14
International MultiConference of Engineers and Computer Scientists IMECS 2014 12-14 March, 2014 The Royal Garden Hotel, Kowloon, Hong Kong i Organizing Association: IAENG International Association of Engineers IA ENG International Association of Engineers ISBN: 978-988-19252-5-1 ISSN: 2078-0958

Engineers and Computer - gbv.de · am Ya'u Gital, Abdul Samad Ismail, Min Chen, andHaruna Chiroma Safety Verification of Floodgate Operation Protocols Using Hybrid Automata M. V

Embed Size (px)

Citation preview

Page 1: Engineers and Computer - gbv.de · am Ya'u Gital, Abdul Samad Ismail, Min Chen, andHaruna Chiroma Safety Verification of Floodgate Operation Protocols Using Hybrid Automata M. V

International MultiConference of

Engineers and Computer Scientists

IMECS 2014

12-14 March, 2014

The Royal Garden Hotel, Kowloon, Hong Kong

i

Organizing Association:

IAENG

International Association of Engineers

IAENG

International Association of EngineersISBN: 978-988-19252-5-1

ISSN: 2078-0958

Page 2: Engineers and Computer - gbv.de · am Ya'u Gital, Abdul Samad Ismail, Min Chen, andHaruna Chiroma Safety Verification of Floodgate Operation Protocols Using Hybrid Automata M. V

Table of Contents

International MultiConference of Engineers and

Computer Scientists

IMECS 2014

Preface xxix

Committees xxx

Abstracts of Invited Lectures 1

VOLUME I

The 2014 IAENG International Conference on

Artificial Intelligence and Applications

Island-Model-based Distributed Modified Extremal Optimization with

Tabu Lists for Reducing Crossovers in Reconciliation Graph

Keiichi Tamura, and Hajime Kitakami 1

Recurrent-Fuzzy-Neural System-based Adaptive Controller for Nonlinear

Uncertain Systems

Tzu-Wei ffu, and Ching-Hung Lee 7

Cluster-based Particle Swarm Algorithm for Solving the Mastermind

Problem

Dan Partynski 13

Virtual Machine Scheduling Management on Cloud Computing Using

Artificial Bee Colony

B. Kruekaew, and W. Kimpan 18

An Application of Fuzzy Inference System Composed of Double-Input

iii

Page 3: Engineers and Computer - gbv.de · am Ya'u Gital, Abdul Samad Ismail, Min Chen, andHaruna Chiroma Safety Verification of Floodgate Operation Protocols Using Hybrid Automata M. V

Rule Modules to Control Problems

Hirofumi Miyajima, Fumihiro Kawai, Noritaka Shigei, and Hiromi

Miyajima

Software Risk Factors: A Survey and Software Risk Mitigation

Intelligent Decision Network Using Rule Based Technique

Muhammad Asif, Jamil Ahmed, and Abdul Hannan 29

A New Method for Improving the Performance of Linkage Pattern Mining

Saerom Lee, Takahiro Miura, and Yoshifumi Okada 36

An Intelligent System Based on Natural Language Processing to Support

the Brain Purge in the Creativity Process

Fadi Issa, Davy Monticolo, Alex Gabriel, and Simona Mihaita ..

41

Applying TAM Model to Evaluate the Indoor Parking Guidance and

Information System

Kuo-Wei Su, Chen-Ni Chen, Nai-Hsin Kuo, and Hsin-Hui Tseng ...

46

Multi-Scale Subspace Grids Based Approach for Recognising Patterns in

Applications Involving Multidimensional Data

M. Arif Wani 52

An Intelligent Model Framework for Handling Effects of Uncertainty

Events for Crude Oil Price Projection: Conceptual Paper

Haruna Chiroma, Sameem Abdulkareem, and Abdulsalam Ya'u Gital 58

Gesture Recognition System for Human-Robot Interaction and Its

Application to Robotic Service Task

Tatsuya Fuj'ii, Jae Hoon Lee, and Shingo Okamoto 63

Applying Eye Tracking to Evaluate Indoor Parking Navigation System

Kuo-Wei Su, Hou-Hui Cai, Yi-Ying Wu, and Ya-Ting Li 69

Image Classification by Transfer Learning Based on the Predictive

Ability of Each Attribute

Masahiro Suzuki, Haruhiko Sato, Satoshi Oyama, and Masahito^

Kurihara

Taxonomy of Low-level Hybridization (LLH) for PSO-GA

S. Masrom,- Siti Z. Z. Abidin, N. Omar, and K. Nasir 79

iv

Page 4: Engineers and Computer - gbv.de · am Ya'u Gital, Abdul Samad Ismail, Min Chen, andHaruna Chiroma Safety Verification of Floodgate Operation Protocols Using Hybrid Automata M. V

SBCAW-PSO: A Sine-Based Chaotic Adaptive Inertia Weight Particle

Swarm Optimization

Yu-Huei Cheng, and Che-Nan Kuo 87

Tissue Characterization of Coronary Plaque by Subspace Method with

Consideration to Neighborhood Information of Target Tissue

Shota Furukawa, Eiji Uchino, Shinichi Miwa, and Noriaki^

Sue take

Bounds for the Permutation Flowshop Scheduling Problem with Exact

Time Lags while Minimizing the Total Earliness and tardiness

Imen Hamdi, and Taicir Loukil 95

The 2014 IAENG International Conference on

Bioinformatics

In-silico Study of the Role of Differentially Expressed Genes and

MicroRNAs in Host-Pathogen Interaction

Nilubon Kurubanjerdjit, Ching-Yi Chen, Ke-Rung Tzeng, JinShuei Ciou,

Jeffrey J. P Tsai, Chien-Hung Huang, and Ka~Lok Ng ....

Reoptimization of Motif Finding Problem

Jhoirene B. Clemente, Jeffrey A. Aborot, and Henry N. Adorna.

106

A Study on Gaze Estimation System using Cross-Channels

Electrooculogram Signals

Mingmin Fan, Hiroki Tamura, and Koichi Tanno 112

Bimodal Biometrics for Health Care Infrastructure Security

0. A. Esan, S.M. Ngwira, and T. Zuva 117

Iterative Optimal TM_Score and Z_Score Guided Sampling Significantly

Improves Model Topology

Ashish Runthaia, and Shibasish Chowdhury 123

Multi-Scale Gaussian Mixtures for Cross-species Study

ZiHua Yang, AbdulJatif Alwatban, Richard Everson, and Zheng Rong

Yang

v

Page 5: Engineers and Computer - gbv.de · am Ya'u Gital, Abdul Samad Ismail, Min Chen, andHaruna Chiroma Safety Verification of Floodgate Operation Protocols Using Hybrid Automata M. V

Blood Vessel Contour Estimation in Eye Fundus Image Using Fuzzy

Inference for Diagnosis of Arteriosclerosis

Shots Furukawa, Eiji Uchino, Miyu Kawachi, Hideaki Misawa, and Noriaki

Suetake

The 2014 IAENG International Conference on

Bioinformatics Special Session: The IAENG

International Workshop on Biomedical Engineering

Characteristic of Spectral Exponent of Epileptic ECoG Data

Corresponding to Levels in Wavelet-Based Fractal Analysis

Suparerk Janjarasjitt, and Kenneth A. Loparo 140

The Comparison of Pronation and Supination between Typically

Developing Children and Children with ADHD

M. Kaneko, H. Okui, K. Higashi, Y. Noguchi, Y. Katayama, T. Ohya, Y.

Yamashita, and K. Iramina

The 2014 IAENG International Conference on Computer

Science

Using Software-Defined Networking for Real-Time Internet Applications

Tim Humernbrum, Frank Glinka, and Sergei Gorlatch 150

An Algorithm for Enumerating All Maximal Tree Patterns Without

Duplication Using Succinct Data Structure

Yuko ITOKAWA, Tomoyuki UCHIDA, and Motoki SAM) 156

Exertainment: Designing Active Video Games to Get Youth Moving

Hung, Pranata, R. Altamimi, and Geoff D. Skinner 162

Unsupervised Adaptation of ASR Systems Using Hybrid HMM / VQ Model

Akella Amarendra Babu, Yellasiri Ramadevi, and Akepogu Anandad

169Rao

vi

Page 6: Engineers and Computer - gbv.de · am Ya'u Gital, Abdul Samad Ismail, Min Chen, andHaruna Chiroma Safety Verification of Floodgate Operation Protocols Using Hybrid Automata M. V

Pronunciation Tutoring using Kinect

Farah binti Dinbandali, and Satoshi Ichimura 175

RFID-based Location Tracking System Using a Peer-to-Peer Network

Architecture

Felix C. P. Hui, Henry C. B. Chan, and S. H. Fung 181

An Enhanced Evaluation Approach: Computer Science and its Framework

M. Satoskar 186

Restricted Poly-Time SAT-Solvable CNF's

Stefan Porschen, and Tatjana Schmidt 191

A Framework for the Design of Cloud Based Collaborative Virtual

Environment Architecture

Abdulsalam Ya'u Gital, Abdul Samad Ismail, Min Chen, and Haruna

Chiroma

Safety Verification of Floodgate Operation Protocols Using Hybrid

Automata

M. V. Panduranga Rao, and Akhilesh Chaganti 201

Virtual Network Construction with K-Shortest Path Algorithm and

Prim's MST Algorithm for Robust Physical Networks

Yasuhiro Urayama, and Takuji Tachibana 206

Termination Detection for Synchronous Algorithms in P Systems

Huiling Wu 211

A Novel Approach towards Very High Level Programming

Darshan Patel, Devashish Thakur, and Kavi Mahesh 217

Adaptive PCA-SIFT Matching Approach for Face Recognition Application

Isra 'a Abdul-Ameer Abdul-Jabbar, Jieqang Tan, and Zhengfeng

Multiple Link Faults Restoration Mechanism in An Enhanced EPON

Architecture

Andrew Tanny Liem, IShyan Hwang, and AliAkbar Nikoukar 227

Semantic Web Improved with IDF Feature of the TFIDF Algorithm

vii

Page 7: Engineers and Computer - gbv.de · am Ya'u Gital, Abdul Samad Ismail, Min Chen, andHaruna Chiroma Safety Verification of Floodgate Operation Protocols Using Hybrid Automata M. V

Jyoti Gautam, Ela Kumar, and Mehjabin Khatoon

Techniques for Scaling Components of Web Application

Ademola Adenubi, Olanrewaju Lewis, and Bolanle Abimbola

233

240

The 2014 IAENG International Conference on Control

and Automation

Designs of Minimal-Order State Observer and Servo Controller for a

Robot Arm Using Piecewise Bilinear Models

Tadanari Taniguchi, Luka Eciolaza, and Michio Sugeno 246

Set-Point Manipulation Approach toward Overcoming Limitation of

Closed Architectural Framework

Tan Kok Kiong, and Kyaw Ko Ko Htet 252

Astaticism in the Motion Control Systems of Marine Vessels

Maria A. Smirnova, Mikhail N. Smirnov, and Tatiana E.„ .

6dO

Smirnova

Computer Simulations and Experiments on Vibration Control of a

Flexible Link Manipulator Using a Piezoelectric Actuator

Abdul Kadir Muhammad, Barlas Raheel Khan, Shingo Okamoto, and Jae Hoon

TZoZ

Lee

Multiprogram Digital Control

Nikolay V. Smirnov, Tatiana E. Smirnova, Mikhail N. Smirnov, and Maria

A. Smirnova

2D0F H infinity Control for DC Motor Using Genetic Algorithms

Natchanon Chitsanga, and Somyot Kaitwanidvilai 272

Fault Tolerance in Asynchronously Operated Machines Allowing

Temporary Violation of Normal Specification

Jung-Min Vang, and Seong Woo Kwak 277

Velocity Grid Map Approach and Its Application to Collision-Free

Navigation

Tomoshi Yamashita, Jae Hoon Lee, and Shingo Okamoto 283

VIII

Page 8: Engineers and Computer - gbv.de · am Ya'u Gital, Abdul Samad Ismail, Min Chen, andHaruna Chiroma Safety Verification of Floodgate Operation Protocols Using Hybrid Automata M. V

An Exploration of Robot Utilization for Vehicles in Tracking Shortest

Route

Mahamaya Mohanty, and Abhinav Bhardwaj 289

Optimum Tuning of the PID Controller for Stable and Unstable Systems

Using Nonlinear Optimization Technique

Fares Alariqi, and Adel Abdulrahman 292

Semi-passive Biped Robot using Motion Control Combining Energy and PD

Controls

Toshiya Yamada, Shingo Okamoto, and Jae Hoon Lee 297

The Method of Accounting of Bounded External Disturbances for the

Synthesis of Feedbacks with Multi-purpose Structure

Mikhail N. Smirnov, Maria A. Smirnova, and Nikolay V. Smirnov 301

The Assessment and Analysis of using a Temperature Sensor to Regulatethe Automatic Gain Control of the Amplifier in a FLASH-OFDM System

Wei Chien, Hsien-Wei Tseng, Yang-Han Lee, YingSen Ho, Tsai~Hua Rang,

and Yu~De Liao

Virtual Taxi Stand Management System

Kar Leong TEW, Jessie CAT, Elliot CHIAM, Ziheng LIN, Bernice NG,^

Manning ZHANG, and Steve LEE

Nonlinear Adaptive Control for Wind Energy Conversion Systems Based

on Quasi-ARX Neural Networks Model

Mohammad Abu Jami'in, Imam Sutrisno, and Jinglu Hu 313

The 2014 IAENG International Conference on Data

Mining and Applications

On a Fuzzy c-means Algorithm for Mixed Incomplete Data Using Partial

Distance and Imputation

Takashi Furukawa, Shin~ichi Ohnishi, and Takahiro Yamanoi....

319

Combination Features for Semantic Similarity Measure

Dat Huynh, Bat Tran, and Wanli Ma 324

ix

Page 9: Engineers and Computer - gbv.de · am Ya'u Gital, Abdul Samad Ismail, Min Chen, andHaruna Chiroma Safety Verification of Floodgate Operation Protocols Using Hybrid Automata M. V

Comparing Performances of Markov Blanket and Tree Augmented Naive-

Bayes on the IRIS Dataset

Haruna Chiroma, Abdulsalam Ya'u Gital, Adamu Abubakar, and Akram

Zeki

Extracting Characteristics of Items Based on Patterns in

Recommendation Graphs

Daisuke KITAYAMA, and Kazutoshi SUMIYA

Using Decision Trees to Identify Key Factors of KeywordAdvertisements

LongSheng Chen, and Tai-Cheng Kuo

Comparison of Classification Techniques in Education Marketing

Sheila A. Abaya, Bobby D. Gerardo, and Bartolome T. TanguiligIII

A Comparative Study of Algorithms for Grouping Cancer Data

Ran Qi, and Shujia Zhou

Bag of Features Based Remote Sensing Image Classification UsingRANSAC And SVM

Bharathi S, Karthik Kumar S, P Deepa Shenoy, Venugopal K R, L M

Patnaik

A New Density-based Spatial Clustering Algorithm for ExtractingAttractive Local Regions in Georeferenced Documents

Tatsuhiro Sakai, Keiichi Tamura, and Hajime Kitakami

IURA: An Improved User-based Collaborative Filtering Method Based

Innovators

Qianru Zheng, Chi-Kong Chan, and Horace H.S. Ip

iRecruit Tool : A Marketing Application for Higher Educational

Institution using C4. 5 Classification Technique

Sheila A. Abaya, Bobby D. Gerardo, and Bartolome T. TanguiligIII

A Discernibility Degree and Rough Set Based Classification Rule

Generation Algorithm (RGD)

Page 10: Engineers and Computer - gbv.de · am Ya'u Gital, Abdul Samad Ismail, Min Chen, andHaruna Chiroma Safety Verification of Floodgate Operation Protocols Using Hybrid Automata M. V

Honghai FENG, Hongjiang FENG, Yanyan CHEN, and Junhui HUANG..

377

Route Recommendation Method Based on Driver's Intention Estimation

Considering the Route Selection When Using the Car Navigation

Keisuke Hamada, Shinsuke Nakajima, Daisuke Kitayama, and Kazutoshi

Sumiya383

Ratio-Type Estimators in Stratified Random Sampling using Auxiliary

Attribute

R. V. K. Singh, and A. Ahmed 389

Improved Training of Predictive ANN with Gradient Techniques

Dharminder Kumar, Sangeeta Gupta, and Parveen Sehgal 394

A Data Cube for Mobility Observation (D3M0)

Ting Wang 400

Application of Fuzzy Logic to Multimedia Streaming Dissemination

System for Vehicular Networks

Chenn-Jung Huang, Yu~Wu Wang, Chuan-Hsiang Weng, Heng-Ming Chen, and

Chao-Yi Chen

The 2014 IAENG International Conference on Imaging

Engineering

Optoelectronic Pattern Recognition Based on YUV Color Model with

Shifted Training Images and Liquid Crystal Spatial Light Modulator

Yuezhe Li, Chulung Chen, Yachu Hsieh, and Hsinyi Chen 414

A Navigational Aid System for Visually Impaired Using Microsoft

Kinect

Mahmud Ridwan, Ehtesham Choudhury, Bruce Poon, M. Ashraful Amin, and

Hong Yan

A Novel Way to Improve Facial Expression Recognition by Applying Fast

Fourier Transform

Dehai Zhang, Da Ding, Jin Li, and Qing Liu 423

Fast and Memory Efficient 3D-DWT Based Video Encoding Techniques

xi

Page 11: Engineers and Computer - gbv.de · am Ya'u Gital, Abdul Samad Ismail, Min Chen, andHaruna Chiroma Safety Verification of Floodgate Operation Protocols Using Hybrid Automata M. V

V. R. Satpute, Ch. Naveen, K. D. Kulat, and A. G. Keskar.

427

Computer Based Pattern Placement Optimization on a Frame

Wikaria Gazali, and Fredy Purnomo 434

Rope Skipping Motion Recognition System Using Kinect

Youji OCHI 437

Face Recognition Enhancement Based on Image File Formats and Wavelet

De-noising

Isra'a Abdul-Ameer Abdul-Jabbar, Jieqang Tan, and Zhengfeng

Hou

The 2014 IAENG International Conference on Internet

Computing and Web Services

CB-Cloudle: A Centroid-based Cloud Service Search Engine

Shengjie Gong, and Kwang Mong Sim : 446

Serendipitous Recommendation Method based on WWW Access Log

Toshiharu Nakashima, Kenji Nakamura, and Shigeru Oyanagi 452

Why Users Leave? Discussion about Users' Switching Behaviors in

Social Network Sites

Y. L. Wu, Y. H. Tao, C. M. Chung, and C. P. Li 457

Measurement of Bloggers' Buzzword Prediction Ability Based on

Analyzing Frequency of Early Mentions of Past Buzzwords

Seiya Tomonaga, Shinsuke Nakajima, Yoichi Inagaki, Reyn Nakamoto,4o^

Tsukasa Ogura, and Jianwei Zhang

The Less Communicated Story of Location Based Service in Retail

Applications

Jessie Cai 468

Inferring Intentions of Twitter Users to Visit Places

Chengcheng Zhang, Haruhiko Sato, Satoshi Oyama, and Masahito

Kurihara

xii

Page 12: Engineers and Computer - gbv.de · am Ya'u Gital, Abdul Samad Ismail, Min Chen, andHaruna Chiroma Safety Verification of Floodgate Operation Protocols Using Hybrid Automata M. V

Developing a Theory of Diagnosticity for Online Reviews

Alton Y. K. Chua, and Snehasish Banerjee 477

Comprehensive Web Search based on Sentiment Features

Katsutoshi Minami, Shoko Wakamiya, Noriaki Hata, Yukiko Kawai,

Tadahiko Kumamoto, Jianwei Zhang, and Yuhki Shiraishi

The Study for Selecting the WWW Service Consignment Performance of

Shared Sales Resource of Publishing

Tsai-Hua Rang, Wei Chien, Jan-Ou Wu, Jian-An Sue, and Kai-Jun

Zhang

An E-commerce Recommender System Based on Degree of Specialties in

Online Shops

Motoki Zaizen, Daisuke Kitayama, and Kazutoshi Sumiya 492

A Tool for Impact Analysis of Test Cases Based on Changes of a Web

Application

Surasak Phetmanee, and Taratip Suwannasart 497

A Linguistic Framework to Distinguish between Genuine and DeceptiveOnline Reviews

Snehasish Banerjee, and Alton Y. K. Chua 501

Extraction of Naming Concepts Based on Modifiers in Recipe Titles

Akiho Tachibana, Shoko Wakamiya, Hidetsugu Nanba, and Kazutoshi

c.

507Sumiya

Minimizing Message Exchanges in Agent Based Cloud Service Composition

Suleiman Onimisi Aliyu, and Kwang Mong Sim 513

Recipe Recommendation Method by Considering the User's Preference and

Ingredient Quantity of Target Recipe

Mayumi Ueda, Syungo Asanuma, Yusuke Miyawaki, and Shinsuke

Nakajima

The 2014 IAENG International Conference on

Scientific Computing

xiii

Page 13: Engineers and Computer - gbv.de · am Ya'u Gital, Abdul Samad Ismail, Min Chen, andHaruna Chiroma Safety Verification of Floodgate Operation Protocols Using Hybrid Automata M. V

Hierarchical Modelling and X-ray Analysis of Human Dentine and Enamel

Tan Sui, Michael A. Sandholzer, Nikolaos Baimpas, Alexander J. G. Lunt,

Igor P. Dolbnya, Jianan Hu, Anthony D. Walmsley, Philip J. Lumley, 524

Gabriel Landini, and Alexander M. Korsunsky

Shear Properties of Graphene Containing Nitrogen Atoms and Grain

Boundaries Using Molecular Dynamics Simulations

Shingo Okamoto, and Akihiko Ito 529

Numerical Method for the Heat Equation with Dirichlet and Neumann

Conditions

A. Cheniguel 535

Mobile Application for Field Knowledge Data of Urban River Catchment

Decision Support System

Fathoni Usman, Rohayu Che Omar, and Lariyah Mohd Sidek 540

Computational Modeling of Honeycomb Structures with Shape Memory

Alloys

Y. Toi, and J. He 545

On Positive Definite Solutions of the Linear Matrix Equation X + A*XA

= I

Sana'a A. Zarea, Salah M. El-Sayed, and Amal A. S. Al-Marshdy 551

The Hybrid Extragradient Method for the Split Feasibility and Fixed

Point Problems

Jitsupa Deepho, Wiyada Kumam, and Poom Kumam 558

FDM for Curved Geometries in Electrostatics II: the Minimal Algorithm

David Edwards Jr. 564

The 2014 IAENG International Conference on Software

Engineering

Automated Test Case Generation Considering Object States in Object-

Oriented Programming

Hiroki fakamatsu, Haruhiko Sato, Satoshi Oyama, and Masahito 569

xiv

Page 14: Engineers and Computer - gbv.de · am Ya'u Gital, Abdul Samad Ismail, Min Chen, andHaruna Chiroma Safety Verification of Floodgate Operation Protocols Using Hybrid Automata M. V

Kurihara

An Automated Testing Tool Using UI Structure

Nutharat Harnvorawong, and Taratip Suwannasart 574

Analysis of an IIS hosted Private Cloud Web Application: Hacker* s

Perspective

Nilaykumar Kiran Sangani, and Nand Kumar 579

Sequence Diagram Generation with Model Transformation Technology

Photchana Sawprakhon, and Yachai Limpiyakorn 584

Comparing Heuristic Search Methods for Selecting Sequence of

Refactoring Techniques Usage for Code Changing

Ratapong Wongpiang, and Pornsiri Muenchaisri 590

Modeling the Mobile Application Development Lifecycle

Tejas Vithani, and Anand Kumar 596

Change Pattern-Driven Traceability of Business Processes

Watcharin Uronkarn, and Twit tie Senivongse 601

VOLUME II

XV