_1 Adoption of E-commerce in Malaysia and its Affect on the business Performance: An Organizational Perspective Muhammad Jehangir Khan, P.D.D. Dominic, Alamghir Khan, Naseebullah (UTP) ITsO7_T4_2 ICT Dimension and Indicators towards building a knowledge society in Malaysia: A Measurement Model Norsiah Abdul Hamid, Halimah Badioze Zaman (UKM) ITSO7_T4_3 A Preliminary study on the Implementation of Enterprise Resource Planning in Malaysian Private higher Institution-A Case study Raja Mohd Tariqi Raja Lope Ahmad, Zalinda Othman, Muriati Mukhtar (UKM) ITSO7_T4_4 If Professors knew What They know: A Technique for Capturing university Teachers' Tacit knowledge of students supervision Ibraheem M. Dooba, Alan G. Downe, Ahmad Kamil Mahmood (UTP) ITSO7_T4_5 Instructors Acceptance of Distance Learning Management system Ibrahim Abood Almrashdah, Noraidah Shaari@ Ashaari, Nor Azan Hj.Mat Zin , Mutasem Alsmadi (UKM)

T4 VIsuAL INfORMATICs VENuE: 3-03


10.50 am

11.10 am 11.30 am

11.50 am

12.10 pm

12.30 pm ITS07_T4_6 An Evaluation of the usage of Web 2.0 Among Tertiary Level students in Malaysia Kamaluddeen Usman Danyaro, Jafreezal Jaafar, Rod Allan A. De Lara , Alan G. Downe (UTP)

T5 VIsuAL INfORMATICs VENuE: 3-04


10.50 am ITSO7_T5_1 A Conceptual Model for behavioral Intention to use 3g Mobile Multimedia services in Indonesia Indrawati, Murali Raman, Kok-Wai Chew (Indonesia) 11.10 am 11.30 am 11.50 am 12.10 pm 12.30 pm ITSO7_T5_2 Problem solving steps in Online PbL-Research framework Nurhazirah Mohd Bakri, Faaizah Shahbodin, Hajah Norasiken Bakar (UTeM) ITSO7_T5_3 Development of Islamic Medication Expert system on Mobile Platform Hanita Daud, Nudzul Izaney M.Z., Low Tan Jung, Khalidah Khalid Ali (UTP) ITSO7_T5_4 Mental Model of blind users to Assist Designers in system Development Siti Nur Syazana Mat Saei, Suziah Sulaiman, Halabi Hasbullah (UTP) ITSO7_T5_5 Virtual Tembaga Ordering system (VTOs) Hasiah Mohamed @ Omar, Nor Azila Awang Abu Bakar, Nurfarhana Mohd Nor (UiTM) ITS07_T5_6 A Learning system Platform or Automated Data Analysis: A Practical Application on historical solar Data Yahya Tashtoush, O.A. Younis, M.H. Alomari (Jordan) ITSO7_T6_1 The Role of factors in business-to-business E-procurement Implementation Naseebullah, Mohd Fadzil Hassan, P.D.D.Dominic (UTP)

T6 VIsuAL INfORMATICs VENuE: 3-05


10.50 am

11.10 am ITSO7_T6_2 Trailblazers and Laggards in Internet sophistication Among Rural society: Empirical Evidence from Malaysia Mahendhiran Nair, Gil-Soo Han, Patricia Goon (Monash University) 11.30 am ITSO7_T6_3 Application of Clickstream Analysis as Web Page Importance Metric in Parallel Crawlers Ali Selamat, Fatemeh Ahmadi-Abkenari (UTM) 11.50 pm ITSO7_T6_4 Electronic Land Administration system In Malaysia: A Proposed Review from ICT and Legal Perspectives Nor Shahriza Abdul Karim, Zainal Abidin Nordin, Ainul Jaria Maidin, Mohd Shukri Ismail (UIAM)

4th International Symposium on Information Technology

32

a conference of World Engineering, Science & Technology Congress

TECHNICAL SESSIONS
ORAL PREsENTATIONs
12.10 pm ITSO7_T6_5 Value co-Creation: Embedding the Value Elements in Critical success factor for E-government system Development Cik Nora Salleh, Yazrina Yahya, Mohammed Alaa H. Altemimi, Muriani Mukhtar (UKM) ITSO7_T6_6 Proposed Development Methodology for higher Education and Library Mash-ups Rabiu Ibrahim, Alan Oxley (UTP)

12.30 pm

T7 ENgINEERINg TEChNOLOgy VENuE: 3-06


10.50 am ITSO7_T7_1 Network Analyzer Development Comparison with Independent Data and benchmark Products: Network Traffic utilization Mohd Nazri Ismail, Abdullah Mohd Zin ( UniKL) 11.10 am 11.30 am ITSO7_T7_2 haptic Texture search Engine framework Waskito Adi, Suziah Sulaiman (UTP) ITSO7_T7_3 On-Line homeschooling Learning Management system using Intelligent Tutoring system Abdurazzag A. Aburas, Rehab Shreef (UIAM)

11.50 pm ITSO7_T7_4 sociability Aspects in e-health Community: A Review Nor Athiyah Abdullah, Nasriah Zakaria (USM ) 12.10 pm ITSO7_T7_5 briefly Introduced and Comparatively Analysed: Agile sD, Component-based sE, Aspect-Oriented sD and Mashups Ali Seyfi, Ahmed Patel ( UKM )

4th International Symposium on Information Technology

33

a conference of World Engineering, Science & Technology Congress

TECHNICAL SESSIONS
POsTER PREsENTATIONs
TuEsDAy, 15 JuNE 2010 ITsP1: POsTER sEssION 1 (2.00 PM 5.00 PM) VENuE: fOyER
ITsP1_1 ITsP1_2 ITsP1_3 ITsP1_4 ITsP1_5 ITsP1_6 ITsP1_7 ITsP1_8 ITsP1_9 3D reconstruction of a scene from multiple uncalibrated images Abdoulaye Mahamat Zakaria , Abas Md Said (UTP) The Enhancement of Assistive Courseware for Visually Impaired Learners Nur Hazwani Mohamad Roseli, Nurulnadwan Aziz Aziz, Ariffin Abdul Mutalib (UiTM) survey on Visualization: Lines and Planes in 3-Dimensions Syazwan Noordin, Wan Fatimah Wan Ahmad, Yew Kwang Hooi (UTP) Applying Virtual Reality Panorama simulation Environment in Technical Communication Wan Norazlinawati Wan Abd Arif, Wan Fatimah Wan Ahmad, Shahrina Md Nordin (UTP) software Risk Assessment Visualization Tool using Probabilistic Model Nuridawati Mustafa , Nurazlina Md Sanusi, Intan Ermahani A. Jalil (UTeM) Architecture and uML Models of Mobile Learning Application for Course Content Ahmad Sobri Hashim, Wan Fatimah Wan Ahmad , Rohiza Ahmad (UTP) gIs-based Mobile Tourism Architecture Prototype for Libya (A Case study) Abubaker Agil Emhmed, Kalaivani Chellapan (UNIR AZAK) A guided Digital storytelling Prototype system using Illustrated flashcards Jumail Wastam, Dayang Rohaya Awang Rambli, Suziah Sulaiman (UTP) An Overview of Augmented Reality of underwater habitat Norsila Shamsuddin, Mohd Kushairi Mohd Rajuddin, Farahwahida Mohd, Faudzi Ahmad, Wan Fatimah Wan Ahmad, Baharum Baharudin (Unisel)

ITsP1_10 Enhanced signature Verification Technique using Data glove Shohel Sayeed, Rosli Besar, Nidal Kamel (MMU) ITsP1_11 Development of Multimedia Messaging service (MMs) -based Receipt system for Mobile banking Mohd Hilmi Hasan , Aklili Khalid (UTP) ITsP1_12 Performance of AODV Routing Protocol in Mobile Ad hoc Network Zahian Ismail, Rosilah Hassan (UKM) ITsP1_13 Evaluation of Real-Time Visio-haptic Deformable bovine Rectal Palpation simulator Irshad Ahmad, Suziah Sulaiman (UTP) ITsP1_14 Multimedia Courseware for slow Learners:A Preliminary Analysis Fatimah Wan Ahmad, Emelia Akashah Patah Akhir (UTP) Norfarhana Abdollah, Wan

ITsP1_15 Developing A Virtual Laboratory for biology (VLab-bio): A Preliminary study Murniza Muhamad, Halimah Badioze Zaman, Azlina Ahmad (UKM)

4th International Symposium on Information Technology

34

a conference of World Engineering, Science & Technology Congress

TECHNICAL SESSIONS
POsTER PREsENTATIONs
WEDNEsDAy, 16 JuNE 2010 ITsP2: POsTER sEssION 2 (8.30 AM 12.00 PM) VENuE: fOyER
ITsP2_1 ITsP2_2 ITsP2_3 statistical Analysis for the key Representation Database and the Original Database Asim Elshiekh, P. D. D. Dominic (UTP) Query Translation Architecture for Malay-English Cross-Language Information Retrieval system Nurjannaton Hidayah Rais, Muhamad Taufik Abdullah, Rabiah Abdul Kadir (UPM) A comparison of feed-forward back-propagation and radial basis artificial neural networks: A Monte Carlo study Osman Ahmed Abdalla, M. Nordin Zakaria, Suziah Sulaiman, Wan Fatimah Wan Ahmad (UTP) A Multidimensional search space using Interactive genetic Algorithm Humera Farooq, M. Nordin Zakaria, Mohd Fadzil Hassan (UTP) Enhanced Performance of Packet Transmission using system Model Over VoIP Network Kashif Nisar, Abas Md Said, Halabi Hasbullah (UTP) Temporary Cluster based Routing for underwater Wireless sensor Networks Muhammad Ayaz, Azween Abdullah, Low Tang Jung (UTP) Trust challenges and issues of E-government: E-Tax prospective Dinara Berdykhanova, Ali Dehghantanha, Kumaresh, Hariraj (Asia- Pacific University College of Technology and Innovation) Review on finger Vein Authentication system by Applying Neural Network Azadeh Noori Hoshyar, Riza Sulaiman (UKM) Climate control and Monitoring with Wireless sensor Network: A Case study Asfandyar Khan, Azween Abdullah, Nurul Hasan (UTP)

ITsP2_4 ITsP2_5 ITsP2_6 ITsP2_7 ITsP2_8 ITsP2_9

ITsP2_10 A New framework to Extract WordNet Lexicographer files for semi-formal Notation: A Preliminary study Noor Maizura Mohamad Noor, Noraida Ali, Noor Syakirah Ibrahim (UMT) ITsP2_11 Development of a Manufacturing Industry success Rate Analyzer using Data Mining Technique Eliza Mazmee Mazlan, Rohiza Ahmad, Rozana Kasbon (UTP) ITsP2_12 sentiment Classification of Customer Reviews based on fuzzy logic Samaneh Nadali,Masrah Azrifah Azmi Murad, Rabiah Abdul Kadir (UPM) ITsP2_13 using Multi-Coordinated Views with Agent Communication Protocol to Detect and Resolve Inconsistent Requirements to Improve Accuracy Tan Lai Heng, Lim Tong Ming (Sunway University College) ITsP2_14 The Development of hashing Indexing Technique in Case Retrieval Mohamad Farhan Mohamad Mohsin, Maznie Manaf, Norita Md Norwawi, Mohd Helmy Abd Wahab (UUM) ITsP2_15 Conceptual Architecture Design and Configuration of Thin Client system for schools in Malaysia: A Pilot Project Abdul Rahman Ahlan, Yusri Arshad, Murni Mahmud (UIAM) ITsP2_16 Evaluation of Theoretical Isotope generator as Alternative for Isotope Pattern Calculator K. Massila, K.C. Soong, I. Nor Haslinda (UTeM) ITsP2_17 An Extension To Mobile IPv6 Micro-Mobility Management Zulkeflee Kusin, Mohamad Shanudin Zakaria (UKM)

4th International Symposium on Information Technology

35

a conference of World Engineering, Science & Technology Congress

TECHNICAL SESSIONS
POsTER PREsENTATIONs
ITsP3: POsTER sEssION 3 (2.00 PM 5.00 PM) VENuE: fOyER
ITsP3_1 The Design of fingerprint biometric Authentication on smart Card for PuLAPOT Main Entrance system Mohd Rizal, Mohd Isa, Yuhanim Hani Yahaya, Mohd Hazali Mohamed Halip, Mohammad Adib Khairuddin, Kamaruzaman Maskat (UPNM) A survey of game Theory using Evolutionary Algorithms Sally Hassan A., Muhammad Rafie M.A. (USM) Malware self Protection Mechanism Issues in Conducting Malware behaviour Analysis in a Virtual Environment As Compared To a Real Environment Syed Nasir Alsagoff (UPNM) Industrial-based Object-oriented software Quality Measurement system and Its Importance Nor Fazlina Iryani Abdul Hamid, Mohammad Khatim Hasan (UKM) Practical Database Design for Industrial Maintenance system Abd. Samad Hasan Basari, Nanna Suryana Herman, Ariff Idris (UTeM) Model Driven security frameworks for Addressing security Problems of service Oriented Architecture Muhammad Qaiser Saleem, Jafreezal Jaafar, Mohd Fadzil Hassan (UTP) Effectiveness of blog for programming course in supporting engineering students Janagiammal Ramasamy, Sangeetha Valloo, Jaya Malathy Polaha Nadan (Kuala Lumpur Infrastructure University College) Domain Analysis with Archetype Pattern based zachman framework for Enterprise Architecture Gunnar Piho; Jaak Tepandi, Mart Roost (University of Leeds / Tallinn University of Technology, UK) Intelligent Decision support for Tourism Destination Choice: A Preliminary study Noor Maizura Mohamad Noor, Ily Amalina Ahmad Sabri, Noraida Ali, Fathilah Ismail, (UMT)

ITsP3_2 ITsP3_3 ITsP3_4 ITsP3_5 ITsP3_6 ITsP3_7

ITsP3_8 ITsP3_9

ITsP3_10 simulating the effect of supply Chain Risk and Disruption: A Malaysian Case study Afsaneh Noori Houshyar, Muriati Mukhtar, Riza Sulaiman (UKM) ITsP3_11 Design of Web Intervention to Influence youth behavior Toward Online gaming Chen Yoke Yie, Subarna Sivapalan, Kajendra Ganeson, Goh Kim Nee, Savita K Sugathan; Emelia Akashah P Akhir (UTP) ITsP3_12 A Proposed framework for E-business supply Chain Integrator Norshakirah Ab Aziz, Rohiza Ahmad (UTP) ITsP3_13 safeJourney A Pedestrian Map using safety Annotation for Route Determination Kwang Hooi Yew, Ta Thu Ha, S.D. Silva Jose Paua (UTP) ITsP3_14 The Development of the short Messaging service (sMs) Application for the school usage Salman Firdaus Sidek (UPSI) ITsP3_15 futuristic Model for school's Content Management systems - A beginning Yuhanis Omar, Noraidah Sahari @ Ashaari (UKM) ITsP3_16 To Enable formal Verification of semi-formal Requirements by using Pre-defined Template and Mapping Rules to map to Promela specification to Reduce Rework Lin Cheng Hong, Lim Tong Ming (Sunway University College) ITsP3_17 Extended balancing Ontological and Operational factors in Refining Multiagent Neighborhood using ACO Lee Chee Yean , Lim Tong Ming, Lay-Ki Soon (Sunway University College)

4th International Symposium on Information Technology

36

a conference of World Engineering, Science & Technology Congress

TECHNICAL SESSIONS
POsTER PREsENTATIONs
ThuRsDAy, 17 JuNE 2010 ITsP4: POsTER sEssION 4 (8.30 AM 12.00 PM) VENuE: fOyER
ITsP4_1 ITsP4_2 ITsP4_3 ITsP4_4 ITsP4_5 ITsP4_6 ITsP4_7 ITsP4_8 ITsP4_9 ICT, knowledge society, and good governance: Relationship and Interaction Pattern Aziz Perdana (Gadjah Mada University,Indonesia) Information sharing through football Website Equatorial guinea (Eg) Case study Emelia Akashah P Akhir, Yoke Yie Chen, Kim Nee Goh , Savita K Sugathan, Salvador Nguema Obama(UTP) Limitations and Measures in Outsourcing Projects to geographically Distributed Offshore Teams Rehan Akbar, Mohd Fadzil Hassan (UTP) An Improved security framework for Data Warehouse: A hybrid Approach Ahmad Sajjad, Rohiza Ahmad (UTP) A Review On The fairness Of The Nurse Rostering Problem Mohd Hakimi Aiman Ibrahim, Robiah Ahmad, Suriayati Chuprat, Habibollah Haron, Nuzulha Khilwani Ibrahim (UTM) Applying zachman's framework to Determine the Content of semantic Theses Digital Library QurratuAini Adibah Ahmad Fazil, Zuraidah Abdullah, Shahrul Azman Noah, (UKM) Integrating National Culture into Information and Communication Technology Adoption Model Mohamed Hussain Thowfeek, Azizah Jaafar (UKM) factors Influencing knowledge sharing in higher Learning A.H Azni, Azreena Abu Bakar, Nuradli Shah, Hanifah Abd Hamid (USIM) Information security Risk Management- An Empirical study on the Importance and Practices in ICT Outsourcing Nik Zulkarnaen Khidzir, Noor Habibah Arshad, Azlinah Mohamed (UiTM)

ITsP4_10 Defining Information system failure in Malaysia: Results from Delphi Technique Norshita Mat Nayan, Halimah Badioze Zaman, Tengku Sembok (UKM) ITsP4_11 formal specification Languages for Real Time system Rabia Sammi, Iram Rubab, Muhammad Aasim Qureshi (Pakistan) ITsP4_12 histogram Matching for Color Detection: A Preliminary study Fatma Susilawati Mohamad, Azizah Abdul Manaf & Suriayati Chuprat (UTM)

4th International Symposium on Information Technology

37

a conference of World Engineering, Science & Technology Congress

WORKSHOPS ThuRsDAy, 17 JuNE 2010


WORkshOP 1 (2.00 PM 4.00 PM) VENuE : 3-01

Workshop Title : End to End Testing strategies


Workshop itineraries: Functional Testing Performance Testing: Concurrent Users Performance Testing: Network Bandwidth and Latency Compatibility Testing Security Testing Usability Testing Workshop Leader: Mr. Redzuan Abdullah Mr. Redzuan is currently the Director of the Test Lab in MIMOS Berhad. He comes with more than 14 years of working experience in software development, technical support and software testing in both local and multinational organizations prior to joining MIMOS in 2007. Mr. Redzuan has vast knowledge in various programming languages, CMMi, Six Sigma, Telecommunication and Project Management with international certifications in TOGAF, ASP, Red Hat Certified Engineer (RHCE), British Standard Information Security Auditor (BS7799) and Six Sigma Green Belt among others.

WORkshOP 2 (2.00 PM 4.00 PM) VENuE : 3-02

Workshop Title: Network simulation using Ns2


This workshop provides a general overview of simulation techniques used to study networks. These techniques are applicable in the studies of traffic engineering, routing and protocols, e.g., transmission control protocols and multicast protocols. The focus is on using NS2, an open source discrete-event simulator, as the tool for network simulation. Participants will also have an opportunity to appreciate some successful simulation models developed using NS2.At the completion of this workshop, participants will be able to: Develop a conceptual simulation model for communication networks Determine the pros and cons of using NS2 simulator in their research, compared to using other simulators Understand situations where NS2 can be more supportive or otherwise, as opposed to other simulators, as well as avoiding some pitfalls in simulation Pick up some tips on verifying and validating a network simulation model. Workshop Leader: Associate Professor Dr. Suhaidi Hassan Associate Professor Dr. Suhaidi Hassan is currently the Assistant Vice Chancellor of the College of Arts and Sciences, Universiti Utara Malaysia (UUM). He is an associate professor in Computer Systems and Communication Networks and the former Dean of the Faculty of Information Technology, Universiti Utara Malaysia. In 2006, he established the ITU-UUM Asia Pacific Centre of Excellence (ASP CoE) for Rural ICT Development, a human resource development initiative of the Geneva-based International Telecommunication Union (ITU) which serves as the focal point for all rural ICT development initiatives across Asia Pacific region by providing executive training programs, knowledge repositories, R&D and consultancy activities. Dr. Suhaidi Hassan is a senior member of the Institute of Electrical and Electronic Engineers (IEEE) and joins both the IEEE Communications and IEEE Computer societies. He served as the Vice Chair (2003-2007) of the IEEE Malaysia Computer Society. He also serves as a technical committee for the Malaysian Research and Educational Network (MYREN) and as a Council Member of the Cisco Network Academy.

4th International Symposium on Information Technology

38

a conference of World Engineering, Science & Technology Congress

WORKSHOPS
WORkshOP 3 (2.00 PM 4.00 PM) VENuE : 3-03

Workshop Title : biometrics: Challenges and Developments


In recent times, an increasing, worldwide effort has been devoted to the development of automatic personal identification systems that can be effective in a wide variety of security contexts. As one of the most powerful and reliable means of personal authentication, biometrics has been an area of particular interest. However, there are many challenges we faced in biometrics research. In order to solve these problems, this presentation will introduce our two different guidelines in selecting a research topic: Do something never done before and do something best than others. As their case studies, 3D/multispectral palmprint & tongueprint biometrics system and high resolution fingerprint & high accuracy palmprint recognition are developed respectively. Workshop leader : Professor David zhang David Zhang graduated in Computer Science from Peking University. He received his MSc in Computer Science in 1982 and his PhD in 1985 from the Harbin Institute of Technology (HIT). From 1986 to 1988 he was a Postdoctoral Fellow at Tsinghua University and then an Associate Professor at the Academia Sinica, Beijing. In 1994 he received his second PhD in Electrical and Computer Engineering from the University of Waterloo, Ontario, Canada. Currently, he is a Head, Department of Computing, and a Chair Professor at the Hong Kong Polytechnic University where he is the Founding Director of the Biometrics Technology Centre (UGC/CRC) supported by the Hong Kong SAR Government in 1998. He also serves as Visiting Chair Professor in Tsinghua University, and Adjunct Professor in Peking University, Shanghai Jiao Tong University, HIT, and the University of Waterloo. He is the Founder and Editorin-Chief, International Journal of Image and Graphics (IJIG); Book Editor, Springer International Series on Biometrics (KISB); Organizer, the International Conference on Biometrics Authentication (ICBA); Associate Editor of more than ten international journals including IEEE Transactions and Pattern Recognition; and the author of more than 10 books and 200 journal papers. Professor Zhang is a Croucher Senior Research Fellow, Distinguished Speaker of the IEEE Computer Society, and a Fellow of both IEEE and IAPR.

4th International Symposium on Information Technology

39

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
VIsuAL INfORMATICs ITsO1_T1: 15 JuNE 2010 (2.00 PM 4.00 PM) VENuE: 3-01
ITSO1_T1_1 ITSO1_T1_3

Mobile-based Interactive Learning using handwriting Recognition


Azam Zakaria, Wan Fatimah Wan Ahmad, Mohd Hilmi Hasan The number of smart phones being fitted with accelerometers and other motion sensitive sensors are increasing by time as the technologies continue to grow. Currently this sensor is used in providing physical gesture interaction in a gesture-based application or software. The function of this new extendibility in mobile phone can be practice in the lecture surrounding. For this research, it is to study the use of mobile phone in the learning environment and proposing interactive learning based on handwriting recognition. It will create a new way of interaction during lecture session involving the mobile phone by using the gesture applied on it to be recognized as the handwriting recognition. Motion will be applied on the phone as the medium of interaction between the lecturer and the student where the gesture applied will be recognized and projected on the lecture halls screen. Thus, it is believed to help the lectures to be more interactive with the students and create a new way of learning in a lecture environment.
ITSO1_T1_2

balancing between usability and Aesthetics of Web Design


Umi Kalsom Yusof, Leng Khang Khaw, Hui Yang Chng, Boon Jiann Neow Web visual aesthetics and its usability play very important roles in determining the success of the Website. It is difficult to decide which aspect needs to be given more attention when it comes to designing a Website as aesthetics is focusing on the look and feel while usability is stressing on its functionalities. There is no perfect answer which aspects of the Web design are more important than the others. In addition, it is also difficult to have a balance of these two seemingly contrary objectives of Web design. This research focuses on how to balance the aesthetics design and the usability of Web design. This study also investigates methods to evaluate Web pages usability and aesthetic appeal, the role of these two aspects play in the Website design and also the relationship between these two aspects. The results of study provide a tangible concept on how the Web usability and the Web aesthetics design affect each other and methods to balance between the Web usability and aesthetics design. The contribution of this paper is to provide guiding principle to the Website developer in order to develop a Website which is well-balance in usability as well as its aesthetics aspect.
ITSO1_T1_4

Multimedia Learning system (MMLs): Valuing the significance of Cognitive Task Analysis Technique and user Interface Design
Norain Mohd Yusoff, Chui Yin Wong
This paper presents a development of e-Learning System and significant contributions of task analysis and user interface design elements for the deployment of a novel Multimedia Learning System (MMLS). An overview of MMLS starting from the content development flow to the implementation stage is discussed in details. This project is currently being deployed at the Multimedia University (MMU) Malaysia. Adobe Dreamweaver and Adobe Flash were used by the teaching staff to develop the interactive learning environment within the two campuses in MMU. Cognitive Task Analysis (CTA) is introduced as a means of capturing the psychological complexity of tasks that involved significant cognitive activities such as planning, diagnosis and decision-making during the human-system interaction design process. Human Factors approach (i.e. effectiveness and efficiency) and Design approach (i.e. affect and hedonistic qualities of products) are also identified as factors contributing to the development of MMLS. This paper concludes that MMLS is able to increase efficiency, and empowers a geographically and temporally dispersed group of educators, administrators, and students to participate in a dynamic learning organization. Hence, looking at these two contributing factors, MMU is also gearing towards a more dynamic educational environment by offering the MMLS as a feasible alternative learning system in both campuses.

Investigation of fingertip blobs on Optical Multi-touch screen


Ahsanullah Abro, Ahmad Mahmood, Suziah Sulaiman Recently, multi-touch tabletop displays provided the Natural User Interface (NUI). Humans use the bare finger as a pointing device for manipulation of interactive elements on multi-touch surface. However, fingertip size occupies the large space instead of appropriate target point and creates ambiguity in touch detection. To overcome issue possibly, we develop an optical multi-touch screen using the Frustrated Total Internal Reflection (FTIR) sensing technique for investigation of the fingertip blobs. In order to conduct the experiment we specify the interaction mechanism which provides the stability in finger touch detection. When users touch with the multi-touch screen using their fingers, we obtain the fingertip blobs that are used for investigation. We take each fingertip blob as an image and compute its relative pixel intensity values using the image processing tool. The investigation exhibits the variation in pixel values each fingertip blobs. The unit variance in intensity of pixel values helps in identifying the error rate in finger touch detection. The study identifies the factors that generate the error rate and ambiguity in finger touch detection. Our study may support for avoiding the error rate and enhancing the finger touch detection. It may also helpful for achieving the accuracy in finger touch detection and for designing and implementing the interactive elements for multi-touch screens.

4th International Symposium on Information Technology

40

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITSO1_T1_5

Design and Implementation of Multi-Touch system using fTIR Technique for Optimization of finger Touch Detection
Ahsanullah Abro, Ahmad Mahmood, Suziah Sulaiman In recent years, multi-touch screens are emerging and seem to be ubiquitous in near future. The intuitive surfaces provide collaborative workspace for users to perform natural style of multi-touch interaction simultaneously. Users can access the interactive elements such as WIMP (window, icon, menus and pointing) using their bare fingers. At the same time multitouch screens have ambiguity in multiple finger touch detection. Users acquire the accuracy in the fingers touch detection during the selection of interactive elements. In order to optimize the multiple finger touch detection, we propose the system and its architecture using the Frustrated Total Internal Reflection (FTIR) sensing technique. The system surface is improved by superimposing the transparent layers on acrylic surface. In addition, we modify the architecture of multi-touch surface by configuring the infrared light emitting diodes against the clean edges of acrylic surface. In order to test the system we conduct the experiment by involving the subjects and investigate the quality of fingertip blobs. The proposed system may increase the image quality of fingertip blobs which may

help in achieving the fidelity for sensing the multiple fingers on interactive surface.
ITSO1_T1_6

Exploring the Quantitative and Qualitative Measures for haptic systems


Muzafar Khan, Suziah Sulaiman, Abas Md Said, Muhammad Tahir
Haptic systems are widely used in different domains for various purposes such as rehabilitation, surgery, training, games, and industrial design. To improve the performance of haptic systems and users (using these systems), evaluation plays an important role. Experiments and user testing are common approaches to evaluate these systems. In this paper, an overview of haptic systems evaluation and users workload measurements is provided. It presents that the evaluation of these systems depends upon different aspects which include devices, haptic rendering algorithms, applications and users. In various studies, these aspects have been evaluated but are specific to different haptic devices and applications. This paper represents an overview of these aspects and highlights the need of generic techniques. We propose a preliminary conceptual framework that 1) may provide structured approach towards developing generic technique(s) and 2) can possibly help to evaluate haptic systems and user workload together.

ITsO1_T5:
ITSO1_T5_1

15 JuNE 2010 (2.00 PM 4.00 PM) VENuE: 3-05


and Service level maximization and further it is converted into crisp single objective programming model using membership functions of the three objectives. Finally the problem is solved by using simulated annealing algorithm to enable the decisionmaker to select the right suppliers and allocate their quota in order to minimize the cost, maximize the quality level and again maximize the service level.
ITSO1_T5_3

A Method for Linking business Process Models and system Models


Faisal A Abu Rub
This paper presents a new method for deriving system models based on business process models. The congruence between the central notion of automated activity in improved R AD model and that of process in DFD facilitates the linking process. This method led to develop system model on early stage and without going through expensive system analysis and design process. The process of cancer registration in Jordan is used to demonstrate the proposed approach and showing its ease and timeliness. Finally, further work is planned to validate and evaluate the proposed method using several cases with different domains. ITSO1_T5_2

graphical Interface for gene Network Inference Application


Suhaila Zainudin, Sim Kah Wei, Safaai Deris A gene network shows the interactions between genes. Previous research has successfully infer gene network from microarray gene expression data using techniques from diverse fields such as pattern detection, machine learning and data mining. In this research, we applied the statistical language R for gene network inference. R provides statistical language and programming environment for statistical computing and graphics. We observed that R only provides command line interface with basic comand buttons. Hence, we built a gene network inference application with Microsoft Visual C# as the visual front-end and R as the back-end for novice R users who are interested to use our gene network inference tool. Th application has tabs which represents each phase of our inference methodology. Each time a user select and click, the command wil be executed through the visual interface. Therefore, users no longer need to use the command line. The inference of gene network from gene expression data is useful for predicting relationships between genes. Gene network inference is important because it

A simulated annealing approach to solve fuzzy multi-objective linear model for supplier selection in a supplu chain
Parthiban P, Dhanapal Durai Dominic, Dhanalakshmi Ramasamy Suppliers play a key role in achieving the objective of supply chain. Hence selecting the right suppliers and their quota allocation is a very important in achieving corporate competition. Supplier selection is a multiple criteria decision-making (MCDM) problem which is affected by several factors. At the same time due to the presence of vague and imprecise input parameters, makes the supplier selection complicated. During this project a fuzzy Multi-objective linear model is developed to achieve three important goals: Cost minimization, Quality maximization
4th International Symposium on Information Technology 41

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
enhances the understanding on genomic function and directly helps development in bioinformatics and medical field.
ITSO1_T5_4

Agent-based Monitoring of Virtual Machines


Anas Ayad, Uwe Dippel One of the main benefits of deploying system virtualization technology is the isolation provided by the virtualization platform. The virtualization layer encapsulates the guest system state in a way that renders it difficult to be aware of the internal state of the guests. This knowledge gap or lack of the higher knowledge is known as Semantic Gap. In this paper, an agentbased monitoring system will be described as a new technique to at least partially bridge the Semantic Gap between the host machine and the virtual guests. It also controls a pool of scheduled backups of the running virtual machines.
ITSO1_T5_5

at higher communication performance. The nondeterministic characteristics of client-server data transfer is modeled and simulated using Colored Petri Nets modified Simplesend for performance analysis. However, the verification and validation of the particular statistics involving random generated variate values must first be investigated; hence independent and identically distributed values must be confirmed by analysing the results of single versus replicated simulations.
ITSO1_T5_6

A service-based framework for Integration of ITIL V3 and Enterprise Architecture


Akbar Nabiollahi, Rose Alinda Alias, Shamsul Sahibuddin ITIL V3 could be introduced as a governance framework for IT service management (ITSM) and attempts to align IT investments with business objectives. Enterprise Architecture (EA) is also referred as a general framework for designing business and IT/IS architectures of organizations and it also attempts to align these architectures with business strategies. Our research tends to provide a service based framework for EA in order to meet IT Service Architecture requirements of ITIL V3. Regard to this issue our Integrated Service Architecture Framework (ISAF) is outlined here to be developed through main research. One of our goals is to provide a solution for practitioners in utilization of EA architectures in ITIL V3. Authors also hope this study would contribute in academic domain through bridging computer science and information system disciplines due to service-oriented technology and management aspects of the research.

single and Replicated simulations for Colored Petri Nets Nondeterministic Network
Dani Adhipta, Mohd Fadzil Hassan This paper presents an investigation of the independent and identically distributed random variate values in Colored Petri Nets nondeterministic network behavior when single and replicated simulations are performed. The results will be utilized and be part of larger research titled Extended Common Instrument Middleware Architecture toward Heterogeneous Data Sources and the Grid Integration, a proposed architecture extension between remote laboratory instrument connected to the grid for facility sharing aimed

ITsO2_T1: 15 JuNE 2010 (4.20 PM 5.40 PM) VENuE: Ch1


ITSO2_T1_1 ITSO2_T2_2

unifying Multimedia Player and Presentation system with Optimizing Dual-Display feature
Rustam Asnawi, Wan Fatimah Wan Ahmad, Dayang Rohaya Awang Rambli In the future, utilization of dual display tends to be more popular. Optimizing the use of this feature, and designing a specific control panel user interface (UI), provide a possibility to develop an application that is able to unify the behavior of PC based multimedia player and presentation system. Since the view of the control panel and its output display occupied a different monitor, it is possible to create a single-compact control panel UI. Each multimedia element (video, image, slide, animation) have a particular controller and to be integrated in one window. This paper presents the Integrated Multimedia Player (IMPlayer) an application that has been developed based on channel controller model and exploits the dual-display feature. We examined that the IMPlayer has inherent double function i.e. as multimedia player and presentation system simultaneously. Lastly, the IMplayer can unify the behavior of multimedia player and presentation system in single application.

Evaluation Method of Malaysian university Website Quality: hybrid Method Approach


Dhanapal Dominic, Handaru Jati In recent years, many people have devoted their efforts to the issue of quality of Web site. The concept of quality is consisting of many criteria: quality of service perspective, a user perspective, a content perspective or indeed a usability perspective. Because of its possible instant worldwide audience a Websites quality and reliability are crucial. The very special nature of the web applications and websites pose unique software testing challenges. Webmasters, Web applications developers, and Website quality assurance managers need tools and methods that can match up to the new needs. This research conducts some tests to measure the quality of Malaysian University website via web diagnostic tools online. We propose a methodology for determining and evaluate the best Malaysian university website based on many criteria of website quality, consists of Linier Weightage Model, Analytical Hierarchy Process, Fuzzy Analytical Hierarchy Process, and one new hybrid model. This new hybrid model has been implemented using Fuzzy Analytical Hierarchy Process (AHP) and Linier Weightage Model to generate the weights for the criteria which are much better and guarantee more fairly preference of criteria. The result of this study confirmed most of Malaysian University
42

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
website are neglecting performance and quality criteria. By applying Hybrid model between FAHP and LWM approach for website evaluation has resulted in significant acceleration of implementation, raised the overall effectiveness with respect to the underlying methodology and ultimately enabled more efficient and significantly equal or better procedure compared with other methods.
ITSO2_T1_3

The proposed sketch-based API will be tested by building a sketchbased user interface.
ITSO2_T1_4

Modeling optimization for real-time virtual heritage visualization content: A research on e-Warisan sENIbINA
Ahmad Rafi Mohamed Eshaq, Azhar Salleh, Avijit Paul, Siti Noraishah Musa, Yee-Jun Wong, Radzi Hanif, Mazlan Mahadzir
This research suggests a concept of virtual heritage experience within the field of architecture in a collaborative virtual environment. A realtime virtual reality application is adopted based on the fundamentals of virtual heritage metadata structure suggested by the UNESCO guidelines that encompassed both cultural and natural heritage of a digital dataset and are thus useful as a starting point for most virtual heritage application. This paper focuses on the technical challenges and requirement particularly on the optimization of modeling for real-time visualization to represent heritage buildings of the preindependence period in architecture built within the period of 80 to 200 years. This e-Content Fund research awarded by the Ministry of Science, Technology and Innovation (MOSTI) Malaysian named e-Warisan SENIBINA will demonstrate the early finding results of two shortlisted buildings that influenced the direction of traditional Malay Muslim architecture in Peninsular Malaysia.

As sketchy As Possible: Application Programming Interface (API) for sketch-based user Interface
Chan Yet Lai, M. Nordin Zakaria This paper proposed an Application Programming Interface (API) for sketch-based user interface. A recent research direction in modeling interfaces is to automate or assist the sketch-to-3D translation process. This trend, known as sketchbased interfaces for modeling, is motivated by the ease of sketching and the ability of human viewers to imbue so much meaning into a sketch. In sketch-based user interface, user expresses visual ideas or messages as freeform strokes on penbased systems, and the computer takes appropriate action by analyzing the perceptual features of the strokes. Although sketch-based system is powerful, it came with the cost of code complexity. The two main contributors to code complexity are: pen-tablet display and the difficulties in interpreting the sketches. This paper proposed a sketch-based API to reduce the code complexity in sketch-based user interface application.

ITsO2_T5: 15 JuNE 2010 (4.20 PM 5.40 PM) VENuE: 3-04


ITS_O2_T5_1 ITSO2_T5_2

flight Connections Multi-leg searching by Adopting Partial Constraint satisfaction


Siti Zarinah Mohd Yusof, Vijanth Sagayan A/L Asirvadam, Mohd Fadzil Hassan This research explains about the development of flight connections multi-leg searching that applies the concept of graph theory and Partial Constraint Satisfaction Problem (Partial CSP). Current practices of information retrieval for flight connections usually provide the user with only a leg of network which restricted the scope of information that user could retrieve in planning their flight itinerary. This research is aimed to develop a flight connections searching system that able to advice user with suggestion of broader destination network for their itinerary and the suggested destinations are selected based on Partial CSP technique. Instead of using Constraint Satisfaction technique, Partial CSP has been proposed to be implemented in this research as its approach could solve over-constrained problem. A web-based prototype has been developed to explain the concept of multi-leg searching and the development will be continued by adopting Partial CSP in future works.

A soft Computing Approach for sound signal Processing and the Memory storage
Hammuzamer Irwan Hamzah, Azween Abdullah This paper tries to create a new biologically-inspired abstract model for the sound signal processing and completes the model with an architectural design of the memory storage. This research adapts the functions from the biologicallyinspired entities, which are the human auditory system and the human brain. This research aims to provide integrated and structured database to store the sound signal processing data. This research provides the framework to the implementation of the soft computing approach for the sound signal processing and the memory storage. Therefore, this research creates the abstract model for the Biologically-Inspired Sound Signal Analyzer (BISSA) as a new idea for information gathering.
ITSO2_T5_3

security Challenges in Designing an Integrated Web Application for Multiple Online banking
Annie Ng, Ai Bee, Nasuha Lee Abdullah Current online banking only allows payment to be made from a single bank account hence user needs to log in to several banking sites to settle the dues monthly. Paying bills/loans from multiple bank accounts in a single login would provide greater convenience. This paper reviewed the current on line

4th International Symposium on Information Technology

43

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
banking system and discussed the challenges in designing an integrated web based application for independent personal financial organizer called I-PFO. I-PFO allows users to settle their financial commitments from multiple banks in a single website. It also provides ease of use, tracking due dates, organizing and personalization. The challenges of such system are security, value proposition to attract collaboration from banks and user acceptance. This paper focuses on security solutions for I-PFO.
ITSO2_T5_4

and the education sciences, according to a new concept of digital video. Gifted of a network InterTvNet, of a global scheme of order WhoDoWhat and of a system SecuRights, this triptych concept is very economic for an education of mass (for more of pedagogic places), for a mutualisation of the quality teachers (for a better quality education), for a fairness between universities (for an equal opportunities) and for an openness to the world (for a better integration in world society of information and communication). The InterTvNet, or the network of TV Endpoints, is a tool of visual informatics that proposes in the framework of the V-Learning, a model of installation of transmitters and receivers in order to carry the audiovisual signal in multimode to multisite, in a relative security and confidentiality, to meet the requirements of the quality assurance in higher education for now. To support this contribution, we will introduce here our experimental device of national scale: Algerian VLearning Network with his InterTvNet of 77 nodes.

InterTvNet
Ferhat Khenak The V-Learning concept or the Online/Video Learning, via Internet and/or by satellite, is a tool of the information and communication technologies for education (ICTE) that ingeniously combines the computer science, the audiovisual

ITsO3_T1:
ITSO3_T1_1

16 JuNE 2010 (9.30 AM 10.30 AM) VENuE: Ch1


a smaller scale known as Corporate Resource On-Demand & Community Sharing (CRODCS) is developed using open source software. This will allow the chosen platform to be tailorsuited and customized to any unit and project team preference. This paper employs social network analysis techniques using software package Agna 2.1 to map and analyze the patterns and flow of interactions critical to information and knowledge sharing of project discussions via CRODCS and gmail. The mapping of the knowledge flow was analyzed and compared in both platforms in order to study the effectiveness of knowledge sharing via social networking site.
ITSO3_T1_3

knowledge Management based Integration of heterogeneous healthcare systems in Malaysia


Intan Najua Kamal Nasir, Dhanapal Dominic
Applying Knowledge Management (KM) in healthcare system is nothing-supernatural constituent. Years of research and effort to implement KM been executed and it can be conclude that KM provides promising approach to a successful healthcare knowledge management system. KM allows sharing of healthcare information between medical practitioners regardless of place and time. A clear and systematic framework to motivate sharing and exchange of healthcare knowledge among different institutions remains a challenge. Prior to the application of integration system, it is crucial to prepare platforms and human resources that are well inform and prepare to adopt such system. Current healthcare system (in Malaysia) are not fairly distributed and not standardized. Some of the hospitals deploys hospital system while others not. In addition to that, the system deployed is different from each other in many aspects. Hence, the aim of this paper is to suggest KM approach in facilitating the organization of healthcare data, information and knowledge for better retrieval process to support knowledge sharing. As the result, we add in the importance differentiate between good knowledge and bad knowledge to ensure the provided knowledge is in the right format to the right person at the right time. ITSO3_T1_2

Visualization of fluid flow: Preliminary Analysis


Siti Azila Zainudin, Abas Md Said, Suziah Sulaiman
Without visualization it is generally impossible to observe the flow behavior. We present in this paper, two pilot studies for evaluation of four various visualization techniques. Preliminary analysis are conducted to test the prototype and to help design the full scale experiment. Our results showed that the three techniques, which are streamlines, stream ribons, and stream tubes giving same result for user perception evaluation task as they are good for showing flow direction and temperature. While Surfaces techniques are served more as cross section and also could predict temperature behavior, area or section.

A study on knowledge flow and Its Implications on social Networking site


Savita K. Sugathan, Azaly Rezza Feisal Azlin, Goh Kim Nee, Emelia Akashah Patah Akhir, Chen Yoke Yie This paper consists of exploratory study to investigate the effect of virtual knowledge sharing of a project team in an organization via social networking site. Putting into consideration that Facebook is public domain, a social networking platform of
4th International Symposium on Information Technology 44

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITsO3_T5:
ITSO3_T5_1

16 JuNE 2010 (9.30 AM 10.30 AM) VENuE: 3-04


good interaction with client during software development process is acknowledged, however, very limited research work has been attempted to study this aspect. This paper presents the process of the development of an interaction overview model that describes all important aspects that should take place during the software development life cycle. A composite structure of client is also presented in the paper which becomes the basis for the interaction overview model. The research focuses on the proposed interaction model which is derived from the analysis of various projects outsourced to offshore teams. The interaction overview model suggests an extension to agile based methodologies. To the best of our knowledge, it is the first model of client-oriented interaction to be proposed within this context.
ITSO3_T5_3

using Educational games in Learning Introductory Programming: A Pilot study on students Perceptions
Roslina Ibrahim, Azizah Jaafar
Studies of using games for learning have being widely discussed in various literatures. This is due to believes that educational games can offer many learning benefits such as highly motivated, engaging and fun. Learning Programming requires many skills such as logical thinking and problem solving as well as understanding of abstract concepts. As a result, many students found that Programming is a challenging subject which resulted in low motivation to study the subject. Thus, it is worth to study how educational games help to enhance our students learning attitude towards Programming. This paper will discuss our pilot study of students perceptions towards using educational games as their learning medium. Findings indicated that the attitude of most students are positive and they are also more motivated to learn Programming by using games compared to conventional method. Hopefully, this research provides some insights to understand our students perceptions regarding educational games usage in their learning. ITSO3_T5_2

Development of Mobile Learning Tool


Sahilu Wendeson, Wan Fatimah Wan Ahmad, Nazleeni Samiha Haron
The widespread use of smart phones and mobile communication offers the opportunity to develop technology that will assist to learn anytime and anywhere. This paper presents the development of M-learning tool for Windows mobile platform, in order to add values on the existing conventional and electronic learning. The system utilizes ASP.NET mobile web forms, Structured Query Language (SQL), and Extensible Markup Language (XML). This tool contains four modules that are lecture materials, assignment, academic information and comment collecting mechanism. This paper also described the limitations of mobile phones in M-learning application development. The main objective of the works that have been carried out is to develop M-learning tool application using the Microsoft.Net infrastructure that runs on three-tier network architecture.

A Collaborative-Interaction Model of software Project Development: An Extension to Agile based Methodologies


Rehan Akbar, Mohd Fadzil Hassan Interaction among team resources during software development is an important aspect of a software project. The success and growth of a project mainly depends upon how effective interaction and coordination exists among all the team resources and client of a project. The importance of having a

ITsO4_T1:
ITSO4_T1_1

16 JuNE 2010 (10.50 AM 12.50 PM) VENuE: 3-01


elements of 8 bits each is processed in 2470 ns and pipeline latency is 123 clock cycles. ITSO4_T1_2

fPgA Implementation of Pipelined 2D-DCT and Quantization Architecture for JPEg Image Compression
Enas Dhuri Kusuma,Thomas Sri Widodo
Two dimensional DCT takes important role in JPEG image compression. Architecture and VHDL design of 2-D DCT, combined with quantization and zig-zag arrangement, is described in this paper. The architecture is used in JPEG image compression. DCT calculation used in this paper is made using scaled DCT. The output of DCT module needs to be multiplied with post-scaler value to get the real DCT coefficients. Post-scaling process is done together with quantization process. 2-D DCT is computed by combining two 1-D DCT that connected by a transpose buffer. This design aimed to be implemented in cheap Spartan-3E XC3S500 FPGA. The 2-D DCT architecture uses 3174 gates, 1145 Slices, 21 I/O pins, and 11 multipliers of one Xilinx Spartan-3E XC3S500E FPGA and reaches an operating frequency of 84.81 MHz. One input block with 8 x 8

Evaluating C2C e-commerce Website usability in Malaysia from users perspective: A case study
Noorfadzilah Md Zainudin, Wan Fatimah Wan Ahmad, and Goh Kim Nee The main challenges of e-commerce are to attract customers and maintain a good relationship with existing customer as user only interact with electronic device. Therefore designing a good and usable website is the most crucial part to succeed in this highly competitive environment. The objectives of this study are to evaluate C2C e-commerce website usability and to study problems faced by potential customer in process of purchasing online. In this study, a number of university students were asked to evaluate the usability of two Malaysian C2C websites. Two local websites were chosen, one is a
45

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
prominent website and the other one is randomly picked from the internet. A framework for evaluating e-commerce usability was implemented in this study. The website is rated based on criteria of system quality, information quality, service quality and attractiveness. Users need to complete a number of tasks on the websites and think- aloud was encouraged during the evaluation process. Results show a number of usability issues encountered by users while completing the task given. From these findings, ecommerce developers may look at the issues seriously before designing their e-commerce website.
ITSO4_T1_3

has a good performance, which improve the accuracy on iris segmentation.


ITSO4_T1_5

3D Reconstruction using Level-based Approach in Computational stereo


Sayed Ali Kasaei Zadeh, Abas Md Said We present an alternative approach to address correspondence in computational stereo. Accurate correspondence between 2D images is required to determine dept which leads to 3D model generation. To achieve this, optimized noise reduction method and accurate edge detection are required for preprocessing, followed by extracting the contours fro the edge detection output and detecting the correspondence for each of them. This detection follows a hierarchical method we term level-based correspondence. The results show improvements in detection speed and accuracy, compared to other local correspondence methods.
ITSO4_T1_6

Non-Cooperative Iris Recognition system: A Review


Abdulsamad Ebrahim Yahya, Md Jan Nordin Reliable personal recognition is critical to many government and business processes. Iris Technology has been successfully applied to person verification and identification. However, all commercial products require user cooperation for iris image capture. Over the last three years, the community has paid more attention on the process of iris images taken with less user cooperative. In this paper we will give an overview of iris recognition when extended to less cooperative situations.
ITSO4_T1_4

3D Reconstruction of geometry from 2D image using genetic Algorithm


Muhammad Tariq Siddique, Mohamed Nordin Zakaria This paper presents an approach to reconstruct 3D objects using Genetic Algorithm (GA) from a 2D image. In the proposed method GA evolve 3D initial models to a target object by means of comparisons between images generated from the models and image of target object. Promising results were achieved reconstructing simple 3D geometric objects. This technique is useful for creating random model by using 3D primitives. For initial experiments we have selected sphere, cube, and cone. The experimental results shows that proposed method generate 3-D model automatically as compared to conventional methods for generating 3-D models.

Improving Iris segmentation by specular Reflections Removable


Abdulsamad Ebrahim Yahya, Md Jan Nordin Iris segmentation is one of the most important steps in iris recognition system and determines the accuracy of matching. This paper proposes a new specular reflection removable method for accurate iris segmentation of in iris. The procedure includes two steps: sepcular reflection detection and image inpainting. Experimental results show that the technique

ITsO4_T5:
ITSO4_T5_1

16 JuNE 2010 (10.50 AM 12.50 PM) VENuE: 3-05


result shows that users prefer the propose technique that helps to improve program comprehension among novices. ITSO4_T5_2

The Effectiveness of zoom Visual flow (zVif) Technique in Program Comprehension Activities
Rozita Kadar, Shahida Sulaiman
Many techniques and tools have been developed to improve program comprehension but most tools are unsuitable for novices. Some tools are not user friendly, some designs are more suitable to expert programmers and some integrated development environments (IDEs) are very simple and fail to support program comprehension needs among the users. These factors hinder the learning process and may become obstacles to users who have no programming background. This paper attempts to improve program comprehension by using Zoom Visual Flow (ZViF) technique that represents source code in graphical views. It also gives some insights on how to improve visual presentation method in a program editor or an IDE. Lab experiments were conducted to determine the effectiveness of the technique. The

biologically Inspired Object Recognition system


Hamada Al-Absi, Azween Abdullah The human visual system (HVS) has an amazing ability in recognizing any objects which it has a previous knowledge about. With the advances in computer vision, human visual system still beat any state-of-the-art system. Neuroscientists have been studying the visual system of the animals and human for a long time in order to understand how their visual systems work. Computer scientist utilized the findings on the HVS and mapped the functions of the visual system into computational systems. This paper presents a research work in the area of biological vision where a model of object recognition that has

4th International Symposium on Information Technology

46

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
been inspired by the feed-forward and feedback mechanisms in the human visual system is presented.
ITSO4_T5_3 ITSO4_T5_5

k-Means Clustering Visualization of Web-based OLAP Operations for hotspot Data


Tsamrul Fuad, Imas Sukaesih Sitanggang, Annisa In the previous work we developed the web-based OLAP (Online Analytical Processing) integrated with the data warehouse for hotspot data in Indonesia. This work aims to develop a visualization module for hotspot clusters resulted from OLAP operations including roll up and drill down. The data warehouse consists of hotspot data represented in multidimensional model with two dimensions: time and location. In the dimension time, the ordered sequence of elements from the higher-level of hierarchy to the lowest is from year, quarter, to month. Whereas the sequence in the dimension location is from island, province, to district. The clustering algorithm we applied was K-means in which the best clustering was obtained for the size of cluster 4 with average value of SSE (sum of square error) 0.2944 for combinations of elements in the dimension time and location. Hotspot clusters are visualized in form of maps in addition to crosstabs and graphics built in the previous work. The map module in the web-based OLAP can be used to better organize and analyze the hotspot data as one of indicators for forest fires occurrence in Indonesia.
ITSO4_T5_4

Compacted Dither Pattern Codes Versus Principal Component Analysis in Video Visual Depiction
Lochandaka Ranathunga, Roziati Zainuddin, Nor Aniza Abdullah Requirement of reduction of feature space of visual descriptors gets attention due to negative effects of high dimensional feature space. This paper reports the performance of Compacted Dither Pattern Code (CDPC) over Principal Component Analysis (PCA) based compact colour descriptor. There are several competitive advantages of CDPC in feature extraction and classification stages when compared to PCA feature vectors. The embedded texel properties, spatial colour arrangements, high compactness, and robust feature representation of CDPC have proven its performances in our experimental study. Visual description experiments were conducted for ten irregular shapes based visual concepts in videos with three setups namely CDPC with Bhattacharyya classifier, PCA with Support Vector Machine (SVM) classifier and PCA with Bhattacharyya classifier. The experimental results were presented based on three common performance measures. The results depict that CDPC with Bhattacharyya classifier provides a good generalized performance for irregular shape based visual description as compared to the other two experimental setups.
ITSO4_T5_6

Visualizing the Design Pattern Interaction Role


Keen Ngee Loo, Sai Peck Lee Designing software involves thinking about the solution for a design problem. Some of the ideas of design solution are captured in the form of descriptions and structures in design pattern. However, there is not much visual aid on the behaviour of a design pattern in a visual design modeling tool. Currently it is difficult to determine the design pattern roles and the interaction variants of a design pattern in an UML diagram as the design pattern information is not represented. This paper proposes a method to define and visualize the pattern roles and its interaction variants by extending the UML sequence diagram via UML Profile. An illustration of the usage of the extension is then shown for the observer design pattern. The benefit of the extension enables tool support on cataloging and retrieval of design patterns structural, behavioral information and variants in a visual design modeling tool.

Improving a Web Application using Design Patterns: A Case study


Phek Lan Thung, Chu Jian Ng, Swee Jing Thung, Shahida Sulaiman
Adopting design pattern while designing web applications can promote reusability and consistency of the web application. Without the adoption of design patterns or wrong selection of them will make the development of web application more complex and hard to be maintained. Thus knowledge in design patterns is essential in selecting the most appropriate patterns in the web applications development. Unfortunately, the ability of developers in applying design pattern is undetermined. The good practice of using design patterns is encouraged and efforts have to be taken to enhance the knowledge on design pattern. This paper analyses and compares a number of design patterns focusing on architectural and navigational design patterns for general features in web applications. Finally, we discuss a case study of our schools website and propose several design patterns to enhance the usability of the website.

ITsO5_T1:
ITSO5_T1_1

16 JuNE 2010 (2.00 PM 4.00 PM) VENuE: Ch1


strengths. Four main SC techniques in image steganography neural network (NN), genetic algorithm (GA), support vector machines (SVM) and fuzzy logic (FL) are assessed based on the three main measurements of steganography imperceptibility, payload capacity and robustness. Most NN usage focuses on robustness, as well as the imperceptibility of the cover-image by exploiting its learning capability to produce a higher quality stego-image. GA is mostly employed to increase the payload capacity to be embedded as well as to find the best bit positions for embedding position in image steganography. SVM is

A Novel hybrid fuzzy-sVM Image steganographic Model


Hanizan Shaker Hussain, Syed Ahmad Aljunid, Saadiah Yahya, Fakariah Hani Mohd Ali
This paper reviews the current soft computing (SC) techniques employed in image steganography as well as proposes a new hybrid approach of these SC techniques to exploit their complementary 4th International Symposium on Information Technology 47

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
normally used to increase the imperceptibility of the stego image via its strength to classify the image blocks by learning the relationship between the secret-message and cover-image to be used in the embedding and extracting procedures. A few works have been done in FL especially in preserving the imperceptibility and the number is increasing. Based on this review and leveraging the complementary strengths of FCM in clustering and SVM in classification, we propose a novel hybrid fuzzy c-means (FCM) and SVM (F-SVM) model in image steganography. The model uses the F-SVM as its main engine that is capable of embedding the secret-message imperceptible to human eyes while increasing the payload capacity. Currently, work is being done to develop and test this model. ITSO5_T1_2 ITSO5_T1_4

sequential Pattern Mining for Library Transaction Data


Imas Sukaesih Sitanggang, Nor Azura Husin, Anita Agustina, Naghmeh Mahmoodian Application of data mining techniques in library data results interesting and useful patterns that can be used to improve services in university libraries. This paper presents results of the work in applying the sequential pattern mining algorithm namely AprioriAll on a library transaction dataset. Frequent sequential patterns containing book sequences borrowed by students are generated for minimum supports 0.3, 0.2, 0.15 and 0.1. These patterns can help library in providing book recommendation to students, conducting book procurement based on readers need, as well as managing books layout.
ITSO5_T1_5

A Constructive shift Patterns Approach with simulated Annealing for Nurse Rostering Problem
Mohammed Hadwan, Masri Ayob Nurse Rostering problem (NRP) is an NP-Hard problem which is difficult to solve for optimality. This work aims to ensure the availability of enough nurses during the roster period and treating those nurses fairly. In order to achieve this, we proposed a greedy constructive heuristic algorithm based on the idea of generating the most required shift patterns first to solve the nurse rostering problem at Universiti Kebangsaan Malaysia Medical Center (UKMMC). That is, this approach attempt to reduce the complexity of the solution search space by generates all allowed two-day and three-day shift patterns to build up the roster. We then use simulated annealing algorithm to improve the quality of the roster. The resulting roster demonstrates that our proposed approach generates a good quality roster in a reasonable time for our case study.
ITSO5_T1_3

game-based Learning Courseware for Children with Learning Disabilities


Wan Fatimah Wan Ahmad, Emelia Akashah P.Akhir, Sarah Azmee This paper demonstrates the development of a multimedia courseware that can be used to educate children with Learning Disabilities (LD). The use of game-based courseware could help those with LD to explore their capabilities without having to pressure them to catch up with other friend but to let them learn in their own pace of time. The courseware can be used as a medium to educate children with LD, to stimulate their psycho-motor for using the computer and also to develop their thinking skills while having fun playing the games. At the same time, this courseware might encourage the teachers and parents to improvise their ICT skills and hands-on learning as a learning tool. It was developed using Visual Basic, Adobe Photoshop and MP3 Wav converter. The courseware is known as Playtime Learning consists of Play games and Fun activities. The user acceptance test shows that teachers and students could adapt well with this kind of learning tool and they have shown positive sign of interest in utilizing it in the future.
ITSO5_T1_6

handwriting Recognition system using fast Wavelets Transform


Mohamed E. Gumah, Etienne Schneider, Abdurazzag Ali Aburas Optical Characters Recognition (OCR) is one of the active subjects of research since the early days of computer science. There are two main stages in most of OCR systems; features extraction and classification. Artificial Neural Networks and Hidden Markov Models are the most popular classification methods used for OCR systems. In this paper, a method that relays on Fast Wavelets Transform (FWT) for optical character recognition is proposed. The idea of the proposed technique is to use the FWT to produce a coefficient vector of the character images, which will be directly used to recognize characters. Using the proposed technique, an accuracy of 94.18% in average was achieved.

A study on students Motivation in Learning Mathematics using Multimedia Courseware


Zuraini Hanim Zaini, Wan Fatimah Wan Ahmad
The paper presents a study on students motivation towards learning mathematics using multimedia courseware. On the topic of Loci in Two Dimensions. An early analysis was conducted using interview and survey. The courseware used in the early analysis was based on the courseware supplied by the Ministry of Education for form two. The survey questions which were based on Instrument Material Motivation Survey (IMMS) have been distributed to investigate the weaknesses of the courseware in terms of motivation. 30 respondents from a school in Perak were involved in the study. The result shows that the students perceived low motivation towards the current courseware.

4th International Symposium on Information Technology

48

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITsO5_T5:
ITSO5_T5_1

16 JuNE 2010 (2.00 PM 4.00 PM) VENuE: 3-04


ITSO5_T5_5

Determining the fittest frontal View face Adaboost Classifier for Adoption in Personage Detector
Norizan Mohamad, Muthukkaruppan Annamalai, Siti Salwa Salleh
A big challenge in many face detection applications is how well faces can be reliably detected. An increasing number of algorithms have been published and many such face detectors have been made publicly available in the form of open source applications, such as the OpenCV classifiers. In this work, we attempt to compare four frontal face OpenCV classifiers and determine the most fit for adoption in personage detector. We focus on frontal view following the experts rule of thumb when looking for any person of interest in an image. We chose AdaBoost classifiers because AdaBoost algorithm often results in improved performance. We measured the classifiers performance on the accuracy in terms of recall, precision and harmonic mean. We performed testing over four heterogeneous datasets to obtain a reasonably accurate estimation of the performance of the classifiers that will help us in identifying the most suitable classifier meeting our needs. ITSO5_T5_3

Locating geometrical Descriptors for hand biometrics in a Contactless Environment


Goh Kah Ong Michael, Tee Connie, Andrew Teoh Beng Jin, Siong Hoe Lau This paper proposes an innovative contactless hand geometry recognition system. We present a novel hand tracking approach to automatically detect and capture the geometrical features of the hand from low resolution video stream. No constraint is imposed and the subject can place his/her hand naturally on top of the sensor without touching any device. Conventional hand geometry systems require fairly precise positioning of the hand in order to obtain accurate measures of the hand. However, the proposed contactless approach does not fix any guidance pegs to help placing the hand at the right position when the image is acquired. As a result, the hand image may appear larger when the hand is placed near the sensor, and vice versa. Besides, the hand can be positioned at different angles. In other words, there is no way to obtain standard and constant hand measurements from this contactless setting. This research aims to deal with this complication when we have to get accurate measurements of the hand from images with varying sizes and directed at different orientations. Experiments show that our proposed method offers promising result for hand geometry recognition in a real-time contactless environment.
ITSO5_T5_6

A study and Result of Image Processing Visualising Topology Algorithm based on satellite geographical Data
Tew Yiqi, Ahmed Moosajee Patel, Christopher Wills The performance of processing and visualizing techniques in present satellite receiving systems is not very well developed for the benefit of end users, especially for critical observation and analysis purpose. Currently, the existing satellite receiving system uses an enclosed method to process the incoming data which requires the whole packet of earth globe data to be fully received before retrieving geographical information and only allows the display of this data as a normal image file which cannot be further processed for better visualising purpose. To overcome this problem, we have devised an integrated software application with a smart visualisation topology algorithm embedded to provide the flexibility on data merging capable of displaying in different overlays. The benefit of this data combination is to allow users to directly evaluate the geographical data in user determined visual mode. It also has the capability to provide information for historical reporting and forecasting purpose in real time scheduled operation. The initial result reported in this paper shows that a better and faster way to visualise data at almost the same time as it is received is possible using the adapted algorithm.

Analysing the Effectiveness of COMA++ on the Mapping between Traditional Malay Textile (TMT) knowledge Model and CIDOC CRM
Syerina Azlin Md Nasir, Nor Laila Md Noor
The existence of state-of-the art mapping tools facilitate in finding correspondences between ontology entities. COMA++ among others is a tool that accommodates both schemas and ontologies matching with additional enhancements and provides a platform to evaluate different match algorithms. COMA++ is asserted to be a useful support tool due to its availability online, capability to integrate large variety of similarity algorithms and feasibility for complex metadata management problems. Thus, COMA++ is chosen in this study based on the input type, output type, interaction and availability. The findings show that COMA++ is an efficient tool in finding similarity between schemas in terms of element and structural aspects with its single hybrid matchers and combination matchers. However, there are several limitations identified during the experiments that drive this study for further enhancement to be carried out in the future to test its true potential.

4th International Symposium on Information Technology

49

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITsO6_T1:
ITSO6_T1_1

16 JuNE 2010 (4.20 PM 6.00 PM) VENuE: 3-01


to help bridge the communication gap between them and the hearing community.
ITSO6_T1_4

Live solar system (Lss): Evaluation of an Augmented Reality book-based Educational Tool
Kien Sin Aw, Halimah Badioze Zaman
Live Solar System (LSS) is an Augmented Reality book-based educational tool to learn Astronomy. Augmented Reality (AR) has its own potential in the education field. In this paper, we review on Tangible Augmented Reality (TAR) which is a combination of Tangible User Interface and AR interface. By applying TAR in LSS, it was able to provide intuitive interaction which became a new learning experience for users. A user study was conducted to test on the usability of LSS based on three constructs namely: ease of use, learnability, and effectiveness. Findings of the study showed that LSS is easy to use and learn, and it also helped users in learning Astronomy. ITSO6_T1_2

Mobile Tourism Directory based on the LuCID Methodology: A Preliminary study


Juhana Salim, Ahmad Bazli Arifin, Onn Azraai Puade
The Internet has grown to be one of the most effective means for tourists to seek information and purchase tourismrelated products. Realizing the potential of Internet, PDA offersinformation seeking and connectivity to internet everywhere and anytime. Very often, tourists conduct information search in their vacation planning process by visiting travel related websites. Research had shown that tourism websites play an indispensable role in peoples traveling decisionmaking before their departure. However, the use of mobile device is not without problems. Searching information through a page using a PDA is a complex task; users are prone to incorrect selections and scroll up and down most of the time. Information from tourism websites not always meet the tourist expectations and needs. The travel information searchers need to navigate through the travel information space on the Internet in order to obtain relevant information. Although PDA assists and offer tourist easy access to information, much of the information needs of tourist is not met. This research aims to design and develop a Mobile Tourism Directory (MTD) to assist tourist in information seeking and searching through mobile phone or PDA. MTD will help tourist access information by connecting tourist to the relevant databases using mobile phone or PDA anywhere and anytime. MTD will be developed according to Logical User-Centered Interaction Design (LUCID) methodology. Key elements in this research include qualitative analysis of users specific requirements, comparative evaluation of various visualization techniques for handheld devices, and users interaction and navigation on small screen display. The MTD can be maintained by using web based online databases which provide information needed by tourist such as accommodation, places of interest, transportation, travel and destination organizations. Another important component of this research involves indexing tourist based company information which can help tourist to effectively access relevant information. The proposed system will integrate the use of visual representation of data which can amplify cognition and reduce cognitive load. This paper reports on early development stages of MTD and the dimensions of result expected from the evaluation of the survey instrument.

Developing Augmented Reality book for Deaf in science: The Determining factors
Norziha Megat Mohd. Zainuddin, Halimah Badioze Zaman, Azlina Ahmad Augmented Reality book is one of augmented reality applications. Augmented reality is a current technology which is based on visually oriented technique. Its visual capability is useful in many applications such as in teaching abstract concepts in learning Science. This article is a part of continuous work in the development of AR book for deaf students. This paper describes the investigation conducted in identifying the determining factors in designing the AR book for deaf students. The qualitative approaches such as observation and interaction techniques were conducted with three deaf students. From the observation and interaction, the researcher found that they preferred to use sign language video compared to text. The students preferred English text to Malay text and they preferred to watch the Whole Communication sign language video instead of the American Sign Language video. However, their performance was not so much different in their given answer. This prompted the researcher to design and develop an AR-Book called AR-SiD in two languages; Bahasa Malaysia and English. The designed AR-SiD is aimed to enhance the understanding of deaf students in learning Microorganisms topic in Science.
ITSO6_T1_3

Courseware Accessibility for hearing Impaired


Siti Zaharah Mohid, Nor Azan Mat Zin Accessibility in courseware designs will ensure that more benefits are derived from these efforts and make it more beneficial for all people with different range of abilities. This article highlights the necessity of couseware design to increase the accessibility of educational software for the deaf community. There is a shortage of accessible courseware to assist the deaf community in the learning process. More efforts in developing accessible coureseware for the deaf community are required

4th International Symposium on Information Technology

50

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITsO6_T4:
ITSO6_T4_1

16 JuNE 2010 (4.20 PM 6.00 PM) VENuE: 3-04


computer interactions. Using proposed technique in this paper, the concept of e-learning contents will be more accessible for arm muscle disorders, Parkinson and hand tremor people.
ITSO6_T4_4

social Interaction in E-learning: An Overview


Noorihan Abdul Rahman @ Abdul Rashid, Shamsul Sahibuddin
Learning process can occur everywhere and anytime. People nowadays are offered with various opportunities to learn and practice their knowledge. Regarding the technology, ICT developers and other stakeholders strive to give the best learning platform to learners. With the help of technology and networking facilities, learners are able to use learning application online which can cater same time same place, same time different place, different time same place and different time different place constraints. This paper will give an overview about electronic learning and discuss the issues arise in e-learning application in order to permit effective collaborative learning. ITSO6_T4_2

Refining Technical and Learning Accessibility Elements on E-learning for user with Visual Impairment
Khairuddin Kamaludin, Noor Faezah Mohd Yatim, Md. Jan Nordin This paper reviews the elements on accessibility issues in e-learning for individual with visual impairment. With current approaches to accessibility are related to technical perspective, this paper examined the fundamental elements on technical accessibility. When physical characteristic of visual impairment affecting user task and ability, it is suggested that learning perspective should be defined by their ability and performance in task, rather than looking at technical accessibility only. The limitation in task and ability leads to accessibility issues in learning process for user with visual impairment. This paper proposed the accessibility requirement for user with visual impairment should be defined by combining both issues of technical and learning accessibility that based on user task and ability. Technical accessibility may relate to individual physical impairment, but learning accessibility should focus on user ability to perform task related to cognitive, perceptual and psychomotor.
ITSO6_T4_5

A Proposed semantic Recommendation system for E-Learning (A Rule and Ontology based E-learning Recommendation system)
Saman Shishehchi, Seyed yashar Bani Hashem, Nor Azan Haji Mat Zin With proliferation of learning contents on the web, finding suitable learning contents has become a very difficult and complicated task for online learners for better performance. Nevertheless, recommender systems can be a solution to the problem. However, recommendation systems havent been sufficiently used in e-learning, in comparison with other fields (i.e. commerce, medicine and so on). In this paper, we propose a semantic recommender system for e-learning by means of which, learners will be able to accurately find and choose learning materials suitable to their field of interest. The proposed web based recommendation system comprises ontology and web ontology language (OWL) rules. Rule filtering will be used as recommendation technique. Our proposed recommendation system architecture consists of two subsystems; Semantic Based System and Rule Based System. Modules for either subsystem are; Observer, Learner profile, Recommendation storage and User interface.
ITSO6_T4_3

MINDA: A Cognitive Tool for solving Mathematical Word Problems


Azlina Ahmad, Halimah Badioze Zaman, Siti Salwa Salim, Roziati Zainuddin
For many students, mathematical word problem-solving is one of the most demanding tasks in mathematics. It involves both higher and lower order thinking skills. The higher order activities in word problemsolving are the main causes of cognitive overload among students. This paper describes a cognitive tool developed for mathematical word problem-solving called MINDA which is designed to reduce the cognitive load of the students and to improve their mathematical communication skills. A model called the Cognitive-Communicative (C-C) model is formulated as the basis in designing MINDA. From a study conducted on fifty-eight Form One (7th Grade) students, we observed that there is a significant difference in the students achievement in solving mathematical word problems.

Accessibile e-learning Approach for handicaps (A ProposedInteractionTechniqueforArm muscle disorders, Parkinson and hand tremors)
Seyed Yashar Bani Hashem, Saman Shishehchi, Nor Azan Haji Mat Zin In the present century the differences between healthy and handicapped people become more obvious due to rapid growth of digital information technologies. Contrary to what some people think, this difference is not about their body deformity or disability to hear or talk. The difference is just in their accessibility level to digital information throughout computers and networks. Information and communication technology (ICT) prepares great opportunities to improve the quality of handicapped people learning process and their life. In this paper we will talk about a technique that facilitates human and
4th International Symposium on Information Technology 51

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITsO6_T5:
ITSO6_T5_1

16 JuNE 2010 (4.20 PM 6.00 PM) VENuE: 3-05


service for LMS. It is part of attraction to improve value-in-use of LMS and to be able to achieve better education levels.
ITSO6_T5_4

Proposed Model for Courseware Development Of Virtual Teaching And Learning Traditional Craft
Salyani Osman, Nor Azan MZ
Preservation and conservation of traditional craft in our community is greatly important and need further attention to ensure the continuity of traditional heritage remains to future generations. Thus, to conserve teaching and learning of traditional crafts, a new model of virtual teaching and learning traditional craft will be developed. In order to capture the learning components for the model, this research focus on related conceptual theories, review existing models, and analyzing digital application of teaching and learning traditional craft. A proposed model also will be developed by concentrating on multimedia technology used as well as strategic learning using cognitive apprenticeship approach. A significant contribution in this research is providing development strategy to courseware designer and producing new learning approach that will motivate adult learners and enhance their skills learning process. ITSO6_T5_2

Mathematical knowledge Representation for Education semantic Web based on Learning style
Ili Farhana Md Mahtar, Nor Azan Haji Mat Zin The ontology language RDFS and OWL are widely used in education semantic web but are limited in their mathematical expressivity. To represent the mathematical knowledge while preserving the semantic, Open Mathematical Document (OMDoc) is used as an ontology language. OMDoc is a contentbased markup which focuses on representing the semantic of mathematical formulae instead of the formulae appearance. Previous researchers have demonstrated that learning style in education is effective in helping the learning process. In this research, we represent the mathematical knowledge using OMDoc format an create learning style ontology as a metadata. In metadata annotation, we use new metadata framework for OMDoc. By embedding learning style metadata, the formal semantic of metadata vocabularies is made available to OMDoc applications. We also transformed OMDoc files into HTML files.
ITSO6_T5_5

sMs-based final Exam Retrieval system on Mobile Phones


Rohiza Ahmad, Aliza Sarlan, Khairul Aiman Ab Maulod, Eliza Mazmee Mazlan, Rozana Kasbon Due to the wide usage of mobile phones, many software developers have make use of the device to be the platform for their applications. This move is especially crucial when the applications are to be made available anytime, anywhere. In this paper the development of a mobile application for administering the final examination exercise of a Malaysian private university using mobile phones is presented. Problems such as change of venue or time of the exams at the last minutes that cause confusion to both students and invigilators warrant the development of Final Exam Timetable Information Retrieval System that can be accessible anytime and anywhere. The results from user evaluations after the completion of FETIDS show that the system is acceptable by users. Hence, the framework and development process of the application can be adapted when developing other similar type of mobile applications.
ITS_O6_T5_3

Evaluation of hiCORE: Multi-tiered holistic Islamic banking system based on user Acceptance Test
Halimah Badioze Zaman, Azlina Ahmad, Tengku Sembok, Sufian Idris, Azuraliza Abu Bakar, Zulaiha Ali Othman, Shahrul Azman Noah, Nazlia Omar, Salwani Abdullah, Sanep Ahmad, Azizah Jaafar, Noor Faezah Mohd Yatim, Wou Onn Choo
Holistic Islamic Banking System (HiCORE) is a virtual multi-tiered system adopting the Services Orientation Architecture (SOA) and parameter driven modules to create new Islamic banking products based on Syariah laws. Islamic banking or Islamic finance reflects banking or financial business that is not contradictory to the principles of Islamic law. This is statutorily mentioned in both the Islamic Banking Act 1983 and the Banking and Financial Institutions Act 1989. In Malaysia, for the creation of Islamic banking products, flexibility is given to practitioners, regulators and Syariah advisors to create and introduce unlimited Islamic banking products to support Islamic banking business. If in the conventional manner, banks may take at least six months for new Islamic products to be created, HiCORE can ensure the possibility of creating an Islamic product at less than a quarter of the time span taken or less (taking into consideration that all policies and processes needed to carry out the transactions are in place). HiCORE went through the normal evaluation process: unit testing, System Integration Test (SIT) and User Acceptance Test (UAT). This paper highlights the latter but unique to the testing of HiCORE, as the UAT is conducted by a Panel of Experts, represented by 15 members from the Islamic Banking industry in the country. Generally, results of the UAT conducted, indicated positive results by the panel of experts. However, there were some specific features and

A service science Approach for e-Learning


Mohamed Nazul Ismail, Yazrina Yahya, Muriati Mukhtar, Mohamad Shanudin Zakaria, Ali Ahmad Zahrawi This study focuses on the process of creating framework to support a web-based e-learning system which uses service science approach. Co-creation value by stakeholder is a main task along the process of new framework for Learning Management System (LMS). Hopefully it does escalate learners motivation in using Learning Management System (LMS) and make use of LMS effectively. Ultimately, we hoped to achieve a better

4th International Symposium on Information Technology

52

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
functionalities that needed improvement. In fact one of the features of the system on new product creation which allows users to see the Source of the Dalil (Al-Quran verses or Sunnah), Hukum dan the Syarat during new product creation makes HiCORE novel.

ITsO7_T1:
ITSO7_T1_1

17 JuNE 2010 (10.50 AM 12.50 PM) VENuE: Ch1


the result of the formative evaluation, it could be concluded that the accounting courseware was suitable to be used as a supplementary learning material as most of the students were satisfied and pleased with the overall courseware presentation in terms of its contents, user friendly navigation and interesting graphics and animations.
ITSO7_T1_3

Evaluating the Accessibility and Visibility of Quranic Websites


Ahmad Bakeri Abu Bakar
With the introduction of the World Wide Web and graphical browsers in the 1990s the Internet has become widely accessible and many people have grabbed the idea of using it for their multifarious purposes and agenda. They have established all types of websites to foster their mission and visions. They recognize that Internet can enhance their scale of communication through the websites as the Internet is capable of delivering large quantities of information in a speedy manner to the public. It is not surprising therefore that Muslims believe that the websites are the most useful platform to disseminate Islamic knowledge and information. The most important website that Muslims interact with is the Holy Quran website. Higher quality websites tend to attract more links and rendered those websites as highly visible. Using a software, Alexa, it is possible to gauge the volume of web traffic in order to determine the visibility of the website. In this paper Alexa is applied to study the visibility of Quranic websites. Nine quranic websites were investigated. It was found that the website, almushaf.com is the most visible website. It is futile to have a website that is difficult to access by users owing to non compliance with the accessibility guidelines. To check whether a particular Al-Quran website conforms or not to the accessible guidelines a software, A-Prompt could be used. The A-Prompt is able to examine the Al-Quran websites for barriers to accessibility, and at the same time is able to perform automatic repairs of the respective websites. Applying A-Prompt it was found that the most inaccessible website is the qurancomplex.org. ITSO7_T1_2

Challenges in the Evaluation of Educational Computer games


Hasiah Mohamed @ Omar, Azizah Jaafar Computer games have been used for educational purposes nowadays. The implementations of educational computer games bring some challenges and issues that need to be highlighted. There are three challenges in evaluating educational computer games which are the evaluation criteria, the evaluators and the evaluation process. Evaluation criteria have been identified and it consists of five issues which are Interface, Educational, Content, Playability and Multimedia. The evaluators are real and surrogate users. The third challenge is regarding evaluation process and one of the suitable processes is by implementing formative evaluation in order to develop a comprehensive and practical educational computer games.
ITSO7_T1_4

Investigating the Redundancy Effect in Multimedia Learning on a Computer science Domain


Riaza Mohd Rias, Halimah Badioze Zaman This paper looks at Mayers theory on the redundancy principle and applies this theory on a computer science domain. This principle states that students learn better from animation and narration than from animation, narration, and text. The topic is on memory management in the subject of operating system concepts. In a series of two experimental studies, a total of 36 students took part in this experiment where these students were divided into two groups. The first group learned the module containing materials with only animation and narration. The second group of students viewed materials with animation, narration and text. The students who had no prior knowledge on the subject where given a test on recall and transfer knowledge after viewing the treatments. This paper reports the results of the experiment which may provide useful guidance for instructional designers specifically in the area of computer science.

formative Evaluation for Accounting Courseware Enhancement


Norlina Mohd Sabri, Hasiah Mohamed @ Omar, Noraidah Md Bati This paper presents a formative evaluation of accounting courseware which was developed for non-accounting students at UiTM Terengganu, Dungun campus. The main reasons for the accounting courseware formative evaluation were to evaluate the coursewares interface and usability in order to improve the courseware as a supplementary teaching and learning tool. The study had involved 30 non-accounting students from various programmes. The testing group was a combination of students who were taking Financial Accounting 1 during December 2008 April 2009 semester and those who had already taken the subject during previous semesters. The type of the formative evaluation used was the small group evaluation and paper based questionnaire has been used as the instrument to evaluate different aspects of the courseware. The questionnaire was divided into 5 parts in which Part A was about demographic characteristic, Part B was related to content of courseware, Part C was related to interactivity of the courseware, Part D was related to screen design of the courseware and Part E was to seek students opinions toward using the courseware. Based on
4th International Symposium on Information Technology 53

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITSO7_T1_5 ITSO7_T1_6

Wi-fi Load balancing using Cognitive Radio Techniques


Rafiza Ruslan, Tat-Chee Wan The current growth of IEEE 802.11 WLAN brings the need to apply intelligent load balancing techniques in order to optimize the overall network performance. Recent studies on WLAN have shown that access points (AP) load is often uneven. To avoid this situation, several load balancing scheme have been proposed. In this paper, we proposed a new AP-driven load balancing scheme which utilizes the capabilities of cognitive radio (CR) techniques based on cell breathing. The CR incorporates fuzzy controller to decide on the transmission power level. Adjusting of transmission power enables the AP to dynamically modify its cell boundaries in order to balance the AP load.

Design of Interactive board system for Collaborative Learning


T. Puckdeepun, J. Jaafar, M. F. Hassan, F. A. Hussin
Recently, technology of interactive whiteboard has been used in schools instead of ordinary whiteboard. It has potential to improve educational environment and teacher- student interaction. Therefore, this paper introduces a new design of interactive board system. The system aims to enhance a low cost interactive whiteboard system for extensive usages as well as to support collaborative learning activities. A new system is designed using infrared (IR) glove/IR finger tip for interaction technique. Additionally, the system will be able to produce single/multi interactive boards to support multi users.

ITsO7_T4:
ITSO7_T4_1

17 JuNE 2010 (10.50 AM 12.50 PM) VENuE: 3-03


the survey questionnaire. 36 items loaded into the five factors, while six items were cross-loaded, therefore deleted. The factors were labeled as Usage, Electronic Government, Access, Quality and Content, and Infrastructure. The measurement model was validated using Structural Equation Modeling with AMOS 16.0. The CFA results suggest that holistically, the ICT measurement model provides a reasonably good fit and thus it is necessary to use it as a guideline in the development of ICT towards achieving a knowledge society in the Malaysian context.
ITSO7_T4_3

Adoption of E-commerce in Malaysia and its Affect on the business Performance: An Organizational Perspective
Muhammad Jehangir Khan, P.D.D. Dominic, Naseebullah This paper reviews the elements on accessibility issues in e-learning for individual with visual impairment. With current approaches to accessibility are related to technical perspective, this paper examined the fundamental elements on technical accessibility. When physical characteristic of visual impairment affecting user task and ability, it is suggested that learning perspective should be defined by their ability and performance in task, rather than looking at technical accessibility only. The limitation in task and ability leads to accessibility issues in learning process for user with visual impairment. This paper proposed the accessibility requirement for user with visual impairment should be defined by combining both issues of technical and learning accessibility that based on user task and ability. Technical accessibility may relate to individual physical impairment, but learning accessibility should focus on user ability to perform task related to cognitive, perceptual and psychomotor. ITSO7_T4_2

A Preliminary study on the Implementation of Enterprise Resource Planning in Malaysian Private higher Institution-A Case study
Raja Mohd Tariqi Raja Lope Ahmad, Zalinda Othman, Muriati Mokhtar Institutions of Higher education are facing a challenging environment which demands an integration of business processes. Most institutions are facing reduced budgets, yet at the same time they have an increased need for technology and business services. They had experienced the rapid development of typical and complex technology over the past several years. Enterprise resource planning (ERP) is one particular type of business technology that is rapidly catching the attention of the institutions of higher education for the administrative and academic functions. This system is complex, expensive and usually requires changes in the organizational culture in order to be implemented successfully. The complexity and comprehensiveness of ERP systems encompasses virtually every aspect of what organizations do today. ERP systems support most industries including airlines, banking, hospitality, insurance, manufacturing, retail, telecommunications, utilities, public services and education. Beside its success and usefulness, the cost of implementing ERP is high. Without a solid history of successes and failures, implementers are at a disadvantage in knowing how best to implement ERP systems so that they will provide operational and strategic benefits to their owners. This makes the task of implementing these systems
54

ICT Dimension and Indicators towards building a knowledge society in Malaysia: A Measurement Model
Norsiah Abdul Hamid, Halimah Badioze Zaman This paper outlines the research conducted to test a measurement model of ICT in an attempt to develop a framework for Knowledge Society (KS) in the Malaysian context. In discussing the KS, one of the most important enabling aspects is ICT. ICT is a powerful driver for social change. The content domain for the ICT measure was developed based on the Delphi technique and semistructured interviews with experts, and previous literature on ICT. It was then empirically tested using a sample of 470 respondents from government officials, private sector personnel and NGOs. Five factors were extracted from the exploratory factor analysis based on 39 items proposed in
4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
even more challenging. Due to these problems, this research is carried out in order to examine the applicability of ERP in a Malaysian institution of higher education and to develop an implementation framework. In this preliminary study, one institution is being taken as a case study. The needs of this institution in implementing ERP and the problems faced by the institution are being documented. As a result, the findings will be used as a ground work for more intensive study throughout Malaysian Institutions.
ITSO7_T4_4

to Use. Using data from a survey to distance learning instructors (N=110), a path analysis revealed that perceived ease of use of the system had a significant impact on perceived usefulness suggested by TAM. In addition, this study confirmed that Perceived Ease of Use and Perceived Usefulness have positive effect on Behavioural Intention to Use.
ITSO7_T4_6

An evaluation of the usage of Web 2.0 among tertiary level students in Malaysia
Kamaluddeen Usman Danyaro, Rod De Lara, Jafreezal Jaafar Web 2.0 is increasingly becoming a tool of pedagogy that increases interactions between educators and learners. This leveraging power of Web 2.0 in academy allows students to share, collaborate or participate in developing scientific thinking or critical thinking skills. While, at the same time, increasing the rate of plagiarism, cyber-bullying, privacy abuse and other Internet problems. This research evaluated the patterns of Web 2.0 usage and academic behavior among students at tertiary institutions with a case study of KDU College students. The researchers collected data by administering a questionnaire to 92 students. Data were analyzed using histogram, frequency and charts. Authors used Deci and Ryans Self-Determination Theory (SDT) to assess academic behavior. We found that most of the students use social Websites for chatting, gaming and sharing contents. Students use Facebook, YouTube and Wikipedia for social interactions, downloading and remixing videos/audio, and research/assignments more often respectively. The choice of acknowledging students feeling and social activities was the adopted strategy for enhancing the students autonomy. It is also found that students feel competent during e-learning activities which lead to the observation in assigning students with work or research with proper feedback. We further found that students were having fun, during their social interaction. Further, there is a presence of independence due to the nature of their participation; students like to study alone. Implications for academic learning and interaction are discussed. Web 2.0 support traditional learning such as constructivism and also creates new learning methodologies like connectivism and collective intelligence. The cognitive development structures depend on the intrinsic behavior of students through dynamic expression and demographic features. Its very trivial to set up Web 2.0 services among tertiary level students, but the pedagogical and moral justification most be considered.

If Professors knew What They know: A Model for Capturing university Teachers Tacit knowledge of students supervision
Ibraheem M. Dooba, Alan G. Downe, Ahmad Kamil Mahmood Research indicates that conflict happens in graduate student and faculty supervisor relationships. Some of these conflicts are resolved through dialogue and arbitration. Others lead to termination of studentships and change of supervisor. Yet some faculty have conflict-free supervisory relationships with their students. In both cases the supervisors concerned hold distinct tacit knowledge about the strategies and techniques they used or would have used in resolving such problems. Significant as this knowledge may seem, paucity of research exists to capture the supervisory knowledge. To address this gap, we introduced a technique to capture facultys tacit knowledge on graduate students supervision. In doing so, we hope that the technique would benefit fellow supervisors and newly recruited faculty members to avoid supervisory breakdown and to minimize error.
ITSO7_T4_5

Instructors Acceptance of Distance Learning Management system


Ibrahim Abood Almrashdah, Noraidah Shaari@ Ashaari, Nor Azan Hj.Mat Zin, Mutasem Alsmadi This study examines the factors that influence instructors acceptance and use of the Distance Learning Management System (DLMS) and tests the applicability of the Technology Acceptance Model (TAM), in the context of distance learning practices in higher education. A survey was conducted to higher education instructors who involved in distance learning instruction. This study used a set of questionnaire which was adapted from TAM with three factors namely Perceived Usefulness, Perceived Ease of Use and Behavioural Intention

ITsO7_T5:
ITSO7_T5_1

17 JuNE 2010 (10.50 AM 12.50 PM) VENuE: 3-04


approached and exploited. To capitalize on this market, it is important to understand the potential use of the 3G mobile multimedia services in Indonesia. The following questions need to be addressed: (1) What are the factors that influence the behavioral intention of mobile phone users to use 3G mobile multimedia services in Indonesia? (2) Are those factors moderated by certain geographic characteristics of customers, such as gender, age, experience, education, and voluntariness of use? Using insights from an extensive review of literature, discussion with people in 3G businesses, and results from an initial survey of 154 respondents that are mobile phone users but non 3G users in 55

A Conceptual Model for behavioral Intention to use 3g Mobile Multimedia services in Indonesia
Indrawati, Murali Raman, Kok-Wai Chew
The number of subscribers to 3G mobile multimedia services in Indonesia is still low, at 3% of the total population. Currently there are 7.5 million 3G subscribers, compared to the population of 238 million people in Indonesia. Hence, this potential huge market has yet to be 4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
Indonesia, a new conceptual model of behavioral intention to use 3G mobile multimedia services (MMS) in Indonesia is proposed. It is expected that customers behavioral intention to adopt 3G MMS in Indonesia are based on performance expectancy, effort expectancy, social influence, facilitating conditions, price of the services and devices, and content. These factors are expected to be moderated by age and gender. ITSO7_T5_2 such development is in understanding how the users behave and interact with the system. This paper presents a mental model for blind users to assist designers in developing better systems for blind computer users. An explanation on mental model as generally is presented. Related papers on mental model for blind user were reviewed to examine the strengths and weaknesses. Kurniawan and Sutcliffes work was chosen as a basis to investigate on mental model of blind users. This paper also provides a discussion on the implication of the proposed mental model to designers in designing system applications for the blinds. This includes the need to get domain experts involvement in the design phase of the mental model proposed. ITSO7_T5_5

Problem solving steps in Online PbL-Research framework


Nurhazirah Mohd Bakri, Faaizah Shahbodin, Hajah Norasiken Bakar Problem based learning is a well known learning method that will start the learning by giving the problem as the appetizer of the learning process. The existence of online problem based learning invites researchers to produce more creative learning system. This paper will discuss about the research framework for development of Online PBL IT Security subject. The design of testing method also will be discussed here. Finally the storyboard design of the prototype will also be highlighted.
ITSO7_T5_3

Virtual Tembaga Ordering system (VTOs)


Hasiah Mohamed @ Omar, Nor Azila Awang Abu Bakar, Nurfarhana Mohd Nor This paper presents the development of Virtual Tembaga Ordering System (VTOS) that focused on interactivity in 3D product using Virtual Reality Modeling Language (VRML). VTOS was developed using PHP language with the integration of VRML capabilities in order to adapt real shopping experience for users while examining the product before purchase. Users/ customers have the chance to view the 3D object from any specific angles and they can also rotate the 3D object and it can encourage users shopping experience when viewing the 3D object. VRML allows creating virtual worlds that are networked via the Internet and provides interactivity for the user. The development of VTOS showed that it is possible to have a Virtual Heritage shop that provide full control for the user while navigating the virtual product. This can give a new perspective for the user while do online shopping.
ITSO7_T5_6

Development of Islamic Medication Expert system on Mobile Platform


Hanita Daud, Nudzul Izaney M.Z., Low Tan Jung, Khalidah Khalid Ali This paper presents the design and development of an expert system (ES) for Islamic medication on a mobile platform. This ES can be accessed by users via mobile devices to obtain treatment or therapy to cure illnesses based on the verses of Al-Quran and the Prophetic sayings (Hadith). The mobile platform allows users to access the ES almost anywhere and anytime when the situation is deemed necessary. The knowledge base in the ES is intended to exhaustively compile the types of illnesses/sicknesses with their related cures or treatments from Quran and/or Hadith. The Mobile Islamic Medication Expert System (MIMES) project was developed with the aim to preserve the diminishing Islamic medical practices among the younger generations.
ITSO7_T5_4

A Learning system Platform or Automated Data Analysis: A Practical Application on historical solar Data
Yahya Tashtoush, O.A. Younis, M.H. Alomari This paper presents a computer platform for the automated analysis of associations among different solar events and activities. This computer tool enables the advanced learning by implementing many associations algorithms to analyze years of solar catalogues data and to study the associations among solar flares, eruptive filaments per prominences and Coronal Mass Ejections (CMEs). The aim is to combine all solar data catalogues in one dynamic space weather database that can be easily used in the analysis of solar activities and features. The computer tool identifies patterns of associations and provides numerical representations that can be used as inputs to the machine learning algorithms to provide computerized learning rules that can be developed in the future within the context of a real-time prediction system.

Mental Model of blind users to Assist Designers in system Development


Siti Nur Syazana Mat Saei, Suziah Sulaiman, Halabi Hasbullah
The vast growing technologies for blind users has attracted many researchers to get involved in developing and improving software and system applications useful for the blinds. However, the challenge before

ITsO7_T6:
ITSO7_T6_1

17 JuNE 2010 (10.50 AM 12.50 PM) VENuE: 3-05


With the advent of internet organizations are facing global competition to improve their efficiency in terms of cost reduction and services delivery. The organizations are forced to shift their operations from traditional to a virtual Eprocurement. E-procurement is persistently receiving attention from industries,
56

The role of factors in business-to-business E-procurement Implementation


Naseebullah, Mohd Fadzil B Hassan, P.D.D.Dominic
4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
business and government agencies and becoming one of todays most widespread IT solutions for business procurement operations. However, not every firm has been successful in E-procurement implementation. A number of factors have been identified to hinder E-procurement implementation, especially within the context of Business to Business (B2B). This paper attempted to provide a comprehensive survey on existing literature with regards to this issue. Eventually, a proposed model is developed that consolidates all the relevant factors which have been categorized into organizational, technological and environmental perspective.
ITSO7_T6_2 ITSO7_T6_4

Electronic Land Administration system In Malaysia: A Proposed Review from ICT and Legal Perspectives
Nor Shahriza Abdul Karim, Zainal Abidin Nordin, Ainul Jaria Maidin, Mohd Shukri Ismail This paper illustrates the scenario of ICT application in land administration in Malaysia in support for effective and efficient administrative processes and development of land in the country. Land administration system, being heavily regulated through the provision of law, is seen as complicated and requires thorough analysis from both the ICT and legal perspectives, if the government were to move towards effective e-government services. A research is, therefore, proposed and preliminary works conducted to investigate the legal provisions and the existing ICT applications in land administration nationwide in order to provide solutions for the government to be better prepared for the future integrated electronic environment.
ITSO7_T6_5

Trailblazers and Laggards in Internet sophistication Among Rural society: Empirical Evidence from Malaysia
Mahendhiran Nair, Gil-Soo Han, Patricia Goon Studies have shown that more sophisticated internet users are able to reap better socioeconomic benefits from the internet in a knowledge economy. Using a sample of 1020 respondents from four diverse rural areas in Malaysia and the Ordinal Probit Model, this study examine the key determinants that impact internet sophistication among rural communities in Malaysia. The empirical analysis shows that the type of rural communities, ethnicity, education, type of occupation and language proficiency have significant effect on the internet sophistication level among rural communities in Malaysia. Based on the empirical results the trailblazers and laggards in internet use in these communities are identified. Key policies to enhance the level of internet sophistication among Malaysian rural society are discussed in the paper.
ITSO7_T6_3

Value co-creation: Embedding the value elements in critical success factor for e-government system Development
Cik Nora Salleh, Yazrina Yahya The success of electronic government initiative depends on many factors, among other is critical success factor (CSF). CSF refers to the limited number of areas in which satisfactory results will ensure successful competitive performance for the individual, department or organization [1]. It had been used significantly to present or identify a few key factors that organizations should focus on in order to be successful. CSF can be categorized into groups of factor such as human factors, technology, culture and infrastructure. Based on analysis conducted there are many CSF available to aid in the e-Government system development. However available CSF does not promote the value-in-use element as such current systems developed using the existing CSF are lacked in the value-in-use aspect. Value-in-use is the satisfaction of wants and needs provided by the direct consumption of goods and services [15]. Value in use should be contrasted with the similar phrase, value in exchange [15]. This research will indentify the CSF in terms of co-creation value between system provider and the customer. The Service Dominant Logic (S-D Logic) and co-creation value insights will be used to establish co-creation value CSFs and therefore it will aid the system development by ensuring the value-in-use is embedded in the system.
ITSO7_T6_6

Application of Clickstream Analysis as Web Page Importance Metric in Parallel Crawlers


Ali Selamat, Fatemeh Ahmadi-Abkenari Employing a parallel crawler as a multiple processes crawler causes different issues of concern in comparison to applying a single-process crawler. These issues impact on achieving the results with higher or even the same quality from a parallel crawler in comparison to a centralized one. Existed parallel crawlers architectures employ link dependent metrics such as Backlink count or PageRank - for URL importance determination in order to prioritize the queue of each process. Then the specific number of the most important pages is sent to the index section of the crawler for further processing on their content. Application of metrics with link dependent nature causes considerable overhead on the overall parallel crawler resulted from the link information exchange among different processes. In this paper we propose the application of clickstream analysis as a link independent Web page importance metric in a parallel crawler. Our approach includes proposing an algorithm for a balanced performance of different processes within a parallel crawler which results in the discovery of higher quality pages by the overall parallel crawler with less overhead in comparison to a centralized crawler which employs link dependent metrics of importance.

Proposed Development Methodology for higher Education and Library Mash-ups


Rabiu Ibrahim, Alan Oxley
This paper proposes a mash-up development methodology for Higher Education (HE) and libraries. The fast-paced development of mashup editors has created a wealth of features and approaches that users can take advantage of. Meanwhile, there has been insufficient work on the creation of a mash-up development methodology that would serve as a guide to Higher Education and library mash-up developers. The first part of our study focuses on investigating mash-ups, mainly 57

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
from university and library user perspectives. The second part focuses on plans to formulate a mash-up application methodology for using information mash-up editors to develop business mash-ups. This part has evolved during our work in creating experimental mash-ups at University Technology PETRONAS (UTP). Initially, the research considered a large number of candidate mash-up editors, two of which were selected. As the research progressed, the mash-up development methodology took shape in an incremental manner until it reached its final form. The work can hopefully be used to guide both researchers and Higher Education and library users in developing mash-ups.

ITsP1:
ITSP1_ 1

15 JuNE 2010 (2.00 PM 5.00 PM) VENuE: fOyER


that students have problem in visualizing the position of lines and planes in the diagram. Hence, this paper suggests a usage of multimedia courseware for topic of Lines and Planes in 3-Dimensions to encounter the problem found from the survey and interview done.
ITSP1_4

3D reconstruction of a scene from multiple uncalibrated images


Abdoulaye Mahamat Zakaria, Abas Md Said
In order to contribute to the search of solving the 3D reconstruction problem we present in this paper a 3D reconstruction system of multiple view images. Our system takes a set of uncalibrated images as an input and produces a depth map. We divided the system in three major parts which are finding corresponding points between images, depth estimation and 3D model generation. We use the global method and dynamic programming method to produce the depth maps and the model. ITSP1_2

Applying Virtual Reality Panorama simulation Environment in Technical Communication


Wan Norazlinawati Wan Abd Arif, Wan Fatimah Wan Ahmad, Shahrina Md Nordin This paper discusses the development of the courseware to complete high demand in improving the quality of the presentation of knowledge sharing activities with the use of technology. The needs for development of technology based learning and training lead to an idea to develop an Oil and Gas Plant Virtual Environment (OGPVE) for the benefit of our future. The technology which is adopted in Panoramic Virtual Reality learning based environment is essential in order to help educators overcome the limitations in traditional technical writing lesson. In order to create an encouraging courseware which precisely meets users need, few steps are taken starting with studying the suitable theory to help presenting the education, collecting pictures and data of proposed location, developing the courseware and finally test the courseware. Virtual reality assists users to understand better by providing the experience of being in real environment with high degree of realistic experience and interactivity. This paper discusses the steps of the virtual environment learning courseware in terms of the development of the courseware for the technology of virtual reality to be tailored together to help learn technical communication.
ITSP1_5

The Enhancement of Assistive Courseware for Visually Impared Learners


Nur Hazwani Mohamad Roseli, Nurulnadwan Aziz, Ariffin Abdul Mutalib Advances in technology provide an opportunity for the visuallyimpaired (VI) people to learn and grasp new knowledge. It is as a medium that could fill a gap between VI and normal people. Even though various technologies are available to the VI people, yet there is no Assistive Courseware (AC) designed especially for the VI people. This paper aims to develop an AC for VI learners based on the guidelines that has been tested with the users in the preliminary study and later revised in this study. In the introduction part, the term of AC is discussed. The objectives of the paper are to redesign the storyboard of the earlier-designed prototype and develop a new version prototype of AC for VI. The study is based on Iterative Triangulation Methodology combined with the IntView Methodology. Summary of methodology is also discussed in this part consisting of four phases starting with specification identification until prototype development based on the revised guidelines. The final part of the paper discuses the problems gathered during preliminary testing, implementation issues and new features added in the AC in order to overcome the problems. The findings that this paper addresses include the guidelines, the storyboard and the prototype.
ITSP1_ 3

software Risk Assessment Visualization Tool using Probabilistic Model: Implementation


Nuridawati Mustafa, Nurazlina Md Sanusi, Intan Ermahani A. Jalil
Managing software projects is a great challenge to many project managers. Due to cost, time or flexibility for software projects, risk management has been adopted by organizations as an alternative managing software projects method. This paper will discuss on the design of software risk assessment visualization tool using probabilistic model. Though there are many approaches in assessing software risks, the probabilistic inference models is chosen to characterize the uncertainty and measure the risks in software development process. The proposed tool, R AVT will assess risks depends on the input determined by user based on the questions given. Questions are

survey of Visualization: Lines and Planes in 3-Dimensions


Yahya Tashtoush, Ola Younis This paper presents a finding of a survey on students visualization of topic Lines and Planes in 3-Dimensions. A survey has been distributed to thirty-one students from two schools in Perak and Pahang. The questions were based on the topic of Lines and Planes in 3-Dimensions. The study revealed
4th International Symposium on Information Technology 58

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
depends on the critical risk elements category sets by users based on their assumption and experience working in the software projects. ITSP1_ 6

Architecture and uML Models of Mobile Learning Application for Course Content
Ahmad Sobri Hashim, Wan Fatimah Wan Ahmad, Rohiza Ahmad Mobile learning (M-learning) is getting famous as a method of giving learners study materials at anytime and anywhere. In providing at anytime and anywhere way of study, there are various architectures and Unified Modeling Languages (UML) models that have been introduced by the developers. This paper presents a study of the architectures and the UML models that are designed by the developers for m-learning applications. Other than that, this paper also proposes suitable architecture and UML models of m-learning application for course content. Several literatures studies have been done in order to get information regarding the architectures and UML models those have been used, and based on the studies, a suitable architecture and UML models for m-learning for course content was proposed.
ITSP1_ 7

system is comprised of two sections; first is the instructor section as the guardian of the story topic. The second is children section; the users who implement the topic of the story assigned by the instructor section. This prototype uses illustrated flashcards as a media to tell story. The illustrated flashcards consist of two design models: story topic design model and single scene design model. The prototype is developed on a web-based platform.
ITSP1_9

An Overview of Augmented Reality of underwater habitat


Norsila Shamsuddin, Mohd Kushairi Mohd Rajuddin, Farahwahida Mohd, Faudzi Ahmad, Wan Fatimah Wan Ahmad, Baharum Baharudin
Augmented Reality (AR) is a term for a view of a physical real world environment whose elements are combined with virtual computer based imaginary that will create a mixed reality. This paper overviews on the process of the development of an AR application of Malaysias Underwater Habitat. Due to time, cost and manpower constraints, the development of the application will be based on Redang Island in Terengganu. It is one of the most popular islands in Malaysia among scuba divers. To create this AR application, ARToolKit can be taken into consideration. It is hope that the application could help first time scuba divers to explore and experience before they go into the real underwater. This application also will provide information about the chosen underwater habitat. Therefore this paper is intended to give an overview of augmented reality application of Malaysias underwater habitat. It can also help to promote tourism in Malaysia. This application will benefit the Department of Fisheries Malaysia through warehousing the information such as images, audios and videos of underwater habitat. Another stakeholder that has the advantage is Malaysian Ministry of Culture, Arts and Tourism. It is because of the application will promote Malaysia. The application also will contribute to Professional Association Divings Instructor (PADI) as it can be one of the supporting tool in their teaching aids for scuba divers. ITSP1_ 10

gIs-based Mobile Tourism Architecture Prototype for Libya (A Case study)


Abubaker Agil Emhmed Ali, Kalaivani Chellapan Applying Geographical Information System (GIS) in tourism system is nothing out of the ordinary. Years of research and effort to implement GIS been executed and it can be conclude that GIS provides promising approach to a successful tourism GIS system. The traditional tourism, tourist and tour-agent relationship now changed into dynamic means where the tour-agent able to guide the tourist although separated by the geographical factor. GIS also allows sharing of tourism information between tour-agent regardless of place and time. On top of that, it is important to keep in mind that GIS provides challenges as well as benefits to the tourism industry. Integration, standardization, security and privacy, availability technology and human resource are some of the issues that currently ongoing research to find the best of it. The integration and availability technology issues are the focus in this research. Mobile technology architecture has been proposed as a solution for the availability technology at present. Looking at the current dilemma faced, with the available of resources, we propose the systematic approach that best suits to gain a valuable tourism information management system in Libyan context.
ITSP1_8

Enhanced signature Verification Technique using Data glove


Shohel Sayeed, Rosli Besar, Nidal Kamel In order to ameliorate the degree of trustiness and, high security, we have presented a new approach to hand signature verification applying data glove. Data glove is a new-fangled dimension in the field of virtual-reality environments, originally designed to satisfy the stringent requirements of modern motion capture and animation professionals. In our research, we attempt to change over the carrying out of data glove from motion animation towards signature substantiation problem, making use of the offered multiple degrees of freedom for each finger as well as for the hand. Our proposed approach is tested in context of highly skilled forgeries with a large number of glove-based signature data sets and obtained a significant level of accuracy in signature verification.

A guided Digital storytelling Prototype system using Illustrated flashcards


Jumail Wastam, Dayang Rohaya Awang Rambli, Suziah Sulaiman This paper describes a guided digital storytelling prototype system using illustrated flashcards. This prototype system model is proposed as a guided digital storytelling application which allows primary level children to create their own story by their own will. The guided digital storytelling in this prototype
4th International Symposium on Information Technology 59

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITSP1_11 model the entire reproductive tract and to find efficient algorithms for interactive deformation. ITSP1_14

Development of Multimedia Messaging service (MMs) -based Receipt system for Mobile banking
Mohd Hilmi Hasan, Aklili Khalid Mobile devices are becoming more important in daily lives and they also have gained increasing acceptance in banking services, for example Short Messaging Service (SMS)-based m-banking system. In this particular system, an SMS receipt will be delivered to users for any transactions done. Though we could gain many benefits out of it, SMS is considered as informal receipt for banking services which could not be used as reference in nowadays formal businesses or transactions. Therefore, this paper proposes a Multimedia Messaging Services (MMS)-based receipt system for m-banking that produces transaction receipt in PDF document and sends it to users via MMS.
ITSP1_12

Multimedia Courseware for slow Learners:A Preliminary Analysis


Norfarhana Abdollah, Wan Fatimah Wan Ahmad, Emelia Akashah Patah Akhir Emergences of technology had enabled the development of various innovative teaching-learning tools in education. The enjoyment offered by multimedia can increase learners motivation and participation thus allowing them to retain the learning process in longer period compared to using traditional classroom method. As slow learners are difficult to maintain their learning attentions for long time span, multimedia courseware is believe to assist them. This paper presents the findings from a preliminary analysis of slow learners conducted in special education schools. In this study, qualitative methodology using interview with special education teachers and class observations were conducted to understand the slow learners teachinglearning situations as a whole. The key findings from the analysis are slow learners learning interest and behavior while using computer and the potential that multimedia courseware can bring in motivating and increasing their interest in learning. Several guidelines for designing multimedia courseware for slow learners are proposed. Conceptual framework is also being illustrated in this paper as guide in conducting further research. All these preliminary findings will assist in designing multimedia courseware and will successfully facilitate the slow learners as well as special education teachers.
ITSP1_15

Performance of AODV Routing Protocol in Mobile Ad hoc Network


Zahian Ismail, Rosilah Hassan Mobile Ad Hoc Network (MANET) is a type of network with special characteristics and it needs special mechanism to bear with its ad hoc behavior. The important issue in MANET is routing protocol. Routing protocol is a standard used to determine the route path taken during the transmission of data. In this paper we will focus on Ad Hoc On Demand Distance Vector (AODV) routing protocol. The simulation experiments have been carried out using OMNeT++ network simulator to study the routing protocol performance. The metrics used to analyze the performance of the routing protocol are throughput and packet delivery ratio (PDR).
ITSP1_13

Developing A Virtual Laboratory for biology (VLab-bio) : A Preliminary study


Murniza Muhamad Halimah Badioze Zaman, Azlina Ahmad
Virtual Reality (VR) are three dimensional, computer generated simulated environments that occur in realtime as manipulated by the user. VR technologies are promising tools for learning. The current demand to reduce the time and cost involved in doing laboratory experiments is to turn to new and emerging technologies such as VR technologies. This paper discusses a preliminary study conducted for a research project on developing a Virtual Laboratory for learning Biology (VLab-Bio). In order to choose the topic to be developed for Vlab-Bio, a preliminary study has been carried out which comprises of an interview with biology teachers, a survey using questionnaire and an analysis on reports obtained from Malaysian Examination Board. The results of this preliminary study showed that there is a need to develop a virtual laboratory for biology for the topic Cell Division. The preliminary findings also confirmed the learning objectives to be focused in the VLab-Bio.

Evaluation of Real-Time Visio-haptic Deformable bovine Rectal Palpation simulator


Irshad Ahmad, Suziah Sulaiman
A real-time Visio-haptic Bovine Rectal Palpation Simulator for training veterinary students was developed. The simulator was meant for training medical veterinary students before they could actually perform diagnosis of various parts of the reproductive tract on live animals. In this simulator the teacher guides the student in applying forces using force feedback device, when palpating different parts of the reproductive system. The teacher can better guide the student if he can see visually forces applied by the student. The implementation proposed is motivated by an existing simulator of a reproductive system used for diagnosing different internal parts which lacks visual deformation features; hence, realism is reduced. In this work, two simulators were used. One with visual deformation and other without visual deformation. The results gather from various experiments by trainees shown that a simulator with visual deformation can better and quickly train the trainees as the trainer has a continuous control over the actions of the trainee. In this study only Ovary was considered during experiments and the trainees were allowed to palpate ovary and their applied forces were recorded. Further work is in progress to

4th International Symposium on Information Technology

60

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ENgINEERINg TEChNOLOgy ITsO1_T2: 15 JuNE 2010 (2.00 PM 4.00 PM) VENuE: 3-02
ITSO1_T2_1 ITSO1_T2_4

Investigation on Model selection Criteria for speaker Identification


Z. Farhood, M. Abdulghafour
Speaker recognition is the task of identifying anonymous individuals using their voice prints. Applicable services for speaker recognition include authentication, surveillance and forensic speaker recognition. This paper investigates the performance of two automatic model selection based on Bayesian information criterion (BIC) and Bayesian YingYang harmony empirical learning criterion (BYY-HEC) for Gaussian Mixture Model (GMM) based approaches. ITSO1_T2_2

RNA secondary structure Prediction using Dynamic Programming Algorithm A Review and Proposed Work
Mohd Nizam Osman, Rosni Abdullah, NurAini Abd. Rashid Ribonucleic acid (RNA) plays fundamental and important role in cellular life forms and their function is directly related to their structure. RNA secondary structure prediction is a significant area of study for many scientists seeking insights into potential drug interactions or innovative new treatment methodologies. Predicting structure can overcome many issues related with physical structure determination and their study yields information useful in prediction of the full three dimensional structures and also in the interpretation of the biochemical abilities of the molecules. Therefore, predicting the secondary structure of RNA is very important for understanding their function. Furthermore secondary structures are discrete and therefore well suited for computational methods. In this paper we present a review on RNA secondary structure prediction using Dynamic Programming (DP) algorithm. An analysis of DP algorithm from previous work is discussed. We will present our proposed work for RNA secondary structure prediction using DP algorithm and special-purposed hardware of multicore and Graphical Processing Unit (GPU). We proposed to implement the DP algorithm approach on a hybrid of multicore and GPU platform to speed up the computational process of RNA secondary structure prediction.
ITSO1_T2_5

hMM Parameters Estimation using hybrid baum- Welch genetic Algorithm


Mourad Oudelha, Raja N. Ainon Automatic speech recognition (ASR) has been for a long time an active research area with a large variety of applications in human-computer intelligent interaction. The most used technique in this field is the Hidden Markov Models (HMMs) which is a statistical and extremely powerful method. The HMM model parameters are crucial information in HMM ASR process, and directly influence the recognition precision since they can make an excellent description of the speech signal. Therefore optimizing HMM parameters is still an important and challenging work in automatic speech recognition research area. Usually the Baum-Welch (B-W) Algorithm is used to calculate the HMM model parameters. However, the B-W algorithm uses an initial random guess of the parameters, therefore after convergence the output tends to be close to this initial value of the algorithm, which is not necessarily the global optimum of the model parameters. In this paper, a Genetic Algorithm (GA) combined with Baum-Welch (GABW) is proposed; the idea is to use GA exploration ability to obtain the optimal parameters within the solution space.
ITSO1_T2_3

Arabic speech Recognition using hidden Markov Model Toolkit(hTk)


Bassam Ali Qasem Al-Qatab, Raja Noor Ainon In this paper we discuss the development and implementation of an Arabic automatic speech recognition engine. The engine can recognize both continuous speech and isolated words. The system was developed using the Hidden Markov Model Toolkit. First, an Arabic dictionary was built by composing the words to its phones. Next, Mel Frequency Cepstral Coefficients (MFCC)of the speech samples are derived to extract the speech feature vectors. Then, the training of the engine based on triphones is developed to estimate the parameters for a Hidden Markov Model. To test the engine, the database consisting of speech utterance from thirteen Arabian native speakers is used which is divided into ten speaker-dependent and three speakerindependent samples. The experimental results showed that the overall system performance was 90.62%, 98.01 % and 97.99% for sentence correction, word correction and word accuracy respectively.

esurvia: A Web-based survey service using fuzzy Conjoint Analysis


Media A. Ayu, Teddy Mantoro, Abu Osman Md Tap, Siti Aisyah Ismail
Fuzzy conjoint analysis has been employed in many studies which involving the use of Likert-scale to represent linguistic terms. It is believed that the fuzzification of this Likert-scale is more representing the vagueness content on human subjectivity in giving judgment. In this paper, we present our works in developing a web-based survey that provides service for analyzing the survey data using fuzzy conjoint analysis. We argued that this web-based survey will ease the distribution of the survey and the automatic data analysis provided will ease the survey owner in getting the meaningful result from the survey.

4th International Symposium on Information Technology

61

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITSO1_T2_6 to automatically generate extraction pattern from a limited corpus and label the pre-defined entities in a collection of accident documents. Link Grammar parser and Stanford Part- of-Speech tagger are used in the pattern extractor to identify named entity and construct extraction pattern. The extraction pattern then feed to SemiSupervised NER to categorize the entities into some predefined categories. Performance is evaluated using Exact Match evaluation and tested on two different entities- DATE and LOCATION. Using only two features, the system shows promising result.

Rule-based Pattern Extractor and Named Entity Recognition: A hybrid Approach


Yunita Sari, Mohd Fadzil Hassan, Norshuhani Zamin
Name Entity Recognition (NER) is one of the important tasks in Information Extraction (IE) research that has been flourishing for more than fifteen years ago. NER enables an IE system to recognize and classify information units in an unstructured text. This paper presents a Rule-based pattern extractor and a Semi-Supervised NER approach

ITsO1_T6:
ITSO1_T6_1

15 JuNE 2010 (2.00 PM 4.00 PM) VENuE: 3-06


efficiency analysis for FEC and ARQ techniques in underwater environment is done based on communication distance, packet size and wind speed. And a comparison between FEC and ARQ in terms of energy efficiency is done, it was found that energy efficiency of both techniques increases with increasing packet size in short distances, but decreases in longer distances. There is also a cutoff distance below which ARQ is more energy efficient than FEC, and after which FEC is more energy efficient than ARQ. Wind speed has great effect on energy efficiency and on cutoff distance for both techniques. Based on this analysis an efficient energy two mode error correction technique is proposed, this technique depends on RTT, distance, packet size, and the energy level in the nodes to determine where and how error can be corrected.
ITSO1_T6_4

Energy balanced Clustering in Wireless sensor Network


Babar Nazir, Halabi Hasbullah
In this paper, clustering in terms of energy efficiency in WSN is explored and proposed Energy Balanced Clustering in Wireless Sensor Network (EBC). Algorithms for energy balanced cluster formation, cluster head selection, intra cluster and inter cluster communication in WSN are proposed. Furthermore, using OMNet-4.0 simulation performance of proposed protocol is compared with LEACH and EEMC using parameters like energy per packet and throughput. Simulation results demonstrate that EBC is effective in prolonging the network lifetime as well as in improving throughput, than LEACH and EEMC. ITSO1_T6_2

Multiple beams switching Double square Loop Antenna for uWb systems
Arun Raaza, Pallawi, Animesh Rana, Gopal. S. Joshi, Amit Mehta A novel method of producing multiple axial and tilted beams using eight feed double square loop (DSL) antenna is proposed. With varying permittivity value of dielectric substrate, the DSL antenna produces multiple beams and steer each of the beam produced at step of 45 throughout the 360 of space, thus offering wide range of option for any modern wireless device integrated with this antenna to focus the beam in target direction. Also the antenna operates in four different frequencies providing multi-channel operation in UWB region.
ITSO1_T6_3

On-Demand flexible Tiered Qos scheduling Algorithm for IEEE 802.16j Multi-hop Relay Networks
Anas F. Bayan, Tat-Chee Wan WiMAX is a wireless technology that provides broadband access for services having different QoS requirements and different traffic priorities. Since the QoS demands of different traffic flows vary, it is the responsibility of the medium access control (MAC) layer to schedule the traffic flows and allocate bandwidth such that the QoS requirements of each flow is satisfied. This scenario is even more complex when multihop relays are introduced into the network. Nonetheless, the IEEE 802.16j standard does not specify any QoS architectures or scheduling mechanisms. In this paper, we propose an OnDemand Flexible Tiered (ODFT) QoS scheduling algorithm for WiMAX Multi-hop Relay networks to guarantee the QoS demands of various applications by utilizing QoS tiers for the relay network. The ODFT (1) classifies the user requests from various wireless zones based on the zone ID and service flow types, (2) calculate the QoS weights of the service flows, (3) schedule service flows based on the calculated weights, and (4) allocate suitable bandwidth for each service flow type.

An Efficient Energy Two Mode Error Correction Technique in underwater Wireless sensor Network
Ammar Babiker, Mohamed Nordin Zakaria Research in underwater acoustic networks has developed quickly to support large variety of applications such as mining equipment and environmental monitoring. As in terrestrial sensor networks; reliable data transport is demanded in underwater sensor networks. The energy efficiency of error correction techniques should be considered because of the severe energy constraints of underwater wireless sensor networks. FEC and ARQ are the two main error correction techniques in underwater networks. In this paper, a mathematical energy
4th International Symposium on Information Technology 62

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITSO1_T6_5 ITSO1_T6_6

Deployment Density Estimation for -Covering Problem in Wireless sensor Network


Hassan Chizari, Shukor Abd Razak, Bahar Arifah, Abdul Hanan Abdullah Promising a suitable coverage is one of the problems in Wireless Sensor Network where a random deployment makes it very difficult to measure. In this paper, a novel equation base on Gaussian distribution is proposed to estimate the deployment density. This function uses the -Covering value and coverage percentage as inputs. Simulation results show high correlation between proposed equation and simulation data. Moreover, the average of the error in different scenarios is 0.38%.

Customizing gINA for Authentication in Virtualization


Siti Rohaidah Ahmad, Arniyati Ahmad, Nor Fatimah Awang, Nik Nur Aisyah Nik Ghazali
GINA is a dynamic link library (DLL) and it is part of the Windows Operating System. GINA not only provides facilities for the user identification and authentication process but also provides user interface. Virtualization is a technology that allows various types of operating systems to share one computer at one time. Self-identity verification process is done in virtual machine monitor, if the users identity has been authorize then the user is allowed to reach the image windows operating system without having to re-enter the password and user-id . This paper discusses the process of customization GINA for identity verification process without their need to repeatedly enter user-id and password, which is only done once in a virtual machine monitor.

ITsO2_T2:
ITSO2_T2_1

15 JuNE 2010 (4.20 PM 5.40 PM) VENuE: 3-01


short lived and thus a question mark in the context of highly dynamic VANET topology. Disseminating message in a secure manner over relevant geographical area is another challenge for VANET. In this paper we propose two schemes one for efficient group formation that improves life time of a group leader role. We also propose hybrid (symmetric/asymmetric) message dissemination scheme for faster and secure communication. Both these schemes are extension of our previously proposed security framework.
ITSO2_T2_3

Optimizing Machine utilization in semiconductor Assembly Industry using Constraint-Chromosome genetic Algorithms
Umi Kalsom Yusof, Safaai Deris
Semiconductor manufacturing is always aiming for an accurate capacity planning that able to optimize the utilization of the resources especially in machine loading problem. There are two main approaches being studied to solve the problem: linear programming-based and bio-inspired approaches. Recently more studies are focusing on bioinspired approaches; where amongst them; genetic algorithm (GA) is being the most popular one. We propose a constraint-chromosome (CCGA) to solve this problem by applying the workable chromosome representation to the domain problem. The approach developed helps avoid getting trapped at local minima and able to search for more solutions. The method is chosen to allow the running of GA in original form as well as to ensure the computation is straight forward and simple. The objective of the algorithm is to optimize the utilization of the machines that leads to increase the company overall profit. It has been found that the proposed CCGA is able to propose good solution to the problem. ITSO2_T2_2

Multi-Level security Random zigbee Wireless sensor Networks


Elisha Tadiwa Nyamasvisva, Halabi Hasbullah In most instances Wireless Sensor Networks (WSNs) are confined to applications which require less security restrictions. This is because the trade off between security and performance in WSNs is far too high. We explore the security requirements of the varied application fields of ZigBee WSNs from current to future applications with the aim of expanding the application domain, integrity and authenticity levels in such these applications. We will explore the existing WSNs security mechanisms and other security mechanisms which are available in wireless Adhoc Networks. Our aim is to harness the positive aspects of all the mechanisms and combine them to define a multilevel structured security which trades performance to security level. We believe with varied options in security and performance levels, ZigBee WSNs can adopt a wider applications domain.

VANET security framework for Trusted grouping using TPM hardware: group formation and Message Dissemination
Asif Wagan, Bilal Mughal, Halabi Hasbullah Vehicular ad hoc network (VANET) has attracted much attention from academia and industries in recent years. Security remain are major concern for VANET application due innate time constraints. Researchers have proposed a number of solutions for different aspect of security i.e. authentication, privacy, non-repudiation etc. Some of solution based on group formation concept but most of these solution work under the simple assumption of an existent group formation method. Furthermore role of group leader is expected to be
4th International Symposium on Information Technology 63

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITSO2_T2_4 in identity providers and service providers, and trustworthiness of subject, identity providers and service providers are active concerns in federated identity management systems. In addition, we had explored trusted computing technology, which covers Trusted Platform Module security features such as Trusted Platform Module Identity, Integrity Measurement and Key certification as well as Trusted Network Connect. In this paper, we presented conceptual threat model for inter-domain web single sign-on in federate identity management system. For this, we set identity theft, misused of identity information, and trust relationship scenarios and in the end, we discussed how trusted computing technology use can effectively resolve identity theft, misused of identity information, and trust relationship concerns in federated identity management system.

A study on Threat Model for federated Identities in federated Identity Management system
Zubair Ahmad Khattak, Suziah Sulaiman, Jamalul-Lail Ab Manan
Federated Identity Management (FIM) based on standards allows and facilitates participating federated organizations to share users identity attributes, facilitate authentication and grant or deny service access requests. Using single sign-on facility users authenticates only once to home identity provider and logged into access successive service providing service providers within federation. Users identity theft, misused of user identity information via single sign-on facility

ITsO2_T6:
ITSO2_T6_1

15 JuNE 2010 (4.20 PM 5.40 PM) VENuE: 3-05


that describe the benefits, disadvantages and suggestions to complete the organizers features.
ITSO2_T6_3

Intelligent Interpretation and Analysis of Child sexual Abuse forensic Evidence: A Preliminary study
Noor Maizura Mohamad Noor, Salwana Mohamad @ Asmara In sexual abuse case, the victims body is the most important source of physical evidence. Meanwhile, medical personnel play a role as part of the police investigation in forensic examination. Forensic evidence in sexual assault will be collected because of intimate nature of this evidence and different special expertises are needed to conduct a detail examination. Therefore, in child sexual abuse cases, uncertainties regarding of various context in decision making can lead to failure of successful investigation. Various types of evidence data need to be analyzed and interpreted to come out a reliable and precise report. Thus, this paper present a preliminary study of this topic in order to gain a solution of decision making in child sexual abuse forensic field through intelligent decision support system.
ITSO2_T6_2

An Integrated DNA Decision support system using grid Environment for Crime Investigation
Noor Maizura Mohamad Noor, Md Yazid Mohd Saman, Ahmad Faiz Ghazali, Zafarina Zainuddin Decision support system (DSS) has been applied in a wide range of computer applications that commonly manipulate information in variety fields. This is including computer-based systems that are being used in handling data in order to achieve an optimization for decision-making in crime investigation. Deoxyribonucleic acid (DNA) profile analysis using computer programming is not a new research in biology and information technology. Projects have been done in developed countries and around the world to develop software tools to analyze DNA data. The main purpose for this research is to design a new architecture of integrated system in handling DNA profile match for identifying possible criminal and convicted offenders. Furthermore, a new visual forensic DNA analysis tool will be developed to help criminal investigators to analyze DNA data and DNA profile. Finally, the proposed architecture and software tool will be evaluated. The need of a high performance computing in a time-critical situation presents a challenge to grid environment
ITSO2_T6_4

Light Weight student Mobile Organizer for Netbook: A Preliminary study


Dian Sugijarto, Ahmed Moosajee Patel, Norleyza Jailani, Marini Bakar This paper describes a proposed Student Mobile Organizer application to help university students in organizing their college and personal activities. The application is designed to run in a netbook with Linux Ubuntu operating system. The application will be integrated with a university server, which is a case study at Universiti Kebangsaan Malaysia (UKM). The integration allows the application to retrieve data from the server to improve the capability of the application system with additional functions. The examples of the data are lectures schedule, university announcement and important university dates. All the retrieved data is placed in the students schedule. In order to develop the integrated organizer, a methodology is proposed, that will cover from requirements until implementation. A framework to support the system is also proposed. This paper ends with conclusion and discussion

Development of simulation Environment for Agent Interaction Protocol


Norizal Abd Latif, Mohd Fadzil Hassan, Mohd Hilmi Hasan This paper presents the process of simulation development for agent interaction protocol. Previously, a set of four interaction protocols for agent-based e-learning system is specified using the ISLANDER. Now, it is time to develop a suitable simulation in order to test the specified protocols using Easy Java Simulation (EJS). Our idea is to present two types of Graphical User Interface (GUIs) to test the protocols. First GUI is a static one using a predefined value, meaning that the values are already hard-coded in the simulation meanwhile for the

4th International Symposium on Information Technology

64

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
second GUI, the dynamic one, where the users are able to enter their desired values in order to run the simulation. The values entered represent the number of agents and documents that is available at certain time. The purpose of having these values is to see whether the interaction protocol specified for these goal: to automate the document downloading and notifying in the e-learning system is capable of handling diverse complexity of environments. In addition, this paper also describes a formal approach to validate the protocol, that is model checking.

ITsO2_T7:
ITSO2_T7_1

15 JuNE 2010 (4.20 PM 5.40 PM) VENuE: 3-06


present a conceptual view of a congestion control scheme using transmission rate and transmission power simultaneously for optimal results.
ITSO2_T7_3

Minimizing Discovery Time in bluetooth Networks using Localization Techniques


Fazli Subhan, Halabi Hasbullah
Bluetooth is a short range wireless communication protocol. However, the discovery process to establish connection in Bluetooth network is very time consuming process. This paper presents localization techniques for Bluetooth networks. There is an increasing interest in location identification, and communication with other Bluetooth devices within a local area network. The idea behind localization techniques is to address position estimation in Bluetooth networks in order to reduce the time taken for device discovery to establish connection process. In this paper Received Signal Strength Indicator (RSSI) is obtained using Inverse square law. The Received Power (Prx) is obtained indirectly by converting RSSI values to Prx using Friis equation. Positioning is based on Prx and converted to estimate the distance using simple radio propagation model based on Friis equation. The advantage of positioning is to know the object actual position with respect to the distance from the transmitter. The relationship obtained from positioning using Prx will be used to minimize the discovery time in connection establishment process in Bluetooth networks. This work is part of the design process of roaming protocol for Bluetooth networks. ITSO2_T7_2

Implementation of IDs with Response for securing MANETs


Yasir Abdelgadir Mohamed, Azween Abdullah This paper presents a new approach to secure Mobile ad hoc networks (MANETs) based on the paradigm of Artificial Immune System (HIS). An intrusion detection system with response (IDSR) that simulates a considerable number of immune system features. A considerable amount of immune properties have been mapped to ad hoc networks seeking for comprehensive security system. Negative selection, clonal selection, danger theory, immune network concept are the main paradigms that have been considered in our system. Anomaly detection, first and second response, learning capability, decentralized and reliable detection system are the features that expected to contribute more to ad hoc network security.
ITSO2_T7_4

Efficient Congestion Control in VANET for safety Messaging


Bilal Mughal, Asif Wagan, Halabi Hasbullah The prime goal of Vehicular Ad hoc Network (VANET) is to provide life safety on the road. To achieve this, vehicles make use of two types of safety messages i) Periodic safety messages (beacons): to exchange status information e.g. position, speed etc. ii) Event-driven messages: broadcast in case of an emergency situations e.g. accidents, hard-braking etc. As both type of messages use same Control Channel, in dense traffic periodic beacons may consume the entire channel bandwidth resulting in a saturated/congested channel. In a congested channel event-driven messages may not be able to access the channel at all, thus providing no safety. Researchers have proposed different strategies to overcome this problem. Most of these strategies rely on the concept of a limiting beacon bandwidth usage level below a specific threshold and thus implicitly reserving a chunk of bandwidth for high priority even-driven messages. In the proposed strategies either transmission rate or power control techniques are used to control congestion. In this paper we evaluate such techniques and highlight following major drawbacks first: using only power control techniques do not satisfy requirements of envisioned beacon-dependent safety applications, second: methods used for measuring channel usage level in transmission rate control technique may not be as effective under real world conditions. We also
4th International Symposium on Information Technology

The survival of Communications In Ad hoc And M2M Networks: The fundamentals Design of Architecture And Radio Technologies used for Low-Power Communication NOMOhI Devices
Juan Jose Martinez Castillo
Always under a Telecommunication view, in this paper will be show an introduction to the need to develop survival strategies in sensor networks and machine to machine (M2M), later, a descriptions of the NOMOHI architecture (Node, Mobile, Hybrid, Intelligent), able to use a cooperative control system based on Fuzzy Neural Network and other strategies of artificial intelligence; then, a descriptive studio of the different communication techniques that could be used to develop the system Management for the operations and survival functions in such networks; finally the conclusions and the lines of investigation should be followed to support the development of this technology.

65

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITsO3_T2:
ITSO3_T2_1

16 JuNE 2010 (9.30 AM 10.30 AM) VENuE: 3-01


voice. Hence, there is a need to enhance the quality of voice transmission over the WLAN. Several metrics such as delay, jitter, and packet lost have impact on the quality of service (QoS) of the VoIP system. Minimizing total transmission delay, jitter and packet lost would mean improving the QoS of VoIP. In this paper, a cross-layer interaction approach is proposed to improve the quality of voice delivery, hence the QoS of VoIP. The approach in achieving this is by introducing a communication agent between Data Link layer and Transport layer, by which congestion misinterpretation by the Transport layer could now be eliminated. In particular, the IP protocol of Transport layer will be utilized to communicate with the agent to improve the QoS of the VoIP system.
ITSO3_T2_3

Workload Analysis of sPECmail2009


Hitoshi Oi, Sho Niboshi
SPECmail2009 is a new benchmark suite for measuring the performance of corporate mail servers. It assumes the IMAP4 protocol for retrieving messages and a large fraction of transactions are for manipulating hierarchical messages and mail folders from the users connected via high-speed networks. In this paper, we present a performance analysis of SPECmail2009, including disk I/O behavior, quality of service metrics, and CPU time breakdown. The IMAP4s capability of directly manipulating the messages on the server makes SPECmail2009 a highly I/O-bound workload. Our experiments show that a combination of a small but fast access SCSI drive for indexing messages and larger but slower SATA drives for message files can be an option for building a cost-effective mail storage. Both of multiprocessing and multithreading are quite effective for SPECmail2009 especially in the user mode CPU. ITSO3_T2_2

Improvements over Two Phase shortest Path Algorithm


Muhammad Aasim Qureshi, Mohd Fadzil Hassan Shortest path is an old classical problem in the area of theoretical computer science. This work is the continuation of the work done previously by the authors and presents two possible improvements in the existing algorithm. The introduced improvements which are simple and fit in easily into the existing algorithm prove to improve the complexity level. The need of improvement is discussed in detail and the expected improvement in overall processing time is shown with the example.

Improving Qos of VoWLAN via Cross-Layer Interaction Approach


Sameha Ahmed Ali Alshakhsi, Halabi Hasbullah Voice over Internet Protocol (VoIP) is a transmission technology that allows voice to be delivered over the Internet with support of Internet Protocol. Recently, the integration of VoIP and Wireless Local Area Network (WLAN) has become popular, driven by mobility requirements of the users. However, WLAN architecture was primarily designed to carry data and not for

ITsO3_T6:
ITSO3_T6_1

16 JuNE 2010 (9.30 AM 10.30 AM) VENuE: 3-05


is effect on determine the corrective, adaptive, perfective, and preventive which are important to determine various quality factors of the system. In this paper we found that the requests for maintenance support could be classified correctly into corrective and adaptive. We used two different machine learning techniques alternatively Nave Bayesian and Decision tree to classify issues into two type. Machine learning approach used the features that could be effective in increasing the accuracy of the system. We used 10-fold cross validation to evaluate the system performance. 1700 issues from shipment monitoring system were used to assess the accuracy of the system.
ITSO3_T6_3

Thematic Role to Assist Preparation of a business Letter based on genre Approach


Tg Zatul Hidayah Tg Petra, Mohd Juzaiddin Ab Aziz, Siti Hamin Stapa
How can a successful computer-based writing software be modeled using thematic role and genre-based approach? This paper will discuss the genre approach for a specific business letter which is an adjustment letter for young executives in Malaysia. The paper will then study the use of thematic role to provide the meaning to the text and how this can be combine with the genre approach to address executives writing problems. ITSO3_T6_2

Text-based Classification incoming Maintenance Requests to maintenance type


Naghmeh Mahmoodian, Rusli Abdullah, Masrah Azrifah Azim Murad Classifying maintenance request is one of the important task in the large software system, yet often in large software system are not well classified. This is due to difficult in classifying by software maintainer. The categorization of maintenance type
4th International Symposium on Information Technology 66

Ontology of Programming Resources for semantic searching of Programming Related Materials on the Web
Siti Noradlina Mat Using, Rohiza Ahmad, Shakirah Mohd Taib
This paper discusses about the development of ontology for semantic searching of programming related materials on the Web. As today, more and more businesses as well as organizations have become computerized, thus programming or system development knowledge is becoming an added advantage for job seekers to have. However, teaching and learning programming has always been a challenge. Since

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
programming need more practical aptitude rather than theoretical, classroom learning is not enough to groom good programmers. Hence, supplementary materials would need to be explored by students and one common source of these materials is the Internet. However, looking for suitable materials among the abundance information on the Internet is not that easy especially to novice users. Therefore, this research explores the concept of Semantic Web in assisting user search. In this research, ontology will be developed along with a website to help students and lecturers to find online information and materials related to programming.

ITsO4_T2:
ITSO4_T2_1

16 JuNE 2010 (10.50 AM 12.50 PM) VENuE: 3-02


errors. Presently, most of the solutions proposed to improve service availability are based on having redundancy units that do not consider the amount of work and resources needed to create replicas, which greatly increases the complexity of the management of a distributed system. In this paper, we survey state-of-the-art techniques that could improve service availability in distributed environments and propose an autonomic algorithm based on team building concept that dynamically performs service placement to improve service availability even in the event of resource failures.
ITSO4_T2_4

sIDIf: Location based Technique as a Determinant of Effectiveness and Efficiency in Artificial Reefs Development Project
W. Aezwani W. A. Bakar, Zailani Mohamed Sidek, Mustafa Man, Mohammad Zaidi Zakaria
Evaluation for effectiveness and efficiency of artificial reefs (AR) development is quite difficult and troublesome. This is because of high cost incurred. As for common practice, evaluation process is done by special diving task force unit to conduct diving activity to observe on how AR has developed. The paper presents framework architecture to integrate location coordinate data (longitude and latitude) of AR with the fish catches data at all identified jetty. In SIDIF, the data of fish catches will be mapped with data on location coordinate of AR as a whole via mapping and integration of these two (2) different databases. Using this methodology, the effectiveness and efficiency of AR development will be achieved as well as the evaluation will be measured. ITSO4_T2_2

Divisible Load scheduling of Real-time Task on heterogeneous Clusters


Suriayati Chuprat Recent research in real-time scheduling had applied workload models from Divisible Load Theory (DLT) to real-time workloads. The resulting theory, referred to as Real-time Divisible Load Theory (RT-DLT), hold great promise for modeling an emergent class of massively parallel realtime workloads. However, the theory needs strong formal foundations before it can be widely used for the design and analysis of real-time systems. In this paper, we report our current findings on RT-DLT as part of our on-going research effort to develop such formal foundations. Specifically, we have extended an algorithm based on Linear Programming to schedule a divisible real-time workload upon heterogeneous clusters. A series of simulations have been conducted and a set of significant results are presented.
ITSO4_T2_5

Multi-level Parallelism in PhyloCon Algorithm


Hazrina Yusof Hamdani, NurAini Abdul Rashid In this paper we investigate the advantages of multi-level parallelism on PhyloCon algorithm. The PhyloCon algorithm naturally possesses multi-levels of functions which cost the execution time took longer to complete. We showed that by applying parallelism to the selected level of functions may significantly reduce the execution time. The selected level of functions produced the independent outer-level parallelism and the independent inner-level parallelism. The details of each independent level of parallelism applied in PhyloCon algorithm are also were shown. The result of the research shows that multilevel parallelism produced a better performance compared to independent level parallelism which half of sequential execution time can be reduced using multi-level parallelism.
ITSO4_T2_3

Optimal Parameters of Interline Power flow Controller using Particle swarm Optimization
Khalid Haroun Mohamed Abdelgadir, K S Rama Rao, Khairul Nisak Md Hasan In this paper, optimal parameters of interline power flow controller using particle swarm optimization is presented. Basic and inertia weight approach particle swarm optimization techniques are applied to optimal power flow control in an electrical power system. Based on the steady state model, the sizing of the controller in the network is formulated as an optimization problem to minimize the transmission line loss in the network. The power flow control constraints due to the use of interline power flow controller are included in optimal power flow problem in addition to the normal conventional constraints. Simulations results are obtained on standard IEEE 30-bus system to minimizing the transmission line losses and optimal parameters of the controller are derived.

Dynamic service Placement and Redundancy to Ensure service Availability During Resource failures
Boon Yaik Ooi, Huah Yong Chan, Yu-N Cheah Service placement algorithms have been introduced to automatically manage services in distributed environments. However, most of these algorithms aim to improve service performance or to reduce operation cost and do not consider the reliability and availability of their resources. Most of them do not consider events when machines in their resource pool malfunction. These malfunctioned machines could cause services to halt or, worse, to produce transient and intermittent
4th International Symposium on Information Technology 67

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITSO4_T2_6 came into picture, with the advent of this not of the efficiency but also the factors like stability, reliability, resource utilization were also of pivotal importance. This paper reviews a critical and comparative analysis of the current ESBs keeping in view the C4I System as a base, so as to ascertain which ESB fulfills the requirements of the system of systems. In comparison we try to analyze Mule ESB, GlassFish ESB and Fuse ESB with respect to interoperability. This study demonstrates that Mule is more feasible to C4I systems because it is simple, easy to integrate, no adopter requirement and flexible.

An Interoperability study of Esb for C41 systems


Abdullah Alghamdi, Muhammad Nasir, Iftikhar Ahmad Khalid A. Nafjan
Ever since the inception of the idea of collaborating the enterprise systems, the need of an Enterprise Service Bus (ESB) has been a relentless need of the market, the bigger the systems get after collaboration the failures of the ESBs was inevitable. Things moved to more gravity when the bulkiest of the systems like Defense architectures

ITsO4_T6:
ITSO4_T6_1

16 JuNE 2010 (10.50 AM 12.50 PM) VENuE: 3-06


basic LAHC as it uses randomized decent method instead of using simple hill climbing. ALARD also differs from the basic LAHC as it uses an average quality of a list of accepted solutions as the acceptance criterion, whilst in LAHC the acceptance criterion is based on the quality of one of the selected solution in the acceptance list. ALARD does not need parameter tuning to the length of list for each benchmarked problem, because the acceptance criterion is based on threshold value (i.e. average), whilst LAHC, requires parameter tuning. Results tested on the Socha benchmark datasets showed that, ALARD produces significantly good quality solutions compared to LAHC within a reasonable time and comparable to other approaches tested on this dataset.
ITSO4_T6_4

Rule Discovery for Pseudorandom Number generator based on Cellular Automata


F. Maleki, A. Bijari, A.Mohades, M.E.Shiri Since the behavior of cellular automata strongly depends on their rules, it is essential to find appropriate rules for a specific application. This paper concern with rule discovery in cellular automata pseudorandom number generators. In this paper, we propose a new criterion to find high quality rules for CA randomizers. We make use of the proposed criterion to find appropriate rules of radius two and to construct a CA randomizer based on one-dimensional non-uniform cellular automata. Moreover, this paper presents and proves some new observations about the relationship between behavior of a CA and its size.
ITSO4_T6_2

Prediction of C-peptide structure using Artificial bee Colony Algorithm


Hesham Awadh Bahamish, Rosni Abdullah Artificial bee colony algorithm (ABC) is a swarm intelligence based algorithm. It is inspired by the foraging behavior of honey bee colony. In this paper, the ABC algorithm was utilized to predict the tertiary structure of C-peptide of ribonuclease A by searching the conformational search space to find the lowest free energy conformation. Conformations were represented using torsion angles representation and energy was calculated using ECEPP/2 force fields. The lowest free energy conformation found was -86.55 kcal/mol, which is lower than the reported lowest free energy conformation in the previous work.
ITSO4_T6_5

using genetic Algorithm for solving N-Queens Problem


Ayad Turky,Mohd Sharifuddin Ahmad The N-Queens problem is a well-known NP-Hard problem. Optimal solutions to small N values can be found in reasonable time by classical search algorithms or linear programming. However, since the N-Queens problem is a constraint satisfaction problem (CSP), it will be very time consuming to solve larger N values with guaranteed optimality. In this paper, genetic algorithm was adopted to solve the N-Queens problem. Results show that this evolutionary approach is very efficient and able to produce good results compared with other approaches e.g. classical search algorithms or linear programming.
ITSO4_T6_3

Early Detection Method of Corrosion on buried Pipeline


Mohd Saiful Abdul Rahman, Halabi Hasbullah Early detection on any abnormality on the pipeline such as leakage is essential for efficient management. As to date, wireless sensors have been widely used to gather information in monitoring reliability of the pipeline. The commonly used sensors are temperature and pressure sensors. One of the issues that relate to pipeline monitoring is the reactive rather than proactive maintenance approach to leakage and abnormality. The objective of this research is to develop a method for early detection of corrosion, which the buried pipeline is exposed to changing temperatures and gas flow pressures. This will ensure that maintenance works can be done quickly to prevent pipe

Average Late Acceptance Randomized Descent Algorithm for solving Course Timetabling Problems
Anmar Abuhamdah, Masri Ayob This work proposes an average late acceptance randomized descent algorithm (ALARD) to solve university course timetabling problems. The aim of this work is to produce an effective algorithm for assigning a set of courses (events) and students to a specific number of rooms and timeslots, subject to a set of constraints. The idea is based on the late acceptance strategy in hill climbing (LAHC). ALARD differs from the
4th International Symposium on Information Technology 68

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
burst, as well as to minimize operational cost. The NORSOK CO2 corrosion rate model is used as a basic reference model and the devices that will measure the value of pressure and temperature is wireless sensor. Simulation will be developed to see the performance of the model.
ITSO4_T6_6 has created new difficulties to internet users about retrieving the latest, relevant and excellent web information. This is due to the enormous contents of web information that have caused problems in the restructuring of web information. Thus, in order to ensure the latest, quality and relevant web information is optimally retrievable, it is necessary to undertake the task of web document classification. This paper discusses the result of classifying web document using the extraction and machine learning techniques. Four types of kernels namely the Radial Basis Function (RBF), linear, polynomial and sigmoid are applied to test the accuracy of the classification. The results show that the accuracy percentage of web document classification will increase whenever more web document is used. The results also show that linear kernel technique is the best in web document classification compared to RBF, polynomial and sigmoid.

Web Classification using Extraction and Machine Learning Techniques


Lizawati M. Yusof, Mohd Shahizan Othman, Juhana Salim
Internet services that has become easier to access has contributed to the drastic increase in the number of web pages. This phenomenon

ITsO4_T7:
ITSO4_T7_1

16 JuNE 2010 (10.50 AM 12.50 PM) VENuE: 3-07


consider the problem of designing an efficient mobility based relay selection and unnecessary relay role switched to slave. Our proposed scheme reduces the delay, message overhead, control overhead, and increases the network stability and reliability. Performance results reveal that our proposed scheme significantly improves the performance of the network.
ITSO4_T7_3

An Improved Inquiry Procedure in Device Discovery bluetooth Network


Sharifah Suhaila Mohd Ramli, Halabi Hasbullah One of the big fundamental issues in Bluetooth ad hoc network is its device discovery in network initialization which would affect the whole performance. The performance of short range wireless Bluetooth ad hoc network technologies depends on the promptness of the self-configuring procedures. Due to continuous inquiry and paging process, battery in Bluetoothenabled devices is easily drained. This afterward gives an impact on Bluetooth technology efficiency. Derived from accumulation of previous works and enhancement of the mechanism, the lengthy delay of inquiry process in device discovery are discussed in this paper. Algorithm highlighting Bluetooth initialization is designed and explained with consideration of its time consuming that eventually caused power issue. Thus, good compromise between power saving and discovery time is observed in this work while mathematical model and simulation results presented based on modification in its parameters.
ITSO4_T7_2

A Novel Weighting scheme for Efficient Document Indexing and Classification


Bashar Tahayna, Ramesh Kumar Ayyasamy, Siew EuGene, Saadat Alhashmi In this paper we propose and illustrate the effectiveness of a new topic-based document classification method. The proposed method utilizes the Wikipedia, a large scale Web encyclopaedia that has high-quality and huge-scale articles and a category system. Wikipedia is used to perform terms to concept substitution. Then concept weighting scheme is proposed to index the text with the flavour of the traditional tf.idf indexing scheme. Experimental results showed that proposed weighting scheme outperform the traditional the traditional indexing and weighting schemes.
ITSO4_T7_4

Dynamic stable Relay selection in bluetooth scatternet


Sheikh Tahir Bakhsh, Halabi Hasbullah (UTP) Bluetooth is a progressive technology used for mobile adhoc network (MANET) for wireless nodes. Basic network in Bluetooth is called piconet, there could be multiple piconets in Bluetooth that are connected with a common node called relay. Relay plays an important role in the network, because it uses different hopping pattern for different piconets. Relay node has extra responsibility, which is forward data from one piconet to other. The mobility and degree of relay node affects the performance of the network. The problem in ad-hoc network is the node stability and reliability. As in Bluetooth all the communication is synchronized so relay has to switch for communication into different networks, most frequent movement of relay increase control overhead in the network. The mechanism for selection of relay should be simple and effective. A stable node should be selected as relay that increases the reliability and stability of the network. In this paper we

Decreasing Packet Loss for Qos sensitive IP Traffic in Diffserv Enabled Network using MPLs TE
Muhammad Tanvir, Abas M. Said More telecommunication services are using Internet as single network for voice, video and data transmission. Quality of Service guarantee is necessary for such transmission over the internet backbone. Internet is not a simple best-effort network only for web traffic anymore. It is generally understood that present internet best-effort infrastructure is not sufficient to provide QoS-guaranteed services. DiffServ is developed to classify internet traffic into different classes, where each class has predefined QoS parameters. DiffServ can be deployed to ensure QoS, but it is unable deliver QoS guarantees for the network as whole. Using MPLS Traffic Engineer we can have the dynamic overview of network resources and so we can route the traffic in the whole network satisfying QoS needs for each
69

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
traffic class, like voice, video, real time etc. In this paper we have demonstrated the usefulness of applying DiffServ and MPLS TE in the network to reduce packet drops for drop sensitive applications keeping the network resources utilization optimized. After application of MPLS TE in a DiffServ enabled network IP backbone we have significantly reduced packet loss.
ITSO4_T7_5

capacity as part of its decision making. The result shows that DACS3 has achieve a better solution for most of the datasets. Applying elitist concept, rearrangement of candidate selection and vehicle capacity as part of its decision making can influence its achievement to reach an optimal distance.
ITSO4_T7_6

suitability factor on the Capacitated Vehicle Routing Problem


Helmi Md Rais, Zulaiha Ali Othman, Abdul Razak Hamdan Finding a good solution for logistics and transportation industries is a continuous effort to maximize the efficiencies especially on problem that relates to the industry such as Vehicle Routing Problem (VRP). One of the most popular solutions is using Ant Colony System (ACS) algorithm. Several versions of ACOs have been proposed which aim to achieve an optimum solution. A new variant of algorithm called DACS3 has been developed which focuses on adding individual ant behavior. It has been applied in CVRP. Therefore, this research aims to improve its solution by applying elitist ant concept, rearrange its selection of candidates and to include current status of vehicle

user Requirements Model for Vehicular Ad hoc Network Applications


Irshad Ahmed Soomro, Halabi Hasbullah, Jamalul-lail Ab Manan
Road accidents have become a common occurrence today. Every year thousands of people die in road accidents, some people are lucky to get away with few scratches and some people tend to suffer serious injuries due to road intersection collision. Vehicular Ad hoc Network (VANET) is a special kind of network that focuses on the safety of users and to reduce the accidents. VANET provides many potential applications that are used to fulfill basic user safety requirements. In this paper, we have proposed the user requirements model, the objective of this model is to describe the relationship with VANET potential applications and the basic users requirements.

ITsO5_T2:
ITSO5_T2_1

16 JuNE 2010 (2.00 PM 4.00 PM) VENuE: 3-01


computer, client at mobile device and server. These components are implemented in order to enable the users to access the system even in the restricted place like a plant, to reduce human errors as well as the time taken to manage pm jobs. Some of the user interfaces of the developed prototype are also presented in the paper to demonstrate the viability of the proposed approach.
ITSO5_T2_3

Design of An Autonomic service Oriented Architecture


Muhammad Agni Catur Bhakti, Azween Abdullah
Service Oriented Architecture (SOA) is a paradigm for organizing and utilizing distributed services as the basic construct to produce the desired results for service consumers. Large and complex computational units can be composed out of the available services. As the complexity and dynamism of the current global network systems grow significantly, the service architecture will also need to grow. It should be capable of autonomously changing its structure and functionality to meet dynamic changes in the requirements and environment with little human intervention. It needs to dynamically (re)organize the interactions between the services due to unpredictable events, such as crashes or network problems, which could cause services unavailability. In this paper, we elaborate the design of an autonomic SOA and implementation model of the autonomic SOA in computational engineering framework as a case study. ITSO5_T2_2

A Novel Maxmin Definition to Achieve an Optimum fairness in scheduling Packets over the Internet
Yaser Miaji, Suhaidi Hassan In this paper we analytically propose an alternative approach to achieve better fairness in scheduling mechanisms which could provide better quality of service particularly for real time applications. Our proposal opposes the allocation of the bandwidth which adopted by all previous scheduling mechanisms. It rather adopts the opposition approach by proposing the notion of Maxmin-charge which fairly distributes the congestion. Furthermore, analytical proposition of novel mechanism named as Just Queueing is been demonstrated.
ITSO5_T2_4

Portable Plant Preventive Maintenance Management system


Nazleeni Haron, Mazeyanti Ariffin, Mohd Hilmi Hasan, Siti N. Abdullah This paper presents the requirements, design and prototype implementation of a system for managing preventive maintenance (pm) in an industrial plant. The presented system offers an alternative approach that integrates portability and computerized features into the manual paper-based pm system. The requirements and design were derived based on a study made at one of the industrial plants. The proposed portable system consists of three components namely client at personal
4th International Symposium on Information Technology 70

Quality of service Metrics using generalized Pareto Distribution


Abdelmahamoud Youssouf Dahab, Halabi Hasbullah Computer networks are becoming an important aspect of our life. More users are competing for limited resources; degradation in the quality of service is thus unavoidable. Proper modeling of bursts and serious deterioration is important. We model network traffic bursts using generalized Pareto distribution.
a conference of World Engineering, Science & Technology Congress

ABSTRACTS
This method is based on the extreme value theory. We simulated external and collected internal network traffic traces. We found that GPD models these two types of traffic correctly and with clear differences between them. New measures and metrics can be defined out of the GPD modeling to be included in the service level agreement between provider and users. This will have the impact of enhancing in the expected quality of service, especially for mission critical applications.
ITSO5_T2_5

and test cases are presented to confirm and support the power optimization algorithm using frequency scaling and processor affinity with the optimum configuration.
ITSO5_T2_6

Numerical Technique for Robot Path Planning using four Point-Eg Iterative Method
Azali Saudi, Jumat Sulaiman
Path planning is an important issue as it allows a robot to get from start point to goal point. In this work, we attempt to solve robot path planning problem iteratively using numerical technique. It is based on the use of Laplaces Equation to compute potential function in the configuration space of a mobile robot. This paper proposed a block iterative method known as 4 Point-EG for solving robot path planning problem. By employing a finite-difference technique, the experiment shows that it able to generate smooth path between the start and goal points. Furthermore, the simulation results show that 4 PointEG performs faster than the previous method in generating path for mobile robot motion.

Power Optimization in Multi-processor systems


Adrian Siong Min Wee, Sei Ping Lau, Chong Eng Tan (Unimas) In modern computing system, processor technology has evolved tremendously with ever increasing processor frequency and number of processors cores. With better performance, more power is utilized. This research focuses on manipulating processor frequency, taking advantage of frequency scaling feature and combining with processor affinity to optimize power consumption in processors, with the objective to propose a power optimization algorithm. Various test scenarios

ITsO5_T6:
ITSO5_T6_1

16 JuNE 2010 (2.00 PM 4.00 PM) VENuE: 3-05


the truth as the growing numbers of data which are deposited into the database are ever increasing. Hence, searching the database becomes a difficult and time-consuming task instead. Here, the computer scientist can help to organize data in a way that allows biologists to quickly search existing information and to predict new entries. In this study, a decision tree indexing method is presented. This method of indexing can effectively and rapidly retrieve all the similar proteins from a large database for a given protein query. Consequently, it can also be used as a predicted model to predict proteins which have not been determined experimentally. Based on published works using indexing techniques for different applications, the theoretical concept is presented and the decision tree can be adapted for use in indexing databases.
ITSO5_T6_3

MALIM - A New Computational Approach of Malay Morphology


Mohd Yunus Sharum, Muhammad Taufik Abdullah, Md Nasir Sulaiman, Masrah Azrifah Azmi Murad, Zaitul Azma Zainon Hamzah
Malay is categorized as an Austronesian language, a group which also contains Bahasa Indonesia and Tagalog. Quite number of morphological analyzers had been developed for Malay, including based on two-level formalism, stemming/conflation model, or even specific model. The obvious weaknesses are incompleteness and incapability of handling ambiguity which affects the accuracy of analysis. So we introduced a new technique called S-A-P-I to handle them in our analyzer - MALIM. In this paper we describe about MALIM and the empirical study to its usage. Our results proved the use of our technique increased the accuracy of morphological analysis up to 98.99% which covers 99.99% of sample data. Thus we believed this approach is most suitable in handling morphological analysis for Malay. ITSO5_T6_2

semantic based features selection and Weighting Method for Text Classification
Aurangzeb Khan, Baharum Baharudin, Khairullah Khan (UTP) Feature selection and weighting is of vital concern in text classification process which improves the efficiency and accuracy of text classifier. Vector Space Model is used to represent the documents using Bag of Word BOW model with term weighting phenomena. Documents representation through this model has some limitations that are, ignoring term dependencies, structure and ordering of the terms in documents. To overcome this problem, Semantics Base Feature Vector using Part of Speech (POS), is proposed, which is used to extract the concept of terms using WordNet, co-occurring and associated terms. The proposed method is applied on small documents dataset which shows that this method outperforms then term frequency/ inverse document frequency (TF-IDF) with BOW feature selection method for text classification.

Indexing Protein sequence/ structure Databases using Decision Tree: A Preliminary study
Khalid Jaber, Rosni Abdullah and NurAini Abdul Rashid Currently, the size of biological databases has increased significantly with the growing number of users and the rate of queries where some databases are of terabyte size. Hence, there is an increasing need to access databases at the fastest possible rate. Where biologists are concerned, the need is more of a means to fast, scalable and accuracy searching in biological databases. This may seem to be a simple task, given the speed of current available gigabytes processors. However, this is far from

4th International Symposium on Information Technology

71

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITSO5_T6_4

seed-based Region growing study for brain Abnormalities segmentation


Noor Elaiza Abdul Khalid, Shafaf Ibrahim, Mazani Manaf, Umi Kalthum Ngah This paper proposes an empirical study of the efficiency of the Seed-Based Region Growing (SBRG) in segmentation of brain abnormalities. Presently, segmentation poses one of the most challenging problems in medical imaging. Segmentation of Magnetic Resonance Imaging (MRI) images is an important part of brain imaging research. In this paper, we used controlled experimental data as our testing data. The data is designed in such a way that prior knowledge of the size of the abnormalities are known. This is done by cutting various shapes and sizes of various abnormalities and pasting it onto normal brain tissues, where the tissues and the background are divided into different categories. The segmentation was done with twenty data of each category. The knowledge of the size of the abnormalities by the number of pixels were then used as the ground truth to compare with the SBRG segmentation results. The proposed SBRG technique was found to produce potential solutions to the current difficulties in detecting abnormalities in the human brain tissue area.
ITSO5_T6_5

agents based on fuzzy logic. Likewise its predecessors, this paper will take agent negotiation to another height making it more efficient and effective. By efficient and effective, we mean the use of fuzzy logic which allows dealing with ambiguity and the natural approximation of common sense reasoning. To achieve this objective we customized our reasoning model in a way that all the negotiation process follows a unique protocol based on fuzzy logic.
ITSO5_T6_6

Transforming unstructured Query to Mediated Query for structured Retrieval


Keng Hoon Gan, Keat Keong Phang
Recent years, the availability of public accessible structured resources like XML on the web has led to active developments of structural retrieval systems. With these systems, users will be able to query for information from structured resources on the web efficiently. When querying, it is obvious that usage of structural information in query increases the precision of retrieval system. However, general web users are more familiar with unstructured query such as natural language or keywords, which contains no structural information. This motivates us to find a retrieval method that supports querying which is simpler and familiar to user, i.e. unstructured query, but at the same time, does not overlook the usage of structural information in query. Hence, we propose a solution that automatically adds structural information to the unstructured query, and represents it as a Mediated Query. The mediated query is an intermediate query in structured form to bridge the gap of structural differences between unstructured query and structured resources. As the selection of correct structural information that reflects the query context is crucial for better retrieval performance, we develop a method to obtain this information by learning the semantics of a set of terms extracted from structured resources. The semantics of a term is defined by its concept and context. We represent the term and its semantics using the Semantic Prediction Model. The model will be used in reasoning the context of query and the process of creating mediated query. The mediated query is then matched against structured resources to obtain relevant results.

Agent based Negotiation In E-commerce


Moustapha Tahir Automation of negotiation constitutes a key mechanism allowing agents to interact one another autonomously and efficiently to reach mutually beneficial agreement. Nevertheless, building an agent with ability to negotiate autonomously in a given environment is a task of no ease. It compels to agents to acquire the means to resolve their conflicting objectives, correct inconsistencies in their knowledge of other agents worldview, and coordinate a joint approach to main domain tasks for the benefit of all agents concerned. This paper, thus, proposes a comprehensive model of negotiation for interactions between

ITsO6_T2:
ITSO6_T2_1

16 JuNE 2010 (4.20 PM 6.00 PM) VENuE: 3-02


ITSO6_T2_2

Traceability in Agri-food sector using RfID


Arun Nambiar
Traceability is an integral requirement in the agri-food sector especially due to the perishable nature of food and the potential for health risks through transmission of bacteria. There are various traceability systems that allow companies to keep track of their products both upstream and downstream.Radio Frequency Identification (RFID) is one such technology that facilitates easy and automatic data collection. With the proliferation of traceability systems using different technologies, it becomes imperative for these systems to be able to interact with one another and be integrated into the companys existing information infrastructure. This work aims to review the current research in this field with special emphasis on RFID systems. We also seek to identify future areas of research in this field.

Decision Making using fuzzy Logic for stock Trading


Shuhadah Othman, Etienne Schneider This paper presents the use of fuzzy if-then rules for a decision support system in stock trading. The three following linguistic variables well be the input for the rule : view from the expert, earning per-share and price to earnings ratio. The purpose of this rule is to assist investors making a decision on their shares. The investors need to make a right decision to gain a high profit in stock trading. Stock market is a complex environment. Therefore by using this Artificial Intelligence (AI) application which is Fuzzy Logic (FL) can make it simpler as well as giving benefits to investors. Most of the earlier research works show that FL can work within stocks environment.

4th International Symposium on Information Technology

72

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITSO6_T2_3 ITSO6_T2_4

Evaluating Neural Network Intrusion Detection Approaches using Analytic hierarchy Process
Iftikhar Ahmad, Azween Abdullah, Abdullah S Alghamdi At present age, security in computer and network systems is a pressing concern because a solo attack may cause an immense destruction in computer and network systems. Various intrusion detection approaches be present to resolve this serious issue but the dilemma is which one is more appropriate in the field of intrusion. Therefore, in this paper, we evaluated and compared different neural network (NN) approaches to intrusion detection. This work describes the concepts, tool and methodology being used for assay of different NN intrusion detection approaches using Analytic Hierarchy Process (AHP). Further, conclusion on results is made and direction for future works is presented. The outcome of this work may help and guide the security implementers in two possible ways, either by using the results directly obtained in this paper or by extracting the results using similar mechanism but on different intrusion detection systems or approaches.

Moving Towards Two Dimensional Passwords


Sohail Safdar, Mohd Fadzil Hassan The main objective of the research is to specify two dimensional passwords that can possess much more strength as compared to linear passwords. These passwords are strong enough to provide effective and secure authentication under certain alarming situations. The alarming situations are the situations where the possibility to breach the system security exists. The specification of the two dimensional nxn passwords has been provided based on NIST standards. The strength of nxn password has been calculated that has proven to be much more as compared to the linear passwords. It is proposed that these passwords should be used under alarming situations such as the protection requirement for some critical resource, special authentication when the system is in unsafe state or protection of sensitive data. Therefore it has been recommended to move from linear passwords to the passwords defined in two dimensional space, whenever some alarming situation arises.

ITsO6_T6:
ITSO6_T6_1

16 JuNE 2010 (4.20 PM 6.00 PM) VENuE: 3-06


achieve such requirement, a routing protocol that is capable of reducing packet loss which results in fast message dissemination and reduced redundancy must be utilized. Combined method of location-based and time reservation-based with the aid of Global Positioning System (GPS) of neighboring nodes to minimize duplicate retransmissions in VAET is proposed and opposite direction nodes are used to relay emergency packets to intended recipients by using multi-hop routing method. The routing algorithm is mathematically tested for packet forwarding between two nodes and results prove that the equation is reliable to help reduce redundancy hence lead to fast and assured message delivery.
ITSO6_T6_3

A survey of simulators, Emulators and Testbeds for Wireless sensor Networks


Muhammad Imran, Abas Md Said, Halabi Hasbullah
Simulators, emulators and testbeds are invaluable tools for performance evaluation of algorithms and protocols in wireless sensor networks (WSNs). It is extremely difficult to choose an appropriate tool for performance testing without the horizontal and vertical analysis of existing tools. This paper presents a survey of thirty five performance evaluation tools for WSNs. Unlike most other studies, tools were selected based on their popularity, support for WSNs, active maintenance and the help available. On the horizontal dimension, prominent competitors at each stage were selected. For vertical analysis, tools for simulation, emulation and testbeds were categorized accordingly. We believe that this survey will aid researchers, application and tool developers while selecting an appropriate tool for their implementation. We have highlighted an open research issue to have an integrated tool that supports modeling, simulation, emulation and testbed implementation for algorithm validation, performance evaluation and proof-of-concept implementation in WSNs. ITSO6_T6_2

Multilayer Packet Tagging for Network behaviour Analysis


Maznan Deraman, Jalil Md Desa, Zulaiha Ali Othman Network behaviour analysis (NBA) is a system that analyses the network data stream or packets characteristics. NBA commonly associated with network intrusion detection and prevention system (IDS/IPS), as the mechanism used in NBA is well known for its capability to discover the hidden information in network packets. Among popular methods empowered the NBA is misuse detection and anomaly detection techniques. Misuse detection is suitable for known attacks that already have list of actions to be taken based on historical events from past attacks. However, misuse detection is inefficient to deal with zero-day type of attack. This paper describes the concept of multilayer packet tagging approach that is possible to compliment the weaknesses found in misuse detection techniques in NBA system.

strategy for Efficient Routing in VANET


Nur Diana Mohd. Nuri, Halabi Hasbullah Flooding is a commonly used technique to transmit packets of data from a source to one or multiple destinations over a network topology of VAET. However, simple flooding in VAETs may cause problems such as redundancy, collision and medium contention. This paper proposes to apply a strategy for efficient flooding in VAET in various networks. An emergency warning message on accidents that occurred about 5 kilometers ahead is sent to prevent vehicles from bumping into bad traffic congestions resulted from the unawareness of traffic conditions that could consume long hours of delay. To
4th International Symposium on Information Technology 73

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITSO6_T6_4 quality for the merged sensor information. One essential requirement for any kind of scheduling scheme is a synchronised time base in the entire network topology. In order to define capable measurement schemes for any kind of available sensor node hardware, lightweight synchronisation concepts are necessary. In this paper we present a scheduling concept for distributed, resource-limited sensor networks based on a capable time synchronisation approach. The concepts operate on the application layer and enable application-specific, energy-efficient sensor measurement schemes. For proof of concept, the approaches were implemented on a sensor node hardware platform. Several test scenarios evaluate the feasibility and clarify an excellent usability in wireless sensor network environments.

A Capable, high-Level scheduling Concept for Application-specific Wireless sensor Networks


Matthias Vodel, Mirko Lippmann, Mirko Caspar, Wolfram Hardt The primary objective of wireless sensor networks is the monitoring of a system or area by measuring different kinds of sensor data. Dependent on the application scenario, a specific measurement scheduling scheme is preferred. Based on this scheduling, an optimisation of the available energy resources in each sensor node and accordingly in the whole network topology is possible. At the same time, an application-specific synchronisation of the measurement points ensures a maximum

ITsO6_T7:
ITSO6_T7_1

16 JuNE 2010 (4.20 PM 6.00 PM) VENuE: 3-10


ITSO6_T7_2

using Change Tracking Component to Manage Object-Oriented Driven user Interface Layout Management system
Liang Ying Oh, Tong Ming Lim
User Interfaces (UI) layout design is one of the most important part of any software requirement activities. User interfaces (UI) emerged as an essential accomplice in fulfilling the potential of an application. Layout design of UI screens has always been very expensive and time consuming activities. However, owing to the ad-hoc nature of UI design process coupled with user involvement throughout the process have inevitably surfaced in the UI construction and management phases. This includes the amount of effort involved in fulfilling multiple user requirements which in turn lead to the generation of a large number of screen layout designs with numerous similarities among them. Taking into considerations on the amount of effort required in maintaining masses of UI layouts with plentiful commonalities, this paper focuses on the integration of an object-oriented approach towards UI layout design along with an evolution tracking system to address the issues projected. Cases were used at the end of this paper to evaluate the effectiveness and accomplishments of the proposed approach so that future research work could be planned.

An Improved Traditional Worm Attack Pattern


Robiah Y., Siti Rahayu S., Shahrin Sahib, Mohd Zaki M., Faizal M.A., Marliza R. The significant threats of traditional worms such as Blaster, Sasser, Code Red and Slammer are still continuing due to their hasty spreading nature on the internet. The worms attack pattern from three different scenarios have been extracted from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern are further analyzed to form the general worms attack pattern which describes the process of worms infection. This paper proposes a general attack pattern for worm in three different perspectives which is attacker, victim and victim/attacker or multi-step attack using only Blaster variant. Thus, the general attack pattern can be extended into research areas in alert correlation and computer forensic investigation.
ITSO6_T7_3

Architecture seMeja Desktop system


Sufian Idris, Marini Abu Bakar, Zarina Shukur seMeja desktop system is a desktop environment that is specifically designed for college students. Basically, the desktop is built on top of Linux operating system. The desktop will have its own GUI, application software and push technology. In order to have that, the architecture of the system should be solid enough to show the internal communication within the Netbook environment as well as between the cloud server.

ITsO7_T2:
ITSO7_T2_1

17 JuNE 2010 (10.50 AM 12.50 PM) VENuE: 3-01


with the objective to provide Foundation students of Universiti Teknologi PETRONAS (U.T.P.) with an adequate and informative literature learning material in an interactive approach. Before this, the learning process of English literature is only being done inside the classroom with large number of students being placed at one time. The teaching method has not only making the students feel uncomfortable with the learning environment, but also discouraged them from learning the literature effectively. Adding to the problem is the lack of references and reading materials. For that, the web portal aims
74

Incorporation of Multimedia Approaches to Literature Online via E-learning for foundation Level Literature Courses: The Case of a Private Institution of higher Learning in Malaysia
Nur Athirah Radzi, Subarna Sivapalan, Wan Fatimah Wan Ahmad, Azrai Hj Abdullah Literature Online via E-learning (L.O.V.E.) is a web portal
4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
to provide them with an interactive way of learning English literature by incorporating multimedia features together with the syllabus. For this project; modified waterfall model has been used as a methodology of the L.O.V.E. portal; with 5 steps of requirement analysis, design, implementation, testing and maintenance. The major areas of focus in the methodology are the analysis and product development (implementation); since the result of the final product will be reflected from what had been worked on these two phases. A survey had been done in the UTP campus to identify problems of the original method, and find better solutions to students in the future. The completed portal will contain lecture materials, students forum, lecturers teaching video, clips of drama scenes, and quizzes. It would stimulate an improvement in learning literature that had been considered as the boring subject if there is an online, multimedia application created for the benefit of learning English literature. L.O.V.E portal would benefit the students in term of the way they learn and interact with each other on the literature subject, apart from learning the theoretical aspects in the classroom. It would allow them to express their thoughts and feelings in a different way, thus maximizing potential and possibilities of excelling in literature in English.
ITSO7_T2_2

The ultimate objective of this work is to determine the net result of the optimal path selection when the all these parameters are combined together as logical unit. We want to determine whether and how paths are selected and what changes take place with the mobility of the nodes. Finally the results show that our approach of selecting the optimal path proves better in terms of data delivery from a given sender to the receiver.
ITSO7_T2_4

The Importance of TALIb sysTEM using Computer Controlled for Visual Impaired Community
Muhamad Lazim Talib, Norshahriah Wahab, Muslihah Wook This paper presents the advantages and importance of the information technology to the visual impaired community to transform the knowledge from normal text document to the Braille document. Based on the architecture of modified manual brailler controlled via computer, all normal text documents will be translated to Braille printed documents are will be discussed in this paper. The algorithm designed named Translating alphabet in Braille (TALIB) will conduct all translation process for this platform. The result is the use of Perkins Brailler to join with computer to emboss the Braille document easily through electronic part.
ITSO7_T2_5

Developing a simulation game to facilitate the Acquisition and Transfer of Road safety knowledge
Mazeyanti Ariffin, Alan G. Downe, Irzan Ashraf Abd Aziz Concern over the risk of fatality and injury among children has focused attention on resources for effecting the transfer of safety knowledge. This paper reports on the development of a simulation game, RoadsTrain, designed to transfer knowledge about safe pedestrian behaviour to school children aged 7 to 12. The paper compares current modes of safety learning to game-based approaches and identifies areas for future research and innovation.
ITSO7_T2_3

forecasting Method selection using ANOVA and Duncan Multiple Range Tests on Time series Dataset
Adhistya Erna Permanasari, Dayang Rohaya Awang Rambli, P. Dhanapal Durai Dominic Selection of a suitable forecasting technique is of prime importance in order to obtain a better prediction result. This paper demonstrated the use of two statistical approaches namely, Analysis of Variance (ANOVA) and Duncan multiple range tests for determining the performance of different forecasting methods. Three forecasting methods were chosen and compared: regression, decomposition, and ARIMA. Data from monthly incidence of Salmonellosis in US from 1993 to 2006 was collected and used for technical analysis. ANOVA was initially used to identify significant difference between the actual data and three forecasting methods. Based on the results from ANOVA, selection of appropriate method was conducted using Duncan multiple range tests. The results showed that both regression and ARIMA could be used in the Salmonellosis data. On the contrary, decomposition method yielded the least performance and is not suitable for being applied on the available dataset.
ITSO7_T2_6

Optimal Path Selection in Bluetooth Scatternet Based on Fuzzy Set


Masood Ur Rehman, Halabi Hasbullah Mobile ad-hoc networks study is based on simulations as well as the fundamental and necessary simplified assumptions of physical reality. Testing the simulations for various protocols in a practical environment shows how theories can be authenticated in practice. This also helps to identify the problems that the ad-hoc network users and developers face. Testing adhoc network implementations, however, also presents a number of challenges. Our approach is to build a mathematical model that can be used to simulate and test the path selection, optimal path selection from plentiful paths available from a source to the destination in Bluetooth Scatternets. We are interested in optimal path selection and its analysis in Bluetooth Scatternet routing with respect to some key parameters. The key parameter include number of intermediate hops, battery power of individual Bluetooth enabled nodes and link stability of all routes in the Bluetooth Scatternet from source to destination.

A New Delayed ACk strategy for TCP Multi-hop Wireless Networks


Ammar Mohammed Al-Jubari, Mohamed Othman
In multi-hop wireless networks, TCP suffers from Performance deterioration due to poor wireless channel characteristics. Earlier studies have shown that the small TCP ACK packets consume wireless

4th International Symposium on Information Technology

75

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
resources as much as the long Data packets. Moreover, generating acknowledgement for each data packet reduces TCP throughput. The main factor affecting the TCP performance in multi-hop wireless networks is the contention and collision between ACK and data packets caused ACKs using the delayed acknowledgment option defined in IETF RFC 1122 will improve TCP throughout. On the other hand, the large cumulative ACKs will induce packet loss. Motivated by this understanding, we propose an adaptive delay ACK algorithm for our strategy can improve TCP throughput up to 233% compared to the regular TCP.

ITsO7_T7:
ITSO7_T7_1

17 JuNE 2010 (10.50 AM 12.50 PM) VENuE: 3-06


on the construction and maintenance of traditional schools. This research work is introducing a new management system to improve the evaluation of homeschooling examinations. The new system shows better exams results and diagnoses of student feedback. The study aims to exploring the prospects of implementing the Intelligent Tutoring Systems - ITS in Libya and integrating ITS into the Libyan system of homeschooling program.
ITSO7_T7_4

Network Analyzer Development Comparison with Independent Data and benchmark Products: Network Traffic utilization
Mohd Nazri Ismail, Abdullah Mohd Zin This paper presents a complete network analyzer development for heterogeneous services in campus environment. The purpose of this study is to define the accuracy of network analyzer development with independent data, real network and OPNET simulation tool. This network analyzer software will test based on traffic and utilization performance. The reliability of this network analyzer will test with web service. The results show that network analyzer software has accuracy and same trend with independent data, real network and OPNET simulation tool. Finally, this software is able to measure the network resources during preparation, proposal and planning phases.
ITSO7_T7_2

sociability Aspects in e-health Community: A Review


Nor Athiyah Abdullah, Nasriah Zakaria Online communities are all about social interaction. There are places for support, entertainment, information, knowledge sharing and even a way to interact with millions of people all over the world. An e-health community serves as a medium for patients and survivors to support each other and to improve their lives as patients need more emotional support to struggle with their disease. Technical accuracy alone is not enough to make online communities successful -they must also focus on the social aspects. Previous studies have highlighted the role of sociability in many research areas. This paper will discuss social software narrowing to online communities; summarize the sociability aspects that have been applied in various research areas and particularly in the e-health community
ITSO7_T7_5

haptic Texture search Engine framework


Waskito Adi, Suziah Sulaiman Computer haptics (CH) and computer vison (CV) are two popular research areas among researchers. Despite their increasing in popularity, little has been reported on integrating both techniques in CV into CH. At present, researchers mainly work on either CH or CV topics, separately. Combining these two areas may benefit information retrieval as the existence of haptic information could enhance a particular search. This paper describes how both CV and CH could be applied into our proposed search engine framework for searching fabric textures. The framework developed involves a computer vision algorithm and a haptic rendering algorithm. Based on our experiments that include searching algorithm and haptic rendering, the result shows that computer vision algorithm can be applied into and suitable for generating haptic textures. This leads towards obtaining a haptic texture search engine that enables cloth searching not only visually but also haptically.
ITSO7_T7_3

briefly Introduced and Comparatively Analysed: Agile sD, Component-based sE, Aspect-Oriented sD and Mashups
Ali Seyfi, Ahmed Patel
This paper compares Agile Methods, Component- Based SE, AspectOriented SD, and Mashups as the latest four software development methods. These different approaches depend very heavily on the application domain. The comparison accordingly gives a brief review of these four methodologies, taking their definition, characteristics, advantages and disadvantages into consideration and generating a conceptual mind-map and preparing the foundation to assist in formulating and designing a new integrated software development approach and supportive techniques. It is a basis to initiate new research in the software engineering subject field

On-Line homeschooling Learning Management system using Intelligent Tutoring system


Abdurazzaq A. Aburas, Rehab Shreef Homeschooling is an effective tool for overcoming hinders and barriers that constrain the ability of a societys educational system to cover and reach students (or potential students) whom are living in suburban or distant areas. Currently, homeschooling is considered one of new type of education and increasingly important of less expensive type of study, especially for developing countries. Homeschooling can help societies attain better educational levels without having to spend huge funds
4th International Symposium on Information Technology 76

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITsP2:
ITSP2_ 1

16 JuNE 2010 (8.30 AM 12.00 PM) VENuE: fOyER


however the challenge remains to select the best of them in term of accuracy and efficiency performance. This paper presents a comparison between feed-forward back-propagation and radial basis ANN base on their performance. The comparison is performed using a Monte Carlo study that involves the following problems: addition, multiplication, division, powers and a production function. The result indicates that the proposed radial basis ANN results are significantly better than proposed feed-forward back-propagation ANN results for all five problems.
ITSP2_4

statistical Analysis for the key Representation Database and the Original Database
Asim Elshiekh, P. D. D. Dominic A statistical database (SDB) is a database that allows its users to retrieve aggregate statistics (such as sum, average, count, etc) on subsets of records, and data in individual records should be remained secret. The key representation auditing scheme (KR AS) is proposed to protect the privacy of online and dynamic SDBs. The core idea is to convert the original database into key representation database (KRDB), also this scheme involves converting each new user query from string representation into key representation query (KRQ), and stores it in the Audit Query table (AQ table). Three audit stages are proposed to repel the attacks of the snooper to the confidentiality of the individuals. In this paper, we provide statistical analysis to compare between the means and variances of the original database and the KRDB populations. We test the null hypothesis, that there will be no significant difference between the two populations means/variances, against the alternative hypothesis, that there will be a significant difference between the two populations means/variances. The results of the tests showed that the differences are statistically significant.
ITSP2_ 2

A Multidimensional search space using Interactive genetic Algorithm


Humera Farooq, M. Nordin Zakaria, Mohd Fadzil Hassan, Suziah Sulaiman This paper applied an Interactive Genetic Algorithm (IGA) technique to design an visualization environment for search space. In past IGA works with a small size of population and generations to prevent the user fatigue, in this way small search space is used for evolving solutions. The proposed work is based on the use of objective function for assigning fitness, visualization of multidimensional search space and interaction of user after several generations. The interaction of user only required for proposing genes values at different locations of particular generation. In our proposed method, the multidimensional data of each generation is represented as 2-D graphs. The selection and interaction of interesting part of search space helps to generate more potential solutions. For experiment, we have selected Parametric L-System, in which both symbols and numerical parameters are evolved using Genetic Algorithm (GA). The output of this visualization helps to generate random strings and parameters, which are used to construct rules for Parametric L-System. Since Parametric L-System is involved, 2 Layered GA is introduced in which upper layer evolved symbols and lower layer evolved parameters.
ITSP2_ 5

Query Translation Architecture for MalayEnglish Cross-Language Information Retrieval system


Nurjannaton Hidayah Rais, Muhamad Taufik Abdullah, Rabiah Abdul Kadir This paper discusses research on query translation events in Malay-English Cross-Language Information Retrieval (CLIR) system. We assume that by improving query translation accuracy, we can improve the information retrieval performance. The dictionary-based CLIR system facing three (3) main problems: (1) translation ambiguity; (2) compound and phrase handling and (3) proper names translation. The use of natural language processing (NLP) techniques, such as stemming, Part-ofSpeech (POS) tagging is useful in query translation process. Hence, n-gram matching technique has successfully applied to information retrieval (IR) system for phrases and proper names translation. The proposed query translation architecture is useful in CLIR system as well as search engine application.
ITSP2_3

Enhanced Performance of Packet Transmission using system Model Over VoIP Network
Kashif Nisar, Abas Md Said, Halabi Hasbullah Transmission of multimedia data in Voice over Internet Protocol (VoIP) network is challenging. The issues of packet loss, delay, jitter etc highly degrades the performance VoIP network. They require more robust techniques to provide a better level of service quality. One of the crucial parameter to measure its service quality is packet loss. In this paper, we have analyzed the impact of packet loss in VoIP that can corrupt the voice application. The objective of this paper is to analyze the impact of packet loss and identify proper codec techniques for VoIP traffic. We have used a packet analyzer tool (wireshark) to analyze the voice traffic. We have come to the conclusion that wireshark can serve as an effective tool for packet loss analysis. It helps us in identifying proper Codec technique that should be used for enhanced performance in VoIP network.

A comparison of feed-forward backpropagation and radial basis artificial neural networks: A Monte Carlo study
Osman Ahmed Abdalla, M. Nordin Zakaria, Suziah Sulaiman, Wan Fatimah Wan Ahmad Interest in soft computing techniques, such as artificial neural networks (ANN) is growing rapidly. Feed-forward backpropagation and radial basis ANN are the most often used applications in this regard. They have been utilized to solve a number of real problems, although they gained a wide use,
4th International Symposium on Information Technology 77

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITSP2_6

Temporary Cluster based Routing for underwater Wireless sensor Networks


Muhammad Ayaz, Azween Abdullah, Low Tang Jung During the last couple of decades Underwater Wireless Sensor Networks (UWSN) have attracted more attention for ocean monitoring systems. Due to adverse environment, UWSN face many problems like bandwidth limitations, high error probability, node movements and 3-dimensional space, and with such challenges, we need a robust and scalable architecture for providing a self configuring network of distributed nodes. In order to handle the problem of large propagation delays and unreliable link quality, many authors proposed multi-hop data delivery routing schemes. But, such multi-hop routing protocols drain more energy of the nodes near the sink. In this paper, we proposed a Temporary Cluster Based Routing protocol, which not only make use of equal energy consumption for all the nodes throughout the network but also it helps to save energy, as it prefer to send the sensed data over short distances. Moreover, it does not require any location information of sensor nodes and only a small number of nodes are involved during the end to end routing process. This makes it suitable not only for stationary and mobile networks but for the hybrid networks as well.
ITSP2_ 7

demand for automated human identification include finger, face, hand, iris, and other identifiers. Therefore, this paper reviews the system based on finger vein leads towards authentication of an individual. This system capture image of finger vein by shining a near-infrared light, then some image processing is done on vein image and finally trained Back propagation Neural Network (BPN) verify whether the person is authorized.
ITSP2_9

Climate control and Monitoring with Wireless sensor Network: A Case study
Asfandyar Khan, Azween Abdullah, Nurul Hasan Climate control and monitoring is one of the promising area of wireless sensor networks. This paper describes the development of a system for controlling different climate control variables. Several measurement points are required to trace down the local climate parameters to make the system work properly. In this paper we have consider different control variables, which are air temperature, CO2 concentration, soil temperature, light intensity, air humidity and crop temperature. The system are able to stored both event based data and automatic data. LabVIEW software is used for the development of this system.
ITSP2_10

Trust Challenges and Issues of E-government: E-Tax Prospective


Dinara Berdykhanova, Ali Dehghantanha, Kumaresh, Hariraj This paper discusses trust issues and challenges have been encountered by e-government developers during the process of adoption of online public services. Despite of the apparent benefits as online services immediacy and saving costs, the rate of adoption of e-government is globally below experts expectations. A concern about e-government adoption is extended to trust issues which are inhibiting a citizens acceptance of online public sector services or engagement with e-government initiates. A citizens decision to use online systems is influenced by their willingness to trust the environment and to the agency is involved. Trust makes citizens comfortable sharing personal information and making online government transaction. Therefore, trust is a significant notion that should be critically investigated in context of different ETaxation models as part of E-Government initiatives. This research is proposing the implementation of Trusted Platform Module as a solution for achieving the high level of citizens trust in e-taxation.
ITSP2_8

A New framework to Extract WordNet Lexicographer files for semi-formal Notation: A Preliminary study
Noor Maizura Mohamad Noor, Noraida Ali, Noor Syakirah Ibrahim Despite its original use, which was very different, WordNet is used and used today as ontology. WordNet has a complex concepts concerning specific knowledge on semantic domain. The main objective is to analyze and recognize the most suitable and easier method for extracting WordNet lexicographer files which is very useful in developing the propose framework. In this paper, we describe the methodologies of this research. They are information binding, WordNet forensic, case analysis and method analysis. Some benefits are expected from this study are the development of framework for extracting WordNet lexicographer files for semi-formal notation, the development of middleware for extracting WordNet lexicographer files, the creation of own database for storing extracted lexicographer files from WordNet. The proposed framework will make WordNet efficiently exploitable in several applications.
ITSP2_11

Review on finger Vein Authentication system by Applying Neural Network


Azadeh Noori Hoshyar, Riza Sulaiman Biometric technologies are automated methods for recognizing individuals based on biological and behavioral characteristics. Establishing human identity, reliably and conveniently has become a major challenge for a modern-day society. Biometric technologies developed in response to the growing worldwide
4th International Symposium on Information Technology 78

Development of a Manufacturing Industry success Rate Analyzer using Data Mining Technique
Eliza Mazmee Mazlan, Rohiza Ahmad, Rozana Kasbon Starting up new businesses can be resource consuming. There are risks involved whenever new businesses are to be set up. This paper presents the development of a success rate analyzer to calculate the successful rate of setting up new manufacturing businesses particularly in Perak, Malaysia. Demographic data of Perak population is used and the data undergoes data mining process using the clustering technique and linear regression
a conference of World Engineering, Science & Technology Congress

ABSTRACTS
methods in analyzing the success rate of a manufacturing industry in Perak. With the result given by the application, new entrepreneurs can decide suitable location/district to set up the manufacturing business.
ITSP2_ 12

the inconsistent requirements detection is helps stakeholders and requirements analysts improve their effort in requirements conflicts detection, 2) to improve the understanding of what inconsistent requirements are detected during elicitation helps stakeholders improve the awareness of requirements conflicts.
ITSP2_14

sentiment Classification of Customer Reviews based on fuzzy logic


Samaneh Nadali, Masrah Azrifah Azmi Murad, Rabiah Abdul Kadir Nowadays, e-commerce is growing fast, so product reviews have grown rapidly on the web. The large number of reviews makes it difficult for manufacturers or businesses to automatically classify them into different semantic orientations (positive, negative, and neutral). Most existing method utilize a list of opinion words for sentiment classification .whereas ,this paper propose a fuzzy logic model to perform semantic classifications of customers review into the following sub-classes: very weak, weak, moderate, very strong and strong by combinations adjective, adverb and verb to increase holistic the accuracy of lexicon approach. Fuzzy logic, unlike statistical data mining techniques, not only allows using non-numerical values also introduces the notion of linguistic variables. Using linguistic terms and variables will result in a more human oriented querying process.
ITSP2_ 13

The Development of hash Indexing Technique in Case Retrieval


Mohamad Farhan Mohamad Mohsin; Maznie Manaf; Norita Md Norwawi; Mohd Helmy Abd Wahab Case-based reasoning (CBR) considers previous experience in form of cases to overcome new problems. It requires many solved cases in case base in order to produce a quality decision. Todays database technology allows CBR to own a huge case storage thus the case retrieval process in CBR also needs to handle the larger capacity. Traditionally, sequential indexing method has been applied to search for possible cases in case base. This technique works well for small number of cases but it consumes more time to retrieve when the case base is huge. Therefore, this study explore a nonsequential indexing called hashing as an alternative to cater large cases resulting faster retrieval time in CBR. Hash indexing searches only records determine by the index computed based on entrys search key without the need to traverse through all records. This paper presents the initial work of the integration of hash indexing method in CBR. The concept of hash indexing in case retrieving process, the model development, and the preliminary algorithm testing result is discussed in this paper.
ITSP2_ 15

using Multi-Coordinated Views with Agent Communication Protocol to Detect and Resolve Inconsistent Requirements to Improve Accuracy
Tan Lai Heng, Lim Tong Ming (Sunway University College) There are few challenges with eliciting requirements from stakeholders. Firstly, inconsistent requirements are usually not realized by stakeholders at the point of requirement specification compilation. Secondly, existing inconsistency checking techniques are usually mathematically or formally validated in a non-collaborative environment which is less practical and not productive for multiple stakeholders. In this research, a proposed requirements conflict detection and resolution solution is provided. The requirements from multiple stakeholders are captured as views on the functional requirements of a business domain using a proposed Semi-formal Ontology Driven Domain-Specific Requirements Specification Language. The proposed language will capture other relevant requirements includes domain, actors, relationships, processes, condition, and data fields to enable consistency checking. The proposed solution enables proper consistency checking in two ways: 1) Inter-Check (check within captured ontology), and 2) IntraCheck (check among stakeholders views) so that stakeholders can resolve detected conflicts collaboratively through Agent Communication Protocol. Lab test will be conducted with a selected group of novice users to measure the learning curve (hours) for adopting the proposed solution as well as the accuracy and the consistency. A few set of requirements will be given to the group of selected users and a prototype for proposed solution will be produced. The values of this research are: 1) to improve the understanding of how much accuracy
4th International Symposium on Information Technology

Conceptual Architecture Design and Configuration of Thin Client system for schools in Malaysia: A Pilot Project
Abdul Rahman Ahlan, Yusri Arshad, Murni Mahmud Thin client systems have advanced recently with new innovative design extensions such as virtualisation and cloud computing. Client-server architecture is the basis for thin client system to connect remote multi-workstations to administrative servers located in headquarters or data center. This paper first presents a literature review on thin client concept and virtualization. In the next section, we describe the Wyse Technology and Linux thin client for windows-based and open source solution respectively. We then proceed with description of proposed conceptual architecture design and implementation for primary and secondary schools in Malaysia taking into account International Telecommunication Union and other International standards or benchmarks for high quality of service (QoS) delivery. Finally, our recommendation is that each system design and implementation is unique and thus requires different sets of decision-making criteria before designing an architecture. Networked-schools across a country like Malaysia with heavy users requirements pose high specification in architecture and system design planning to IT divisions.

79

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITSP2_ 16 ITSP2_17

Evaluation of Theoretical Isotope generator as Alternative for Isotope Pattern Calculator


K. Massila, K.C. Soong, I. Nor Haslinda As to obtain whichever related information about the molecular formula, there are numerous of mass spectrometry applications accessible either web-based or windows-based systems as to calculate the isotope patterns. Additionally, most of the applications are capable to display the mass spectrum as to gain related information on molecules and the particular relative intensity. We have developed TIG as an alternative towards isotope pattern calculator, reinforcing the concept of calculating isotope pattern by using the Cartesian Products. In this paper, we provide an evaluation result for the isotope pattern calculator; Theoretical Isotope Generator (TIG). It is also shown from the evaluation that TIG provides an insight of the related field as well as what should be possessed to be an ideal isotope pattern calculator principally for educational purposes.

An Extension To Mobile IPv6 Micro-Mobility Management


Zulkeflee Kusin, Mohamad Shanudin Zakaria A Mobile IPv6 (MIPv6) supports mobility and takes advantage of the new design in IPv6 by allowing a mobile node move to another location without changing the mobile nodes home address. A Hierarchical Mobile IPv6 (HMIPv6) was designed to enhanced mobility problem in MIPv6. The key concept behind HMIPv6 is to locally handle handovers by the usage of an entity called Mobility Anchor Point (MAP) located at any level in a hierarchical network of routers to support micromobility management. The major issue on HMIPv6 is to design the MAP selection scheme that can reduce frequent Binding Update process and improve handover performance. This paper discussed and reviewed the extension of HMIPv6 in term of Local Binding Update, MAP Discovery and MAP selection scheme.

sOfTWARE DEVELOPMENT & APPLICATION ITsO1_T3: 15 JuNE 2010 (2.00 PM 4.00 PM) VENuE: 3-03
ITSO1_T3_1

Issues with flexibility: A Reason for not using Online Reservation systems
Arif Mushtaq, Suziah Sulaiman, Jrn Loviscach
In the discipline of systems engineering, the flexibilityof a system is considered its ability to respond to change. However, Transaction Processing Systems (TPS) are left to be inflexible up to a certain extent to avoid non-standard operations. This leads to the dilemma that incorporation of more Functional Requirements (FR) into TPS could cause systems to become more inflexible, which in turn could affect the usage of, for instance, online airline reservation systems. We conducted a survey in order to examine the physiological, cognitive, social experiences and perceptions of a selected group of people who have booked their tickets either through travel agents or through online reservation systems. The findings indicate that flexibility has a significant impact on the perceived usability of online reservation systems, much more than functional requirements. ITSO1_T3_2

computation. At the same time, it also reduces some iteration that is involved in LUC Cryptosystem computation.
ITS_O1_T3_3

Establishing A Defect Prediction Model using A Combination of Product Metrics As Predictors Via six sigma Methodology
Muhammad Dhiauddin Mohamed Suffian, Mohamed Redzuan Abdullah
Defect prediction is an important aspect of the Product Development Life Cycle. The rationale in knowing predicted number of functional defects earlier on in the lifecycle, rather than to just find as many defects as possible during testing phase is to determine when to stop testing and ensure all the in-phase defects have been found in-phase before a product is delivered to the intended end user. It also ensures that wider test coverage is put in place to discover the predicted defects. This research is aimed to achieve zero known post release defects of the software delivered to the end user by MIMOS Berhad. To achieve the target, the research effort focuses on establishing a test defect prediction model using Design for Six Sigma methodology in a controlled environment where all the factors contributing to the defects of the product is within MIMOS Berhad. It identifies the requirements for the prediction model and how the model can benefit them. It also outlines the possible predictors associated with defect discovery in the testing phase. Analysis of the repeatability and capability of test engineers in finding defects are demonstrated. This research also describes the process of identifying characteristics of data that need to be collected and how to obtain them. Relationship of customer needs with the technical requirements of the proposed model is then clearly analyzed and explained. Finally, the proposed test defect prediction model is demonstrated via multiple regression analysis. This is achieved by incorporating testing metrics and development-related metrics as the predictors. The achievement of the whole research effort

Computation of Cryptosystem based on Lucas functions using Addition Chain


Zulkarnain Md Ali, Mohamed Othman, Mohd Rushdan Muhd Said, Md Nasir Sulaiman Cryptosystem based on Lucas Functions is known as LUC Cryptosystem. Lucas Functions are the special form of secondorder linear recurrence relation using a large public integer as modulus. In this paper, we are developing a better computation algorithm for LUC Cryptosystem using Addition Chain. The computation time for existing and new algorithms will be recorded. Smaller computation time means the algorithm is better and more efficient than the other. We have found that new technique shows a better computation time compared to the existing algorithm. It also increases the efficiency of
4th International Symposium on Information Technology 80

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
is described at the end of this study together with challenges faced and recommendation for future research work. ITSO1_T3_4

Evaluating Playability on haptic user Interface for Mobile gaming


Chui Yin Wong, Kimberly Chu, Chee Weng Khong, Tek Yong Lim There have been escalating research interests on areas relating to haptic modality in recent years, especially towards mobile devices. However, there seems to be limited studies in determining the relation between haptic user interfaces and its influence on the playability of mobile games. This paper aims to measure playability of mobile games by comparing two different types of haptic interfaces, namely hard and soft keypad, for mobile gaming. The results show that the participants (N=12) scored highest in using a soft keypad (mean = 591.92, SD =
322.57) as compared to playing games using a hard keypad (mean = 471, SD = 359.29). However, this paper highlights that the majority of users prefer using the hard keypad method in virtue of greater player experience with regards to game play. ITSO1_T3_5

limitation. In this paper we propose a new model for the implementation of online business. The solutions can also be adapted to any country for the most part except for the delivery process that requires the use of a smartcard-based national identity card. The non-repudiation evidences that are generated from the system can be used by both the consumer and the merchant to resolve possible future disputes. The evidence is also admissible in the court of law since they are generated from the Public Key Infrastructure (PKI) that is recognized by the authority as legally binding.
ITSO1_T3_6

The Development of a Rule-based Asthma system


Goh Kim Nee, Muhammad Azlil Syafiq, Savita K. Sugathan, Chen Yoke Yie, Emelia Akashah Patah Akhir
Asthma is a very common disease that may become lethal if remained untreated. An asthma patient must always be alert with their body condition, especially their respiratory and the surroundings they are in. This paper proposes a development of a rule-based asthma system. This system provides advice for patients who would like to know the chances of getting an asthma attack are based on the patients current asthma condition and surrounding environment. To do so, the patients will answer questions to enable the system to understand their current health condition and the environment they are living in. It will then provide suggestions to avoid the attack, or to hasten asthma recovery, which includes environmental factors. Data regarding asthma was gathered through an interview with doctors and online medical resources. A rule-based algorithm was developed based on the data gathered. With this program, it allows patients self management to lead a healthy, asthma-free lifestyle.

Non-Repudiation in Order, Delivery and Payment Process for a sustainable Online business
Abdullah Sani Abd Rahman, Suraya Masrom Online businesses in Malaysia suffer from the lack of nonrepudiation in the ordering, delivery and payment process. Most businesses cannot sustain their growth because of this

ITsO1_T7:
ITSO1_T7_1

15 JuNE 2010 (2.00 PM 4.00 PM) VENuE: 3-07


ITSO1_T7_2

The Architecture of scientific Computing Library Portal on sequential Algorithm based on Partial Differential Equation
Othman, M.S., Yusuf, L.M., Basitt, U.N.A., Alias, N. Scientific Computing Library Portal (SCLP) is a system for scientific researchers to obtain, contribute, share, store, and analyze scientific algorithm through a portal platform. Due to incomplete existing scientific computing library, not so centralized massive knowledge resources, and distributed data analyses for a science team, it is desired that the development of SCLP as a centralized database for computing discipline could overcome the problems highlighted previously. Four disciplines of scientific computing are included in SCLP which are mathematics, engineering, computer science, and bioinformatics. Data collection was gathered from the expert in each discipline. This paper also highlights the importance of metadata to ease the process of obtaining the data. Result from this paper is about the architecture of scientific computing library portal for sequential algorithm which covers the four mentioned disciplines.

Cooperative Coalition formation on Valuebased Decision


Arazi Idrus, Christiono Utomo This paper presents the core of the negotiation support model for Value Management in construction. Coalition formation was presented in a logical manner and in the form of a mathematical model. It consists of the process of identifying agreement options, analysis and coalition formation. The objective of the research is to find an agreement options model and coalition algorithms for value-based decision. This objective was attained by model of satisfying game as a basis for two main references of value which are function and cost and provide a set of analysis on cooperative game theory to get an algorithm of coalition and the coalition formation for agreement option.

4th International Symposium on Information Technology

81

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITSO1_T7_3 ITSO1_T7_5

A survey on Different Interoperability frameworks of sOA systems Towards seamless Interoperability


Najhan M.Ibrahim, Mohd Fadzil Hassan
Service Oriented Architecture (SOA) plays many important roles for resource sharing and manipulating interconnected data in heterogeneous geographic distributed environments. Interoperability is two or more systems which is able to communicate, share, and exchange the resources with no need to know how each other works, but in the same time both need to have some common specifications to provide a reliable connection with no errors or misunderstanding. Many research works have been conducted to solve different interoperability issues for specific domains such as resource management, enterprise system and healthcare sector. Different development styles may lead to breakdown or interruption of communication. This paper examines and reviews studies related to interoperability frameworks. We found that different domains will have different types of interoperability frameworks. We argued that future research in this area is needed to consolidate and address interoperability issues which are required for a standard seamless framework between multi SOA platforms. ITSO1_T7_4

A services-Oriented Platform for synergisation of Research and Development strengths


Chua Chong Chai, Cheah Yu-N, Tang Enya Kong There have been many R&D projects conducted under PPSKOMP (School of Computer Sciences, Universiti Sains Malaysia) since its establishment in 1995 until today. In PPSKOMP, there are eight major research groups established, which are: Artificial Intelligence Lab, Computer Aided Translation Unit, Computer Vision Research Group, Health Information Research Group, Information Systems Engineering, Multimedia Research Group, Network Research Group, and Parallel and Distributed Computing. Many knowledge resources and processing components have been developed by researchers and available in each of this research group. However, these resources are resided and accessible only in respective research group and mostly developed using different methodologies, paradigm and platform. In this paper, we present a Service-Oriented Architecture (SOA) framework which capable to resolve this problem and enable the synergisation of research and development strengths in PPSKOMP.
ITSO1_T7_6

Agent based Monitoring framework for sOA Applications Quality


Zain Balfagih, Mohd Fadzil Hassan Service Oriented Architecture (SOA) and web service technology plays a great role in enabling the integration of different systems from different enterprises and platforms. Usually, the service provided to consumers in such systems requires a specific level of quality to be ensured by the providers. So, the consumer and provider enter into a mutual Service Level Agreement (SLA) which is a contract defining the obligations, rights, and penalties between the provider of a web service and a client with respect to the services quality. Monitoring is required at they service provider and service consumer sides in order to ensure the satisfaction of SLA. This research aims to provide an automated monitoring framework for non-functional attributes of SOA to ensure the trustworthiness of SLA for SOA applications using agent technology. A quality model has been developed as a basis for this monitoring framework. The quality model will identify the related quality attributes and their metrics from different multi-stakeholders perspective.

A Proposed Reusability Attribute Model for Aspect Oriented software Product Line Components
Fazal e Amin, Ahmad Mahmood, Alan Oxley
Reusability assessment is vital for software product line due to reusable nature of its core components. Reusability being a high level quality attribute is more relevant to the software product lines as the entire set of individual products depend on the software product line core assets. Recent research proposes the use of aspect oriented techniques for product line development to provide better separation of concerns, treatment of crosscutting concerns and variability management. There are quality models available which relate the software reusability to its attributes. These models are intended to assess the reusability of software or a software component. The assessment of aspect oriented software and a core asset differs from the traditional software or component. There is need to develop a reusability model to relate the reusability attributes of aspect oriented software product line assets. This research work is an effort towards the development of reusability attribute model for software product line development using aspect oriented techniques.

ITsO2_T3:
ITSO2_T3_1

15 JuNE 2010 (4.20 PM 5.40 PM) VENuE: 3-02


inadequate resources and limited education about ICT. There are many differences that exist between large companies and SME organizations in relation to adoption of ICT. To date, the SME clinics in general have not been convinced of the benefit of ICT. SME clinics utilize computerized system in supporting their businesses are still minimum and paper-based practices are still the norm. Hence, the objective of this paper is to report on the literature study related to identification of technology resistance and acceptance factors of ICT utilization in an organizations and study of any existing prominent theoretical frameworks on Information System (IS) Success Model. The study

Conceptual Information system success Model for small and Medium Enterprise Clinic Information system
Aliza Sarlan, Rohiza Ahmad, Wan Fatimah Wan Ahmad, P.D.D. Dominic
In general, small and medium enterprise (SME) business face substantially greater risks in Information Communication and Technology (ICT) implementation than large businesses do because of 4th International Symposium on Information Technology 82

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
then outlines the proposed conceptual Success Model for SME Clinics Information System. ITSO2_T3_2

student Problem Analyzer for Mathematics: The design perspective


Siti Noor Arfah Umar, Norlia Mustaffa This paper discusses, in the form of assumptions, the design phase of a Student Problem Analyzer for mathematics module which analyzes a students academic results in the subject of mathematics and pin points the root causes that are preventing the student from excelling. A flow of how the system diagnoses a students problem was designed in a previous study and was used extensively in this paper. This paper discusses designing the system itself and the components needed to develop it. First the syllabus of the KBSR Mathematics used in schools is analyzed. Next the requirements for computational items are defined. The computational structure is also designed and identified. Further research is then proposed to fulfill the requirements for designing the computational items.
ITSO2_T3_3

artifacts. The concept of a critic has been adopted in various domains, including: medical (ATTENDING, ONCONCIN), programming (Lisp-Critic, RevJava), software engineering (Argo/UML, ABCDE-Critic), design sketching (Design Evaluator) and others. Critics have proven to be an effective mechanism in providing feedback to users. In this paper we propose an initial critic taxonomy based on our review of the critic literature. We present the groups and elements of the critic taxonomy and explain the groups and critic elements together some examples. We believe our taxonomy will assist others in identifying, categorizing, developing and deploying computer-supported critics in a range of domains.
ITSO2_T3_4

Extending Quality Data for Lot-based Traceability system in sME


Khabbazi M.R., Hasan, M.K., Sulaiman, R., Mousavi, S.A.
This paper addressed extending quality data in lot-based based traceability information system through modeling and evaluation which is purposely designed for small-to-medium size enterprise (SMEs). The solution translates the system behavior and value data arisen from traceability requirement into useful and organized computerized information system. Easy understanding and economic approach in design and implementation meets conditions of SME environment. The designed information system through data query evaluates the functionality of quality data dynamically.

A Taxonomy of Computer-supported Critics


Norhayati Mohd Ali, John Hosking, John Grundy Critics have emerged over the last several years as a specific tool feature to support users in computer-mediated tasks. These computer-supported critics provide proactive guidelines or suggestions for improvement to designs, code and other digital

ITsO3_T3:
ITSO3_T3_1

16 JuNE 2010 (9.30 AM 10.30 AM) VENuE: 3-02


ITSO3_T3_2

understanding Domain Experts Perspectives and Expectations in Assistive Technology


Suziah Sulaiman, Siti Nur Syazana Mat Saei, Foong Oi Mean, Halabi Hasbullah
Designing computer applications for blind users is a challenging task. The design requirements should encompass those feedback obtained from the target users, the domain experts as well as the designers intuition of the system. Current practice has placed little emphasis on the involvement of domain experts when capturing the design requirements. This paper addresses this problem by highlighting the importance of such involvement. An interview was conducted to elicit a domain experts view on how blind users used computer, the technology they used and their general requirements on an ideal system. The findings include blind users require an intelligent system that could read the right thing at the right time, provide a description of images on a document, and have shortcut keys for the system.

formalization of uML Class Diagram using Description Logics


Lusiana Efrizoni, Wan M.N. Wan-Kadir, Radziah Mohamad Unified Modelling Language (UML) is as a standard objectoriented modelling notation that is widely accepted and used in software development industry. In general, the UML notation is informally defined in term of natural language description (English) and Object Constraint Language (OCL) which makes difficult to formally analyzed and error-prone. In this paper, we elucidate the preliminary result on an approach to formally define UML class diagram using logic-based representation formalism. We represent how to define the UML class diagram using Description Logics (DLs).
ITSO3_T3_3

service Oriented Disributed Manager for grid systems


Entisar S. Alkayal, Fathy A. Essa
Current problems in science and engineering become more complicated and need more computing power to tackle and analyze. The processing power of a single computer system has become inadequate for that problem and use of a supercomputer is not always an optimal solution. Nowadays institutions as universities or companies have lots of Desktop

4th International Symposium on Information Technology

83

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
PCs in their infrastructures. With advanced in hardware, software and network gird computing are developed to benefits from these futures in idle computers in an efficient way to solve complex problems that need powerful computing requirements. Grid technology, which connects a number of personal computers, can achieve the same computing power as a supercomputer does, also with a lower cost. The goal of grid computing is to aggregate idle resources on the Internet or Intranet such as CPU cycles, storage spaces, etc. to facilitate utilization. In this research we present computational grid framework that used to utilize idle computers in Intranet to execute jobs in an efficient way than a single computer. We design and implement Service Oriented Distributed Grid Manager (SODGM) framework based on web services technology to manage resources and jobs in the system. SODGM balance the load among available resources to increase computers utilization in the system and minimize jobs response time. To evaluate the SODGM system, we performed tests on the Computers Laboratory in the Faculty of Computing and Information Technology in King Abdul Aziz University. The tests show that SODGM system provides good performance compared with using single computer in terms of execution time, resource utilization and system throughput.

ITsO4_T3:
ITSO4_T3_1

16 JuNE 2010 (10.50 AM 12.50 PM) VENuE: 3-03


automatic programming assessment, test data generation and integration of both of them. This review is aimed at gathering different techniques that have been employed to forward an interested reader the starting points for finding further information regarding its trends. In addition, the result of the review reveals the main gap that exists within the context of the considered areas which contributes to our main research topic of interest.
ITSO4_T3_3

Customer Relationship Management: Computer-Assisted Tools for Customer Lifetime Value Prediction
Lim Chia Yean, Vincent KT Khoo
A customer lifetime value (CLV) can be used as an indicator for assessing a customers worthiness. It is often used among the medium to large organizations for predicting future revenues from their customers. Many research projects have been conducted to enhance the individual prediction models and formulae. However, there are no obvious formal approaches to ensure the consistency and customizability of a prediction process and its major elements. This paper proposes a basic set of computer-assisted tools for a CLV prediction process. The semi-automated tools could be used by the business analysts of an organization to customize the existing templates; record, monitor, and track the work done in each phase of the process. In this paper, various challenges are discussed together with their possible solutions. The tools are specifically designed and implemented for the derivation of customizable formulae and models among the different customer segments of a non-profit organization. In the near future, more research work would be conducted to enhance the capabilities of the tools to cater for possible collaborative CLV predictions among the interested parties on the variables, algorithms, and the subsystems of a model base management system and the associated knowledge base management system. ITSO4_T3_2

I-Wellness: A hybrid Case-based framework for Personalized Wellness Therapy


Lim Thean Pheng, Wahidah Husain In todays world, increasing awareness on personal wellness has shifted the concept of health from treatment of diseases to prevention of health problems. This is actually related to complementary and alternative medicine treatment known as wellness. As defined by the National Wellness Institute Inc. in United States of America (USA), wellness is an active process through which people become aware of, and make choices towards a more successful existence. In typical wellness approach, the wellness operators namely therapist, masseur, psychiatrist and wellness specialist are among the experts in wellness consultation. They are qualified experts in analyzing a persons wellness condition and matching a suitable wellness therapy for him/her. This typical consultation approach is time consuming and inconvenient for consumers and wellness operators who have hectic daily schedules. Therefore, an intelligent wellness recommendation system is necessary to analyze users wellness condition and recommend suitable wellness therapy for them. One of the solutions to typical consultation is to apply a knowledge-based approach that enables quick and reliable decision making process. A hybrid case-based framework is proposed to solve the recommendation tasks for personalized wellness therapy recommendation and monitoring.
ITSO4_T3_4

Automatic Programming Assessment and Test Data generation - A review on its approaches
Rohaida Romli, Shahida Sulaiman, Kamal Zuhairi Zamli Automatic programming assessment has recently become an important method in assisting lecturers and instructors of programming courses to automatically mark and grade students programming exercises as well as to provide useful feedbacks on students programming solutions. As part of the method, test data generation process plays as an integral part to perform a dynamic testing on students programs. To date, various automated methods for test data generation particularly in software testing field are available. Unfortunately, they are seldom used in the context of automatic programming assessment research area. Nevertheless, there have been limited studies taking a stab to integrate both of them due to more useful features and to include a better quality program testing coverage. Thus, this paper provides a review on approaches that have been implemented in various studies with regard to
4th International Symposium on Information Technology

Computer-Assisted Composing Process in business Writing


Tuan Norhafizah Tuan Zakaria, Mohd Juzaiddin Ab Aziz, Tg Nor Rizan Tg Mohd Maasum
There are many existing writing tools in the market such as WhiteSmoke and Business-in-a-Box. However most of these tools only provide mechanic tools such as spelling checker and grammar checker. 84

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
Second language writers (L2) tend to translate directly from first language (L1) to English. It is difficult to stop this process because this is the nature of L2 writers. Currently, the writing documents will be proofread by someone who is fluent in English (lecturers or translators). The proofreading process is difficult and costly. This paper discusses an approach for developing a computer-assisted writing tool for non-native writers. Sample of sentences in business letters have been collected. Sentences according to the type of letters will be classified and the result of this study will be stored into an electronic thesaurus. This thesaurus will provide words for writers during writing where the word appears are related to the environment of sub-sentences. The software that will be developed will assist L2 writers to choose appropriate words during the preparation of the document. ITSO4_T3_5

of multi agent system, Dendritic cell, Cluster-K-NearestNeighbor, K-mean and Gaussion mixture methods which are give an autonomous, highly accurate and fast classifier security system. This is based on intelligent agents that exploit known functional features of the immune system and the self-healing system to detect, prevent and heal harmful or dangerous events in network systems A combination of features between the IPS and self healing (SH) mechanism to ensure continuity of the networked systems have been established.
ITSO4_T3_6

Information Extraction for Counter-Terrorism: A survey on Link Analysis


Norshuhani Zamin, Alan Oxley
Information Extraction (IE) is an emerging technology to transform unstructured textual information into a structured knowledge base. With the potential to analyze the structured information, IE significantly improves analysts ability to see underlying trends and to discover the unexpected, in various domains. IE research in counterterrorism has been mushrooming after the 9/11 attack. A huge data warehouse on surveillance, that is freely available for training and testing, has become the major support to this research. Link Analysis is a topic in IE focusing on possible link detection between concepts across multiple documents. This paper presents some of the recently developed link analysis tools and approaches to detecting potentially interesting links in surveillance data. The related challenges and issues arising within the research are explored and discussed.

Immune Multi Agent system for Intrusion Prevention and self healing system Implement a Non-Linear Classification
Muna Elsadig, Azween Abdullah, Brahim Belhaouari Samir Artificial immune systems have recently been implemented in the field of computer security system particularly in intrusion detection and prevention systems. In this paper researchers present an approach to an intrusion prevention system (IPS) which is inspired by the Danger model of immunology. This novel approach used a multi immune agent system that implements a non-linear classification method to identify the abnormality behavior of network system. The authors look into Dendritic Cell (DC) which is a cell in Innate Immune system (IIS) as a classifier cell. Our approach takes the advantages

ITsO5_T3:
ITSO5_T3_1

16 JuNE 2010 (3.00 PM 4.00 PM) VENuE: 3-02


ITSO5_T3_2

self-Organizing Map Approach for determining Mobile user Location using IEEE 802.11 signals
Teddy Mantoro, Media A. Ayu, Asma Nuraini, Sulafa Mohd Amin
This paper describes a study towards user location system based on Kohonen Self-Organizing Maps (SOM) algorithm for locating user location with the existing Wi-Fi signals. With the novel use of Wi-Fi based on the IEEE 802.11 standards: inferring the location of a wireless client from signal quality measures, the Kohonen SOM paradigms were used. SOM as an unsupervised learning technique of Artificial Neural Network (ANN) capable for summarizing high-dimensional data which cause region of the network to respond similarly to certain input patterns by analyzing the signal strength or signal-to-noise (SNR) of the wireless access points (AP) that enable a wireless networked device to infer the location of wireless client. Location estimation is then computed using SOM on sample sets. We outline the study leading to the system and provide location performance metrics where a user who is using wireless local area network (WLAN) will be able to detect with the existing of Wi-Fi signal nodes with the SOM technique, highlighting position at the current time.

An e-book personalization architecture with digital rights and encryption procedures


Hameed, N., Cheah, Y.-N., Rafie, M. In this paper we report in building an electronic book (e-book) representation with Digital Rights Management (DRM) architecture. E-book personalization is being featured with DRM capabilities. The knowledge about DRM architecture can be further formalised, more specifically for ebook packaging. E-book requires the secure business model that includes e-book transaction. DRM framework is to provide the significant field for producers/consumers. E-book associates the DRM components: the capabilities for e-book personalization/ DRM. It includes five components: (1) create/publish such as legal contracting, writing/editing the content, (2) market/ distribute such as packaging, storing, translating and shipping e-book content, (3) sell to consumer such as selling, fulfilling and processing payments, (4) consume content such as reading, storing and disposing of e-books, and (5) support consumer such as returning, replacing and troubleshooting. At a macro level, the e-book is being evaluated based on the commercialization of the e-book market, and while at a micro level, it is evaluated based on the technical infrastructure is required to distribute the e-book package from publisher to consumer.

4th International Symposium on Information Technology

85

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITSO5_T3_3

Two-tier bitwise Interest Oriented QRP with firework Model Query for a small world Peerto-peer system to reduce message flooding and improve recall rate
Choong Yong Liang, Lim Tong Ming Small-World paradigm was adopted by many peer-to-peer (P2P) systems such as Freenet in order to improve performance of the P2P system. To adopt Small world as part of the architecture of a P2P system, the overlay network must archive high cluster coefficient and low average hop between any two randomly chosen peers. In this research, we propose to enhance Limewire by incorporating the Small world concept to improve several aspects of the overlay network. The Query Routing Protocol (QRP) table in the Limewire will be adopted and enhanced to hold interest information of leaf peers files for all the peers. Aggregation of leaf peers QRP will stay with the SuperPeer so that such interest information could be used to form short-range, medium-range and long-range links with other SuperPeers to achieve low average hop criteria as required by the Small world paradigm. Firework Query model is adopted in the search activity of the proposed enhanced Limewire P2P system through various links established between SuperPeers. Tests will be carried out using P2P simulation software on performance and scalability factors such as reducing message flooding and improving accurate recall rate. A prototype will be produced in this research to complete a lab-based test for concept proofing. Tests will be carried out comparing with the original Limewire and the improved Limewire so that potential future works could be recommended.
ITSO5_T3_4

transactions on a P2P protocol. This paper proposes a preliminary approach called One-Stop Multiversion Dynamic Adjustment of Serialization Order (OS-MDASO) which eliminates conflicts between read-only and update transactions to increase degree of concurrency and resolves data conflicts using multiversion dynamic adjustment of serialization order to guarantees database correctness. This approach improves response time by reducing peers involvement in transaction processing and increases tolerance of disconnection by implementing timeout value.
ITSO5_T3_5

Comparisons of Routing Protocols for Child Tracking in Wireless sensor Network


Azat Rozyyev, Halabi Hasbullah One of the widespread types of crime is child kidnapping where the number of cases is increasing each year. With the modern telecommunication technology, the child protection should be better now than before. This paper presents a preliminary study on routing protocol for child tracking using combined infrastructure of Wireless Sensor Network and Cellular Network. The real-time application in these networks would help the related parties to track the location of the missing child. From proactive point of view, the application would act as a preventive tool for child kidnapping. When the sensors in a Wireless Sensor Network detect childs presence, they have to transmit the data to an Access Point or the sink node in the network. Many routing protocols have been developed in the past, and all of them have their advantages and disadvantages. This paper shows the selection of a few routing protocols that are suitable for child tracking in Wireless Sensor Network, which will be improved and suggested for the use in the application.
ITSO5_T3_6

Os-MDAsO: An Algorithm that guarantees Correctness for P2P Object-Oriented Database systems in a Wireless Local Area Network Environment
Wong Wai Keong, Lim Tong Ming Concurrency Control is one of the core areas of study in P2P object-oriented database system. Although classical optimistic concurrency control has the advantages of non-blocking and deadlock free, it has the problems of late conflict detection and wasted transaction restarts. Peers in an overlay wireless network are faced with low bandwidth connection and frequent disconnection problems, hence, conventional concurrency control cannot be applied correctly to provide concurrency control management for long-duration transactions of a P2P object-oriented database system. Although some new approaches reduce the number of transactions restarts and improve response time by dynamically adjusting the sequential order, they are still some unnecessary transactions restarts and delay in response time which affects correctness of distributed

Mobile government services in Malaysia: Challenges and Opportunities


Ahmad Al Thunibat, Nor Azan Mat Zin, and Noraidah Sahari @ Ashaari
Mobile government (m-Government) can be a powerful component of the e-Government in facilitating the delivery of more and better services to citizens. The government of Malaysia should pay attention to the new technologies and their impact on government agencies and citizens, and face up to the challenges and opportunities offered. It should also be attentive to the important benefits derived from the alignment of organizational change and process reengineering that are concomitant with these mobile technologies. In this paper we investigate the challenges faced by implementation of the m-Government in Malaysia and also discuss the opportunities for using mobile technology in Malaysias e-Government services.

ITsO5_T5:
ITSO5_T5_2

16 JUNE 2010 (3.00 Pm 4.00 Pm) VENUE: 3-04


Rozie Ezrina Shuhimi, Norasiken Bakar, Faaizah Shahbodin, Sazilah Salam, Ibrahim Ahmad This paper highlights the development of virtual learning for chemistry subject. In this research, the term virtual learning is used to show the students may see the real material and
86

Development of Virtual Learning for Chemistry subject based on Constructivism-Contextual Approach


4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
simulation that involved in learning process using computer. They are also able to interact with the material and apparatus for the experiment. Discussion involved on theoretical framework modeling where it divided into four parts that is analysis, design, development and evaluation. For the second objective, researcher will explained the architecture of development of this Virtual Learning. While designing the development of Virtual Learning, researcher has used learning theory approach such as constructivism and contextual. The learning concept that are used in this Virtual Learning is education, simulation, animation to create virtual based on learning.
ITSO5_T5_4

an automatic infant cry classification system which main task is to classify and differentiate between pain and non-pain cries belonging to infants. The classification system is trained based on Baum Welch algorithm on a pair of local feature vectors. In this study, Mel Frequency Cepstral Coefficient (MFCC) and Linear Prediction Cepstral Coefficients (LPCC) are extracted from the audio samples of infants cries and are fed into the classification module. The system accuracy reported in this study varies from 71.8% up to 92.3% under different parameter settings, whereby in general the system that are bases on MFCC features performs better than the one that utilizes LPCC features. The encouraging results demonstrate that indeed Hidden Markov Model provides for a robust and accurate infant cry classification system.

An Accurate Infant Cry Classification system based on Continuos hidden Markov Model
Yousra Abdulaziz, Sharifah Mumtazah Syed Ahmad This paper describes the feasibility study of applying a novel continuous Hidden Markov Model algorithm as a classifier to

ITsO6_T3:
ITSO6_T3_1

16 JuNE 2010 (4.20 PM 6.00 PM) VENuE: 3-03


ITSO6_T3_2

A P2P Object-Oriented Database system that supports Multi-Attribute and Range Queries with Improved Query Response Time
Goh Chiao Wei, Lim Tong Ming
Nowadays, the demand for the processing and storing demand of these data has limited the traditional way of storing and processing data based on client/server architecture. To overcome this bottleneck, a peer-to-peer object-oriented database is proposed because of its robustness, fault-tolerance, scalability and less administrative nature. Chord is a structured P2P overlay network providing indexing facility enables users to locate a piece of data based on a given key through an efficient routing algorithm. The proposed object-oriented database is built on the openChord, a Chord implementation. In this paper, we present a preliminary design for a P2P object-oriented database on the openChord which supports multi-attribute and range queries. The storing and processing of objects are managed locally to reduce the network traffic. Pointers of objects are stored around the routing path of nodes to efficiently access to a desired object to reduce storage cost and to preserve the object-oriented features. Nodes holding the object pointers are distributed around the network to reduce the lookup time. Nodes are organized into logical class hubs where each hub handles pointers to nodes storing objects belonging to a particular class. Queries involving multi-attributes and ranges are routed to the related class hubs to retrieve the desired objects. Our proposed system will be tested using an Order Picking application for a warehouse with only dozens of nodes connected in a wireless local area network. Tests were carried out with another P2P database system measured on reliability and performance of both P2P database systems.

functional Requirements Analysis for Developing English Language Diagnosis Tool


Roshini Rajamanicam, Norlia Mustaffa, Wahidah Husain, Nasriah Zakaria
The objective of this research is to analyze the functional requirements for developing a system to monitor students problem in learning English Language. There are four problems in learning English Language which deal with linguistic, grammatical, cultural and psychological problems. The system will be developed in order to assist in diagnosing students problem in learning English Language. The methodology used to analyze the functional requirements is focused interview using five investigation steps. The result of the interview indicates the system that needs to be designed must incorporate the grammatical and linguistic structure assessments. The outcome of the research is Functional Flow Diagram (FFD) which consists of components for test, test result analysis and evaluation of the students problem in learning English Language. ITSO6_T3_3

E-Cost Estimation using Expert Judgment and COCOMO II


Zulkefli Mansor, Zarinah Mohd Kasirun, Noor Habibah Hj Arshad, Saadiah Yahya The accuracy and efficiency of cost estimation methodology for web-based application is very important for software development as it would be able to assist the management team to estimate the cost. Furthermore, it will ensure that the development of cost is within the planned budget and provides a fundamental motivation towards the development of webbased application project. The literature review reveals that COCOMO II provides accurate result because more variables are considered including reuse parameter. The parameter is one of the essential variables in estimating the cost in webbased application development. This research investigates the feasibility to combine and implement COCOMO II and expert judgment technique in a tool called WebCost. In estimating
87

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
a cost, the tool considers all variables in COCOMO II and requires expert judgment to key-in the input of the variables such as project size, project type, cost adjustment factor and cost driven factor. Developed in JAVA, WebCost is proven able to estimate cost and generate its estimation result. The usability evaluation conducted had shown that WebCost is usable when compared with other tools; it has its own advantages. WebCost is evidence suitable for everyone especially the project managers, software practitioners or software engineering student in handling the cost estimation tasks.
ITSO6_T3_4 ITSO6_T3_5

Implementing Rapid Application Development(Rad) Methodology In Developing Practical Training Application system
Nik Marsyahariani Nik Daud, Nor Azila Awang Abu Bakar, Hazlifah Mohd Rusli
Practical training objective is to prepare students for their future jobs. Many university programs integrate practical training as a course component due to its benefits. Application is one of the main processes in practical training. Managing application process manually is a tedious task, thus a system to manage practical training application is proposed to be developed using Rapid Application Development methodology. This methodology is chosen as it allows fast implementation of the system in real environment. The development had started in the mid of semester December-April 2009 and the development process had been iterated based on the requirements acquired. The practical training application system had been implemented for three semesters and the rapid application development is proved to be a right methodology for this project as it serves the goal of fast implementation for a small size system.

Design and Development of e-RuE as a Webbased Evaluation Tool


Rafidah Mohd Ramli, Azizah Jaafar Usability evaluation is part of the software development cycle. Throughout the years, various methodologies have been used to evaluate software effectiveness, efficiency and satisfaction. The capabilities of Internet technologies has make possible to run usability evaluation remotely via online. The usability evaluation can be run from different geographical locations between the respondents, experts and researchers. This paper discusses the design and development of online remote usability evaluation (e-RUE) tool in a web-based environment. The development of e-RUE is a possible tool for web based usability evaluation.

ITsO7_T3:
ITSO7_T3_1

17 JuNE 2010 (10.50 AM 12.50 PM) VENuE: 3-02


in mentoring process. We reviewed the historical perspective of ARCS, discussed the previous works that used ARCS as well as proposing the design of our e-mentoring system. The ARCS model was developed by John M. Keller in 1987 as an effective approach in stimulating motivation level among students. We discussed how to customize, videoconferencing, an important element in e-mentoring based on the ARCS design strategies.
ITSO7_T3_3

smart Card Technology Integration in a higher Education Institution


Ili Hawa Ahmad, Normie Azura Abdul Jamil, Muna Azuddin, Norshidah Mohamed
The application of smart card technology in many industries locally and abroad is common nowadays. The technology is used in ensuring security and attaining functional capabilities. Based on an Internet search, there appears to be several reported cases of successful smart card technology implementation projects. However, there may not be as many challenged projects reported. In this paper, we report a challenged implementation of smart card technology in a higher education institution using the Project Management Body of Knowledge (PMBoK) as the framework. ITSO7_T3_2

semantic-based grid Resource Discovery systems - A literature review and taxonomy


Mahamat Issa Hassan, Azween Abdullah Resource Discovery (RD) is an important key issue in grid systems since resource reservation and task scheduling are based on it. Classical grid RD systems use keyword-based approaches to describe, and discover resources and services. However, keyword-based approaches are associated with some deficiencies that are inherited from the appearance of Intergrid system with various types of resources, services and middleware in the recent years. Therefore, semantic technology has been introduced to grid RD system to overcome this issue and considerable amount of studies have been done in this context. Such systems are known as semantic-based RD systems. Nevertheless, review or survey studies that can compare and evaluate these studies, and draw the future research directions in this field remain a challenge. This paper addresses this issue. It initially discusses the RD system components, semantic technology and its use in grid systems. The paper then focuses on the use of semantic
88

A conceptual framework of an e-mentoring system for orphan children using ARCs Motivational Model
Nursakirah Ab.Rahman Muton, Nasriah Zakaria, Faten Damanhoori This paper discusses the conceptual framework that guides the design of an e-mentoring system specifically for orphan children as protg with their adult mentors. We are proposing ARCS motivational model as the theoretical guidelines because motivation is one of the most important aspect to be considered

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
technology in grid RD system components and presents the current works in this perspective. It also presents a detailed analysis of these systems and the future research directions in this field. Finally, the paper discusses future applications of the semantic-based RD system on emerging technologies such as Meta-brokers and Clouds.
ITSO7_T3_4 documents provide several advantages. One advantage is document specific representations no longer affect the search. This is extremely important in the case of multilingual representations. Keywords of several languages are mapped to the same concept in an ontology and are therefore given the same meaning. Multilingual search portal can be established to produce the same results, no matter which language is used for retrieval. This research aim to identify and analyze ontology that relates to Islam to enhance the use of exact vocabularies and to develop an ontology based Islamic semantic retrieval that can retrieve Islamic web in 3 different languages simultaneously through a multilingual search portal. This research emphasizes on semantic web technologies and the development of ontology using thesaurus such as Library Congress Subject Heading and other reference sources such as Index Islamicus, thesaurus, encyclopaedia, biographies etc. as the basis for implementing novel mechanism for retrieving Islamic web in 3 different languages simultaneously. In this research, existing knowledge sources such as documents, reports, etc. are mapped into the domain ontology and semantically enriched. This semantically enriched information enables better knowledge indexing and searching process and implicitly a better management of knowledge. ITSO7_T3_6

Extended function Point Analysis Prototype With security Costing Estimation


Nur Atiqah Sia Abdullah, Rusli Abdullah, Mohd Hasan Selamat, Azmi Jaafar Software cost estimation is a complex activity that requires knowledge of a number of key attributes about the project for which the estimate is being constructed. Nevertheless, security is becoming more and more important in most of the software construct. Reviews on several widely recognized parametric estimation models found the insufficient of current estimation in software security costing. Comparison of common security standards successfully highlighted software security characteristics to be considered in cost estimation. A survey based on the rating of these characteristics has been conducted. Analysis results from R ASCH have validated the relative importance of these characteristics based on Multimedia Super Corridor (MSC) software developers perspective. These validated characteristics are then extended the calculation and implemented in a Function Point Analysis prototype. The paper also points to the steps of calibrating the calculation through this prototype.
ITSO7_T3_5

semantically Indexed and searched of Digital Images using Lexical Ontologies and Named Entity Recognition
Datul Aida Ali, Shahrul Azman Noah
Using low-level features to support semantic search of images is a difficult task. As a result, textual content is used to provide semantic description or annotation of images. Such textual description of what we may call as surrounding text is a value added features available in most web images particularly on-line newspaper images. Most search engines used them as a feature to provide textual meaning of images. Relying on surrounding text alone, however, unable to provide support for semantic search that go beyond indexed terms. Lexical resources and ontology are potential sources to enhance searching for images. This paper discusses the use of WordNet and ConceptNet to enhance searching for on-line newspaper images. This is further improved with named entity recognition (NER) technique to annotate important entities such as name if a person, location and organization among image searchers. Results show that our semantic search approaches outperform the normal approach for searching images.

A framework for building Multilingual Ontologies for Islamic Portal


Juhana Salim, Siti Farhana Mohamad Hashim, Akmal Aris
In recent years, there were a variety of difficulties that users have to face in searching for information through Internet. Past research had shown that in performing searches, users use query terms that consist of everyday language, technical terms (with or without knowledge of underlying concepts) and various explanatory model, all influenced by psychosocial and cultural variations. Semantically annotated

ITsP3:
ITSP3_ 1

16 JuNE 2010 (2.00 PM 5.00 PM) VENuE: fOyER


verification that can be embedded in a smart card. The smart card plays a data storage for storing the cardholders fingerprint data. The card holder is required to scan his/her fingerprint on a sensor. The scanned fingerprint image is then sent to the card for matching. ITSP3_2

The Design of fingerprint biometric Authentication on smart Card for PuLAPOT Main Entrance system
Mohd Rizal Mohd Isa, Yuhanim Hani Yahaya, Kamaruzaman Mohamed Hali , Mohd Hazali Mohammad Adib, Khairuddin Maskat
Biometrics personal authentication utilizing fingerprints have been thoroughly studied and applied. Exploiting the unique features of a fingerprint and the pleasant way of capturing the required information permits it to be used in numerous applications. Smart card is also being widely adopted in many applications and refers as an essential platform to hold biometrics information. This paper presents a fingerprint

A survey of game Theory using Evolutionary Algorithms


Sally Hassan A., Muhammad Rafie M.A. This paper presented a survey on the applications of Evolutionary Algorithms in Game Theory. The purpose of this work is to study existing Evolutionary Algorithms techniques applied in the field of Game Theory. We found that Game
89

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
Theory is tightly related to Evolutionary Algorithms, especially Genetic Algorithm. Genetic Algorithm was mainly utilized for finding an absolute optimal strategy by virtually applying a game against a known strategy.
ITSP3_ 3 ITSP3_5

Practical Database Design for Industrial Maintenance system


Abd. Samad Hasan Basari, Nanna Suryana Herman, Ariff Idris
This paper describes how a database design can play an important role for developing industrial maintenance system. The definition and design of the database are presented and illustrated by a case. The main result presented is that it is possible to access a more correct view of the situation in the system development and thereby obtain a better base for making maintenance decisions. The database supports the development of applications e.g. for monitoring the performance of a maintenance in the production, for deciding the most appropriate maintenance policy or for simulating possible maintenance solutions. ITSP3_ 6

Malware self Protection Mechanism Issues in Conducting Malware behaviour Analysis in a Virtual Environment As Compared To a Real Environment
Syed Nasir Alsagoff Malware writers are constantly trying to defeat and hinder malware analysis with malware self protection mechanism. There are two main methods of malware analysis which are reverse engineering and behaviour analysis. Reverse engineering consists of static and dynamic code analysis. Behaviour analysis studies the malwares interaction in and out of the infected host. Behaviour analysis will always be a faster method compared to reverse engineering due to its more visual approach. This study will analyse issues related to malware self protection mechanism in conducting malware behaviour analysis in a virtual environment as compared to a real environment and suggestion(s), on how to overcome the problem.
ITSP3_4

Model Driven security frameworks for Addressing security Problems of service Oriented Architecture
Muhammad Qaiser Saleem, Jafreezal Jaafar, Mohd Fadzil Hassan Service Oriented Architecture based on Web Services technology gained popularity because business work flows can easily be executed as an orchestration of Web Services. These Web Services are independently developed and may be internal or external. With increase in connectivity among the Web Services, security risks rise exponentially. Moreover the security requirements are not defined at organizational level rather they left until the technical level. Many security problems related to SOA applications are highlighted by different authors which if not properly managed might have serious consequences. Many Model Driven Security Frameworks are presented by different research groups to overcome the security problems of SOA based applications. In this survey paper we have highlighted the security problems for SOA based applications and few Model Driven Security Frameworks are presented; their working style and security goals are also discussed in the course of paper.
ITSP3_7

Industrial-based Object-oriented software Quality Measurement system and Its Importance


Nor Fazlina Iryani Abdul Hamid, Mohammad Khatim Hasan In new era of ICT world today, companies are competing to produce software which are claimed to be good and fulfill users expectation. Thus we can see the tremendous growth of software industries in the last few years as the demand for software increased significantly. In Malaysia, the emergence of Multimedia Super Corridor (MSC) has seen dynamic growth of computer related companies. At the same time issues regarding software quality are being addressed by the users and practitioners in the industry. Companies allocate and spend huge amount of investment on software and expect a profitable return from it. The assurance of software quality affects both immediate profitable and long-term retention of customer goodwill. Currently users are left with uncertainties on the quality and whether the customer conforms to their requirements and expectations. Industrial-based software quality measurement system is the software that measures the quality of software that is used by the industry. The importance of having Industrial-based software quality measurement system is the quality of the industrial-based software can be identified and controlled. Therefore, the development of industrial-based object-oriented software quality measurement system is beneficial not only to users but also developers and stakeholders.

Effectiveness of blog for programming course in supporting engineering students


Janagiammal Ramasamy, Sangeetha Valloo, Jaya Malathy Poloha Nadan Programming course teaches students to understanding the concepts of programming and develop application effectively. Students have to acquire skills to identify problems and find suitable solution accordingly. Exposing students to classroom sessions may not be sufficient to ensure they are able to digest and develop the skills required in designing an application. Moreover, engineering program does not include many programming courses to enhance the students understanding. To supplement the course, blog is used to provide an opportunity for students to participate and share knowledge on programming concepts and principles. A blog or a web log is a user-generated website where entries are made in journal style and displayed in a reverse chronological order. A blog component model is related to Kolbs experimental learning which involves four stages; concrete experience, reflection on
90

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
observation, conceptualization of the relevant knowledge, and active experimentation which validate the gained knowledge. The key stage is the reflection stage which is defined as a process where the students make connection between experience and abstract concepts. To measure the effectiveness of the blog as a discussion tool, two set of data used. The effectiveness of blog is evaluated using two important measures which are student performance and blog performance. This paper discuss on the early stage of development of the blog and measurement elements.
ITSP3_ 8

system. This research is rated highly on the effectiveness and the usability of the system.
ITSP3_10

simulating the effect of supply Chain Risk and Disruption: A Malaysian Case study
Afsaneh Noori Houshyar, Muriati Mukhtar, Riza Sulaiman As competitions between firms become more fierce, they are constantly finding new ways to win the competition. They employed various initiatives such as outsourced manufacturing and increased product variety for increasing profit and customer satisfaction. Another strategy employed is supply chain management. However, managing a supply chain presents certain challenges. There are a lot of risks like demand changes, transportation disruptions and natural disasters which can threat the stability of a chain member and increases the vulnerability of the whole supply chain. Examples of this include the terrorist attacks on the world trade center on September 11, 2001, the SARS epidemic in south-East Asia and the recent H1N1 epidemic which led to costly disruptions in the supply chain. In this research, via an examination of the literature, paper investigates the probable reasons of disruptions in a supply chain, and then classifies the risks which can cause disruption in a supply chain, paper will also highlight the strategies which can control and mitigate the risk effect on the chain.. Finally, an automotive supply chain in Malaysia is used as a case study and paper will simulate the conceptual model of that for highlighting these elements of supply chain disruption.
ITSP3_11

Domain Analysis with Archetype Pattern based zachman framework for Enterprise Architecture
Gunnar Piho, Jaak Tepandi, Mart Roost The software factories approach is one of a number of the automated software development methods, which promise greater gains in productivity and predictability by making application assembly more cost effective through systematic reuse and by enabling the formation of supply chains. In our research work on archetypes based development we investigate methods and applications of business archetypes and business archetype patterns (originally described by Arlow and Neustadt) in the development of software factories. In the current paper we describe and explain the Zachman Framework (ZF) from the archetype patterns perspective, explain how we use this archetype patterns based ZF in domain analysis and compare the ZF based approach with Dines Bjrners domain facets based approach. The business domain in our studies consists of a clinical laboratory. Our research is based on Laboratory Information Management System developments for the Clinical and Biomedical Proteomics Group, University of Leeds, UK. Our studies show, that ZF with archetypes and archetype patterns helps developers to better understand business domains, to design more robust and cost effective enterprise applications through systematic reuse of archetypal components by enabling supply chains of product families and to explain solutions to domain experts. ITSP3_9

Design of Web Intervention to Influence youth behavior Toward Online gaming


Chen Yoke Yie, Subarna Sivapalan, Kajendra Ganeson, Goh Kim Nee, Savita K Sugathan, Emelia Akashah P Akhir
PC or video games are an electronic game that has been made famous among teens way back in the 80s era. It has been a source of entertainment and stress relief as an after school or holidays activity. Massively Multiplayer Online Role-Playing Games (MMORPG) were made possible with the growth of broadband Internet access in many developed countries, using the Internet to allow hundreds of thousands of players to play the same game together. However, if too much time is spent in playing online games and players show negative behavior sign or pathological, the player is categorized or known as an online game addict. Once addicted, it will affect the players psychological and physical well-being. The objective of this study is to propose the design of a web intervention to influence youth behavior towards online gaming using Cognitive Dissonance and Gagnes Learning Theory. Based on our previous research work, we are using the same theories and applying it in a different type of behavioral issue which in this case is online gaming. In UTP (Universiti Teknologi PETRONAS), students are able to play online games among themselves via the local area network. A total of 30 students who plays online games more than 10 hours per day were chosen, ranging from the 18 to 22 age range. Players will be categorized according to a baseline survey. Each category of users will go through the web intervention of different content. It is hoped that by combining the abovementioned theories,

Intelligent Decision support for Tourism Destination Choice: A Preliminary study


Noor Maizura Mohamad Noor , Ily Amalina Ahmad Sabri, Noraida Ali, Fathilah Ismail The World Tourism Organization defines tourists as people who travel to and stay in places outside their usual environment for more than twenty-four (24) hours and not more than one consecutive year for leisure, business and other purposes not related to the exercise of an activity remunerated from within the place visited. This paper describes a research and development of an intelligent decision support system for tourism destination choice. A prototype system called tourism advisory system (TAS) is proposed to assist tourists in planning their travel using fuzzy logic approach. Selected practitioners in tourism industry and potential users will be invited to participate in testing system to evaluate the performance of the

4th International Symposium on Information Technology

91

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
players are able to reduce their number of hours in playing online games. ITSP3_ 12 ITSP3_15

futuristic Model for schools Content Management systems - A beginning


Yuhanis Omar, Noraidah Sahari @Ashaari One of the main elements in educational portal is Content Management System (CMS). CMS is a web application technology used for managing contents on websites which easy to be updated by anyone who uses a web form. By using CMS, teachers are authorized to contribute materials for teaching purposes while the students do their experiment to test their understanding of the subject. Problem Statement: In order to monitor the students assessment progress and maintain the engagement of the students to the curriculum and assessments activities, it is important for the parent to get the result of the assessment via mobile services. Approach: This research will concentrate on the analysis and development of futuristic CMS model by using Web 2.0 development, but the paper will explain the theoretical basis of this research first. The characteristic of Flow Theory will be considered to ensure the engagement of the student to the CMS exists. Result: A CMS model which can be used in secondary school. ICT Form five secondary schools subject will be used as a sample of teaching and learning materials. The proposed CMS can be embedded to the educational portal framework. Conclusion: With the proposed CMS, it encourages the engagement of the students in doing their curriculum activities and at the same time improve their level of understanding in ICT subject. As for their parent, they will receive a message of their childrens performance to help them monitor their childrens performance in study.
ITSP3_ 16

A Proposed framework for E-business supply Chain Integrator


Norshakirah Ab Aziz, Rohiza Ahmad Construction industry remains as the most complex industries in Malaysia. Currently there is no specific research done on how to integrate the entire supply chain components. This paper prepared to propose a solution to this problem. By providing a model framework for E-business Supply Chain Integrator (SCI), entire supply chain can be integrated. Hence, review of literature, challenge and discussion and future work are highlighted in this paper.
ITSP3_13

safeJourney A Pedestrian Map using safety Annotation for Route Determination


Kwang Hooi Yew, Ta Thu Ha, S. D. Silva Jose Paua When travelling alone in an unknown urban area, pedestrians are exposed to a higher risk of accident or assault. In light of this growing concern, we propose that safety annotation to be included as one of the pedestrian map attributes and using it to recommend a relatively safer route. Unlike motorist map, pedestrian map must also include pedestrian-oriented features and noticeable landmarks in order to optimize the path. This paper presents the techniques to determine relatively safe path, its future works and challenges.
ITSP3_14

The Development of the short Messaging service (sMs) Application for the school usage
Salman Firdaus Sidek
This research has outlined 2 objectives: to develop a personal Short Messaging Service (SMS) server that is easy to manage by school IT teacher and to develop an SMS application system which is cost effective and does not tied up to the SMS Gateway Service Provider. The Rational Unified Process (RUP) methodology is implemented in this research where the researcher cans iteratively doing the system development during each phase. The literature review shows most of the Content Delivery SMS services used by people nowadays are rely on the commercial system developer and the SMS Gateway Provider which provides the expensive 5 digits unique number. But the SMS application system developed through this research only need a minimum development and maintenance cost and suitable to be used in the school environment. The product of this research is the SMS application system that can avoid the reliance of the Content Delivery SMS application of the student examination result to the SMS Gateway Provider and the commercial SMS application developer. This system can be managed totally by school staff via Maxis telco without involving the third party as SMS Gateway Provider as well as the commercial SMS application developer. This system also can be expanded to be another SMS application that is suitable to be implemented in school by only creating tables in the database provided and developing some simple user interface.

To Enable formal Verification of semi-formal Requirements by using Pre-defined Template and Mapping Rules to map to Promela specification to Reduce Rework
Lin Cheng Hong, Lim Tong Ming Gap has always been found between semi-formal requirements and formal specification. Semi-formal or informal requirements are not able to do formal verification as imprecise and ambiguity is always found. The proposed research is to carry out the mapping of semi-formal requirements to Promela specification in order to enable early verification before the requirements analysis process take place and to obtain highly accurate and complete requirements specification. The proposed solutions include a set of pre-define requirements templates that helps analysts to collect requirements and a set of mapping rules to bridge semi-formal and formal specification. The inputs are a set of semi-formal requirements specifications called Swimlane Domain-specific Requirements Language based on business processes, business actor, flow of processes and simple formula or logics within a process. The target language is Promela, a Process Meta language that can be verified using SPIN tool to perform formal verification. Inconsistency of requirements will be identified before the inputs are mapped to Promela language. The supporting tool will be included and tested with a group of novice users by applying different formalization strategies like generation of OCL specification from UML diagram set, generation of Z specification from UML and the proposed solution to measure the hours required to finalized
92

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
requirements, accuracy of the generated specification and the completeness of requirements comparing to the prepared requirements set for measuring purpose.
ITSP3_ 17

Extended balancing Ontological and Operational factors in Refining Multiagent Neighborhood using ACO
Lee Chee Yean, Lim Tong Ming, Lay-Ki Soon In this paper, we present our work extended balancing ontological and operational factors using Ant Colony Optimization (ACO) in building collaborations within multiagent neighborhoods.

This innovation overcomes the previous versions problem on better collaboration among agents, reducing message flooding, increase scalability and resolved the hidden boundary problem. The domain of application is multiagent, distributed information retrieval, where agents safeguarding their own information or data resources, improve their local services by collaborating with others. Information retrieval is like a food finding for ants. Foods are not always available at the same location and there might be a better location with more foods. Same thing apply to information. In this paper, we adopted ACO as our agents collaboration technique to enhance the previous work.

kNOWLEDgE sOCIETy ITsO1_T4: 15 JuNE 2010 (2.00 PM 4.00 PM) VENuE: 3-04
ITSO1_T4_1 ITSO1_T4_3

Performance Analysis of Modulation schemes for Wireless Optical In-Cabin Aircraft Networks
D.Marinos, C.Aidinis, C.Vassilopoulos, P.Kouros, N.Schmitt, T.Pistner, J.Schalk, J.Klaue
One of the major tasks in the future of aircraft in-flight entertainment is to provide wireless connectivity throughout the cabin. In this work an optical OFDM modulation scheme for cellular network architecture is investigated in comparison to other conventional optical modulation techniques (PPM, OOK). An analysis of efficient cabin link layout with respect to seat rows per cell and available data rates, allowing high quality services for specific application (e.g. Video, data transfer), is presented for an implemented minimum of 10Mbit/s per cell. A wireless optical OFDM communication prototype has also been implemented in a laboratory experiment and compared to a conventional diffuse optical 2PPM, achieving 17.2Mbit/s data transmission, thus doubling the previously achieved performance, but being based on line of sight links in the laboratory only. Both implementations prove the usefulness of the investigated modulation schemes. ITSO1_T4_2

Efficient Retrieval of Malay Language Documents using Latent semantic Indexing


Roslan Sadjirin, Nurazzah Abd Rahman The main objectives of this research is to investigate whether by using Latent Semantic Indexing (LSI) will improve the retrieval effectiveness on Malay document, compared to by using exact term-matching technique. LSI is a mathematical approach that uses Singular Value Decomposition (SVD) to discover the important association of the relationship between terms and terms, terms and documents and documents and documents. Cosine similarity measurement is used to measure the similarity between the query word and terms as well as the documents. This research uses Malay Language Test Collection consisting of 210 Malay documents, queries, relevant judgment and Malay stemmer to stem Malay terms. Results and analyses show that, LSI retrieval method outperformed the exact term-matching technique despite the longer processing time it took during the indexing. The best result for retrieval effectiveness for Malay documents in this domain is achieved when k-dimension is 4 and the threshold value is 0.8, which is 80.2 percent.
TSO1_T4_4

Query Expansion using Thesaurus in Improving Malay hadith Retrieval system


Nurazzah Abd Rahman, Zainab Abu Bakar, Tengku Mohd Tengku Sembok Thesaurus has become another valuable structure in any Information Retrieval system. It is a list of terms and concepts that provide a controlled vocabulary of words to use in document indexing, clustering, earching and retrieval. This paper presents the results of expanding users query using Malay thesaurus in the process of searching Malay documents from Malay Hadith retrieval system. The results obtained shows that the retrieval effectiveness improves by four percent when thesaurus is employed in the process of retrieving Malay translated Hadith documents, compared to when single term queries are employed.

An Ontology Driven, Multi-agent based framework for Automated Resource Allocation in Mobile Workforce Management systems
Arash Mousavi, Md. Jan Nordin, Zulaiha Ali Rapid advancement in Mobile Information and Communication Technology (ICT) caused an enormous increment in mobile workforce population of the world. Consequently, this rapid increment created a high-demand for reliable and automated mobile workforce management (MWM) systems. An MWM system consists of several subsystems amongst which, Resource Allocation (R A), which is the focus of this paper, is of high importance. The better performance and reliability that an R A system exhibits the more reliable its corresponding MWM will be. A reliable resource allocation process in a mobile environment however, should be able to adequately challenge human resource risks as well as environmental risks, such as frequent disconnection, caused by mobility of the resources. In this paper an ontology driven multiagent based framework
93

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
for such R A systems is proposed. The main emphasis of this frame work is to describe a dynamic coordination model for a multi-agent system which is utilized to automate the resource allocation process in presence of the above mentioned risks and challenges.
ITSO1_T4_5 ITSO1_T4_6

framework of Intrinsic and Extrinsic Motivators of knowledge sharing - A Case of Training Institutes of an Oil and gas Company in Malaysia
Aamir Amin, Mohd Fadzil Hassan, Mazeyanti Ariffin
Knowledge sharing is vital for the success of Knowledge Management (KM) initiatives. But it is inconceivable to flourish knowledge sharing without individuals motivation to share his knowledge. Individuals are motivated through intrinsic as well as extrinsic motivation. Due to this reason researchers have underlined the importance of extrinsic rewards and Organization Citizenship Behavior (OCB) to influence individuals decision to share his knowledge. Apart from extrinsic and intrinsic motivations, it is important to understand individual differences in knowledge sharing behavior based on demographic variables. The relationships of these variables with knowledge sharing have been tested in past research works, however there are a number of limitations which need to be addressed. Using the case of training institutes of an oil and Gas Company in Malaysia, the aim of the study is to propose a framework of intrinsic and extrinsic motivators of knowledge sharing. The proposed framework will overcome the limitations in the literature by revisiting the impact of extrinsic rewards, OCB and demographic variables on knowledge sharing. Hence the proposed framework has encompassed intrinsic motivators (OCB), extrinsic motivators (extrinsic rewards) and personality attributes (demographic variables). Six major and in total 20 hypotheses has been tested. The data was gathered from the knowledge workers, working as trainers and practitioners, at three training institutes. Questionnaire method was used to gather data. Later the data was tested using regression analysis through SPSS. The results have shown that OCB is a very strong predictor of knowledge sharing, whereas extrinsic rewards moderately affect individuals intention to share his knowledge. At the same time demographic variables including gander, race and education level affect the relationship between knowledge sharing intention and knowledge sharing behavior as a moderating variable except experience level, which has no impact on the relationship. The study will help us to understand the role of an individuals intrinsic attributes (i.e. OCBs), personality attributes (Demographic variable) and external motivators (i.e. extrinsic rewards) to affect his decision to share his knowledge. The study will help the theorists and practitioners to develop strategies to foster knowledge sharing in their organizations.

Pre-Considered factors Affecting ERP system Adoption in Malaysian sMEs using a Technology-Organization-Environment framework
Siti Shafrah Shahawai, Rosnah Idrus The adoption of Enterprise Resource Planning (ERP) system among large organizations around the world has gradually increased due to the number of its implementation successes. An integration of a primary technology that effectively utilizes an ICT system in the organization such as ERP system will have a huge positive long-term result on any large, medium or small enterprises. However, most Small Medium Enterprises (SMEs) in Malaysia are still lagging behind. This paper aims to discuss the proposed pre-considered factors affecting ERP system adoption in Malaysian SMEs by using a technologyorganization-environment (TOE) framework. Based on this framework, each factor will be looked at and discussed further in this paper on how the elements in the framework affect the adoption of ERP system in SMEs. This paper also explains how the factors will be used in a survey to be conducted later. The findings will help outline the strategies that should be considered to increase the understanding on the successful adoption of ERP among Malaysian SMEs.

ITsO1_T8:
ITSO1_T8_1

15 JuNE 2010 (2.00 PM 4.00 PM) VENuE: 3-08


LEACH and EEMC, using performance metrics of energy per packet and average delay. Simulation results demonstrated that the proposed protocol of REC is effective in prolonging the network lifetime, as well as supporting for scalable network.
ITSO1_T8_2

Region-based Energy-aware Clustering (REC) for Efficient Packet forwarding in WsN


Halabi Hasbullah, Babar Nazir

Energy (battery) of the sensor node is considered as the scarcest resource in Wireless Sensor Network (WSN), hence a communication protocol that efficiently uses the limited energy must be developed. In this paper, Region-based Energyaware Clustering (REC) scheme is presented to optimize the energy usage, with clustering has been identified as an effective data forwarding technique in WSN. With REC, algorithms for energy efficient cluster formation, cluster head selection, and inter-cluster communication is proposed. Using OMNet-4.0 simulation tool, the performance of REC is compared with

An Evaluation of Endpoint Detection Measures for Malay speech Recognition of an Isolated Words
Noraini Seman, Zainab Abu Bakar, Nordin Abu Bakar
This paper presents the endpoint detection approaches specifically for an isolated word uses Malay spoken speeches from Malaysian Parliamentary session. Currently, there are 34,466 vocabularies of utterances in the database collection and for the purpose of this 94

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
study; the vocabulary is limited to 25 words which are most frequently spoken selected from ten speakers. Endpoint detection, which aims to distinguish the speech and non-speech segments of digital speech signal, is considered as one of the key preprocessing steps in speech recognition system. Proper estimation of the start and end of the speech (versus silence or background noise) avoids the waste of speech recognition evaluations on preceding or ensuing silence. In this study, the endpoint detection and speech segmentation task is achieved by using the three different algorithms, namely combination between Short-time Energy (STE) and Zero Crossing Rate (ZCR) measures, frame-based Teagers Energy (FTE), and Energy-Entropy feature (EEF). Three experiments were conducted separately to investigate the overall recognition rate obtained with a Discrete-Hidden Markov Model (DHMM) classifier approach on the testing data set that consists of 1250utterances. The results show that EEF algorithm performs quite satisfactory and acceptable where average recognition rate is 80.76% if compared with other two algorithms. Each of the algorithms have the advantages and disadvantages and there are still misdetection of word boundaries for the words with weak fricative, plosive and nasal sounds and not robust enough to implement in Malaysian Parliamentary speech data. However, improvement is still possible to increase the performance of these algorithms. ITSO1_T8_3

constituent of successful ICT utilization in an organization but yet their development, implementation, monitoring and evaluation is a challenging concern. This paper proposes a framework to shape further researches and the important considerations in conducting additional exploration on ICT policy.
ITSO1_T8_5

A Web based safety Intervention Need Analysis system in Construction Design


Azizah Jaafar, Normazlina Mohamed zi, Ismail Bahari, Asmalia Che Ahmad Recent advances in Information and Communication Technologies (ICT) and web based system have driven new directions in the development of safety intervention in construction industry. Emerging concepts such as web based technology through Safety Intervention Need Analysis System (SINAS) are expected to revolutionize the need analysis of safety intervention in construction design. This paper describes a proposed development of system design for SINAS specifically for construction design and explains four important components in SINAS; web based interfaces, input data, SINAS Calculation and Decision Suggestion, and output data (Executive report and Design Intervention Recommendation) that involve in the system.
ITSO1_T8_6

A Non-Linear Model for the Classification of stored Items in supply Chain Management
Seyed Yaser Bozorgi Rad, Mir Abbas Bozorgi Rad, Mohammad Ishak Desa, Sarah Behnam, Sina Lessanibahri
With the significant role that warehouse plays in connection to suppliers, distributors, and clients, and considering the costliness of storage systems, efforts have focused on the reduction of procedural expenses. Among the most significant expenses, one involves the distance traveled by operators or S/R machinery for the selection of ordered items; the common solution to which has been through the classification of stored items. Previous articles have focused on linear solutions to the abovementioned problem, such as PMedian.This article shall focus on the problems arising from the said solution, and instead a non-linear method proposed. Further, a heuristic algorithm is produced for the solution that will be compared to similar solutions through Lingo, proving acceptable results. ITSO1_T8_4

Predict the customer behavior in the shopping by Distributed Learning Automata


Mansour Esmaeilpour, Vahideh Naderifar, Riza Sulaiman
Predict the customer behavior in the shopping is important from two aspects: one is from the perspective of goods suppliers and the other from shop owners. Both groups want to know that their customers interest in which goods and buy which sequence of the goods. In the this paper we provide a way in finding sequences of the customers shopping, which in comparison with the previous methods, it works better and we demonstrate that it could obtain sequences of the customers shopping in shorter time than the previous methods. Finding of the sequences is very essential for suppliers of goods and shop owners and will lead to an increase in annual profit. In this article, we provide a method of finding two-member and higher sequences by distributed learning automata; its costs is lower than the other methods. We examined it on online basket data of costumer shopping and it is clear that the results are much better.

Information and Communications Technology (ICT) Policy Management Towards Enabling Research frameworks
Reza Alinaghian, Azizah Abdul Rahman, Roliana Ibrahim This paper discusses the topic ICT Policy that has captured very little attention to date. ICT policies are the crucial

ITsO2_T4:
ITSO2_T4_1

15 JuNE 2010 (4.20 PM 5.40 PM) VENuE: 3-03


The popularity of Open Source Software (OSS) is increasing as a platform for modern software innovation with the prominent concept of freedom. Freedom in OSS innovation is similar to freedom of speech not in term of price. However, less than 2% of the contributors are women in OSS innovation. Minorities including women are often ignored in OSS innovation process. The gender issues in OSS

Women Contributions to Open source software Innovation: A social Constructivist Perspective


Musyrifah Mahmod, Shafiz Affendi Mohd. Yusof, Zulkhairi Md. Dahalin
4th International Symposium on Information Technology 95

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
innovation might be more complex than what it seems, as female contributors are often experience hybrid discriminations, both from the male dominated OSS community and socio-cultural patriarchy. This paper concerns the questions of how innovation is achieved in open source software communities through social constructionist perspectives focusing on feminist views. ITSO2_T4_2

Decision support system framework for Implementation of Enterprise Resource Planning (ERP) system
Muhammad Abdul Tawab Khalil, P. D. D. Dominic, Mohd Fadzil Bin Hassan A growing challenge for todays complex decision making is the successful implementation of ERP (Enterprise Resource Planning) system. Many problems that arise in ERP implementation have been discussed and tackled by researchers in recent times. An emerging threat to the successful implementation of ERP is the wicked problems. Wicked problems manifest in somewhat enormous projects or applications. These wicked problems can lead to a huge loss of organizational intellectual property and finance. In order to counter these wicked problems, a preemptive decision making strategy needs to be adopted to anticipate these problems in ERP implementation. As such, a research investigation requires to be carried out to address the complexity and multiplicity in projects which may lead it to wicked problems and ultimately turning it into a wicked project. As of todays expanding globalization, multiple stakeholders with conflicting standpoints increase; each one linked with the organization(s) is affected by the different customs, behaviours, laws and environmental concerns. Globalization also leads to the wicked problems for the organization. Methods to help decision makers deal with wicked problems are greatly needed. In pursuit of that some elastically open ended, participative, collaborative and adaptive approaches are needed to anticipate wicked problems in ERP implementation. This paper focuses on a decision support system model for implementation of ERP system. ERP often serves as a happy hunting ground for wicked problems because of its complex and multi-pronged nature. Other than that, we are reviewing some techniques and methodologies that are recommended to assist decision makers understand the unstructured and poorly defined complexity in ERP implementation. Comparative analyses of these techniques will not only assist in better understanding wicked problems, they are also being used to provide a framework for a suitable and sustainable decision support system for implementation.
ITSO2_T4_3

involvement of all different parties and major change practices and beliefs. The foundation of knowledge management, however, is to transform information and intellectual capital to achieve organizations goal. Knowledge management acts as the catalyst for organization change It entails processes associated with sharing, exchanging, creation and disseminating of knowledge. The study presents the correlation of knowledge management and sustainable development for developing business competitive advantage. This paper sample cases from industries mapping out the essence of these two stipulations in their solution to prevailing challenges in the economy. Finally, a framework is developed based on the underlying principles of McKinsey 7S framework justifying the best practices of knowledge management provides a very good foundation to sustainable development.
ITSO2_T4_4

Identifying the social factors and Representation for knowledge based Coalition formation system
Azleena Mohd Kassim, Yu-N Cheah, Intan Hashimah Mohd Hashim In order to form a collaborative team working on a specific task, we need to identify individuals that will be able to form groups and work together based on certain criteria such as their knowledge and personal role. Coalition formation is an approach dedicated to achieve optimal group arrangement. We are working in the direction of identifying strategies to build a coalition formation system taking into consideration the social factors. Computational cultural dynamics (CCD) is a research area that intertwines computer technology with behavioral and social sciences. We find that this research has potential to be further expanded to study and build a group setting. At the same time, the value of knowledge is seen as an important factor to determine the success of such coalition especially from the social setting. Therefore, with the motivation to achieve a CCD setting of a knowledge based coalition formation, social factors are studied, where the knowledge derived from this process will be identified, represented and stored. In this paper, we present a framework for the knowledge based coalition formation focusing on structuring the social factors chosen to initiate the knowledge process of the coalition formation system.

knowledge Management Catalyst for sustainable Development


Diana M.L. Wong Both, knowledge management and sustainable development has been coined for slightly more than a decade now, as the essential solution to the global crisis. Todays economic development practices are causing detrimental effect to the environment. Sustainable development is essential to sustain the ecosystem and the natural resources from depletion while creating new products/services for business sustainability. The basis of fostering sustainable development in business requires
4th International Symposium on Information Technology 96

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITsO3_T4:
ITSO3_T4_1

16 JuNE 2010 (9.30 AM 10.30 AM) VENuE: 3-03


the knowledge to the general public, employ less ICT in their exhibition halls. As there is lack of empirical evidence to prove the above, this study aims to determine the level of ICT use by museums in Malaysia and attempts to understand issues that have a profound influence on ICT implementation in their institutions and hence in their exhibition halls. A survey was conducted among 22 governing institutions for museums throughout Malaysia. The findings suggest that museums have adequate ICT infrastructure, services, and applications to run day-by-day administration and operations. However, there are rooms for improvement when it comes to museum exhibition halls. This study further reveals several issues that restricted these museums from using ICT as one of the means for historical, cultural, and heritage knowledge to be delivered to the general public and puts forward few recommendations to possibly curb these issues.
ITSO3_T4_3

Organizational Commitment Towards software Process Improvement - An Irish software VsEs Case study
Shuib Bin Basri, Rory V. OConnor This paper presents a study of the software development processes of very small software companies, with a focus on the companys Software Process Improvement (SPI) activities. SPI has gained an increasing importance in software engineering domain. However, recent studies show that the obligation and commitment towards SPI especially in small companies is weak and not always taken seriously. This situation is often related to insufficient availability of resources either in term of financial, human and time in this type of companies. Accordingly, this paper explores the current situation in very small companies and gauges their acceptance levels towards SPI actions and the underlying reasons behind this. In this research we carried out a survey which contains open and close ended questions in a series of very small software development companies in Ireland. A quantitative analysis; that use a statistical analysis, and qualitative analysis; that adopt the qualitative content analysis method have been followed throughout this study. The results indicate that the SPI initiatives in very small software development companies are done on a small scale manner, informally and indirectly. In addition, the results also indicate that commitment and involvement of people in these organizations towards SPI is high.
ITSO3_T4_2

Enhanced CAf Indexing Algorithm using hashing functions


Nuraini Abdul Rashid, Rana Ghadban, Hazrina Yusof Hamdani, Atheer A-Abdulrazaq
The rapid growth of genomic databases and the increased of queries against those databases have lead to the needs of new and efficient search and compare techniques. Researchers in bioinformatics have concentrated on exploring into different approaches in order to solve the problem of cost associated with the exhaustive search techniques. One of these is the CAF indexing algorithm which is considered to be a fast indexing algorithm in genomic information retrieval. However, there is still room for improvement in the CAFE indexing structure. This research aims to enhance the structure of CAFE inverted index by using a proper hash function to speedup retrieval process. The results of this research indicated that retrieval using the enhanced index is faster than retrieval using the original index (CAF).The benefit ratio of using the enhanced CAFE index compared to the retrieval time using the original CAFE index are between 62.8 to 74.9 for one query. However, we found that the memory space for storing the indexes are the same for both algorithms. The reason is that although the interval size decreases, each interval will now have an increased number of posting list.

The Level of ICT use by Museums in Malaysia


Juliana Aida Abu Bakar, Murni Mahmud, Puteri Shireen Jahn Kassim The recent advances in information and communication technology (ICT) have tremendously affected the way teaching and learning (T&L) is delivered in both formal and informal education. For formal education, Malaysia is reaping the benefits of ICT through Smart School project under MSC Malaysia initiatives. For informal education, an initial observation suggests that museums, a critical institution which protects and preserves the national heritage as well as delivers

ITsO4_T4:
ITSO4_T4_1

16 JuNE 2010 (10.50 AM 12.50 PM) VENuE: 3-04


which explains the interplay between strategic alignment dimensions of governance, communication, and architecture enabled by SOA, and enterprise agility. The model was tested using survey data collected from 202 Malaysian service industries. The data was analyzed using structural equation modeling AMOS 5 to test the model fit. Using maximum likelihood estimation analysis, the model fit for data was achieved. The key results were that the factors of alignment via governance, alignment via communication, and alignment via architecture are good predictors for enterprise agility.

strategic IT Alignment with business: service Oriented Architecture Approach


Mohammed Abdi, P.D.D. Dominic
Enterprises are moving fast to transform into service orientation to maintain their competitive advantage. In order to meet rapidly changing demands, and achieve true agility an enterprise needs strategic IT alignment with business strategy integrated with Service Oriented Architecture (SOA). As enterprises transform service oriented enterprises, the challenge of aligning IT strategy with business strategy and the use of IT to meet customer demands becomes an important research issue. The primary aim of this paper is to develop a model 4th International Symposium on Information Technology 97

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITSO4_T4_2

A survey on Adaptive Qualitative Assessment and Dynamic Questions generation Approaches


Diyana Syamsiyah Rozali, Mohd Fadzil Hassan, Norshuhani Zamin The goal of assessment is to identify weaknesses in learners knowledge. There are various types of assessment in which among them are the Quantitative and Qualitative assessment. This paper is concerned with the qualitative assessment. The underlying principle of qualitative assessment motivates the research. Qualitative assessment is not about assessing the domain knowledge but it is about assessing the learners current and potential capacities related to the knowledge. Dynamic questions generation for qualitative assessment involves a strong degree of subjectiveness. Appropriate scoring mechanism is needed to assess learners level of knowledge and to dynamically create a subjective question that is adaptived to the learners current knowledge and understanding. The paper provides an overview of adaptive qualitative assessment and dynamic questions generation and a discussion on possible approaches found in the recent research as a guide to the development of an automated tool.
ITSO4_T4_3

present a result aggregation engine which can either present results of the individual algorithms separately or fuse the results of the composite algorithm.
ITSO4_T4_5

Co-creation Values in knowledge Management


Elliyani Atan Awang,Mohamad Shanudin Zakaria,Yazrina Yahya,Muriati Mukhtar This research is conducted to establish a guideline for system developers in designing and developing the electronic government systems that embed values that is appreciated by the users. The work is established by obtaining inputs from help desks and users feedback relating to problems occurred. The details procured will be used to generate mutual values between the users and the developers of the electronic government systems. The values identified will then be used to aid in the designing of the KM framework for the help desk. Based on the framework, a knowledge management system will be established in order to gather the information and as a reference mode to disseminate the values. The co-created values embedded in the electronic government will ensure the systems are being used by the targeted users and undertake the issues of underutilized system.
ITSO4_T4_6

Conceptualization of the Antecedents and Impacts of kMs utilization: A Preliminary framework


Ishaq Oyefolahan, P.D.D. Dominic The need for competitive advantage in organizations has become the hallmark of the present knowledge era. Knowledge Management Systems (KMS) provides the platform through which such goals can be realized when supplemented with other factors. In investigating how KMS contribute to organizational performance, this study conceptualizes the antecedents facilitating the effective use of KMS and relates how the usage of KMS influences both knowledge sharing practices and social capital development. Moreover, the interaction between knowledge sharing and social capital as well as their joint effect on human capital development is explored. Lastly, the framework provides theoretical explanation of how KMS utilization contributes to organizational performance by establishing the link between human capital development and organizational performance.
ITSO4_T4_4

Identifying Effective software Engineering (sE) Team Personality Types Composition using Rough set Approach
Mazni Omar, Sharifah-Lailee Syed Abdullah
This paper presents an application of rough sets in identifying effective software engineering (SE) teams personality types composition. Identifying effective team personality composition is important to determine software project success. It was revealed that balance of members in personality types composition, which were Sensing (S) and Intuitive (N), Thinking (T) and Feeling (F) has assisted the teams to achieve higher software quality. In addition, Extroverted (E) members also gave an impact towards team performance. Even though size of empirical data was too small, the rough set technique allows generating significant personality types composition rules in assisting decision makers to form effective teams. Future works will include more empirical data in order to develop teams performance predicting model based on personality types.

hybrid Approach Towards Ontology Mapping


Shailendra Singh,Yu-N Cheah It is common for different ontologies to exist for similar domains, which leads to ontology heterogeneity. This can be addressed by ontology mapping. Issues related to ontology mapping include the lack of efforts to hybridize the various ontology mapping algorithms that are available. Another problem concerns the mapping approaches themselves, i.e. these are either conceptbased or instance-based (and not a combination of these). In this paper, we present an approach for ontology mapping. Our approach employs a library of ontology mapping algorithms. A number of these algorithms are selected and linked or hybrided to produce a composite algorithm. Furthermore, we also
4th International Symposium on Information Technology 98

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITsO5_T4:
ITSO5_T4_1

16 JuNE 2010 (2.00 PM 4.00 PM) VENuE: 3-03


populate the domain ontology in order to support semantic search in digital libraries. The research is focusing at the user level in extracting the information of the academic dissertations and populate to the ontology.
ITSO5_T4_4

semantic search in Digital Library semantic Technology


Nurul Aida Osman,Shahrul Azman Noah, Nazlia Omar
Semantic search tries to concentrate on the boundaries of text search by performing search in a conceptual space, based on disambiguated concepts rather than exact words, and by exploiting semantic networks of concepts underlying the texts. This paper provides another view of semantic information retrieval for a digital library from the perspective of semantic technology. It then proposes a semantic indexing and retrieval approach which includes an ontology based information retrieval framework. The proposed ontology based retrieval model will be based on an adaptation of the classic vector space model, which includes document annotation, weighting and concept-based ranking algorithm. ITSO5_T4_2

Agent based Meeting scheduling in hierarchical Organizations


Ozgur Koray Sahingoz Personal Information Management systems are important tools which are used by individuals for organizing their daily calendars to remember important events like birthdays, anniversaries, appointments and meetings. The problem of scheduling meetings is a time-consuming and basic part of the daily tedious task in an organization. Meeting scheduling is a difficult task because current Personal Information Management systems cannot handle the responsibility of automatically managing time slots of meeting participants. In this paper a distributed multi-agent system architecture in which each participant is represented by an agent is presented. These agents autonomously work together to organize different participants to arrange meetings on their behalf. System is managed by a set of distributed static and mobile agents which are developed over Java Agent DEvelopment Framework-JADE for platform independence. System has developed with minimal message passing and without divulging the privacy of involved users. Experimental analysis shows that this approach is scalable and handling strong constraints.
ITSO5_T4_5

Transformation of L2 Writers to Correct English: The Need for A Computer-Assisted Writing Tool
Tuan Norhafizah Tuan Zakaria, Mohd Juzaidin Ab Aziz, Tg Nor Rizan Tg Mohd Maasum Most of current existing writing tools are developed by native speakers of English (L1). Some of these writing tools may not be suitable for non-native writers (L2) who used English as a second language (L2). The writing styles of L2 writers are different from the writing styles of L1 writers. One of the main problems faced by L2 writers were generating ideas while writing. They tended to generate ideas in L1 and later translated into English as L2. They also lack in vocabulary which make the problem further. People with limited vocabularies are often forced to use the relatively few words they know without knowing their precise meaning. The objective of this paper is to discuss an approach to develop a computer-assisted writing tool for L2 writers. The vocabulary used in business letters will be investigated based on the part of letter, genre analysis and effective sentences and words for business letters. The collection of sentences and words based on these three aspects will be used to develop an electronic dictionary and develop rules to check the sentences and provide suggestive example sentences. Some techniques will be used in order to automatically detect and correct sentences.
ITSO5_T4_3

A case study on Implementation of grid Computing to Academic Institution


Ahmed Mohammed Al-iesawi,Mohd Isa Mohd Samat This Paper offers a discussion on how to implement a grid computing environment with planning steps and as such , it covers the basic requirements for setting up a grid computing environment, and present the suitable topology and design to set up an initial grid for research and data processing in academic institutions , and off course not to forget how to maintain and expand the grid. Grid Computing offers this tremendous opportunity to unlock these resources and repurpose them (and any new resources) into a widely accessible (pool of resources) available to all applications and users. Knowing what a grid is and what it can do for whom uses it is essential when planning to use this technology to tackle the most demanding computational problems. However, when going through the process of implementing a grid computing environment, there are many other issues that arise and that may require special attention. This paper will be a significant guideline for IT mangers as such, it will assist organizations which already having clusters on campus to explore it if they can be shared and linked together.

Application of semantic Technology in Digital Library


Nor Afni Raziah Alias, Shahrul Azman Noah, Zuraidah Abdullah, Nazlia Omar, Maryati Mohd Yusof, Yazrina Yahya Digital libraries play an important role in current activities involving digital documents. The research presented in this paper explores the future implementation of digital library by considering the semantic technology.This paper discuss our on-going research in developing a semantic digital library for academic institution. We aim to propose a prototype to
4th International Symposium on Information Technology 99

a conference of World Engineering, Science & Technology Congress

ABSTRACTS
ITSO5_T4_6 Value Frequency (RVF); (2) Uncommon Attribute Value Matches (UAVM); (3) Hybrid I (H1) and; (4) Hybrid II (HII) Weighting Schema are evaluated for Y-STR Surname data. The overall results show that the clustering accuracy of all methods is in between 40 44% only. None of the methods produces a significant good clustering result for Y-STR data.

Attribute Value Weighting in k-Modes Clustering for y-short Tandem Repeats (y-sTR) surname
Ali Seman, Zainab Abu Bakar, Azizian Mohd. Sapawi
This paper evaluates Y-STR Surname data for attribute value weighting in K-Modes clustering algorithm. Four weighting methods: (1) Relative

ITsO5_T7:
ITSO5_T7_1

16 JuNE 2010 (2.00 PM 4.00 PM) VENuE: 3-06


is known about how HCI being incorporated in Malaysian practices. We undertook a 12-week ethnographical study aimed at revealing HCI perceptions among different managerial levels in IT department and agencies. We describe and discuss the factors that either impede or drive technology managers towards HCI awareness, based on the nature of IT-related/software development in Malaysia. The result of the study indicates that stakeholders overall perception of HCI was influenced by their national and organizational culture. The lack of emphasize on the usable interface design and scarce information regarding user studies and evaluation is a major concern. Within this context of developing countries, we uncover and explain the difficulty of creating HCI awareness and adopting usability are due to complexity of the government and national systems. We suggest that stakeholders and policy makers such as the Malaysian Communications and Multimedia Commission (MCMC) and The Malaysian Administrative Modernization and Management Planning Unit (MAMPU) are more relevant in influencing and/or reinforcing the incorporation of HCI in the workplace and enhance the usability of the products and software created in the organization at the managerial level.
ITSO5_T7_4

Information security Considerations for higher Learning Institutions


Zuraini Ismail, Maslin Masrom, Dayang Suhana Hamzah, Zailani Mohammed Sidek
Information security is the most important element in an organization including the High Learning Institution (HLIs). Apart from technological aspect, HLIs must enforce proper policies, procedures, and standards in compliance with laws and regulations to ensure safe and secured environment. This research has two main objectives. First is to identify the major component of information security framework (ISF). Secondly, to investigate IT personnel perceptions on the existing information security policy practices. Two modes of data collection were used in this study; interview and survey respectively. Hence, this research has defined five major components in the ISF through the preliminary investigation via interview with the IT personnel in HLIs. Based on the developed ISF, a survey was conducted to fulfill the second objective. As a result, it shown that most of them are concerns with the existing policy and practices. Nevertheless, improvement of policy content, awareness and compliance must be focus in order to ensure the information security level is at topmost. This paper explains the results and future hope in detail. ITSO5_T7_2

Evaluating heuristic for Eg Portal Design Model


Murni Mahmud, Ab Razak Che Hussin, Noor Khairunnisa Othman, Halina M. Dahlan The effective use of an E-Government (EG) Portal depends on the ability of people to utilize electronic services. One of the main challenges in developing the EG Portal is selecting usability design guidelines that addressed the overall EG functions. Most government agencies tend to design their portal based on existing guidelines that are not directly related to the EG context. In this study, the basic functions and characteristics of the EG Portal were analyzed. The concept of usability, the design guidelines, and the heuristic were reviewed. A set of questionnaires was distributed to users to access its accuracy of the proposed heuristic for design model of EG portal. The result indicates that the heuristic in the design model could reduce the usability problems in the portal.
ITSO5_T7_5

Assessing knowledge Management Readiness in Organizations


Mohamed Jalaldeen Mohamed Razi, Nor Shahriza Abdul Karim The importance of measuring organizational readiness to implement knowledge management (KM) process has been well documented in the literature from both practitioners and academics perspectives. However, very limited information is available in the literature in this regard. Hence, the present authors propose a research model by integrating knowledge creation theory (SECI process), KM enablers, and individual acceptance models. In addition, an instrument that can be used to measure the KM readiness of an organization also presented. The reliability of the proposed instrument was tested among 222 executives in the Sri Lanka Telecommunication Industry.
ITSO5_T7_3

hCI Practices in Malaysia: A Reflection of IT Professional Perspective


Idyawati Hussein, Murni Mahmud, Alvin W. Yeo Although Human Computer Interaction (HCI) has been practiced by western countries over the last 40 years, very little
4th International Symposium on Information Technology 100

Designing a Computer Literacy Course


Alan Oxley This paper is based on the experience of reviewing a computer literacy course taught at the British campus of an American university. The comments and advice given are applicable to
a conference of World Engineering, Science & Technology Congress

ABSTRACTS
those charged with designing a new course as well as those re-designing an existing one. The author was employed at the university until recently. The steps taken to design the course are given and the syllabus is compared to that of the European Computer Driving License.
ITSO5_T7_6 transferring technical knowledge between the lecturers to the students for programming courses conducted at Universiti Teknologi PETRONAS (UTP). The purpose of this study is to present academics and practitioners insights on the challenges of transferring technical knowledge to learners. Programming lecturers are considered as a person with technical knowledge because they have the ability to explain theoretically and practically technical concepts and also has theoretical ability to face a technical problem, analyze it, describe it and solve it.

The Challenges in Transferring Technical knowledge: A universiti Teknologi PETRONAs Case study
Khairul Shafee Kalid
This paper reports a case study on the challenges of transferring technical knowledge. The study focuses on the challenges of

ITsP4:
ITSP4_ 1

17 JuNE 2010 (8.30 AM 12.00 PM) VENuE: fOyER


that will surely fulfill all the users requirement and also the needs of EG citizens.
ITSP4_ 3

ICT, knowledge society, and good governance: Relationship and Interaction Pattern
Aziz Perdana In todays digital era, the community becomes an important basis for development. Development funding is no longer rely on natural resources but also on the creative economy based on knowledge. Therefore, people are expected to take advantage of the use of ICT (Information And Communication Technology) as a tool to be able to create a knowledge society. There are many research discussed about knowledge society, but none of them can provide a clear mapping about relationship and the pattern of interaction among ICT usage, knowledge society, and good governance. This paper tried to summarize previous research about knowledge society and its supporting components, and then make a map of relationship among ICT usage, knowledge society, and good governance. This paper also identifies obstacles based on the map in implementing the knowledge society as well as offering strategies to overcome these obstacles.
ITSP4_2

Limitations and Measures in Outsourcing Projects to geographically Distributed Offshore Teams


Rehan Akbar, Mohd Fadzil Hassan Latest global social, economic and technological changes have given birth to a new generation of software engineering practice. Traditional approaches of software development have become less popular. Software development by centrally located in-house teams has slowly been replaced by geographically distributed offshore teams. As such project outsourcing to geographically distributed offshore teams has become a popular and profitable practice. Although it has a number of positive aspects, disadvantages of outsourcing to distributed offshore teams far out-weighted its advantages. This paper identifies those issues associated with this trend and proposes the improvement techniques to overcome them. The paper suggests that the success of project management activities is dependent on reducing the risk factors and the capability of the project managers to manage the issues involved.
ITSP4_4

Information sharing through football Website Equatorial guinea (Eg) Case study
Emelia Akashah P.Akhir, Y.Y.Chen, Goh Kim Nee, Savita K.Sugathan,Salvador Nguema Obama This paper demonstrates the needs of football websites in Equatorial Guinea (EG) which is one of the smallest country in African continent. The websites is designed with the purpose to encourage information sharing and promoting EG football team among football fans from inside and outside of EG. This research is initiated based on three (3) key factors : 1) EG people would like to promote their football national team; 2) the lack of medium to share the football news; 3) need a platform to keep themselves updated and exchange opinion with other fan. Implementing a football website also could give benefit in terms of promoting the league to the outside world. Pre-implementation questionnaires were distributed to EG citizens and the result is analyzed to evaluate the needs. The feedback from the respondents on the websites features and design will be evaluated before it is transformed into a portal

An Improved security framework for Data Warehouse: A hybrid Approach


Sajjad Ahmad, Rohiza Ahmad The implementation of data warehouses (DWs) for the huge databases has become one of the major needs of the current times. Large organizations having different small databases need a proper integration of their small databases and development of data warehouses. The development of data warehouse for an organization helps in storing the statistical information that can be helpful in decision making process later on. This statistical information needs to be stored with proper security and confidentiality. At the same time, this information also needs to be readily available to all authorized users, in order to ensure the accuracy and consistency of data. Though, so far, a lot of work has been done towards the development of data warehouses, but not much attention has
a conference of World Engineering, Science & Technology Congress

4th International Symposium on Information Technology

101

ABSTRACTS
been given towards improved and optimal implementation of security measures in data warehouses. This paper highlights some of the security approaches, like classical security models and implementation of filter over data before they are kept in statistical form in a data warehouse. The comparison of these approaches and introduction of a hybrid approach of the security implementation in data warehouses is the main focus of this paper.
ITSP4_5

lead to a comprehensive and fully utilized theses digital library that support users, both as information producers and as information users.
ITSP4_7

Integrating National Culture into Information and Communication Technology Adoption Model
Mohamed Hussain Thowfeek, Azizah Jaafar This paper focuses on the importance of positioning culture as one of the vital factors that influences the adoption of information and communication technology (ICT). The analysis of various models has made it to believe that cultural factors were not given importance to the development of adoption models. But it is understood that the national culture influences the actual behavior and it can provide additional explanatory power in explaining the variation of the behavior towards adopting a technology.
ITSP4_ 8

A Review On The Workload in The Nurse Rostering Problem


Mohd Hakimi Aiman Ibrahim, Rabiah Ahmad, Suriayati Chuprat, Habibollah Haron, Nuzulha Khilwani Ibrahim Healthcare organization is very important for community in delivering a healthy life. Nurse is the person that will handle the healthcare organization wisely. The nurses should get their duty roster with a wide hand to deliver a good service. There are some issue needs to be classified such as the modes of operation and constraints. The most desirable environment for the nurses is the fairness roster that will consider any preferences from them that is possible to give a respect and care about. Besides that, the solution approach that can be applied in their field must be clarified. In this paper, we will discuss the entire thing about the nurse rostering problem such as its constraints, the modes of operation, the process to complete a roster and the solution approach to this problem.
ITSP4_ 6

factors Influencing knowledge sharing in higher Learning


A.H Azni, Azreena Abu bakar, Nuradli Shah, Hanifah Abd Hamid A strategy in ensuring a country able to face the globalization challenges and sustain the economy growth is by establishing a dynamic human resource which able to support the development of k- based economy and to leverage the country productivity and competitiveness. Practicing the knowledge management is not as easy as we thought for without proper plan it would not reach the objective furthermore it will spend many cost. This paper will identify the factors that affect knowledge sharing in order to enable the sharing of knowledge activities be carried out effectively in organization.
ITSP4_9

Applying zachmans framework to Determine the Content of semantic Theses Digital Library
QurratuAini Adibah Ahmad Fazil, Zuraidah Abdullah,Shahrul Azman Mohd. Noah Digital library brought a high impact phenomena as it contributes a lot in term of new way in dealing with knowledge. Bazillion (2001) stated that libraries built after 1995 have a different look and feel that defines intellectual information centre where people and technology interact. Most scholars believed that the way knowledge been created and disseminated fundamentally were altered by a series of innovation begins by Michael S. Hart, with his Project Gutenberg as the first producer of free electronic books in 1971 (Bazillion, 2001). Apart from being the oldest digital library developed, Project Gutenberg also works as a catalyst in rapid development of multiple kind of digital libraries nowadays. Since then, digital library plays a vital role in supporting academia activities including creation, organization, preservation and dissemination of knowledge. As part of the extensive development and deployment of digital libraries initiatives over the past decades, attention should be drawn to its massive growth in content design and storage capacity. This study proposed a framework to determine the content of a semantic theses digital library based on the Zachmans Framework data dimension. Six artifacts in Zachmans Framework which are Data, Process, Place, People, Time and Motivation are applied to represent six layers of semantic digital library architecture. Twenty-four public and private institutions of higher learning in Malaysia were selected for data collection and further evaluation. A framework which is more robust, offers user friendly interface besides adaptable search and browsing interface empowered by semantic can
4th International Symposium on Information Technology 102

Information security Risk Management An Empirical study on the Importance and Practices in ICT Outsourcing
Nik Zulkarnaen Khidzir, Noor Habibah Hj Arshad, Azlinah Mohamed There are many organizations opt for outsourcing in order to cut cost and improve efficiency for their ICT services. On the other hand, ICT outsourcing could also contribute to some risks especially information risks that could jeopardize information asset in the company. An appropriate information security risk management (ISRM) in ICT outsourcing should be in place in order to minimize the potential risks and their impact to business operation as well as ICT services. The objective of this research is to conduct an empirical study on the relationship between importance and practices of ISRM in ICT Outsourcing. Questionnaires were distributed to various private companies and government agencies in Malaysia for the study. Findings of the study show that importance of ISRM process influences its practices in ICT outsourcing. Through the findings, information security risk professional would be able to identify the importance of ISRM and improve
a conference of World Engineering, Science & Technology Congress

ABSTRACTS
their practices in managing information security risk for ICT outsourcing projects. Finally, companies and government agencies need to improve their practices managing information risks in ICT Outsourcing.
ITSP4_10 ITSP4_11

formal specification Languages for Real-Time systems


Rabia Sammi, Iram Rubab, Muhammad Aasim Qureshi This paper presents a survey about the formal specification languages which are used to specify Real-time systems. Real time systems are critical systems such as nuclear missile system, auto pilot system etc. A minor fault in these systems can result into serious consequences. These consequences may comprise threat to human life. Therefore it is very vital to specify the system correctly. To achieve the correct and unambiguous specification, formal languages are used. Formal languages increase the confidence on the specification and hence the overall system. This paper compares formal languages which are used to specify real-time systems such as VDM++, RTSJ, ASTR AL. A comparison criterion is established to select the best suitable specification languages for Real-Time systems. In the end a small example is mapped in to three selected specification languages which conclude that which language provides the best constructs and tools for Real-Time systems.
ITSP4_12

Defining Information system failure in Malaysia: Results from Delphi Technique


Norshita bt Mat Nayan, Halimah Badioze Zaman
Information system is one of Information Technology divisions. The emergence of information system can be found in many areas. However, based on a report, percentage of failure for information system projects are still disturbing. In order to make an accurate evaluation regarding the status of information system in Malaysia, the definition of information system failure need to be peeled off specifically for Malaysia environments. Therefore, this study is conducted to identify the definition of failure by using Delphi technique. The intention of defining the definition will make it as a hit statistic about the usage of information system particularly in the Malaysia government sectors. Twenty experts have been selected, but only ten were willing to participate throughout the research. Experts were chosen from variety fields in information system background. Research has been conducted by considering experts views from three round. Research questions were developed and distributed to all experts involved. Analysis were performed by using SPSS version 16 and consensus from experts were taken by evaluating the min, median and also the inter quartile. All items were analysed and items with high value were selected as main element in the definition. On the final phase, the definitions were verified by the experts participated.

histogram Matching for Color Detection: A Preliminary study


Fatma Susilawati Mohamad, Azizah Abdul Manaf, Suriayati Chuprat Several similarity measures such as Euclidean Distance, Histogram Intersection, Cosine or Quadratic Distances are usually used to calculate the images similarity rating. However, each of the distances has their own limitations when used in particular situation or application. This paper reports a preliminary study of current similarity measures used based on histogram matching. Few experiments on image and color histograms are also presented and discussed. Images of Oil Palm Fruits are used to estimate for its ripeness. This paper will point out the use of existing similarity measures to find the most suitable and efficient one for that particular application

4th International Symposium on Information Technology

103

a conference of World Engineering, Science & Technology Congress

AUTHOR INDEX
A
Aamir Amin 94 Abas Md Said 41, 44, 46, 58, 73, 77 Abas M. Said 69 Abdelmahamoud Youssouf Dahab 70 Abdoulaye Mahamat Zakaria 58 Abd. Samad Hasan Basari 90 Abdul Hanan Abdullah 63 Abdullah Alghamdi 68 Abdullah Mohd Zin 76 Abdullah S Alghamdi 73 Abdullah Sani Abd Rahman 81 Abdul Rahman Ahlan 79 Abdul Razak Hamdan 70 Abdulsamad Ebrahim Yahya 46 Abdurazzag Ali Aburas 48 Abdurazzaq A. Aburas 76 A. Bijari 68 Ab Razak Che Hussin 100 Abubaker Agil Emhmed Ali 59 Abu Osman Md Tap 61 Adhistya Erna Permanasari 75 Adrian Siong Min Wee 71 Afsaneh Noori Houshyar 91 A.H Azni 102 Ahmad Al Thunibat 86 Ahmad Bakeri Abu Bakar 53 Ahmad Bazli Arifin 50 Ahmad Faiz Ghazali 64 Ahmad Kamil Mahmood 55 Ahmad Mahmood 40, 41, 82 Ahmad Rafi Mohamed Eshaq 43 Ahmad Sobri Hashim 59 Ahmed Mohammed Al-iesawi 99 Ahmed Moosajee Patel 49, 64 Ahmed Patel 76 Ahsanullah Abro 40, 41 Ai Bee 43 Ainul Jaria Maidin 57 Akbar Nabiollahi 42 Aklili Khalid 60 Akmal Aris 89 Alan G. Downe 55, 75 Alan Oxley 57, 82, 85, 100 Ali Ahmad Zahrawi 52 Alias, N. 81 Ali Dehghantanha 78 Ali Selamat 57 Ali Seman 100 Ali Seyfi 76 Aliza Sarlan 52, 82 Alvin W. Yeo 100 Amit Mehta 62 Ammar Babiker 62 Ammar Mohammed Al-Jubari 75 A.Mohades 68 Anas Ayad 42 Anas F. Bayan 62 and Noraidah Sahari @ Ashaari 86 Andrew Teoh Beng Jin 49 Animesh Rana 62 Anita Agustina 48 Anmar Abuhamdah 68 Annie Ng 43 Annisa 47 Arash Mousavi 93 Arazi Idrus 81 Ariff Idris 90 Ariffin Abdul Mutalib 58 Arif Mushtaq 80 Arniyati Ahmad 63 Arun Nambiar 72 Arun Raaza 62 Asfandyar Khan 78 Asif Wagan 63, 65 Asim Elshiekh 77 Asmalia Che Ahmad 95 Asma Nuraini 85 Atheer A-Abdulrazaq 97 Aurangzeb khan 71 Avijit Paul 43 Ayad Turky 68 Azadeh Noori Hoshyar 78 Azali Saudi 71 Azaly Rezza Feisal Azlin 44 Azam Zakaria 40 Azat Rozyyev 86 Azhar Salleh 43 Azizah Abdul Manaf 103 Azizah Abdul Rahman 95 Azizah Jaafar 45, 52, 53, 88, 95, 102 Azizian Mohd. Sapawi 100 Aziz Perdana 101 Azleena Mohd Kassim 96 Azlina Ahmad 50, 51, 52, 60 Azlinah Mohamed 102
104

Azmi Jaafar 89 Azrai Hj Abdullah 74 Azreena Abu bakar 102 Azuraliza Abu Bakar 52 Azween Abdullah 43, 46, 65, 70, 73, 78, 85, 88

b
Babar Nazir 62, 94 Bahar Arifah 63 Baharum Baharudin 59, 71 Bashar Tahayna 69 Basitt, U.N.A. 81 Bassam Ali Qasem Al-Qatab 61 Bilal Mughal 63, 65 Boon Jiann Neow 40 Boon Yaik Ooi 67 Brahim Belhaouari Samir 85

C
C.Aidinis 93 Chan Yet Lai 43 Cheah, Y.-N. 85 Cheah Yu-N 82 Chee Weng Khong 81 Chen Yoke Yie 44, 81, 91 Chong Eng Tan 71 Choong Yong Liang 86 Christiono Utomo 81 Christopher Wills 49 Chua Chong Chai 82 Chui Yin Wong 40, 81 Chu Jian Ng 47 Cik Nora Salleh 57 C.Vassilopoulos 93

D
Dani Adhipta 42 Datul Aida Ali 89 Dayang Rohaya Awang Rambli 42, 59, 75 Dayang Suhana Hamzah 100 Dhanalakshmi Ramasamy 41 Dhanapal Dominic 42, 44 Dhanapal Durai Dominic 41

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

AUTHOR INDEX
Diana M.L. Wong 96 Dian Sugijarto 64 Dinara Berdykhanova 78 Diyana Syamsiyah Rozali 98 D.Marinos 93

h
Habibollah Haron 102 Hajah Norasiken Bakar 56 Halabi Hasbullah 56, 62, 63, 65, 66, 68, 69, 70, 73, 75, 77, 83, 86, 94 Halimah Badioze Zaman 50, 51, 52, 53, 54, 60, 103 Halina M. Dahlan 100 Hamada Al-Absi 46 Hameed, N. 85 Hammuzamer Irwan Hamzah 43 Handaru Jati 42 Hanifah Abd Hamid 102 Hanita Daud 56 Hanizan Shaker Hussain 47 Hariraj 78 Hasan 83 Hasiah Mohamed @ Omar 53, 56 Hassan Chizari 63 Hazlifah Mohd Rusli 88 Hazrina Yusof Hamdani 67, 97 Helmi Md Rais 70 Hesham Awadh Bahamish 68 Hitoshi Oi 66 Huah Yong Chan 67 Hui Yang Chng 40 Humera Farooq 77

Irshad Ahmad 60 Irshad Ahmed Soomro 70 Irzan Ashraf Abd Aziz 75 Ismail Bahari 95

E
Elisha Tadiwa Nyamasvisva 63 Eliza Mazmee Mazlan 52, 78 Elliyani Atan Awang 98 Emelia Akashah Patah Akhir 44, 48, 60, 81, 91, 101 Enas Dhuri Kusuma 45 Entisar S. Alkayal 83 Etienne Schneider 48, 72

J
Jaak Tepandi 91 Jafreezal Jaafar 55, 90 Jalil Md Desa 73 Jamalul-lail Ab Manan 70 Jamalul-Lail Ab Manan 64 Janagiammal Ramasamy 90 Jaya Malathy Poloha Nadan 90 J. Jaafar 54 J.Klaue 93 John Grundy 83 John Hosking 83 Jrn Loviscach 80 J.Schalk 93 Juan Jose Martinez Castillo 65 Juhana Salim 50, 69, 89 Juliana Aida Abu Bakar 97 Jumail Wastam 59 Jumat Sulaiman 71

f
Faaizah Shahbodin 56, 86 F. A. Hussin 54 Faisal A Abu Rub 41 Faizal M.A. 74 Fakariah Hani Mohd Ali 47 Farahwahida Mohd 59 Fatemeh Ahmadi-Abkenari 57 Faten Damanhoori 88 Fathilah Ismail 91 Fathy A. Essa 83 Fatma Susilawati Mohamad 103 Faudzi Ahmad 59 Fazal e Amin 82 Fazli Subhan 65 Ferhat Khenak 44 F. Maleki 68 Foong Oi Mean 83

k
Kajendra Ganeson 91 Kalaivani Chellapan 59 Kamaluddeen Usman Danyaro 55 Kamal Zuhairi Zamli 84 Kamaruzaman Mohamed Hali 89 Kashif Nisar 77 K.C. Soong 80 Keat Keong Phang 72 Keen Ngee Loo 47 Keng Hoon Gan 72 Khabbazi M.R. 83 Khairuddin Kamaludin 51 Khairuddin Maskat 89 Khairul Aiman Ab Maulod 52 Khairullah khan (UTP) 71 Khairul Nisak Md Hasan 67 Khairul Shafee Kalid 101 Khalidah Khalid Ali 56 Khalid Haroun Mohamed Abdelgadir 67 Khalid Jaber 71

I
Ibraheem M. Dooba 55 Ibrahim Abood Almrashdah 55 Ibrahim Ahmad 86 Idyawati Hussein 100 Iftikhar Ahmad 73 Iftikhar Ahmad Khalid A. Nafjan 68 Ili Farhana Md Mahtar 52 Ili Hawa Ahmad 88 Ily Amalina Ahmad Sabri 91 Imas Sukaesih Sitanggang 47, 48 Indrawati 55 I. Nor Haslinda 80 Intan Ermahani A. Jalil 58 Intan Hashimah Mohd Hashim 96 Intan Najua Kamal Nasir 44 Iram Rubab 103
105

g
Gil-Soo Han 57 Goh Chiao Wei 87 Goh Kah Ong Michael 49 Goh Kim Nee 44, 45, 81, 91, 101 Gopal. S. Joshi 62 Gunnar Piho 91

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

AUTHOR INDEX
Kien Sin Aw 50 Kimberly Chu 81 K. Massila 80 Kok-Wai Chew 55 K S Rama Rao 67 Kumaresh 78 Kwang Hooi Yew 92 Md Nasir Sulaiman 71, 80 Md Yazid Mohd Saman 64 Media A. Ayu 61, 85 M.E.Shiri 68 M. F. Hassan 54 M.H. Alomari 56 Mir Abbas Bozorgi Rad 95 Mirko Caspar 74 Mirko Lippmann 74 M. Nordin Zakaria 43, 77 Mohamad Farhan Mohamad Mohsin 79 Mohamad Shanudin Zakaria 52, 80, 98 Mohamed E. Gumah 48 Mohamed Hussain Thowfeek 102 Mohamed Jalaldeen Mohamed Razi 100 Mohamed Nazul Ismail 52 Mohamed Nordin Zakaria 46, 62 Mohamed Othman 75, 80 Mohamed Redzuan Abdullah 80 Mohammad Ishak Desa 95 Mohammad Khatim Hasan 90 Mohammad Zaidi Zakaria 67 Mohammed Abdi 97 Mohammed Hadwan 48 Mohd Fadzil Hassan 42, 43, 45, 56, 62, 64, 66, 73, 77, 82, 90, 94, 96, 98, 101 Mohd Hakimi Aiman Ibrahim 102 Mohd Hasan Selamat 89 Mohd Hazali Mohammad Adib 89 Mohd Helmy Abd Wahab 79 Mohd Hilmi Hasan 40, 60, 64, 70 Mohd Isa Mohd Samat 99 Mohd Juzaiddin Ab Aziz 66, 84 Mohd Juzaidin Ab Aziz 99 Mohd Kushairi Mohd Rajuddin 59 Mohd Nazri Ismail 76 Mohd Nizam Osman 61 Mohd Rizal Mohd Isa 89 Mohd Rushdan Muhd Said 80 Mohd Saiful Abdul Rahman 68 Mohd Shahizan Othman 69 Mohd Sharifuddin Ahmad 68 Mohd Shukri Ismail 57 Mohd Yunus Sharum 71 Mohd Zaki M. 74 Mourad Oudelha 61
106

L
Lay-Ki Soon 93 Lee Chee Yean 93 Leng Khang Khaw 40 Liang Ying Oh 74 Lim Chia Yean 84 Lim Thean Pheng 84 Lim Tong Ming 79, 86, 87, 92, 93 Lin Cheng Hong 92 Lizawati M. Yusof 69 Lochandaka Ranathunga 47 Low Tan Jung 56, 78 Lusiana Efrizoni 83

M
M. Abdulghafour 61 Mahamat Issa Hassan 88 Mahendhiran Nair 57 Mansour Esmaeilpour 95 Marini Abu Bakar 74 Marini Bakar 64 Marliza R. 74 Mart Roost 91 Maryati Mohd Yusof 99 Maslin Masrom 100 Masood Ur Rehman 75 Masrah Azrifah Azim Murad 66 Masrah Azrifah Azmi Murad 71, 79 Masri Ayob 48, 68 Matthias Vodel 74 Mazani Manaf 72 Mazeyanti Ariffin 70, 75, 94 Mazlan Mahadzir 43 Maznan Deraman 73 Maznie Manaf 79 Mazni Omar 98 Md Jan Nordin 46 Md. Jan Nordin 51, 93

Mousavi 83 Moustapha Tahir 72 Muhamad Lazim Talib 75 Muhamad Taufik Abdullah 77 Muhammad Aasim Qureshi 66, 103 Muhammad Abdul Tawab Khalil 96 Muhammad Agni Catur Bhakti 70 Muhammad Ayaz 78 Muhammad Azlil Syafiq 81 Muhammad Dhiauddin Mohamed Suffian 80 Muhammad Imran 73 Muhammad Jehangir Khan 54 Muhammad Nasir 68 Muhammad Qaiser Saleem 90 Muhammad Rafie M.A. 89 Muhammad Tahir 41 Muhammad Tanvir 69 Muhammad Tariq Siddique 46 Muhammad Taufik Abdullah 71 Muna Azuddin 88 Muna Elsadig 85 Murali Raman 55 Muriati Mokhtar 54 Muriati Mukhtar 52, 91, 98 Murni Mahmud 79, 97, 100 Murniza Muhamad 60 Muslihah Wook 75 Mustafa Man 67 Musyrifah Mahmod 95 Mutasem Alsmadi 55 Muthukkaruppan Annamalai 49 Muzafar Khan 41

N
Naghmeh Mahmoodian 48, 66 Najhan M.Ibrahim 82 Nanna Suryana Herman 90 Naseebullah 54, 56 Nasriah Zakaria 76, 87, 88 Nasuha Lee Abdullah 43 Nazleeni Haron 70 Nazleeni Samiha Haron 45 Nazlia Omar 99 Nazlia Omar 52, 99 Nidal Kamel 59

4th International Symposium on Information Technology

a conference of World Engineering, Science & Technology Congress

AUTHOR INDEX
Nik Marsyahariani Nik Daud 88 Nik Nur Aisyah Nik Ghazali 63 Nik Zulkarnaen Khidzir 102 Noor Elaiza Abdul Khalid 72 Noorfadzilah Md Zainudin 45 Noor Faezah Mohd Yatim 51, 52 Noor Habibah Hj Arshad 87, 102 Noorihan Abdul Rahman @ Abdul Rashid 51 Noor Khairunnisa Othman 100 Noor Maizura Mohamad Noor 64, 78, 91 Noor Syakirah Ibrahim 78 Nor Afni Raziah Alias 99 Noraida Ali 78, 91 Noraidah Md Bati 53 Noraidah Shaari @ Ashaari 55, 92 Noraini Seman 94 Norain Mohd Yusoff 40 Nor Aniza Abdullah 47 Norasiken Bakar 86 Nor Athiyah Abdullah 76 Nor Azan Mat Zin 51, 52, 55, 50, 86 Nor Azila Awang Abu Bakar 56, 88 Nor Azura Husin 48 Nordin Abu Bakar 94 Norfarhana Abdollah 60 Nor Fatimah Awang 63 Nor Fazlina Iryani Abdul Hamid 90 Norhayati Mohd Ali 83 Norita Md Norwawi 79 Norizal Abd Latif 64 Norizan Mohamad 49 Nor Laila Md Noor 49 Norleyza Jailani 64 Norlia Mustaffa 83, 87 Norlina Mohd Sabri 53 Normazlina Mohamed zi 95 Normie Azura Abdul Jamil 88 Norshahriah Wahab 75 Nor Shahriza Abdul Karim 57, 100 Norshakirah Ab Aziz 92 Norshidah Mohamed 88 Norshita bt Mat Nayan 103 Norshuhani Zamin 62, 85, 98 Norsiah Abdul Hamid 54 Norsila Shamsuddin 59 Norziha Megat Mohd. Zainuddin 50 N.Schmitt 93 Nudzul Izaney M.Z. 56 Nuradli Shah 102 NurAini Abdul Rashid 61, 67, 71, 97 Nur Athirah Radzi 74 Nur Atiqah Sia Abdullah 89 Nurazlina Md Sanusi 58 Nurazzah Abd Rahman 93 Nur Diana Mohd. Nuri 73 Nurfarhana Mohd Nor 56 Nurhazirah Mohd Bakri 56 Nur Hazwani Mohamad Roseli 58 Nuridawati Mustafa 58 Nurjannaton Hidayah Rais 77 Nursakirah Ab.Rahman Muton 88 Nurul Aida Osman 99 Nurul Hasan 78 Nurulnadwan Aziz 58 Nuzulha Khilwani Ibrahim 102

Q
QurratuAini Adibah Ahmad Fazil 102

R
Rabiah Abdul Kadir 77, 79 Rabiah Ahmad 102 Rabia Sammi 103 Rabiu Ibrahim 57 Radziah Mohamad 83 Radzi Hanif 43 Rafidah Mohd Ramli 88 Rafie, M. 85 Rafiza Ruslan 54 Raja Mohd Tariqi Raja Lope Ahmad 54 Raja N. Ainon 61 Raja Noor Ainon 61 Ramesh Kumar Ayyasamy 69 Rana Ghadban 97 Rehab Shreef 76 Rehan Akbar 45, 101 Reza Alinaghian 95 Riaza Mohd Rias 53 Riza Sulaiman 78, 91, 95 Robiah Y. 74 Rod De Lara 55 Rohaida Romli 84 Rohiza Ahmad 52, 59, 66, 78, 82, 92, 101 Roliana Ibrahim 95 Rory V. OConnor 97 Rose Alinda Alias 42 Roshini Rajamanicam 87 Rosilah Hassan 60 Roslan Sadjirin 93 Rosli Besar 59 Roslina Ibrahim 45 Rosnah Idrus 94 Rosni Abdullah 61, 68, 71 Rozana Kasbon 52, 78 Roziati Zainuddin 47, 51 Rozie Ezrina Shuhimi 86 Rozita Kadar 46 Rusli Abdullah 66, 89 Rustam Asnawi 42

O
O.A. Younis 56 Ola Younis 58 Onn Azraai Puade 50 Osman Ahmed Abdalla 77 Othman, M.S. 81 Ozgur Koray Sahingoz 99

P
Pallawi 62 Parthiban P 41 Patricia Goon 57 P. D. D. Dominic 77, 96 P.D.D. Dominic 54, 82, 97, 98 P.D.D.Dominic 56 P. Dhanapal Durai Dominic 75 Phek Lan Thung 47 P.Kouros 93 Puteri Shireen Jahn Kassim 97

4th International Symposium on Information Technology

107

a conference of World Engineering, Science & Technology Congress

AUTHOR INDEX
s
Saadat Alhashmi 69 Saadiah Yahya 47, 87 Safaai Deris 41, 63 Sahilu Wendeson 45 Sai Peck Lee 47 Sajjad Ahmad 101 Sally Hassan A. 89 Salman Firdaus Sidek 92 Salvador Nguema Obama 101 Salwana Mohamad @ Asmara 64 Salwani Abdullah 52 Salyani Osman 52 Samaneh Nadali 79 Saman Shishehchi 51 Sameha Ahmed Ali Alshakhsi 66 Sanep Ahmad 52 Sangeetha Valloo 90 Sarah Azmee 48 Sarah Behnam 95 Savita K. Sugathan 44, 81, 91, 101 Sayed Ali Kasaei Zadeh 46 Sazilah Salam 86 S. D. Silva Jose Paua 92 Sei Ping Lau 71 Seyed Yaser Bozorgi Rad 95 Seyed yashar Bani hashem 51 Shafaf Ibrahim 72 Shafiz Affendi Mohd. Yusof 95 Shahida Sulaiman 46, 47, 84 Shahrina Md Nordin 58 Shahrin Sahib 74 Shahrul Azman Noah 52, 89, 99, 102 Shailendra Singh 98 Shakirah Mohd Taib 66 Shamsul Sahibuddin 42, 51 Sharifah-Lailee Syed Abdullah 98 Sharifah Mumtazah Syed Ahmad 87 Sharifah Suhaila Mohd Ramli 69 Sheikh Tahir Bakhsh 69 Shohel Sayeed 59 Sho Niboshi 66 Shuhadah Othman 72 Shuib Bin Basri 97 Shukor Abd Razak 63 Siew Eu-Gene 69 Sim Kah Wei 41 Sina Lessanibahri 95 Siong Hoe Lau 49 Siti Aisyah Ismail 61 Siti Azila Zainudin 44 Siti Farhana Mohamad Hashim 89 Siti Hamin Stapa 66 Siti N. Abdullah 70 Siti Noor Arfah Umar 83 Siti Noradlina Mat Using 66 Siti Noraishah Musa 43 Siti Nur Syazana Mat Saei 56, 83 Siti Rahayu S. 74 Siti Rohaidah Ahmad 63 Siti Salwa Salim 51 Siti Salwa Salleh 49 Siti Shafrah Shahawai 94 Siti Zaharah Mohid 50 Siti Zarinah Mohd Yusof 43 Sohail Safdar 73 Subarna Sivapalan 74, 91 Sufian Idris 52, 74 Suhaidi Hassan 70 Suhaila Zainudin 41 Sulafa Mohd Amin 85 Sulaiman 83 Suraya Masrom 81 Suriayati Chuprat 67, 102, 103 Suziah Sulaiman 40, 41, 44, 56, 59, 60, 64, 76, 77, 80, 83 Swee Jing Thung 47 Syed Ahmad Aljunid 47 Syed Nasir Alsagoff 90 Syerina Azlin Md Nasir 49 Thomas Sri Widodo 45 Tong Ming Lim 74 T.Pistner 93 T. Puckdeepun 54 Tsamrul Fuad 47 Tuan Norhafizah Tuan Zakaria 84, 99

u
Umi Kalsom Yusof 40, 63 Umi Kalthum Ngah 72 Uwe Dippel 42

V
Vahideh Naderifar 95 Vijanth Sagayan A/L Asirvadam 43 Vincent KT Khoo 84

W
W. Aezwani W. A. Bakar 67 Wahidah Husain 84, 87 Wan Fatimah Wan Ahmad 40, 42, 45, 48, 58, 59, 60, 74, 77, 82 Wan M.N. Wan-Kadir 83 Wan Norazlinawati Wan Abd Arif 58 Waskito Adi 76 Wolfram Hardt 74 Wong Wai Keong 86 Wou Onn Choo 52

T
Tang Enya Kong 82 Tan Lai Heng 79 Tat-Chee Wan 54, 62 Ta Thu Ha 92 Teddy Mantoro 61, 85 Tee Connie 49 Tek Yong Lim 81 Tengku Mohd Tengku Sembok 93 Tengku Sembok 52, 93 Tew Yiqi 49 Tg Nor Rizan Tg Mohd Maasum 84, 99 Tg Zatul Hidayah Tg Petra 66

y
Yahya Tashtoush 56, 58 Yaser Miaji 70 Yasir Abdelgadir Mohamed 65 Yazrina Yahya 52, 57, 98, 99 Yee-Jun Wong 43 Yousra Abdulaziz 87 Yuhanim Hani Yahaya 89 Yuhanis Omar 92 Yu-N Cheah 67, 96, 98 Yunita Sari 62

4th International Symposium on Information Technology

108

a conference of World Engineering, Science & Technology Congress

AUTHOR INDEX
Yusri Arshad 79 Yusuf, L.M. 81 Y.Y.Chen 101

z
Zafarina Zainuddin 64 Zahian Ismail 60 Zailani Mohamed Sidek 67 Zailani Mohammed Sidek 100 Zainab Abu Bakar 93, 94, 100 Zainal Abidin Nordin 57 Zain Balfagih 82 Zaitul Azma Zainon Hamzah 71 Zalinda Othman 54 Zaman, Azlina Ahmad 50, 52, 60 Zarinah Mohd Kasirun 87 Zarina Shukur 74 Z. Farhood 61 Zubair Ahmad Khattak 64 Zulaiha Ali 93 Zulaiha Ali Othman 52, 70, 73 Zulkarnain Md Ali 80 Zulkeflee Kusin 80 Zulkefli Mansor 87 Zulkhairi Md. Dahalin 95 Zuraidah Abdullah 99, 102 Zuraini Hanim Zaini 48 Zuraini Ismail 100

4th International Symposium on Information Technology

109

a conference of World Engineering, Science & Technology Congress