Thursday, December 05, 2019

These articles have been peer-reviewed and accepted for publication in JICT, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the JICT standard. Additionally, titles, authors, abstracts and keywords may change before publication.

Ahmad Afif Ahmarofi, Razamin Ramli, Norhaslinda Zainal Abidin, Jastini Mohd Jamil & Izwan Nizal Shaharanee
Multilayer perceptron network (MLP) has a better prediction performance compared to other networks since the structure of MLP is suitable for training process in solving prediction problem. However, to the best of our knowledge, there is no rule of thumb in determining the number of hidden nodes within the MLP structure. Researchers normally test with various numbers of hidden nodes to obtain the lowest square error value for optimal prediction result since none of the approaches is claimed as the best practice. Thus, the aim of this paper is to determine the best MLP network by varying the number of hidden nodes of the developed network in predicting the cycle time for producing a new audio product at a production line. The networks are trained and validated through 100 sets of production lots from a selected audio manufacturer. As a result, the 3-2-1 MLP network is the best network based on the lowest square error value compared to the 3-1-1 and 3-3-1 networks. Consequently, the 3-2-1 predicted the best cycle time of 5 seconds to produce a new audio product. Hence, the prediction result can guide production planners to manage the assembly process at the production line smoothly.
Keywords: Artificial neural networks,multilayer perceptron, hidden node, cycle time, production line. 

Farhanah Atiqah Norki, Radziah Mohamad & Noraini Ibrahim
Mobile applications are expected to receive context input such as location, speech, and network from different context providers. Since context can be considered as knowledge, a formal method is needed to capture this knowledge. There is less work on ontology model that could be reused to model a new context ontology for Android mobile application. Therefore, this study proposed an ontology specifically for Android mobile application, COCCC, to formalize context knowledge present within it. METHONTOLOGY method was used to create COCCC ontology as it offers intermediate representation in the form of concepts. The concepts from the context ontology were extracted from various resources, sorted and categorized based on the types and functions for standardization purposes. Survey was given to five domain experts for evaluation of COCCC ontology in terms of its usability. Data from these experts were analysed and the results have confirmed that the proposed context ontology is usable to Android mobile application developers.
Keywords: Context ontology, knowledge representation, mobile application, ontology.

Naseer Sanni Ajoge, Azizi Ab Aziz & Shahrul Azmi Mohd Yusof
Anxiety is an aversive motivational state that occurs when an individual perceives threat at events. This condition creates harmful effects for candidates during the interview session. An interviewee overwhelmed in such states deploys worry as resources to cope with the threat hence losing the ability to present self positively for favourable assessments. Most of the digital approaches to assist interviewee in this condition are focused on coaching for verbal and non-verbal cues. The aspect of understanding interviewees’ psychological complexities that influence their behavioural tendencies is lacking in these approaches. As the first step in building an intelligent digital based therapy platform to overcome this issue, this article provides a building block to understanding the interviewee anxiety state by means of a computational model. The model is developed based on the conceptual model derived from generalized anxiety disorder theories. The formal model is evaluated using mathematical analysis to determine possible equilibria state and the simulation results are tested against known cases in the literature. The simulation results show that the degree of threat perceived at events is based on task demand and the resources to cope. Threat is the building block of anxiety through worry which is controlled by one’s personality and inherent trait anxiety. The results conform to established facts in literature. Consequently, this model can serve as the basis to build an integrated interviewee mental state model embedded with self-efficacy and motivation constructs as a holistic approach to support interviewee during simulated training and coaching environment.
Keywords: Anxiety States, Computational Cognitive Modeling, Intelligent Support Agent, Interviewee Behavioural States

P. Shanthi Saravanan & S. R. Balasundaram
Use of mobile devices enabled with the internet has increased the rapid development of location-based services (LBS). LBS allow users to access useful information such as nearest ATM, temple, and so on. Though users enjoy the convenience of LBS, they are being exposed to the risk of location disclosures which lead to potential abuse of location data. Hence, location privacy protection has recently received considerable attention in LBS. There are numerous techniques have been presented by various researchers to protect the location-context of the users. Location Cloaking is an often used technique to protect the location-contexts. Most of the existing location cloaking algorithms are concerned only with snapshot user locations and cannot effectively prevent the users from the location-dependent attacks when users’ location-contexts are continuously updated. This paper presents a solution to protect users from the location-dependent attacks by improving the existing clique based cloaking algorithm. The main idea is to maintain maximum sized cliques required for location cloaking in an undirected graph. Thus, a qualified clique can be quickly identified and used to generate the cloaked region when a new request arrives. In addition, dummy queries are generated to protect the users from unusual situations. Through maximum sized clique and dummy query generation more numbers of user queries are getting cloaked with a reasonable amount of time, thereby provides better privacy protection while using the LBS applications. The experimental results show that the proposed cloaking algorithm outperformed existing algorithms such as IClique, OptClique and MMBClique in terms of its cloaking success rate and processing time.
Keywords: Location based services, location-dependent attacks, privacy preservation, spatial cloaking

Dewi Yanti Liliana, T. Basaruddin, M. Rahmat Widyanto & Imelda Ika Dian Oriza
Emotion is an important element in an interaction since it conveys human perception and response about an event. Unlike verbal words that can be manipulated, emotion is brief, spontaneously appears and provides more honest information. Emotion consists of several classes of basic emotion which is a human primary emotion that differ one from another; those classes are happy, sad, fear, surprise, disgust, and angry. Meanwhile, a psychologist has developed a set of rules to recognize emotion based on facial expression. This research intends to develop an artificial intelligent model based on psychologist knowledge to recognize emotions by analyzing facial expressions. Moreover, the proposed model defines high-level fuzzy linguistic features of facial components which distinguishes it from existing methods which commonly use low-level image features (e.g. color, intensity, histogram, texture). High-level linguistic features (e.g. eye is open, nose is wrinkle) are better representing human minds than low-level features which are only understandable by machine. The model initially works by detecting facial points to locate important facial components; extracting geometric facial component features which is then applied to the fuzzy facial component inference system and resulting high-level linguistic facial features; the last step is applying high-level linguistic features to the fuzzy emotion inference system which classifies the input image into the respective emotion class based on psychologist rules. Experiments using facial expression dataset gave a high accuracy rate at 98.26% for fuzzy facial component linguistic identification. The proposed model also outperformed other classifiers (Fuzzy C-Means, Fuzzy Inference System, and Support Vector Machine). This intelligent model contributes to various fields, including psychology, health, and education; especially for helping people with emotion disorders (e.g. Alexithymia, Asperger, and Autistic syndromes) to recognize emotions.
Keywords: basic emotion, emotion recognition, facial expression, facial component, fuzzy system, high-level linguistic features

Jagadeesh B & Chandrashekar M Patil
Human activity recognition from video scenes has become a significant area of research in the field of computer vision applications. Action recognition is one of the most challenging problems in the area of video analysis and finds applications in human-computer interaction, anomalous activity detection, crowd monitoring and patient monitoring, Several approaches have been presented for human activity recognition using machine learning technique. The main aim of the work is to detect and track of human, and classification of actions for two publicly available video database. In this work, a novel approach of feature extraction from video sequence by combining Scale Invariant Feature Transform (SIFT) and optical flow computation is used where shape, gradient and orientation features are also incorporated for robust feature formulation. Tracking of the human in the video is implemented using Gaussian Mixture Model. Convolutional Neural Network based classification approach is used for database training and testing purpose. The activity recognition performance is evaluated for two public datasets namely Weizmann dataset and KTH dataset with action recognition accuracy of 98.43% and 94.96% respectively. Experimental and comparative study shows that proposed approach outperforms when compared with state-of-art techniques.
Keywords: Action recognition, Convolutional Neural Network, Gaussian Mixture Model, Optical flow, SIFT feature extraction.

N. Sathish Kumar & K. Raja Kumar
Nowadays, Underwater Acoustic Sensor Network (UASN) plays a significant role in many application areas like surveillance, security, commercial and industrial application and so on. In UASN routing, the propagation delay and collision are perennial problems due to data transfer from various sensor nodes to the Sink Node (SN) at the same time. In this paper, we propose a Collision Aware Priority Level mechanism based on the Medium Access Control (MAC) protocol (CAPL-MAC) for transferring the data from the Sensor Head (SH) to the SN. In the proposed protocol, we used Parallel Competition Scheme (PCS) for high channel utilization and energy saving of the battery. In each Competition Cycle (CC), the data packet produced by each SH in a different time slot can join in CC for data packet transmission in parallel for high channel utilization. In CAPL-MAC, each SH is assigned with a different Priority Level Number (PLN) during each CC. Instead of broadcasting, each SH is sending its respective PLN to every SH with the help of nearest SH for saving energy of the battery. Based on highest PLN, each SH is communicating to SN without collision and also it will reduce propagation delay as well as improve timing efficiency. Finally, Quality of Service (QoS) is also improved. We adopt the single layer approach with handshaking protocol for communication. We carried out the simulation utilizing Aqua-Sim Network Simulator2 (NS2). The simulation results illustrate that the proposed CAPL-MAC protocol achieves the earlier stated performance than by the existing protocols such as Competitive Transmission-MAC (CT-MAC) and Channel Aware Aloha (CAA). 
Keywords: Underwater acoustic sensor network, Medium access control protocol, Handshaking protocol, Channel aware aloha, Quality of service.

Md Kamrul Islam, Md Manjur Ahmed, Kamal Zuhairi Zamli, & Salman Mehbub
Twitter is one of most popular internet-based social networking platform to share the feelings, views, and opinions. In recent years, many researchers have utilized the social dynamic property of the posted messages or tweet to predict the civil unrest in advance. However, the existing frameworks fail to describe the low granularity level of tweet and they work in offline mode. Moreover, most of them do not deal with the case where enough tweet information is not available. To overcome these limitations, this article proposes an online framework for analyzing the tweet stream in predicting the future civil unrest events. The framework filters the tweet stream and classifies the tweets using linear SVM classifier. After that, the weight of the tweet is measured and distributed among the extracted locations to update the overall weight in each location in a day in a fully online manner. The weight history is then used to predict the status of civil unrest in a location. The significant contributions of this article are (i) A new keyword dictionary with keyword score to quantify the sentiment for extracting the low granularity level of knowledge (ii) A new diffusion model for extracting the locations of interest and distribute the sentiment among the locations utilizing the concept of information diffusion and location graph to handle the locations with insufficient information (iii) Estimating the probability of civil unrest and finding the stages of unrest in upcoming days. The performance of the proposed framework has been measured and compared with existing logistic regression based predictive framework. The result shows that the proposed framework outperforms the existing framework in terms of F1 score, accuracy, balanced accuracy, false acceptance rate, false rejection rate, Matthews’s correlation coefficient.
KeywordsText classification, information diffusion, sentiment analysis, polynomial regression, connected graph.

Universiti Utara Malaysia Press
 Universiti Utara Malaysia, 06010 UUM Sintok
Kedah Darul Aman, MALAYSIA
Phone: +604-928 4816, Fax : +604-928 4792

Creative Commons License

All articles published in Journal of Information and Communication Technology (JICT) are licensed under a Creative Commons Attribution 4.0 International License.

All Right Reserved. Copyright © 2010, Universiti Utara Malaysia Press