CONTENT

2014 IACSIT GENEVA CONFERENCES
CONTENT
Welcome to Geneva Conferences
………………………………………………………………………….2
Announcement
………………………………………………………………………….3
Introduction of Conference Chair and Keynote Speakers
……………………………………………………………………….…5
Instruction for Oral Presentation
………………………………………………………………………….8
Technical Program at a Glance
………………………………………………………………………….9
Detailed Technical Program
Schedule for October 8…………………………………………10
Schedule for October 9…………………………………………11
Information of Conference Venue
………………………………………………………………………27
Call for Paper
………………………………………………………………………28
Note
………………………………………………………………………………34
1/ 34
2014 IACSIT GENEVA CONFERENCES
Welcome to Geneva Conferences
Dear Professors and Distinguished Delegates,
Welcome to 2014 IACSIT Geneva Conferences. On behalf of IACSIT
organization, I would like to thank all the Conference Chairs,
Program Chairs and the technical Committees. Their high
competence and professional advice enable us to prepare the
high-quality program. We hope all of you have a wonderful time at
the conference and also in Geneva.
We believe that by this excellent conference, you can get more
opportunities for further communication with researchers and
practitioners
with
the
common
interest
in
Information
Communication and Management, International Conference on
Computer and Electrical Engineering, Distance Learning and
Education.
In order to hold more professional and significant international
conferences, your suggestions are warmly welcomed. And we are
looking forward to meeting you again next time.
Best Regards!
Yours sincerely,
Teresa Zhang
Director of Conference Department, IACSIT
2/ 34
2014 IACSIT GENEVA CONFERENCES
Announcement
 All accepted papers of ICDLE 2014 will be published in International Journal of
Information
and
Education
Technology
(IJIET,
ISSN:
2010-3689,
www.ijiet.org ),which will be indexed by Engineering & Technology Digital
Library, Google Scholar, Crossref and ProQuest.
 All accepted papers of ICCEE 2014, both invited and contributed, will be
reviewed by two or three experts from the TC. After a careful reviewing process,
all accepted paper will be published in the following journals:
International Journal of Electrical Energy (IJOEE)
ISSN: 2301-3656 Abstracting/Indexing: EI (INSPEC, IET), Ulrich's Periodicals
Directory, Google Scholar, EBSCO, Engineering & Technology Digital Library
and etc.
International Journal of Computer and Electrical Engineering (IJCEE)
ISSN: 1793-8163 Abstracting/ Indexing: Ulrich's Periodicals Directory, Google
Scholar, EBSCO, Engineering & Technology Digital Library, Crossref,
ProQuest, EI (INSPEC, IET), and Electronic Journals Library
International Journal of Information and Electronics Engineering (IJIEE)
ISSN: 2010-3719 Abstracting/ Indexing: Google Scholar, Electronic Journals
Library, Engineering & Technology Digital Library, Crossref and ProQuest,
DOAJ, Ei (INSPEC, IET).
3/ 34
2014 IACSIT GENEVA CONFERENCES

All accepted papers of ICICM 2014, both invited and contributed, will be
reviewed by two or three experts from the TC. After a careful reviewing process,
all accepted paper will be published in the Lecture Notes on Information Theory
(LNIT, ISSN: 2301-3788, www.lnit.org ),which will be indexed by Ulrich's
Periodicals Directory, EBSCO, Engineering & Technology Digital Library,
Crossref and Electronic Journals Digital Library.
*Attention:
 For the journal publication schedule, some authors could not get the journal on
conference site. We’ll post the journal after publication.
 The soft copy of the conference proceeding including all registered papers will
be handed out to the presenters.
 One excellent presentation will be selected from each session and the author of
excellent presentation will be awarded the certificate after the session is over.
IACSIT Committee
4/ 34
2014 IACSIT GENEVA CONFERENCES
Conference Chairs & Keynote Speakers
Prof. Stephanie Teufel
University of Fribourg international institute of management in
technology, Switzerland
Stephanie Teufel studied Informatics / Computer Science at the Technical University of
Berlin and the Swiss Federal Institute of Technology Zurich (ETH). From the University of
Zürich she received her Doctor's degree. She was a lecturer at the University of Wollongong,
Australia, and a university professor for Management Information Systems at the Carl von
Ossietzky Univer-si-tätOldenburg, Germany. Since April 2000 she holds a full
professorship in ICT-Management at the Faculty of Economics and Social Sciences, the
University of Fribourg, Switzerland. Furthermore, she is the director of the international
institute of management in technology (iimt). She is author/co-author of a multitude of
scientific publications and books and a member of numerous national and international
boards and committees.
Major research interests: Innovation and Technology Management, Energy Systems
Management, Management of Information Security, Project Management.
Title:Decentralization and Energy-Prosumers
Abstract:After the Fukushima disaster European politicians began to reassess the energy
strategy for their countries. The focus is now on renewable energy sources and as a result on
decentralization. The decentralized generation, storage, and of course consumption of
energy is the central point. Now with the new developments under the roof of energy
turnaround the way back from the centralized architecture of our energy system to a more
decentralized one is predetermined. Moreover, decentralization implies the change in the
role of today’s consumers. They become energy prosumers. This is the basis for the Crowd
Energy concept.
5/ 34
2014 IACSIT GENEVA CONFERENCES
Dr. Fang Lou
School of life Science / learning and Teaching Institute, University of
Hertfordshire, UK
Dr Fang Lou was born in 1963 in Hangzhou, China. She obtained a BSc in Biology from the
University of Science and Technology of China (1986), and a PhD in Medical Sciences from
the Lund University, Sweden (1994). She did post doctorial research at the Imperial College,
London, United Kingdom, in muscle physiology.
Dr Fang Lou joined the University of Hertfordshire, United Kingdom, in 2002 as a lecturer
in Physiology. She is interested in pedagogy with the application of blended learning,
particularly in peer assessment and group work. She has been seconded to the Learning and
Teaching Institute between September 2009 to August 2014 as a principal lecturer. She has
been involved in the management and staff training of the online teaching tool
‘Elluminate/Collaborate’ and ‘Adobe Connect’ across the university. She works with many
colleagues in the university on assessment for learning and flexible learning. She is the
Departmental Lead in Learning and Teaching.
Dr Fang Lou is a Senior Fellow of the UK Higher Education Academy, and member of the
Physiological Society. Her publications cover both the physiology and learning and
teaching fields.
Title:Assessments for distance learning
Abstract: Assessment is always a challenging topic, especially with online courses. What
are the purposes and principles of assessments? How can students benefit from assessments
and feedback? What about staff effort? What can technology do to assist assessments?
Examples of various formative and summative assessments will be shared, including peer
assessment, group assessment, online assessment tools, e.g. QuestionMark Perception,
Examsoft, EZ, etc.
6/ 34
2014 IACSIT GENEVA CONFERENCES
Prof. Dr. Dimiter Georgiev Velev
Department of Information and Communication Technology, University
of National and World Economy, Sofia, Bulgaria
Prof. Dr. Dimiter Georgiev Velev was born in 1958 in Vidin, Bulgaria. He holds a M.Sc.
degree in Electro-engineering from the Technical University of Sofia, Bulgaria (1984) and a
Ph.D. degree in Engineering Sciences (Computer Systems, Complexes, Systems and
Networks) from the Institute of Simulation Problems in Power Engineering at the National
Academy of Sciences of Ukraine (1994).
Prof. Dr. Dimiter G. Velev is with the Department of Information and Communication
Technology at the University of National and World Economy, Sofia, Bulgaria since 1996.
He is the Bulgarian representative in the TC5 Technical Committee (Application of
Information Technology) of the International Federation for Information Processing (IFIP).
He is an IEDRC fellow and a member of other professional organizations.
Prof. Dr. Dimiter G. Velev’s main R&D interests include Internet business applications,
cloud computing, online social networking, mobile applications and mobile learning,
information systems for management of natural disasters. Prof. Velev teaches Internet
technologies, Web programming languages, service-oriented architectures, informatics.
Prof. Dr. Dimiter G. Velev is an established chair and a keynote speaker in conferences in
China, UAE, Malaysia, Thailand, Sri Lanka, etc. He also is a regular program committee
member and reviewer in many conferences in Europe and Asia.
Title: Virtualizing the Education – Participants, Technologies, Challenges
Abstract: The rapid development of Information and Communication Technology (ICT)
has brought to significant changes in the many fields of life. Educational institutions have
learned quickly to integrate ICT solutions into education and training, which in turn has
produced new models of education such as distance learning, e-learning, and blended
learning. Internet, computers, tablets, and smartphones have become a main point of focus
in everyday life in many households, offices and schools around the world. In this
continuous and interconnected process not only ICT changes – the human participants
(teachers and students) undergo a major shift in the way they teach and learn.
7/ 34
2014 IACSIT GENEVA CONFERENCES
Instruction for Oral Presentation
Devices Provided by the Conference Organizer:



Laptop (with MS-Office & Adobe Reader)
Projector & Screen
Laser Sticks
Materials Provided by the Presenters:

PowerPoint or PDF files
Duration of each Presentation (Tentatively):


Regular oral presentation: about 13-15 minutes (including Q&A)
Keynote speech: about 45 minute (including Q&A)
Notice:
Please keep your belongings (laptop and camera etc) with you!
8/ 34
2014 IACSIT GENEVA CONFERENCES
Technical Program at a Glance
October 8
Venue: Lobby
10:00-17:00
09:00-09:10
09:10-09:55
October 9
9:00-11:45
Venue:
IACSIT Meeting
Room -BILL
09:55-10:40
10:40-11:00
11:00-11:45
October 9
12:00-13:30
Breakout Area
BILL
Venue:
IACSIT Meeting
Room –BILL
Venue:
IACSIT Meeting
Room -Marissa
October 9
19:00-20:30
Opening
Prof. Stephanie Teufel
Remarks
Plenary
Dr. Fang Lou
Speech I
Plenary
Prof. Dimiter G. Velev
Speech II
Group Photo &Coffee Break
Plenary
Prof. Stephanie Teufel
Speech III
Lunch (Novotel Café Restaurant)
Venue:
IACSIT Meeting
Room –BILL
Venue:
IACSIT meeting
room -Marissa
October 9
13:30-18:30
Registration
13:30-16:00
13:30-16:00
Session I-E-education (10papers)
DL0003,DL0011,DL0015,DL0018,DL0021,DL0022,
DL1004,DL1007,DL1017,A1008
Session II-Education and e-health
(11papers)
DL0006,DL0009,DL0010,DL0012,DL0013,DL0017,W015,
W005,W031,W003,W033
16:00-16:20
Coffee Break
16:20-18:30
Session III-Enterprise management and
IT(11papers)
16:20-18:30
Session IV- Smart grid and
communications (12papers)
W006,W008,W009,W010,W011,W034, W024,
DL0026,W210, A0021,A0036
W209,W025,A0004,A006,A0017,A0019,A0025,A0027,
A0032,A0037,A0039,A0042
Dinner Banquet (Novotel Café Restaurant)
9/ 34
2014 IACSIT GENEVA CONFERENCES
Detailed Technical Program
Schedule for October 8
Onsite registration: October 8, 2014
Time
Event
Location
10:00-17:00
Arrival, registration and conference materials
collection
Lobby
Address
Rue de Zurich 19 1201 GENEVE SWITZERLAND
Telephone
Staff
Tel. (+41)22/9099000
Teresa Zhang /Yoyo Yang
Note:
(1) You can also register at any working time during the conference
(2) Certificate of Participation can be collected at the registration
counter.
(3) The organizer won't provide accommodation, and we suggest you
make an early reservation.
(4) Please get the notification for your paper printed out and it is
required when you register on desk.
10/ 34
2014 IACSIT GENEVA CONFERENCES
Schedule for October 9
Morning, October 9, 2014
Plenary Speeches
Location: IACSIT meeting room BILL
09:00-09:10 Opening Remarks
Prof. Stephanie Teufel
09:10-09:55 Topic: Assessments for distance learning
Plenary
Speaker: Dr Fang Lou
Speech I
School of Life and Medical Sciences, University of Hertfordshire, Hatfield, Herts
AL10 9AB, United Kingdom
Abstract—Assessment is always a challenging topic, especially with online courses.
What are the purposes and principles of assessments? How can students benefit
from assessments and feedback? What about staff effort? What can technology do
to assist assessments? Examples of various formative and summative assessments
will be shared, including peer assessment, group assessment, online assessment
tools, e.g. QuestionMark Perception, Examsoft, EZ, etc.
09:55-10:40 Topic: Virtualizing the Education – Participants, Technologies,
Plenary
Challenges
Speech II Speaker: Prof. Dimiter G. Velev
University of National and World Economics, Bulgaria
Abstract—The rapid development of Information and Communication Technology
(ICT) has brought to significant changes in the many fields of life. Educational
institutions have learned quickly to integrate ICT solutions into education and
training, which in turn has produced new models of education such as distance
learning, e-learning, and blended learning. Internet, computers, tablets, and
smartphones have become a main point of focus in everyday life in many
households, offices and schools around the world. In this continuous and
interconnected process not only ICT changes – the human participants (teachers
and students) undergo a major shift in the way they teach and learn.
The keynote speech discusses how the digital age changes the minds of both
educators and students, new ICT technologies coming to education and the
challenges to be resolved.
10:40-11:00
Group Photo &Coffee Break
11:00-11:45 Topic: Decentralization and Energy-Prosumers
Plenary
Speaker: Prof. Stephanie Teufel
Speech III University of Fribourg international institute of management in technology,
Switzerland
Abstract—After the Fukushima disaster European politicians began to reassess the
energy strategy for their countries. The focus is now on renewable energy sources
and as a result on decentralization. The decentralized generation, storage, and of
course consumption of energy is the central point. Now with the new developments
under the roof of energy turnaround the way back from the centralized
architecture of our energy system to a more decentralized one is predetermined.
Moreover, decentralization implies the change in the role of today’s consumers.
They become energy prosumers. This is the basis for the Crowd Energy concept.
11/ 34
2014 IACSIT GENEVA CONFERENCES
12:00-13:30
Lunch Novotel Café restaurant
Afternoon, October 9, 2014
Session I-E-Education
Venue: IACSIT meeting room BILL
Time: 13:30-16:00
Session Chair:
Kaninda Musumbu,
LaBRI University of Bordeaux, France
DL0018
DL0011
Learning via A Social Media Enabled Tool – Do Learning Styles Make a Difference?
Vimala Balakrishnan
University of Malaya-Malaysia
Abstract—This paper investigated if students’ varying learning styles affect the use of social
media for learning based on two learning styles, that is independent and collaborative.
Questionnaires were used to gather the students’ perceptions after using a social media
enabled tool, which was specifically developed based on three key factors (i.e. Self, Effort
and Function). A total of 48 students with Computer Science background were recruited to
participate in the experiment. Path modeling analyses indicate the factors to predict 70% and
59% of usage among the independent and collaborative groups, respectively. Results show
collaborative students to emphasize more on Function and Effort than Self, whereas Self and
Effort had stronger impacts on the independent students than Function. Pair-wise
comparisons revealed the differences between the learning styles to be significant for Self
and Function, that is Self to be more important for independent students whereas Function
was more important for the collaborative students. No significant differences were noted for
Effort. The findings clearly indicate that students’ learning styles play important roles in
their learning activities, and hence academics should look into the possibilities of using
different approaches in their teaching practices.
Essential Considerations in Distance Education in KSA: Teacher Immediacy in a virtual
Teaching and Learning Environment.
A. Al. Ghamdi, A. Samarji, and A. Watt
College of Education, Victoria University, Melbourne, Australia
Abstract—Teacher immediacy (verbal and non-verbal) remains an important factor towards
prompting efficient pedagogical approaches. Whilst teacher immediacy in a classroom
setting is important, there is growing awareness about the importance of the construct in a
virtual setting as education shifts from explicit conventional face-to-face teaching and
learning to a blended environment which includes distance education. This paper attempts to
generate some understandings about the correlation between teacher immediacy, both verbal
12/ 34
2014 IACSIT GENEVA CONFERENCES
DL0015
DL0003
DL0022
and non-verbal, and students’ active participation and satisfaction in a distance education
learning environment. This paper considers, in a preliminary research framework, a Saudi
university which offers a range of distance education courses as an initial cohort from which
to generate such understandings. Students’ opinions, perceptions, and reported satisfaction
were captured through utilising a structured questionnaire completed by 413 participants,
enrolled in a variety of distance education courses offered by the aforementioned university.
This study found that there was significant correlation between the overall adopted teacher
immediacy (verbal and non-verbal) and students’ overall online participation and satisfaction
in the investigated distance education courses. In terms of gender differences, male
participants have higher willingness to participate than female participants within the
perceived immediacy behaviours. On the other hand, female participants were more satisfied
in terms of communication than male participants within the perceived “e-immediacy”
behaviours. These results serve as a prompt for further research on teacher immediacy in the
rapidly developing and increasing virtual education domain in a global and connected world.
Perceived Barriers towards E-learning by Faculty Members at a Recently Established
University in Saudi Arabia
M. A. AlGhamdi and A. Samarji
AlBaha University, Saudi Arabia
Abstract—E-learning is nowadaysan essential teaching and learning setting to both faculty
members and students in a digital and connected 21st Century. Despite the attempts and the
claims that many higher education institutes make in regards to e-learning, a number of
barriers retard many faculty members to progress from the state of appreciating and
acknowledging e-learning to the state of actually adopting and implementing it. Saudi higher
education institutes and Saudi faculty members are no exception in facing such barriers. This
paper investigated the challenges to adopting e-learning in higher education by focusing on
one of the recently established Saudi universities as a case study. Quantitative data were
collected through 214 questionnaires. Findings from quantitative data analysis revealed a
number of barriers which challenge the effective implementation of e-learning at the
targeted Saudi university. This paper found that barriers towards e-learning are
gender-related. In addition, this paper reports that the most cited barriers were external
sources barriers which suggests that strategic policies need to be in place to overcome such
resources barriers. Once external sources barriers are overcome, focus can shift on the
pedagogical opportunities that e-learning creates and makes possible. As e-learning is a
developing field of interest in Saudi higher education institutes, this paper adds to the little
literature conducted so far in a Saudi context. In addition, findings from this paper contribute
to the global literature on e-learning in a globalised and connected world.
Promoting of Knowledge and Moral Lessons about the Life’s 38 Blessings with Video on
the Web-Based Instruction
Sirichom Pichedboonkiatrst
Rajamangala University of Technology Lanna, Chiang Rai campus, Thailand
Abstract—An action research analysis of findings from 120 controlled evaluation studies
showed that web-based instruction with the title on the Life’s 38 Blessings usually produces
positive effects on students. The studies covered learners of undergraduate students who
registered the Life and Social Skills subject in the second semester year 2013. The Life’s 38
Blessings on WBI raised student examination scores by 86.64 standard percent in the
average study, and changed their behaviors by 4.12 standard deviations in the average study,
a high significant effect. Size of effect varied, however, as a function of study feature. The
Life’s 38 Blessings on WBI also produced small but positive changes in student attitudes
toward teaching and computers, and it reduced substantially the amount of time needed for
instruction.
New Directions in the Arts: Building Quality Online Courses and Degree Programs
13/ 34
2014 IACSIT GENEVA CONFERENCES
April Munson, Lindsey Archer; Edward Eanes; Dori Garziano; and Deborah Hutchinson
DL0021
DL1004
DL1007
College of the Arts at Kennesaw State University, US
Abstract—The landscape of virtual learning is vast, filled with rich opportunity and need to
grow new programs, reach innovative learning experiences, and offer extraordinary
opportunities for students who otherwise might not have the opportunity for a quality
education. Like any area of learning, the virtual one also has areas that lack the
understanding or transformation in pedagogy needed for proper growth, as many associate
with online learning in the arts. The focus of this paper is the path one University to nurture
the field of content and technical challenges, pioneering a well-laid foundation for virtual
learning experiences in all areas of the arts.
Developing an Open Book Examination in a Sensor Technology Course
A. J. Rissanen
National Defence University, Helsinki-Finland
Abstract—According to the Bologna declaration, the Finnish National Defence University
(NDU) provides undergraduate- and graduate-level courses in academic and military
disciplines. Military technology is one of the major learning aims at the NDU. Learning
aims in master level technology courses are on scientific knowledge, understanding how
technology is related to science, and life-long learning in technology-based working
environments. Sensor technology is one of the key elements for surveillance and target
acquisition principles. This study presents one development concept in assessment research
and how it has been applied to learning sensors. Obligatory lectures and exercises are
specific to NDU’s teaching environment. As such, they are effective methods for
co-operative learning and teacher resource utilization. On the other hand, distance education
features have been actively added to NDU’s curriculum structures. Exams can estimate
students’ learning outcome and act as tools to diversify teaching processes. When aiming for
better student motivation and learning results, enough space must be given for students’
contributions in examination protocols.
Using Emerging Technologies in Distance Learning 0054o Improve Admission Rate into
Nigerian Universities.
Ojajuni Jethro
Federal College Of Education (Technical), Akoka, Lagos State-Nigeria
Abstract—One of the major objectives of the Nigerian National policy on Education (2004)
is the provision of equal educational opportunities to all citizens at every levels of education.
With regard to high education, an aspect of the policy encourages distance learning to be
organized and delivered by tertiary institutions in Nigeria. While distance education has
been in existence for over 50 years, it can be described to be at the infantile stage in Nigeria.
With the emergence of radio, television and internet technology the mode of teaching has
changed drastically. Distance learning has been used to reduce the illiteracy rate in many
developing countries by giving admission to as many students that applied. In Nigeria more
than a million legible candidates every year could not be admitted into higher institutions
due to inadequate infrastructures in the conventional universities and other related problems.
This paper therefore examines various factors inhibiting the use of distance learning, the
present state in Nigeria, and how it can be used to improve the admission rate into higher
institutions thereby reducing illiteracy rate in the country.
Decision-Making Skills And Academic Performance Of Distance Education Learners:
Implications For Students Counsellors
NebathTanglang and AminuKazeem Ibrahim
National Open University of Nigeria- Nigeria
Abstract—The study adopted an Ex-post facto research design. The population consisted of
14/ 34
2014 IACSIT GENEVA CONFERENCES
DL1017
A1008
637 PGDDE students that were selected with the use of randomization sampling technique.
248 students were sampled for the study and the samples were grouped into two (High and
Low) Decision-making skills students. The grouping was done based on the analysis of the
samples responses on a standardised Students Academic Decision-making Skills Scale
(SADMSS). The instruments for data collection were: Students’ Academic Decision-making
Skills Scale (SADMSS) and Semester Examination course result grades in four courses
(Psychology of learning, Measurement and Evaluation, Sociology of Education and the
Good Study Guides). The Psychometric properties of the research instruments, SADMSS
were established with face and content validity and a test re-test administered after three
weeks. The obtained alpha value was 0.84 while, semester examination course result grades
of the four courses were moderated by External examiners appointed by the Senate of the
University in the four subject areas. The study employed Pearson Product Moment
Correlation coefficient statistical method to analyse the data at 0.05 level of significance.
The findings indicated no statistically significant relationship between the academic
performance in Psychology of learning (r = 0.013 < 0.901), Measurement and Evaluation (r
=0.086 < 0.391) and the Good Study Guide (r = -0.029 < 0.77) except Sociology of
Education (r = 0.27 > 0.007) between High and Low decision-making skills students.
Implications for Student’s Counsellors particularly, those serving in open and distance
learning institutions were recommended.
Comparison Study of Learning Outcomes between the Traditional Lecture and IELS
Ahmed Althobaiti
Durham University, UK
Abstract —This main goal of this paper is to compare between learning outcomes within
undergraduate students between Traditional Group and Interactive Electronic Lecture Group.
Two types of lectures were delivered to undergraduate students, the
first type was traditionally delivered in the class and enhanced by presentation slides, 16
students were involved in this lecture. The other type was electronically delivered via the
Interactive Electronic Lecture System. Both groups were tested before and after conducting
this experiment. They were given pre-test and post-test to examine their learning outcomes.
The IELS group was asked to complete a questionnaire to measure their attitude when they
used the IELS application. The result showed that the IELS students achieved more learning
outcomes than the traditional group achieved.
Learning at Your Own Pace: M-learning Solution for School Students
Uma Srithar, Dhivya Selvaraj
University of Applied Sciences, FHNW, Business School, Olten- Switzerland.
Abstract—Today’s computing trend is more towards anywhere anytime computing.
Nowadays m-learning is one of the hot topics in the educational sector and UNESCO
believes that mobile technologies can expand and enrich educational opportunities for
learners in diverse settings due to the increase in usage of mobile handheld devices. More
and more applications are being developed to make the knowledge accessible from
anywhere and at any time. The main goal of our work is to observe the usage of m-learning
solution in a developing country. Our focus was making recommendation towards the design
of self-directed learning. With the help of Quizlet application, we analyzed the effect of
m-learning solution in the rural context of Mpumelelo secondary school, Zimbabwe from
both teacher’s and student’s point of view.
Session II-Education and E-health
Venue: IACSIT meeting room -Marissa
Time: 13:30-16:00
15/ 34
2014 IACSIT GENEVA CONFERENCES
Session Chair:
Ahmad Samarji
Victoria University, Melbourne, Australia
DL0006 Global Trends in Transnational Education
Betsy J. Bannier
Lake Region State College, Devils Lake, ND 58301- USA
Abstract—The realities of globalization, both positive and negative, dominate the landscape
of higher education. Transnational education programs allow students to pursue higher
education in other countries without physically relocating. These programs offer
collaborative learning opportunities which are valuable for increasingly globalized societies,
and hold great potential for developing countries. However, concerns regarding cultural
compromise and quality assurance remain. This article highlights current global trends in
transnational education, with a dual focus on culture and quality.
DL0009 Adaptation of Learning Objects with Multi-format Assets
Joab E. Agaba and Jude T. Lubega
Makerere University Kampala, Uganda
Abstract—A good number of tools and techniques have been developed to support reuse of
learning objects in instruction design for e-learning environments. However, the challenge is
that learning objects with multi-format assets can not be fully adapted for reuse using
existing adaptation tools and techniques. This limits reusability in instruction design. This
research proposes a model to support full adaptation of learning objects with multi-format
assets so as to improve reusability in instruction design.
DL0010 Assessing Student Attitudes to Online versus Print Materials for L2 Vocabulary Acquisition
John Howrey and Kelly Quinn
Nanzan University, Japan
Abstract—Past research indicates that learners underutilize second language vocabulary
acquisition strategies. This paper presents four different methods of learning English
vocabulary from the Academic Word List (AWL), with emphasis on comparing the benefits
of print materials versus online Moodle materials. The participants in the project were first
year English majors at a private university in Japan. One set of students used print materials:
vocabulary cards and in class assessment in the first semester and a vocabulary workbook for
out of class practice combined with in class assessment in the second semester. The second
set of students used Moodle materials: out of class online Moodle activities in the first
semester and a workbook combined with out of class Moodle assessment in the second
semester. A pretest and posttest were administered to determine how well students learned
the material. Students using the print materials slightly outperformed students using the
online materials. A survey was given to assess student attitudes toward the different types of
materials and toward the method and style of the activities. This paper will discuss the results
of the posttests and learner attitudes survey.
DL0012 Lexical Analysis of Student’s Learning Activities during the giving of Instructions for
Note-taking in a Blended Learning Environment
Minoru Nakayama, Kouichi Mutsuura, and Hiroh Yamamoto
16/ 34
2014 IACSIT GENEVA CONFERENCES
Tokyo Institute of Technology-Japan
Abstract—Note-taking activity affects student’s learning performances in blended learning
courses, which consist of face-to-face sessions and online learning materials. To promote the
effectiveness of note-taking, a lecturer gave students instructions during the course.
According to the results of a lexical analysis of the contents of notes taken by students, the
lecturer’s instructions had a significant effect on some of the indices of features of notes
taken. This effectiveness can be observed when the lecturer gives instructions as opposed to
not giving them. Also, the relationships between student’s characteristics and indices of
features of content of notes taken were analyzed.
DL0013 Disruptive innovation in higher education: The professional doctorate
G. Robinson and W J. Morgan. Reed
Capella University, US
Abstract—The new Doctor of Business Administration [DBA] Program at a recognized US
University is a disruptive innovation in the field of doctoral education. It is meeting the
demand for professional doctoral education as a next step in individual professional
development. It is disruptive in several ways. First, the courses and curriculum, face-to-face
Residencies and Mentor courserooms are innovative by design. Second, learners are matched
with a DBA Mentor, chosen for their expertise and strong interpersonal skills. Third, the
dissertation process begins immediately with learners choosing a preliminary topic by end of
quarter 1. One of the unique innovative characteristics is its high touch character achieved
through technology. Additional elements of disruptive innovation include; Recognition that
online education is an innovative and disruptive force in the delivery of higher education.
Design is the new fulcrum for management to achieve its performance goals and the DBA
enables the candidate to graduate in 12 quarters or less. The new DBA professional doctorate
meets the definition of innovation through three qualities of innovation:
1. An invention, i.e., creation of something entirely new;2. An improvement, i.e., a
refinement of what has been developed; 3. The diffusion or adoption of innovation
developed elsewhere.
DL0017 Exploring Factors In Contributing Student Progress In The Open University
Muhammad Husni Arifin
W015
University of Southampton-United Kingdom
Abstract—The Open Universities nowadays have been growing up with the high number of
students. At the same time, they also facea high number of non re-enrolment and in turn have
affected the retention rate. This study was aimed to explore factors contributing to student
progress in the Indonesia Open University by employing mixed methods study. In this study,
student progress refers to continuation of learning by re-enrolling within four consecutive
semesters. A mixed methods research with the design of sequential explanatory study was
opted by obtaining the quantitative findings from surveying 127 students and then was
followed by multiple case study from four purposefully selected respondents. In the
quantitative phase, 12 predictor variables were found to have important contributions to the
predictive model of student progress. Meanwhile, in the qualitative phase, three major
themes emerged from the multiple case study analysis: (1) self-motivation; (2) quality of
institutional support; (3) interaction; and (3) supporting environment. The quantitative and
qualitative findings are discussed with reference to previous research.
Feature Grouping for Intrusion Detection based on Mutual Information
Jingping Song, Zhiliang Zhu, and Chris Price
Software College of Northeastern University-Shenyang, China
Department of Computer Science, Aberystwyth University, Aberystwyth-United
Kingdom
Abstract—Intrusion detection is an important task for network operators in today’s Internet.
17/ 34
2014 IACSIT GENEVA CONFERENCES
W005
W031
W003
Traditional network intrusion detection systems rely on either specialized signatures of
previously seen attacks, or on labeled traffic datasets that are expensive and difficult to
re-produce for user-profiling to hunt out network attacks. This paper presents a feature
grouping method for the selection of features for intrusion detection. The method is based on
mutual information theory and is tested against KDD CUP 99 dataset. It ranks the mutual
information between features and uses the fuzzy C means algorithm to compose groups. The
largest mutual information between each feature and a class label within a certain group is
then selected. The evaluation results show that better classification performance results from
such selected features.
Intrusion Detection Techniques in Mobile Adhoc Networks: A Review
Salman Naseer and Rashid Mahmood
University of the Punjab, Gujranwala Campus- Pakistan
Abstract—Mobile ad hoc networks (MANETs) use has been well-known from the last few
years in the many applications, like mission critical applications. In the (MANETS)
prevention method is not adequate as the security concerned, so the detection method should
be added to the security issues in (MANETs). The authentication and encryption is
considered the first solution of the MANETs problem where as now these are not sufficient
as MANET use is increasing. In this paper we are going to present the concept of intrusion
detection and then survey some of major intrusion detection techniques in MANET and aim
to comparing in some important fields.
MDH*: Multidimensional Histograms for Linked Data Queries
Yongju Lee
School of Computer Information, Kyungpook National University, Sangju- Korea
Abstract—Recently, a very pragmatic approach towards achieving the Semantic Web has
gained some traction with Linked Data. While many standards, methods, and technologies
are applicable for Linked Data, there are still a number of open problems in the area of
Linked Data. In this paper, we investigate how Linked Data are stored, indexed, and queried.
We present an MDH* structure capable of efficiently storing, indexing, and querying Linked
Data. The goal of the MDH* is to support efficient join query processing with a compact
storage layout. We evaluate the MDH* with existing methods on a synthetic RDF dataset.
The experimental results show that our method performs better in terms of both the join
response time and the amount of storage compared to existing methods.
Factors affecting electronic medical record acceptance by specialist physicians
Parvin Lakbala, Mahboobeh Lakbala and Kavoos Dindarloo Inaloo
Health information management research center,Hormozgan University of Medical
Sciences, Bandar Abbas-Iran.
Abstract—An Electronic Medical Record (EMR) is a longitudinal record of a patient
consisting of data owned by a single provider, Generated as by-product of daily Health
Information System (HIS) functions, an EMR provides caregivers with immediate access to
information relevant to that patient, impacting care and safety in real time. Physicians’
acceptance and willingness must be present in order to successfully implement an EMR
system; understanding Physicians’ attitudes and perceptions are of vital importance to
physicians' acceptance and willingness. The main objective of this research is to explore
physicians, attitude and perceptions of the impact on EMRs. The cross-sectional study was
conducted on 133 specialist physicians of Hormozgan Medical Sciences University in 3
educational hospitals in the city of Bandar Abbas capital city of Hormozgan province. The
most important barrier factors of EMRs in this study were technical barriers such as
limitation of the system 96 (72.2%) and interconnectivity/standardization96 (72.2%) and
social factor of uncertainly about vendor 97 (72.9%), that mentioned by majority of
physicians. This finding will help to address the barrier more appropriately, and plan for
18/ 34
2014 IACSIT GENEVA CONFERENCES
W033
implementation EMRs. With peak interest in implementing EMR, in Iran and worldwide,
knowing and acting on the beliefs associated with physicians about this technologies is as
essential as ever.
Paired Transcriptional Regulatory System for Differentially Expressed Genes
Aurpan Majumder and Mrityunjay Sarkar
Dept. of E.C.E, National Institute of Technology, Durgapur- INDIA
Abstract—A fully functional gene regulatory network can be formed using gene-gene and/or
gene-protein interactive patterns. To maintain a healthy cell cycle, it is necessary to have a
proper control of the regulatory proteins in the network. Excess protein concentration may
lead to beyond control division of the healthy cells causing cancer. In this context,
transcriptional regulators (proteins) are responsible for changes in gene expression levels
across different developmental stages. In our work we have extended a recently developed
procedure to find out the pair(s) of TFs, which can control a target gene from a linear
prospective. Here, we have explored the pairwise regulatory action through mutual
information and spline regression. In the result segment we have shown that the controlling
action between these two methods is dependent upon the dimension (number of samples) of
the data. For large dimension spline regression based controlling shows better result that MI,
and vice versa for smaller dimensions.
16:00-16:20
Coffee Break(Breakout area BILL)
Session III- Enterprise Management and IT
Venue: IACSIT meeting room –BILL
Time: 16:20-18:30
Session Chair:
Dr. Muhammad Mudasar Ghafoor
University of Dundee, United Kingdom
DL1009
The Big Student Big Data Grab
A.S. Weber
Weill Cornell Medical College, Qatar
Abstract—This contribution addresses a serious emergent policy issue regarding student data
privacy that has arisen in the United States the last five years due to the increasingly
widespread use of cloud computing services in education and the creation of large
datasets–commonly known as ‘Big Data’–collected by educational online (hosted) services.
Considerable confusion exists around the actual privacy protections offered by laws such as
FERPA, PPRA, and COPPA in online environments, and in addition the actual use and extent
of the collection of data by hosted services is not transparent. Large datasets have proven
immensely valuable to for-profit corporations, and schools generate large amounts of
information about students including state and federally-mandated student records. Thus
technology giants such as Facebook, Google, Apple, and Microsoft as well as non-profit
entities such as inBloom with strong links to for-profit companies, have been competing to
gain greater access to student Big Data for the purposes of commercialization. Using two
19/ 34
2014 IACSIT GENEVA CONFERENCES
W006
W008
W009
W010
cases studies (Google Apps for Education and inBloom, Inc.), the author demonstrates that
new student privacy laws are required in the U.S., and the author suggests the outlines of a
federal statute.
Technology Transfer as a Driver of Cooperation and Communication in a New Knowledge
Management Methodology
Amílcar A. R. Baptista, M. J. Madeira Silvaa, Carlos M. Cabritab, Fernando B. Santosc, and
José C. Pascoa
University of Beira Interior (UBI) / Department of Electromechanical Engineering,
Covilhã- Portugal
Abstract —The growing tendency of globalization and interdependency of economies is
inferred in highly competitive and chaotic context for firms and universities. Due to the high
competitiveness and changes that firms face, Technology Transfer (TT) is assumed as a key
factor to success. A better management of innovation created in research units as well as a
deeper and closer cooperation and communication of these units with the business sector are
the biggest factor of hope and strengthening for the global economy. This study arises due to
the growing necessity of the Electromechanical Department (DEM) of University of Beira
Interior (UBI) to diffuse their studies and technology among their logistic, institutional and
more importantly, enterprise partners.
Production Network Planning based on Constraint Relaxation and Discount Approach
Atour TAGHIPOUR
University of Le Havre/Faculty of International Business, Le Havre- France
Abstract—In the real world, one of the major factor that contributes to the complexity of
supply chains is the structure of supply chain. Compared with a supply chain with two
members, operations planning in a manufacturing network where members are independent
entities require a special attention to the details. This paper will focus on the specific case of
manufacturing network planning. Our objective is to propose a new planning methodology
between independent production companies to achieve an agreed plan.
Performance measurement of Indian Banks using Data Envelopment Analysis
Nikita Agarwal, Banhi Guha, Avijan Dutta and Gautam Bandyopadhyay
National Institute of Technology, Durgapur-India
Abstract—In the paper an attempt was made to study the performance of Indian Banks with
the help of CAMEL rating system, taking eighteen banks (eight being Private Sector Banks
and ten being Public Sector Banks) over the period of ten years from (2004 to 2013) and then
finding out their efficiency of banks with the help of DEA in terms of gaining confidence from
investors and ranking them accordingly. Our finding suggests that private sector banks are in
advantage situation and thereby hinting at the possibility of further improvisation of most of
the public sector banks. Private sector banks show marked consistency in their efficiency level
during the period under study. 
Technical Efficiency Measurement of Indian Banking companies: An Investigation using
DEA and Super Efficiency Model
Arijit Ghosh, Munmun Dey, Gautam Bandyopadhyay and Banhi Guha
National Institute of Technology,Durgapur- India
Abstract—This paper investigates the efficiency of Indian banks enlisted in Bombay Stock
Exchange. We applied Data Envelopment Analysis (DEA), to estimate the efficiency of the
Indian banks using publicly available financial data of various different parameters related to
the financial health of Indian banks. The efficiency of each company in comparison with other
companies of the banking sector is estimated. We applied super efficiency model to measure
the most efficient bank over a certain time horizon among all the banks. Bank efficiency
scores derived using the DEA contributes significant information towards identifying the
20/ 34
2014 IACSIT GENEVA CONFERENCES
W011
W034
W024
DL0026
scope for improvement.
What Content of Information Customers Want from aTourism Website? An Empirical Study
for Latent Factors Identification
Kaushik Mandal and Monami Dasgupta (Banerjee)
National Institute of Technology,Durgapur-India
Abstract—Now a day’s website is performing the role of an instrument for achieving
competitive excellence through disseminating information as per requirement of customer.
This research carries out an empirical study to understand the latent factors which are essential
for tourism customer need and thus helpful for developing the content of the websites. Further
we measure the stability of these latent factors across the socio demographic of tourism
customer. Result founds a stable result and thus provides a good model for website
development for tourism marketer.
Modeling Cloud Computing Integration with E-Supply Chain Management
Ahsan Ali Chaudhri, Anita Ajmeri and Jaishree Asarpota Asarpota
Higher Colleges of Technology- Business Department, Dubai- United Arab Emirates
Abstract—This paper proposes a conceptual framework model for integration of cloud
computing with the e-supply chain network. This integration can potentially allow firms to
leverage the benefits inherent in a cloud computing environment and thus, enable
organizations to optimize their cost and operational efficiency of management of their
electronic supply chain. A cloud based environment can greatly enhance e-SCM success by
creating information visibility along the entire supply chain; improving speed, cost, quality,
customer service, and amalgamation of all e-SCM activities into a unified, accessible and
virtualized platform. The e-SCM activities can be modeled after the cyclic view in order to
improve the conceptualization of integration of e-SCM with cloud computing
An Overview of Data Mining Techniques Applied for Heart Disease Diagnosis and Prediction
Salha M. Alzahani, Afnan Althopity, Ashwag Alghamdi, Boushra Alshehri, Suheer Aljuaid
Taif University, Saudi Arabia
Abstract—Data mining techniques have been applied magnificently in many fields including
business, science, the Web, cheminformatics, bioinformatics, and on different types of data
such as textual, visual, spatial, real-time and sensor data. Medical data is still information rich
but knowledge poor. There is a lack of effective analysis tools to discover the hidden
relationships and trends in medical data obtained from clinical records. This paper reviews the
state-of-the-art research on heart disease diagnosis and prediction. Specifically in this paper,
we present an overview of the current research being carried out using the data mining
techniques to enhance heart disease diagnosis and prediction including decision trees, Naive
Bayes classifiers, K-nearest neighbour classification (KNN), support vector machine (SVM),
and artificial neural networks techniques. Results show that SVM and neural networks
perform positively high to predict the presence of coronary heart diseases (CHD). Decision
trees after features reduction is the best recommended classifier to diagnose cardiovascular
disease (CVD). Still the performance of data mining techniques to detect coronary arteries
diseases (CAD) is not encouraging (between 60%-75%) and further improvements should be
pursued.
Use of Statistical Implicative Analysis in complement of Item Analysis
Raphaël Couturier and Rubén Pazmiño
Facultad de Ciencias, Escuela Superior Politécnica de Chimborazo (ESPOCH)-France
Abstract—In many different situations, students or more generally individuals fill forms or
surveys. Such forms could be used to evaluate the knowledge of students after a lesson in a
classroom or could form a global evaluation of all the students in a country. More generally a
survey aims at gathering the opinion of people on a particular subject. In such a case, item
21/ 34
2014 IACSIT GENEVA CONFERENCES
W210
A0021
A0036
analysis gives interesting information on how the items have been answered. In this paper, we
present the Statistical Implicative Analysis (SIA) that produces oriented rules. A survey about
the future of students in the different schools of the ESPOCH is studied to highlight the
interest of using SIA in order to be able to analyze the general behavior of the population.
Antecedents and Consequences of Leadership Styles: Evidence from Successful
Entrepreneurial Ventures
Muhammad Rauf
University of the Punjab and University of Sargodha, Gujranwala- Pakistan
Abstaract-The purpose of this paper is to study the leadership dynamics and the innovative
processes in it throughout the years. The importance of leadership in the corporate world
cannot be overemphasized considering the impetus that it implants in the organisation the
synergy that it creates among the employees and the organisational principles. It is often seen
that the companies start their businesses with a clear vision but they do not implement clear
and concrete mechanisms to transform their visions into reality (Aaker, 1991). Leadership is
important for the transition of the company from one phase to another smoothly and swiftly as
it provides direction to the employees thereby ensuring against the company going off-course.
The methodology applied in this research paper is qualitative.The qualitative method of study
implies that Leadership is studied through secondary sources by the existing literature and the
concepts and ideologies present about leadership in them.
Runtime Comparison of CPU and GPU using Portable Programming Models
Franz Wiesinger, Florian Nairz, Michael Bogner
University of Applied Sciences Upper Austria
Abstract—Since increasing clock speeds are not enough to speed up computation, there exist
several alternative options. One of them is parallelism. For some problems it is possible to use
the graphics processor as a massive parallel system and gain high speedups. Since NVIDIA
introduced the unified device architecture and AMD switched to the OpenCL programming
model it is possible for everyone to achieve high speedups through massive parallel systems
easily. In this paper CUDA and OpenCL are introduced and differences are shown. To point
out that graphics processor can be used for common tasks too, there is a comparison on
runtime of two different test cases. The results show why the problem size is a very important
factor for decisions to make use of the massive parallelism.
An MCA based method for API Association Extraction for PE Malware Categorization
Mohamed Belaoued and Smaine Mazouzi
department of computer science, University of Skikda-Algeria
Abstract—In Computer security, protecting systems against malwares has become the main
concern of particulars and companies. Unfortunately, the existing anti-malware systems are so
fare unable to provide an efficient protection. However, a new generation of powerful
malware detection techniques has emerged. One of these techniques is that based on the static
analysis of the called API functions by a program in order to detect any suspicious behavior.
In this paper we provide a method to extract existing associations between the imported API
functions by malware codes under Microsoft Windows environment. The main goal of this
work is to be able to determine with a high degree of confidence what the most likely used
Windows APIs and their associations by malware are. We have used for that purpose a well
known and a powerful statistical method which is the Multiple Correspondence Analysis
(MCA). We applied the MCA method on a set of APIs which were priori extracted from a
large dataset of malware and clean portable executable (PE) files. According to our
knowledge, this is the first work having used factorial analysis to determine API associations
in malwares. We assume that this allows a more accurate behavior based malware detection.
Session IV-Smart Grid and Communications
22/ 34
2014 IACSIT GENEVA CONFERENCES
Venue: IACSIT meeting room -Marissa
Time: 16:20-18:30
Session Chair:
W209
W025
A0004
Behaviors of Multi-hop Routing Protocols Based on Cross-Layer Approach
Amal. Boumedjout, Ali. Kies, Zoulikha. Mekkakia Maaza and Sidi Mohamed. Senouci
University of sciences and the technology of oran Mohamed Boudiaf USTO-MB/Faculty
of mathematic and computing science, Oran-Algeria
Abstract— Most of the recent performance studies in MANETs (Mobile Ad Hoc Networks),
consider the effects of multiple layer interactions. These interactions allow layers to exchange
state information in order to obtain performance gains. For instance, the routing layer may use
the channel state information such as interference and noise in the route discovery process, in
order to dynamically select the most stable routes. In this paper, we present a behavior
comparison of the routing protocols based on cross-layer approach among physical and
network layers. The first protocol is a reactive protocol Ad Hoc On- demand Distance Vector
(AODV), the second one is a proactive protocol Optimized Link State Routing (OLSR). Both
of them are based on Signal to Interference and Noise Ratio (SINR) metric in their route
discovery process. The behavior comparison of the routing protocols is implemented using
NS2 simulator with mobile nodes in a shadowing environment qualified as an environment
with important variations in the received signal power. Simulation results, using NS2, show
that AODV based on SINR metric maximizes the packet delivery ratio and minimizes the
overhead cost compared to OLSR based on SINR metric.
Mathematical Models to Support the Issue of Electrical Blackouts in the Context of Smart
Grid
Fairouz Iberraken, Rabah Medjoudj and Djamil Aissani
Faculty of technology, University of Bejaia- Algeria
Abstract—This paper aims to provide knowledge to understand the impacts of the integration
of information and communication technologies (ICT) in the conventional power network
giving birth to a smart energy grid. We have developed the attributes of combining smart
systems with renewable energy resources to mitigate the occurrence of blackouts. Two main
issues were investigated from mathematical models point of view: First, we have considered
time series analysis and forecasting models to understand the occurrence of the blackouts and
consequently the behaviour of the power system. Second, we have modelled the restoration
process of the system after the blackout using Markov method. This work has highlighted the
dominance of ARMA model in forecasts and that the smart systems can mitigate the blackouts
occurrence thanks to the information given online looking to the weather conditions and to the
load demand. Using Markov method we have highlighted the importance of decentralized
clean resources in the reduction of the downtime during the restoration of the power network.
Experimental Study of the Artificial Neural Network Solutions for Insulators’ Leakage
Current Modeling in a Power Network
Ali Bahramiazar and Mohammad Oskuoee
West Azarbaijan Electric Power Distribution Co.- Iran
Abstract—The leakage current which flows through insulators is dependent on many different
environmental variables like temperature, humidity, wind and pollution. The leakage current
rate varies during a daily period; so the leakage current curve versus time in a 24 hour period
will be nonlinear. Implementing field experiments in a Research Site, the leakage current peak
amounts were collected in different intervals and using two neural network methods of Feed
Forward BP algorithm and Radial Based Function, the relation between leakage current and
23/ 34
2014 IACSIT GENEVA CONFERENCES
A0016
A0017
A0019
A0025
variation of effective parameters of leakage current was studied in this paper and the most
effective algorithm revealed.
Robust Control of Two Link Rigid Manipulator
Pawan Singh Yadav and Narinder Singh Bhangal
Dr. BR. Ambedkar National Institute of Technology, Jalandhar, PUNJAB- INDIA
Abstract—Two Link Rigid Manipulator (TLRM) is highly unstable and non-linear system
thus its stability is a matter of concern. This paper presents Lagrange-Euler method for
deriving the dynamics of TLRM. The uncertain model is considered using LFT. Parametric
uncertainty in moment of inertia and co-efficient of friction in the TLRM is considered and
uncertainty in actuators. Two different robust control strategies, H∞ and µ-synthesis are used
and compared. Results show that µ-synthesis controller has superior robust performance of the
proposed two robust control methods.
Multilayer Secured SIP Based VoIP Architecture
Basma Basem, Atef Z. Ghalwash and Rowayda A. Sadek
Arab Academy for Science, Technology & Maritime Transport, Cairo-Egypt
Abstract—VoIP faces many emerging attacks and threats. securing SIP based VoIP is a major
challenging task, hence confidentiality, integrity, availability, as well as authenticity must be
provided. Focusing on three main critical attacks targeting SIP based VoIP infrastructure,
which are Denial of service (DoS), man-in-the middle attack, and Authenticity based attacks.
In this paper the main contribution is providing a secure efficient multilayer security
architecture based on open source applications (snort, snortsam and iptables, as well as
OPENVPN Tunnel), The architecture provides a secure reliable VoIP services for the
enterprise network, that have been deployed based on asterisk PBX. The proposed security
architecture aims to prevent the mentioned critical attacks, to provide CIAA security services,
by proposing an adaptive rule based queuing polices. QoS is a major challenge, the paper also
provides an enhancement for the proposed architecture to minimize the delay for more
efficient secure communication, as well as preventing zero day attacks by exploiting method
and updating Snort DB with attack signatures. QoS factors have been measured using OPNET
simulators. The proposed architecture gives promising results when it comes to attacks
prevention with 0.01% better performance results compared to previous work.
A Case Study of Resonance in 11kV Network in the presence of Series Current Limiting
Reactors, VSDs and Power Factor Improvement Capacitors
Yadavalli Venkata Sridhar
Kuwait Oil Company-Kuwait
Abstract—Presence of electrical network elements such as reactors, power factor capacitors
along with harmonics injecting loads such as Variable Speed drives create an ideal situation
for resonant conditions in an industrial electrical network. This paper attempts to identify
various conditions that influence the resonance situation in the 11KV network of hydrocarbon
industry and its sensitivity to influencing factors is assessed. Further, the effect of detuning
reactor in the power factor capacitors on the THD values, harmonic frequency and other
parameters is studied. Based on the case study, the impact of configuration of electrical
network and variation of capacitance in the electrical network on the THD and harmonic
frequency is established.
Using Neutral Reactor for Suppression of Secondary Arc Current during Single-Phase
Auto-Reclosing under Different Fault Locations
Mahyar. Bolhasani and Somayeh. Sadat. Hashemi. Kamangar
Moshanir, Electrical Engineering Consultant Company,Tehran- Iran
Abstract—when single-phase grounding fault occurs in high voltage transmission line,
secondary arc current and recovery voltage must be suppressed in order to ensure that
24/ 34
2014 IACSIT GENEVA CONFERENCES
A0027
A0032
A0037
A0039
single-phase auto-reclosing operates reliably and successfully. Automatic single-phase
reclosing is used to clear single-phase-to–ground faults, which are about 80% of the transient
faults. In order to have successful fast reclosing, different methods are used to extinguish the
arc. One of the common methods is to use a single-phase reactor in the neutral of shunt
reactor, when transmission line is compensated with shunt reactors. In this paper, exact system
and an exact arc modeling is used for transient simulation of neutral reactor and guidelines for
selecting the appropriate amount for the neutral reactor are proposed. then uses EMTP-RV
software to simulate suppression effect about different fault point locations toward an example
of 400kv double-ended sources high-voltage transmission line.
Assessment of Electromagnetic Radiation With Respect To Base Station Types
Levent Seyfi
Selçuk University- Turkey
Abstract—In this paper, radiation of base stations (BSs) in different installation types was
measured in order to determine how the electromagnetic pollution level is affected by the
installation types of them. Measurements were carried out on 8 BSs in Konya, Turkey.
Additionally, a survey including 10 questions was applied to Selçuk University students (334
people) to show how informed about radiation of mobile phones and BSs they are. As a result
of measurements, the maximum radiations from BSs were observed at an apartment across BS
on a tower, and at an apartment across BS on an apartment, respectively. Yet, the most of
mobile phone users participating in the survey believes that a BS on their apartment roof has
more radiation than the others.
Competing risk of degradation processes of a photovoltaic system under several conditions
Fairouz Iberraken, Rabah Medjoudj and Djamil Aissani
University of Bejaia, faculty of technology, Unit research LaMOS- Algeria
Abstract—The regions of Sahara provide a very important solar resource, trying countries to
move towards the production of photovoltaic energy. But operating systems are installed in a
hostile environment and equipment is more vulnerable than in the north. This paper deals with
the failure mechanisms of photovoltaic system and highlights the effect of competing risk of
breakdowns initiated by severe weather in the south. The effect of the sandstorm is not
often discussed in the literature, for this a special interest has been given to this phenomenon
in this paper. The work developed in this paper was initiated following our understanding of
the interest granted by a group of countries from the Maghreb and from Europe to develop
green energy in the DESERTEC project, considered of regional significance.
A Hierarchical Routing Protocol for Smart Grid
Mohsen Dorsetan, Azadeh Jafarinezhad and Sayyed Majid Mazinani
faculty of Engineering in Imam Reza University, Mashhad- Iran
Abstract—Nowadays, power grids have many variations and each day we see more
development. Meanwhile power grids have a significant importance and their structure are
developing and improving. Due to more efficiency and increasing the performance of
traditional power grid, smart grid is appeared. In view of the traditional electric grid network
infrastructure and integration with wireless sensor networks, new services ability is added to
the total structure of traditional electrical grid. One of the smart grid infrastructure
requirement is wireless sensor networks that is perfect solution for data acquisition from
environment and equipment in the smart grid and transmission of information. Routing in
wireless sensor networks due to its particular application in smart grid have gained significant
attention. In this paper, we provide a hierarchical routing protocol for both HAN and NAN
level by considering low power consumption and delay. Our proposed protocol is compared
with two energy-aware and shortest path protocol, in addition to achieving energy efficiency
and lower latency, higher data delivery rate and less data loss is achieved.
A Secure Spectrum-Aware Routing Scheme by Detecting Black hole Attacks for Smart Grid
25/ 34
2014 IACSIT GENEVA CONFERENCES
Applications
Azadeh Jafarinezhad, Mohsen Dorsetan, Sayyed Majid Mazinani, and Masoud Shirkhani
A0042
Iranian Construction Engineering Organization Province of Khorasan Razavi,
Mashhad-Iran
Abstract—Recently, cognitive sensor network (CSN) emerges as a key technology to enhance
spectrum efficiency of wireless sensor network (WSN) and thus creates opportunistic
transmissions over links. Dynamic and opportunistic spectrum access capabilities of CSN can
be benefited to address many of the unique requirements and challenges of smart grid for
WSN. The migration of power grids from an isolated network to a public communication
network has created many challenging issues in the security of smart grids and one of the
major challenges of CSN face today is security.
This paper proposes a secure
spectrum-aware routing scheme, which considers black hole attacks in smart grid
communication structure and also considers traffic balance, route configuration and power
control for reliable routing. We propose a mechanism to detect black hole attacks and also a
method is employed to combine the routing objectives into a single target function.
Randomized route selection strategy is adopted for traffic balance. The simulation results
demonstrate that the proposed scheme improves the communication reliability and packet
delivery rate in smart grid.
An Efficient Routing Protocol for Video Streamin ClusteredWireless Sensor Networks
Sayyed Ahmad Hoseini , Sayyed Majid Mazinani , Mehdi Shahedi , Omid Naderi
Electrical Engineering Department, Imam Reza International University, MashhadIran
Abstract—In the time limit network traffic, especially video traffic, Packet delay is an
important issue. However, there are several limitations in wireless sensor networks their main
argument is that the network lifetime. The Congestion in Wireless Sensor Networks is
significantly higher and thus severely affects the network performance leading to increased
data loss and end to end delay and applications that require fast response time such as
emergency preparedness and hostile environment surveillance pose challenging obstacles to
wireless sensor network (WSN) protocols. A routing protocol must provide fast and reliable
techniques for data propagation. In this study, we intend to approach in order to reduce energy
consumption with maintaining the quality of service we provide to achieve improved network
lifetime.
19:00-20:30
Dinner Banquet (Novotel Caférestaurant)
26/ 34
2014 IACSIT GENEVA CONFERENCES
Conference Venue
Novotel Genève Centre hotel
http://www.accorhotels.com/gb/hotel-3133-novotel-geneve-centre/index.shtml
Address:Rue de Zurich 19 1201 GENEVE SWITZERLAND
Tel. (+41)22/9099000
Fax. (+41)22/9099001
H3133@accor.com
The 4-star Novotel Genève
Centre hotel is located in the
heart of Geneva, close to Lake
Geneva and 15 mins from the
UN headquarters. The hotel
has 206 rooms, a restaurant,
bar, and 5 conference rooms. This 4-star hotel is equally suited to business tripsand holidays in Geneva
with your partner or family. In addition to the fitness center and spa, with relaxation room, hammam, sauna,
solarium and massage room, guests enjoy free public transport and free WIFI access.
Located in the heart of Geneva, your hotel offers free travel on all public transport in town and by the lake.
Get out and about with peace of mind thanks to Novotel. Reconnect using our free WIFI, available
throughout the building.
Accessible by public transport
Line Station
Bus 1 Monthoux
Railway Station
Airport
27/ 34
2014 IACSIT GENEVA CONFERENCES
http://www.icmre.org/
Welcome to ICMRE 2015
2015 International Conference on Mechatronics and Robotics Engineering will be held in Kuala Lumpur, Malaysia
during January 17-18, 2015. The aim of ICMRE 2015 is to provide a platform for researchers, engineers, academics
as well as industry professionals from all over the world to present their research results and development activities
in the area of Mechatronics and Robotics Engineering. This conference provides opportunities for delegates to
exchange new ideas and research findings in a face to face environment, to establish business or research
relationships and to find global partners for future collaboration.
All papers, both invited and contributed, will be peer reviewed by the program and technical committees of the
Conference. After a careful reviewing process, all registered and presented paper will be published in Applied
Mechanics and Materials Journal (ISSN: 1660-9336), which will be indexed Ei Compendex and ISI proceeding.
Applied Mechanics and Materials (ISSN: 1660-9336) is Indexed by Elsevier: SCOPUS www.scopus.com and Ei
Compendex (CPX) www.ei.org. Cambridge Scientific Abstracts (CSA) www.csa.com, Chemical Abstracts (CA)
www.cas.org,
Google
and
Google
Scholar
google.com, ISI
(ISTP,
CPCI,
Web
of
Science)www.isinet.com, Institution of Electrical Engineers (IEE) www.iee.org, etc.
Important Dates
Before November 1, 2014
Before November 20, 2014
Before December 10, 2014
Before December10, 2014
Full Paper Submission
Notification of Acceptance
Final Paper Submission
Authors' Registration
Submission Methods
I. Electronic Submission System; (.pdf)
II. icmre@iacsit.org (.doc and .pdf)
Contact Us
Ms. Yashin Tu (Conference Secretary) E-mail:
icmre@iacsit.org
28/ 34
2014 IACSIT GENEVA CONFERENCES
http://www.iciim.org/
Welcome to ICIIM 2015
2015 3rd International Conference on Innovation and Information Management (ICIIM 2015) will be held in Kuala
Lumpur, Malaysia during January 17-18, 2015. The aim of ICIIM 2015 is to provide a platform for researchers,
engineers, academics as well as industry professionals from all over the world to present their research results and
development activities in the area of Innovation and Information Management. This conference provides
opportunities for delegates to exchange new ideas and research findings in a face to face environment, to establish
business or research relationships and to find global partners for future collaboration.
All papers, both invited and contributed, will be peer reviewed by the program and technical committees of the
Conference. After a careful review process, all registered and presented papers will be published in WIT
Transactions on Information and Communication Technologies (ISSN: 1743-3517), which will be indexed by EI
Compendex, Scopus and ISI.
Important Dates
Before November 5, 2014
Full Paper Submission
Before November 20, 2014
Notification of Acceptance
Before December 10, 2014
Final Paper Submission
Before December 10, 2014
Authors' Registration
Submission Methods
I. Electronic Submission System; ( .pdf)
II. iciim@iacsit.org (.doc and .pdf)
Contact Us
Ms. Yolanda L. Dong (Conference Secretary) E-mail:
iciim@iacsit.org
29/ 34
2014 IACSIT GENEVA CONFERENCES
http://www.icsmo.org/
Welcome to ICSMO 2015
ICSMO-International Conference on System Modeling and Optimization is the main annual research conference
aimed at presenting current research being carried out. The ICSMO 2013-2014 were held in Rome and Barcelona,
Spain, and the currently ICSMO 2015 will be held in Amsterdam Netherlands during February 12 to 13, 2015
together with the workshops ICCMS 2015 and ICICA 2015. The idea of the conference is for the scientists, scholars,
engineers and students from the Universities all around the world and the industry to present ongoing research
activities, and hence to foster research relations between the Universities and the industry.
ICSMO 2015 is sponsored by International Association of Computer Science and Information Technology, and
technical assisted by many other universities and institutes.
The ICSMO 2015 conference proceeding will be published in the International Journal of
Modeling and Optimization (ISSN:2010-3697 www.ijmo.org ), and will be included in the
Engineering & Technology Digital Library, and indexed by ProQuest,Google Scholar and
Crossref.
Important Dates
Before November 20, 2014
On November 15, 2014
Full Paper Submission
Notification of Acceptance
Before December 30, 2014
Final Paper Submission and Authors’ Registration
Submission Methods
I. Electronic Submission System; (.pdf)
II.
icsmo@iacsit.org
(.doc and .pdf)
Contact Us
Ms. Yoyo Yang (Conference Secretary) E-mail: icsmo@iacsit.org
30/ 34
2014 IACSIT GENEVA CONFERENCES
http://www.icica.org/
Welcome to ICICA 2015
ICICA-International Conference on Information Computer Application is the main annual research conference aimed
at presenting current research being carried out. The ICICA 2012 -2013 were held in Hong Kong,Rome and Barcelona,
Spain respectively.And the currently ICICA 2015 will be held in Amsterdam, Netherlands during February 12 to 13,
2015, together with the workshops ICCMS 2015 and ICSMO 2015.
The idea of the conference is for the scientists, scholars, engineers and students from the Universities all around the
world and the industry to present ongoing research activities, and hence to foster research relations between the
Universities and the industry.
ICICA 2015 is sponsored by International Association of Computer Science and Information Technology, and
technical co-sponsored by many other universities and institutes.
Publication
The ICICA 2015 conference proceeding will be published in the International Journal of
Computer and Communication Engineering (ISSN:2010-3743 www.ijcce.org ), which will
be indexed by Google Scholar, Engineering & Technology Digital Library,ProQuest, and
Crossref
Important Dates
Before November 5, 2014
Full Paper Submission
Before November 25, 2014
Notification of Acceptance
Before December 5, 2014 Final Paper Submission and Authors' Registration
Submission Methods
I. Electronic Submission System; (.pdf)
II. icica@iacsit.org (.doc and .pdf)
Contact Us
Mr. Seymour Chiang (Conference Secretary) E-mail: icica@iacsit.org
31/ 34
2014 IACSIT GENEVA CONFERENCES
http://www.ickem.org/
Welcome to ICKEM 2015
2015 5th International Conference on Key Engineering Materials (ICKEM 2015) will be held during March
21-23, 2015 in Singapore together as the workshop of ICRMM 2015. The aim of ICKEM 2015 is to provide a platform
for researchers, engineers, academicians as well as industrial professionals from all over the world to present their
research results and development activities in Key Engineering Materials. This conference provides opportunities for
the delegates to exchange new ideas and application experiences face to face, to establish business or research
relations and to find global partners for future collaboration.
All accepted papers of ICKEM 2015 will be published by Advanced Materials
Research Journal, which will be indexed by EI Compendex.
And some excellent papers will be select to be published in International Journal of Materials
Science and Engineering (IJMSE)free of charge.
Important Dates
Before December 10, 2014
Full Paper Submission
Before December 30, 2014
Notification of Acceptance
Before January 5, 2015 Final Paper Submission and Authors' Registration
Submission Method
I.Electronic Submission System (.pdf)
II.
ickem@iacsit.org (.doc and .pdf)
32/ 34
2014 IACSIT GENEVA CONFERENCES
Note
33/ 34
2014 IACSIT GENEVA CONFERENCES
.
34/ 34