Transcript ABSTRACT for COE 2015
TECHNOLOGICAL INSTITUTE OF THE PHILIPPINES QUEZON CITY COLLEGE OF INFORMATION TECHNOLOGY EDUCATION LIST OF COMPLETED RESEARCH WITH ABSTRACT 2014-2015 1.
2.
3.
4.
5.
6.
7.
8.
Circular Pair Flash Code
Jasper S. Agustin, Proceso L. Fernandez
Traffic Predictive for the Major Roads in EDSA using Feed-Forward Backpropagation Neural Networks
Emilio Angelo D. Alindogan, Melissa P. Juanillo, Jerry Y. Hom, Ph.D., Ma. Christina R. Aragon, Ph. D, Febrev F. Dela Cruz, mark Lorenz F. Eustaquio
E-Math Version 2.0, a Learning Management System as a Math Reviewer Tool for Engineering Students in the Philippines
Maila R. Angeles, Arnel C. Fajardo, and Bartolome T. Tanguilig III
Predictors of Project Cost Utilizing Parametric Cost Analysis of Selected Domestic Construction Projects
Efren M. Pantoja, Ria Liza C. Canlas, Bartolome T. Tanguilig III
Enhanced SHA-1 on Parsing Method and Message Digest Formula
Christine Charmaine G. San Jose, Bobby D. Gerardo, Bartolome T. Tanguilig III
Modified AES Algorithm Using Multiple S-Boxes
Felicisimo V. Wenceslao, Jr., Bobby D. Gerardo, Bartolome T. Tanguilig III
i-SEARCH: DOCUMENT SEARCHING USING PAGERANK ALGORITHM
Renalyn C. Antonio, Lorena W. Rabago, Bartolome T. Tanguilig III
SECURITY ASSURANCE FRAMEWORK FOR SMS USING CASCADED ENCRYPTION ALGORITHM
Reynaldo E. Castillo, Gerald T. Cayabyab, Bartolome T. Tanguilig III
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
Status Analysis in Social Media: Input for Potential Business Trends
Paula Jean M. Castro, Rosmina Joy M. Cabauatan, Bartolome T. Tanguilig III
Mobile Web-based Student Integrated Information System
Ma. Cecilia A. Cantos, Lorena W. Rabago, Bartolome T. Tanguilig III
Time Scheduler Using SPEX: A New Genetic Algorithm Crossover Operator
Jose Tan Jr., Bobby Gerardo, Bartolome Tanguilig III
COMPETENCY MODEL FOR INFORMATION SYSTEMS’ SPECIALIZATION TRACK UTILIZING RIASEC AND VALUES SEARCH MODELS
Risty Moyo-Acerado1, Lorena W. Rabago2, and Bartolome T. Tanguilig3
‘Make-It-ECE’, a Mathematics Learning Management System (LMS) for Engineering Students in the Philippines
Maila R. Angeles1, Custer C. Deocaris2*, Celso B. Co2, Shearyl U. Arenas1
The Mythical Adventure of Mang Kanor: An Action Adventure Game
Reynaldo E. Castillo, Mark Allen Q. Domagas, Paul M. Grafilon, Roniel N. Pagaling
Pest Identification using Image Processing Techniques in Detecting Image Pattern through Neural Network
Johnny L. Miranda, Bobby D. Gerardo, Bartolome T. Tanguilig III
Academic Decision Support System for College Completion Model
Allen M. Paz, Bobby D. Gerardo, Bartolome T. Tanguilig III
Agricultural Crops Classification Models Based on PCA-GA Implementation in Data Mining
Geraldin B. Dela Cruz, Bobby D. Gerardo, Bartolome T. Tanguilig III
Predictive Decision Support System for Licensure Examination Performance through Integration of Multiple Regression and PART Classification Models of Data Mining
Ivy M. Tarun, Bobby D. Gerardo, and Bartolome T. Tanguilig III
Adopting Game-Based Mobile Learning for Young Learners
Fredilyn Calanda, Roselia C. Morco, Risty Acerado
Comparative Study of the Three DifferentE-Learning Management Tools: A Basis for Development of
22.
Knowledge Based Management System
Marmelo V. Abante, Lorena W. Rabago, Bartolome T. Tanguilig III
Extendibility of the Teknomo-Fernandez Algorithm for Background Image Generation
Patricia Angela Abu, Proceso Fernandez
23.
2012 - 2013 Impact of General Social Media Experience on Usefulness for Business in the Workplace
Donald L. Amoroso, Tsuneki Mukahi, Mikako Ogawa
24.
25.
26.
27.
Co-Creation between Food Allergy Customers and Restaurants using Mobile Devices
Mikako Ogawa, Ayaka Tanaka, Keiichi Noda, Donald L. Amoroso
The Importance of Institution- Based Trust in Mobile Adoption with Online Shopping Applications
Donald L. Amoroso
An Improved Data Mining Mechanism Based on PCA GA for Agricultural Crops Characterization
Geraldin B. Dela Cruz, Bobby D. Gerardo, Bartolome T. Tanguilig III
Generating Licensure Examination Performance Models Using PART and JRip Classifiers: A Data Mining Application in Education
Ivy M. Tarun, Bobby D.
28.
29.
30.
31.
Gerardo, Bartolome T. Tanguilig III
Camera-Captured Writing System Recognition of Logosyllabic Han Character
Maria Christina Aragon, Melissa Juanillo, Rosmina Joy Cabauatan
Antiscraping Tool: A system that blocks automatic scrapers through Computer Test and Human Test
David, Alexis Pantola Paul Alejandro, Algene de la Paz, John Guevara, John Ong
iRecruit Tool : A Marketing Application for Higher Educational Institution using C4.5 Classification Technique
Sheila A. Abaya, Bobby D. Gerardo, Bartolome T. Tanguilig III
Comparison of Classification Techniques in Education Marketing
Sheila A. Abaya, Bobby D. Gerardo, BartolomeT. Tanguilig III
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
Pest Detection and Extraction Using Image Processing Techniques
Johnny L. Miranda, Bobby D. Gerardo, Bartolome T. Tanguilig III
Mapping of the Three Different E-Learning Management Tools: A Basis for Integrated Development Learning Environment (IDLE)
Marmelo V. Abante, Lorena W. Rabago, Bartolome T. Tanguilig III
Development of College Completion Model Based on K-means Clustering Algorithm
Allen M. Paz, Bobby D. Gerardo, Bartolome T.Tanguilig III
INNOVATIVENESS OF CONSUMERS IN THE ADOPTION OF MOBILE TECHNOLOGY IN THE PHILIPPINES
Amoroso, Donald, L.Lim, Ricardo
CHED Faculty Information System Utilizing Cloud Computing Infrastructure
Ronnie B. Santelices, Bartolome T. Tanguilig III
Application of Fuzzy Logic and Neural Network Algorithm as an Input to Decision Support System Prescribing Medicine for Diabetes
J. Fidelino, B. D. Gerardo, Dr. B. T. Tangulig III
Implementation of Lossless Preprocessing Technique for Student Record System
Elmer C. Matela, Dr. Ariel Sison, Dr. Bartolome Tanguilig III
New Genetic Algorithm Crossover Technique for a Constraint-Based Scheduling Agent
Jose Tan Jr., Bobby Gerardo, Bartolome Tanguilig III
Students Competency Model for Information Systems Specialization Tracks
Risty Moyo- Acerado, Roberto U. Acepcion
FRAMEWORK MODEL OF IMPLEMENTING SUSTAINABLE COMPUTER LITERACY PROGRAM FOR ADOPTED BARANGAY
Valencia Shiela Dala, Roselia Morco, Alvin Teruel, Marlon Castillo, Roberto Bautista, Raychelou
JVISUAL: A VISUALIZATION TOOL FOR NOVICE OBJECT-ORIENTED PROGRAMMERS IN JAVA LANGUAGE
Marlon Castillo, Shiela Dala, Raychelou Valencia, Ferdinand Hassan Flojo, Roselia Morco, Ronald Lacanilao, Alvin Teruel
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
Mining Online GIS for Crime Rate and Models based on Frequent Pattern Analysis
Gerardo, John David Elijah Sandig, Ruby Mae Somoba, Ma Beth Concepcion, Bobby D.
Flash Flood Prediction Model based on Multiple Regression Analysis for Decision Support System
and Bobby D. Gerardo,
Member, IAENG
Joel T. de Castro, Gabriel M. Salistre, Jr, Young-Cheol Byun
Framework for Information Sharing with Privacy and Priority Control in Long-Term Care in Japan
L. Amoroso Shoko Miyagawa, Shigeichiro Yamasaki, Eiko Uchiyama, Donald
An Education Data Mining Tool for Marketing based on C4.5 Classification Technique
Sheila A. Abaya, Bobby D. Gerardo
TULUNGAN: A SLANDERING-RESISTANT REPUTATION SYSTEM FOR COLLABORATIVE WEB FILTERING SYSTEMS
Alexis V. Pantola, Susan Pancho Festin, Florante Salvador
An Examination of Consumers’ High and Low Trust as Constructs for Predicting Online Shopping Behavior
Donald L. Amoroso, Tsuneki Mukahi
Investigating the Number of Users and Months to Make TULUNGAN Effective Against Self-Promoting Users
Alexis V. Pantola, Susan Pancho-Festin, Florante Salvador
e-DoX:DEPED Student Grade Records Management System with Implementation of Advanced Encryption Standard and PKI Infrastructure
Rommel B. Dy, Mary Jane A. Larida, Bartolome T. Tanguilig III
iCCS: Development of a Mobile Web-Based Student Integrated Information System Using Hill Climbing Algorithm
Maria Cecilia G. Cantos, Lorena W. Rabago, Bartolome T. Tanguilig III
Implementation of Improved DES Algorithm in Securing Smart Card Data
Ariel M. Sison, Bartolome T. Tanguilig III, Bobby D. Gerardo, Yung-Cheol Byun
Ubiquitous Stopping Criterion for Backpropagation Learning in Multilayer Perceptron Neural Networks
J. T. Lalis, B. D. Gerardo, Y. Byun, Y. Ha
55.
56.
57.
58.
59.
60.
61.
62.
63.
64.
65.
Decision Support System for Agricultural Management using Prediction Algorithm
Mark Ian Animas, Bobby D. Gerardo, Yung-Cheol Byun, Ma. Beth Concepcion
A Protocol to Secure Bluetooth Communication
J. T. Lalis*, B. D. Gerardo, and Y. Byun
Using TCP Reset for Blocking and Using Spoofing for User Notification in Non-inline Non-proxy Based Web Filters
Melesan Karen Chavez, Christine Marianne Reyes, Martin Spencer Sy, Rafferty Erik Sy, Alexis Pantola and Gregory Cu
Delaying ARP Poisoning using an Active Network Based Technique
Yu, Allison Mae H.
Buena, Deanne Erika B., Garcia, Clarissa Mae C., Pantola, Alexis V. Villafuerte, Celine V.,
Home Video Surveillance and Security Sensors with Mobile Application
Sheila Mae S. Gomez, Bobby D. Gerardo, Joel T. De Castro, Ma. Beth Concepcion, Cyreneo Dofitas, Yung-Cheol Byun
J-Master: An Interactive Game-based Tool for Teaching and Learning Basic Java Programming
Raymond S. Bermudez, Ariel Sison, Bartolome T. Tanguilig III
PREDICTING FACULTY DEVELOPMENT TRAININGS AND PERFORMANCE USING RULE-BASED CLASSIFICATION ALGORITHM
Lorena, W. Rabago Roxanne A. Ancheta, Rosmina Joy M. Cabauatan, Bartolome T. Tanguilig,
Research on Food Allergy Information using Smart Mobile Media Devices to Enhance Communication at Restaurants
Mikako Ogawa, Ayaka Tanaka, Keiichi Noda, Ayako Kawai, Donald L. Amoroso
Building a Research Model for Mobile Wallet Consumer Adoption: The Case of Mobile Suica in Japan
Donald L. Amoroso, Rémy Magnier-Watanabe
MATH WORLD: A GAME-BASED 3D VIRTUAL LEARNING ENVIRONMENT (3D VLE) FOR SECOND GRADERS
Jean Maitem, Rosmina Joy Cabauatan, Lorena Rabago, Bartolome Tanguilig III
A Rule-based Parallel Processing to Speed-Up an Application
Jo Ryan Basco, Bobby D. Gerardo, Cyreneo Dofitas Jr, Bartolome Tanguilig III, Yung-Cheol Byun
66.
67.
68.
69.
70.
71.
72.
73.
Location Technique based on Pattern Recognition of Radio Signal Strength for Parking Management
Romeo Mark A. Mateo,1 Bobby D. Gerardo,2 and Jaewan Lee
Monitoring Environmental Changes in Agricultural Crops via SMS
Byun Kaycee Pearl Germia, Michael Angelo G. Salvo, Cyreneo Dofitas Jr., Bobby D. Gerardo, Yung-Cheol
Ultrasonic Key Recognition; Security Algorithm for Pre-composed High Frequency Sound as a Mode of Unlocking a Security Lock
Byun Jeric Ryan R. De Josef, Ma. Beth S. Concepcion, Kyle Gabriel V. Oreta, Yung-Cheol
A Rule-Based Fuzzy Diagnostics Decision Support System for Tuberculosis
Bobby D. Gerardo , Bartolome T. Tanguilig III , Joel T. de Castro Louie F. Cervantes
Hierarchical Clustering and Association Rule Discovery Process for Efficient Decision Support System
Bobby D. Gerardo, Yung-Cheol Byun, Bartolome Tanguilig III
Adoption of Mobile Banking: Development of a Research Model
Amoroso, D. C. Clark, O. Sato, M. Rollins
Differences Between Japan and the United States Adoption of Mobile and PC Applications
Amoroso, D., M. Ogawa, T. Mukahi
Social Media Use at Work: Comparison of the United States and Japan
Ogawa, M., D. Amoroso , T. Mukahi, M. Tanabu
74.
Building a Research Model for Mobile Wallet Consumer Adoption: The Case of Mobile Suica in Japan
Donald L. Amoroso1 and Rémy Magnier-Watanabe2
75.
2010-2011 Automated Video Surveillance for Monitoring Intrusions Using Intelligent Middleware Based on Neural Network
Osorio Ana Rhea Pangapalan, Bobby D. Gerardo,Yung-Cheol Byun,Joel T. De Castro,Francisca D.
76.
Data Extraction using Preprocessing Compression Based on LZW to improve DB Performance
Bartolome
77.
78.
79.
80.
81.
82.
T. Tanguilig III, Ariel M. Sison, Bobby D. Gerardo, Yung Cheol Byun
SMS-Based Automatic Billing System of Household Power Consumption Based on Active Experts Messaging
Mark Dominic Cabioc, Bobby D. Gerardo, Yung-Cheol Byun
Predicting Faculty Performance using Regression Model in Data Mining
Tanguilig, III, Ph.D.
Raymond S. Bermudez,Joseph O. Manalang, Bobby D. Gerardo, Ph.D., Bartolome T.
Rater rating V2 (R2V2) : a feeloader-resistant user driven reputation system for collaborative sites
Alexis V. Pantola
Rating the raters: A Reputation System for Wiki-Like Domains
Alexis Velarde Pantola, Susan Pancho- Festin, Florante Salvador
A MODEL FOR CREATING 3D VISUAL LEARNING ENVIRONMENT (VLE) IN TIP-QC AS A FLAGSHIP FOR MULTIMEDIA AND COMPUTER GRAPHICS APPLICATIONS
Edison T. Talla
Application of Scaffolded Instruction allowing Cloudstorming in the Conduct of Information Technology Projects
Rosmina Joy M. Cabauatan
2009-2010 83.
84.
A High Precision Temperature Insensitive Current and Voltage Reference Generator
Kimberly Jane S. Uy, Patricia Angela Reyes-Abu, Wen Yaw Chung
A framework for discovering relevant patterns using aggregation and intelligent data mining agents in telematics systems
Bobby D. Gerardo , Jaewan Lee
85.
86.
An improved Data Encryption Standard to Secure Data using Smart Cards
Ariel M. Sison, Bartolome T. Tanguilig III, Bobby D. Gerardo, Yung-Cheol Byun
Acceptance of WoredaNet E-Government Services in Ethiopia: Applying the UTAUT Model
Lessa, L., S. Negash, D. Amoroso
87.
88.
89.
90.
Social Media Use by American-born versus Japanese born Respondents: Is There a Difference?
Amoroso, D., N. Amoroso, A. Orita
Factors of Mobile Ecosystem Success in Japan: An Interview with i-Mode Founder
Amoroso, D., M. Ogawa
Adoption of Mobile and Internet Applications in Japan and the United States
Amoroso, D., M. Ogawa
Mobile Payment Industry: Toward a Comprehensive Research Model
Amoroso, D., R. Watanabe
91.
92.
93.
94.
An Examination of Consumers’ High and Low Trust as Constructs for Predicting Online Shopping Behavior
Amoroso, D., T. Muhaki
Exploring Innovation in Mobile Technology: A Comparison Between U.S. and Japan
Donald Amoroso, Andrew Small
Reliable Progressive to Restricted PS-STUN Algorithm
Alexis V. Pantola, Mark Lim, Andre Tuason,, Jay Go, Don Sta. Ana
95.
96.
97.
ICT Assimilation in Ethiopian Institutions
Assefa, T., Negash, S., Amoroso, D.
UNDERSTANDING CONSUMERS’ ACCEPTANCE OF ONLINE PURCHASING
Amoroso, D., Hunsinger, S.
The Potential of a Web Portal of Selected Professional Subject - Data Structures at the Technological Institute of the Philippines
Rosmina Joy M. Cabauatan, Mylyn H. Nostarez
Creating an E-Portfolio for CITE Students of TIP QC 98.
99.
Lorena W. Rabago, Edison T. Talla
100.
Enhancing the Efficiency of an Open Laboratory Management System (OLMS) of TIP QC
Lorena W. Rabago, Gleen S. Israel
101.
Interactive Student's Performance Monitoring System for Guidance and Counseling Center
Melissa P. Juanillo, Elsa V. Isip
102.
AUTOMATED FACULTY LOCATOR FOR CITE
Melchor G. Erise
103.
DEVELOPMENT OF A TEMPLATE FOR DATA MANAGEMENT SYSTEM FOR STUDENTS’ RESEARCH PROJECT CUM MANUAL OF INSTRUCTIONS FOR
PROSPECTIVE USERS
Jean B. Maitem Lorena W. Rabago
104.
FRAMEWORK FOR AN AUTOMATED ASSESSMENT SYSTEM FOR RUBRIC
Dr. Bartolome T. Tanguilig III, Dr. Lorena W. Rabago
105.
ADVERTISING, PROMOTION AND MARKETING PORTAL FOR FINE LIGHT PHOTOGRAPHY COMPANY
Jean B. Maitem, Eric James L. Manalang and Lorena W. Rabago
106.
ELECTRONIC ADVISING FOR CITE STUDENTS
Lorena W. Rabago and Bartolome T. Tanguilig, III
107.
FACTORS RELATED TO ITE STUDENTS’ CAREER CHOICE
Elsa V. Isip and Melissa P. Juanillo
108.
READINESS OF ITE STUDENTS IN ORACLE CERTIFICATION EXAMINATION: INPUT TO PERFORMANCE LEVELING
Elsa V. Isip
109.
TRACER STUDY OF BSCS GRADUATES OF TIPQC
Bartolome T. Tanguilig III
2014-2015
codes.
Keywords –
Circular Pair Flash Code Jasper S. Agustin, Proceso L. Fernandez ABSTRACT
A flash code is a mechanism used for encoding and decoding digital information in flash memory. In most of the flash codes in literature, an update in 1 data bit requires at least pose the Circular Pair Flash Code, a new flash code that allows a pair of bit updates to require only a single cell write. Through computer simulation, we show that the proposed flash code is generally more efficient than existing flash
Flash Code, Encoding, Decoding
1
Traffic Predictive for the Major Roads in EDSA using Feed Forward Backpropagation Neural Networks Emilio Angelo D. Alindogan, Melissa P. Juanillo, Jerry Y. Hom, Ph.D., Ma. Christina R. Aragon, Ph. D, Febrev F. Dela Cruz, mark
modeling the traffic
Lorenz F. Eustaquio ABSTRACT
One area of improvement for many traffic control systems is the utilization of predictive analytics to enhance the control and management of traffic. Despite the complexity and constantly fluctuating nature of traffic flow, historical and real-time traffic data can be analyzed in order to make scientific predictions about the future traffic situation. The neural network approach is a machine learning technique that is used for computational modeling of many such complex systems. This paper describes a prototypal traffic forecasting program consist of a n aggregation of several Backpropogation-trained Feed-Forward Neural Networks that can be further developed for integration into a traffic management system. The Neural Networks were trained with historical traffic data from major segments in the C4 Road, commonly known as EDSA. Comparisons between predictions from the neural Network model and the corresponding actual traffic information from an online traffic monitoring system showed a considerably high 88% accuracy. This demonstrates the capability and effectives of Neural Networks in
Keywords –
Backpropagation Traffic Prediction, Artificial Neural Networks,
2
E-Math Version 2.0, a Learning Management System as a Math Reviewer Tool for Engineering Students in the Philippines
Maila R. Angeles, Arnel C. Fajardo, and Bartolome T. Tanguilig III
ABSTRACT
Abstract
— E-Math Version 2.0 is a learning management system (LMS). Its main objective is to assist math reviewers in their Engineering Licensure Examination in the Philippines. One of its features includes automatic evaluation feedback. This is designed in order to easily assess the student’s ability in mathematics. The capability of the system to track student profile while managing their progress in the activity became its advantage over its predecessor. The acceptability of E-Math as a reviewer tool was determined through the 3.58 average mean satisfaction rate given by the students as compared to 2.75 in the previous version.
Index Terms
— Engineering licensure examination, learning management system
3
Predictors of Project Cost Utilizing Parametric Cost Analysis of
projects.
Selected Domestic Construction Projects
Efren M. Pantoja, Ria Liza C. Canlas, Bartolome T. Tanguilig III
ABSTRACT
The issue of the cost of construction is one that is rarely far from the minds of construction clients, design teams, constructors and of course, quantity surveyors. The cost of constructing a building project is a primary concern for the vast majority of construction clients. Using the different estimating parameters from selected Philippine domestic projects, this study determined the various factors that interplay in the project cost performance of the construction projects. Specifically, the objectives attained were profiling of selected domestic construction projects; predictors of construction project cost; and, mathematical model utilizing parametric cost analysis in estimating future project cost. This study used selected building construction projects within and adjacent to Manila. There were thirty (30) structures which were part of this study. These structures were vertical medium rise projects. Linear regression was utilized to predict the model. Findings showed that the majority of the 30 projects engaged in government projects and constructors are corporations. The positively significant indicators were Project Duration (Days), Building Perimeter (l.m), Building Volume (cu.m), Total Weight of Steel Bars (kg/s), Exterior Wall Area (sq.m) and, Volume of Excavation (cu.m). The model for predicting the project cost for medium rise projects was derived and maybe used in other
Index Terms
-
Construction project cost, estimates, modeling cost, project management
4
Enhanced SHA-1 on Parsing Method and Message Digest Formula
Christine Charmaine G. San Jose, Bobby D. Gerardo, Bartolome T. Tanguilig III
ABSTRACT
The Secure Hash Algorithm is one of the most commonly used hashing algorithms on the time being. Experts are proposing for much secured SHA-1 because of some reports and study conducted on SHA-1 collision attacks. The aim of the enhanced Secure Hash Algorithm -1 (SHA-1) is to strengthen its original version that is expected to resist possible SHA-1 collision attacks. The enhanced SHA-1 had integrated the following modification: 1) Enhancement on the preprocessing, specifically on the parsing method. 2) The message digest and the final message digest formula was enhanced by giving additional shifting, xoring and improved mathematical formula. The enhanced SHA-1 maintains its original rounds which consist of 80 rounds and message digest output of 160 bit. Based from the result, the enhanced algorithm specifically on mathematical calculation of parsing method and message digest had shown great effects on its result on the hash value despite of a very minimal time delay, the enhanced algorithm is better and more secure.
Keywords-
Message Digest, Hash Function, Parsing Method, Cryptography, Digital Signature
5
Modified AES Algorithm Using Multiple S-Boxes
Felicisimo V. Wenceslao, Jr., Bobby D. Gerardo, Bartolome T. Tanguilig III
ABSTRACT
This paper proposes for a modified version of the AES algorithm using multiple Sboxes. While many studies have been conducted specifically on modifying the Sbox, these studies were made to replace the Rijndael Sboxes in the AES cipher. We propose to implement two substitution boxes, where the first Sbox is the Rijndael Sbox and will be used as is. The second Sbox was constructed through an XOR operation and affine transformation and will replace the MixColumns operation within the internal rounds in the cipher. Based on simulation testing conducted, it was found out that the modified AES algorithm using multiple SBoxes has better speed performance compared to the original cipher. However, when tested using the avalanche effect, the changes in the output bits were below the minimum expected rate.
Keywords-
AES algorithm, Sbox, Cryptography, Affine Transformation
6
i-SEARCH: DOCUMENT SEARCHING USING PAGERANK ALGORITHM
Renalyn C. Antonio, Lorena W. Rabago, Bartolome T. Tanguilig III
ABSTRACT
The study focuses on optimizing document searching using PageRank algorithm for White Hat Search Engine (SEO) technique for digitized master.s theses and doctoral dissertations of the Technological Institute of the Philippines-Quezon City Graduate Programs. This project will be beneficial to the readers, authors, and researchers for their research related needs like review of related literature and among others. Several techniques and technologies were used for the development of the project. The SDLC waterfall method served as the model in developing the system. PHP: Hypertext Preprocessor was used as the scripting language and MySQL as the database management system. White Hat SEO technique and strategies which target a human audience opposed to a search engine was also used in the project. The system was evaluated on its acceptability in terms of usability, functionality, reliability using ISO 9126. The respondents rated the system highly acceptable in terms of optimizing their search activities. This is a clear indication that optimizing document searching for any data or documents repository should be optimized for better customer service.
Keywords -
White Hat SEO techniques; Repository; Document Management System Page Rank Algorithm; Search Engine Optimization;
7
SECURITY ASSURANCE FRAMEWORK FOR SMS USING CASCADED ENCRYPTION ALGORITHM
Reynaldo E. Castillo, Gerald T. Cayabyab, Bartolome T. Tanguilig III
ABSTRACT
Security assurance in any telecommunication lines is a necessity. It is everyone.s desire to maintain secrecy of any information sent thru both unsecured and secured telecommunication lines. Short Message Service (SMS) has turned into an extension and has been an important part in the life of its user. Payment, mobile banking, important reminders such as stocks and news alerts, traffic updates, weather information and business related information are being catered thru SMS. Problems of privacy and imitations are the core issues dealt in the study. In order to prolong the secrecy of any information, an implementation of an improved cryptology scheme was designed. The study used a cascaded encryption process designed for sending SMS thru any communication line. The strength of the algorithm using the framework focused on designing a secured encryption process and adapting AES (Advance Encryption Standard) encryption with two more encryption layers. It discussed impact of the framework upon encryption process. This paper defined possible parameters which are focused on threat and risk analyses and prevention, technical and architectural requirements. The combined scheme provides further authenticity, security, privacy protections. During transmission or while in storage, security is still a significant concern to electronic information frameworks against coincidental or unlawful obliteration or modification. Cascaded encryption algorithm is one of the ways to ensure information security to which intended parties are able to read and access the confidential information. Aside from the cipher key used in the algorithm is of 128 bits, the approach had utilized two more layers for more confusion. Therefore, to the get the plaintext and cipher key an attacker has to check 2128*n possibilities where n is the number of substitutions and fold-shifting processes which are practically almost impossible.
Keywords-
AES; Encryption;Decryption; Plain Text; Cipher Text; SMS; Information Privacy and Security;ODD-EVENSubstitution; Folded-Shifting Metho 8
Status Analysis in Social Media: Input for Potential Business Trends
Paula Jean M. Castro, Rosmina Joy M. Cabauatan, Bartolome T. Tanguilig III
ABSTRACT
Social Media such as Twitter, Facebook, and LinkedIn provides people an avenue to virtually communicate and share implicit and explicit expressions about anything that interests them. These are normally in the form of posts and likes. Regardless of who instigated the posts, it inherently invites feedbacks in the form of likes as expressions of agreement or appreciation. In this study, a corpus of these types of explicit expressions was collected using Facebook Graph Application Platform Interface. With an end-in-view of utilizing it for the identification of potential business trends that could most likely be embraced by a specific clusters of users, the data were pre processed and clustered using K-Means data mining technique. Results show that interests of clusters of user unveil potential business trends, probable customers and insights for outstretched networked marketing strategies.
Keywords-
social media; data preprocessing; clustering; RapidMiner; tf-idf;
9
Mobile Web-based Student Integrated Information System
Ma. Cecilia A. Cantos, Lorena W. Rabago, Bartolome T. Tanguilig III
ABSTRACT
This paper describes a conducive and structured information exchange environment for the students of the College of Computer Studies in Manuel S. Enverga University Foundation in Lucena City, Philippines. The system was developed to help the students to check their academic result every end of the semester, make self- enlistment that would assist the students to manage their academic status that can be viewed in their mobile phones. This system would also help the dean to predict how many number of sections to be created for the next semester. The proponents used the Hill Climbing Algorithm search technique for the system particularly in creating self- enlistment and finding the best set of courses to the class schedule, and in projection of number of sections to be created for the next semester. The proponent also used the PHP as the programming language and MySQL as the database. The testing system was done before deploying it to the internet. The process was done in different processors, operating systems and different mobile device platforms. The system’s evaluation were involved 67 respondents from the College of Computer Studies in Manuel S. Enverga University Foundation in Lucena City, Philippines. The proponent made used ISO 9126 based Likert modified scale type of questionnaire that assess the system’s acceptability in terms of functionality, reliability, usability, efficiency, maintainability and portability. Non-probability sampling method was used in selecting respondents under a purposive-sampling scheme. The results of the evaluation for the prototype yielded a general weighted mean of 4.4 that describes the respondents strongly agree that the developed system was acceptable. 10
Time Scheduler Using SPEX: A New Genetic Algorithm Crossover Operator
Jose Tan Jr., Bobby Gerardo, Bartolome Tanguilig III
ABSTRACT
It has long been the problem of educational institutions to create classroom schedules for their instructors and students. The proponent created a course scheduling application using a new Genetic Algorithm (GA) crossover called Selected Peer Exchange Crossover (now SPEX.) The SPEX algorithm is likewise invented by the proponents designed for ordered chromosomes. The application has been developed to solve the time tabling problem of any Higher Educational Institutions (HEIs.) The scheduler application was developed using Microsoft C#.Net using actual data from a database. To further test the proposed algorithm, the scheduling system will also implement the Partially Matched Crossover (PMX) for comparison which is likewise an operator for ordered chromosomes. The test yielded favorable results to the new algorithm, SPEX, than PMX having average speeds of 2,786.82 and 2,934.53ms respectively from the five different crossover amounts, making the development of the class scheduler a successful one.
Keyword-
Genetic Algorithm, Time Tabling Problem, Partially Matched Crossover, Selected Peer Exchange Crossover
11
COMPETENCY MODEL FORINFORMATION SYSTEMS’ SPECIALIZATION TRACK UTILIZING RIASEC AND VALUES SEARCH MODELS
Risty Moyo-Acerado1, Lorena W. Rabago2, and Bartolome T. Tanguilig3
ABSTRACT
This paper introduces the competency models for Operations Manager, User Interface Designer, and Application Developers. It will serve as a guide for Information Systems students to identify which among the three of the offered tracks would be most suited for them to pursue according to their knowledge, skills, values and interests. The Holland’s RIASEC model and the Values Search model of Bronwyn and Holt were utilized to determine the most dominant interest and most dominant values of the industry computing experts. Survey assessment forms were sent to IT Operations Manager, User Interface Designer, and Application Developer. Most dominant values and interests of industry computing experts were determined as well as the knowledge and skills which are mostly required by the industry in their particular area. Based on the result of the survey, it shows that application developer and user interface designer have a closely related values. Thus a second round of a survey would be needed to come up with the most exclusive dominant values for the particular information systems specialization track.
Keywords-
e-learning, career assessment, profile matching, competency model
12
‘Make-It-ECE’, a Mathematics Learning Management System (LMS) for Engineering Students in the Philippines
Maila R. Angeles1, Custer C. Deocaris2*, Celso B. Co2, Shearyl U. Arenas1
ABSTRACT
Make it EC-E (MiE) is a learning management system (LMS) designed to supplement the mathematics review of candidate engineers for National Licensure Board examination in the Philippines. The content of the LMS is based on an ABET-certified curriculum. Its design is made simple as possible and it features gamification of learning activity. The game of choice is lottery using virtual play money. The randomness of lottery is to be beaten by the degree of knowledge acquired. The system collects student performance data in a well-defined database structure that facilitates test question reconstruction. Test question reconstruction is intended for adaptability of system according to teacher’s assessment of current weaknesses of the students. The acceptability of MiE is determined through survey however its effectiveness remains to be confirmed from actual result of the board exam.
KEYWORDS
- learning management system, gamification, engineering education, teaching mathematics, on-line teaching tools
13
The Mythical Adventure of Mang Kanor: An Action Adventure Game
Reynaldo E. Castillo, Mark Allen Q. Domagas, Paul M. Grafilon, realistic. Roniel N. Pagaling
ABSTRACT
The Mythical Adventures of Mang Kanor is an action-adventure game that acquaints the user to the various fictional creatures present to the Philippine culture. The developer’s goal is to familiarize the users with the different mythical creatures that is believed to exist. The gameplay is to defeat the enemies (mythical creatures) by following certain objectives per mission. The adventures of Mang Kanor’ environment uses models and algorithms that makes a 3D interface that is agreeable to the user. Evaluation is conducted to gather feedbacks and impressions of the users. The evaluation is composed of functionality, usability, reliability and efficiency that the target users going to rate. The developers gained a very satisfactory grade under the category of the game’s usability, reliability and efficiency. However, to some users, the developers received different reactions in terms of the game’s speed. Overall the Adventures of Mang Kanor obtained its main goal to introduce the users to the different mythical creatures and integrate appropriate algorithms to make the 3d game more
Keywords
- Game development, 3D Game, Filipino Mythical Creatures, Action-Adventure Game
14
Pest Identification using Image Processing Techniques in Detecting Image Pattern through Neural Network
Johnny L. Miranda, Bobby D. Gerardo, Bartolome T. Tanguilig III
ABSTRACT
In rice production, pest invasion is considered as the most challenging task for crop technicians and farmers. Pest invasion can cause serious losses and affect the income of farmers. It is then important to assess their density for pests forecasting decision making. Existing identification techniques of these species comprise of using different traps to detect their presence. However, these traditional methods are labor-intensive and sometimes experts on this field are not available. Another problem is that multiple site and frequent monitoring of rice pests is time consuming and tedious for a crop technician. This can lead to low accuracy and delays in obtaining accurate count of these species. In this study, an identification system was developed to automatically identify the insect pests in the paddy field. Sticky trap was used to capture the insect which continuously monitored by a wireless camera to record the video. Different image processing techniques was utilized to detect and extract the captured insect from the image, and Kohonen Self Organizing Maps neural network was used to identify the extracted insect pests. The results indicate that the proposed automated identification system is capable of accurately identifying the insect pests even though there are lots of lighting variations. The new automated identification system developed in this study provides a reliable identification and was found to be faster than a human expert in identifying the insect pests caught by a sticky trap.
Keywords -
paddy fields insect pests, automated pest identification, image processing, neural network
15
Academic Decision Support System for College Completion Model
Allen M. Paz, Bobby D. Gerardo, Bartolome T. Tanguilig III
ABSTRACT
Universities need to have extensive capabilities in order to analyze students’ achievement levels which will help in making appropriate academic decisions. Conversely, academic decisions will result in changes in academic performance which need to be assessed periodically and over spans of time. In this work, the college completion model based on k-means clustering algorithm was utilized in the development of the proposed academic decision support system (DSS). The system utilized data from the university database while the client front-end ensures adequate presentation so as to reveal significant details and dependencies. The system can be used to automate the decision making process of administrators aiming to decrease the high rate of academic failure among students. A real case study in Isabela State University is presented using a dataset collected from 2009-2013.
Keywords
decision support system, k-means clustering, college completion, data mining
16
Agricultural Crops Classification Models Based on PCA-GA Implementation in Data Mining
Geraldin B. Dela Cruz, Bobby D. Gerardo, Bartolome T. Tanguilig III
ABSTRACT
Extraction of knowledge in agricultural data is a challenging task, from discovering patterns and relationships and interpretation. In order to obtain potentially interesting patterns and relationships from this data, it is therefore essential that a methodology be developed and take advantage of the sets of existing methods and tools available for data mining and knowledge discovery in databases. Data mining is relatively a new approach in the field of agriculture. Accurate information in characterizing crops depends on climatic, geographical, biological and other factors. These are very important inputs to generate characterization and prediction models in data mining. In this study, an efficient data mining methodology based on PCA-GA is explored, presented and implemented to characterize agricultural crops. The method draws improvements to classification problems by using Principal Components Analysis (PCA) as a pre processing method and a modified Genetic Algorithm (GA) as the function optimizer. The fitness function in GA is modified accordingly using efficient distance measures. The approach is to asses, the PCA-GA hybrid data mining method, using various agricultural field data sets, generate data mining classification models and establish meaningful relationships. The experimental results show improved classification rates and generated characterization models for agricultural crops. The domain model outcome may have benefits, to agricultural researchers and farmers. These generated classification models can also be utilized and readily incorporated into a decision support system.
Index Terms
- Classification, data mining, genetic algorithm, k-NN, principal component analysis.
17
Predictive Decision Support System for Licensure Examination Performance through Integration of Multiple Regression and PART Classification Models of Data Mining
Ivy M. Tarun, Bobby D. Gerardo, and Bartolome T. Tanguilig III
ABSTRACT
Data mining is the process of discovering knowledge which in turn can be used to predict future trends. On the other hand, decision support system is an information system that enables one to analyze data and compile information that will aid in decision making process. This paper presents the integration of data mining and decision support system in an educational context. thus, a predictive decision support system for licensure examination performance (PDSS-LEP) is designed that highlights the repeated generation of multiple regression model and the integration of another classification model which was derived using PART classification technique. The PDSS LEP was found beneficial as it provides a good platform for generation of MR model that can be adapted by other institutions because of its model selection procedures and user-oriented interface. It is however suggested that data integration should be enhanced by considering multiple sources of data.
Index Terms -
system Data mining and decision support system integration, LET performance, multiple regression, predictive decision support
18
Adopting Game-Based Mobile Learning for Young Learners
Fredilyn Calanda, Roselia C. Morco, Risty Acerado
ABSTRACT
The use of multimedia is replacing many old school approaches to course materials preparation. The purpose of the work presented in this paper is to apply multimedia learning principles in the development of course materials for young learners. Because the first few years of schooling are vital for the development of skills, knowledge, and behaviors that provide the foundation for life learning, it is essential to give the best possible start to young learners. Accordingly, a game-based mobile learning prototype was developed to provide starter lessons like letters, numbers, and colors for 3-5 year old children based on the cognitive theory of multimedia learning approach. Improving the traditional way of teaching, the app utilizes words combined with images and audio or sound effects to capture the attention of its target users. There are different levels of difficulty to engage and motivate users. The prototype was installed in 30 mobile gadgets used by the parents with children ages 3-5 to evaluate its usability in terms of ease of use, user satisfaction, attractiveness, and learnability. The evaluation results prove that the approach is appropriate for the target users, with parents giving the app a satisfactory rating.
Keywords –
game-based mobile learning, usability, ease of use, user satisfaction, attractiveness and learnability
19
Comparative Study of the Three Different E-Learning Management Tools: A Basis for Development of Knowledge Based Management System
Marmelo V. Abante, Lorena W. Rabago, Bartolome T. Tanguilig III
ABSTRACT
The Internet had been experiencing considerable improvements recently. Being involved in such rapid modernism, the Internet therefore attained the significant aspects which have the capabilities of providing an even more extensive approach on how society preserves and develop knowledge. Considering these facts, the internet had been utilized by lecturers specifically those within the fields of higher education to convey information with ease. The Internet is used to deliver initiatives with regards to learning aspects and indeed this has created a more sophisticated approach in teaching. Utilizing the internet for teaching, along with other technological mediums is then referred to as ELearning. Nowadays, E-Learning has been traversing the conceptual path of innovation with haste, due to this certain instance, educational institutions have to be able to adapt to the fast evolving environment in which it is involved in. A variety of teaching and learning techniques; specifically reorientation, are to be incorporated through a tactical method. These methods are to be attenuated in order for them to be able to provide and uphold a more flexible performance when it comes to learning styles and stratagem. A lofty university education requires a prerequisite of certain key elements for it to be considered adept of betterment. Employers have the need to endow with a major programme of staff amelioration. Training and support are undoubtedly required to make sure that technological modernism could be prompted into the daily routines of an individual and for it to be utilized with percipient efficiency and effectiveness. Lecturers of an extensive number of departments were prompted to investigate computer aided learning in order to meet the objectives and motivating factors derived from the perspective of new students. However, many of these students had complaints regarding the lack of improvement and sustenance for this particular matter. This had been the reason why several schemes, methodologies, and 20
proposals were introduced in order to improve and develop E Learning management tools. On the other hand, the most recent advancement of knowledge-based systems has been to adopt the technologies for the development of systems that use the Internet. The Internet often has to deal with complex, unstructured data that can't be relied on to fit a specific data model. The technology of knowledge-based systems and especially the ability to classify objects on demand is ideal for such systems. Being a knowledge based system, E-Learning seeks to provide an easier approach in solving problems with complexity. This paper examines the issues surrounding the implementation of eLearning into higher education, including the structure and delivery of higher education, the implications to both students and lecturers and the global impact on society, determines how effective E-learning could serve as a knowledge based system, and also includes the mapping of three E Learning tools which may help to find out the differences between the commonly used E-Learning tools today namely Moodle, Blackboard and Claroline.
Keywords -
E-Learning, Moodle, Claroline, Blackboard, mapping, LMS
21
Extendibility of the Teknomo-Fernandez Algorithm for Background Image Generation
Patricia Angela Abu, Proceso Fernandez
ABSTRACT
The Teknomo-Fernandez (TF) Algorithm is an efficient algorithm for generating a background image from a given video sequence. It uses a tournament-like strategy, with 3 frames per tournament (TF3), to approximatethebackgroundpixelvalueateverypixelpositionofanimagefr ame. In this study we perform both theoretical and empirical analyses of the extendibility of this TF version by considering tournament sizes of 5(TF5),7(TF7) and even higher. The expected accuracies of the TF configurations are derived which are verified by the gathered experimental performances. A model background image and a framework for comparing the performance of the algorithms in terms of accuracy, space and time complexities are developed. From the theoretical and empirical results, the TF3 configuration is extendible to TF5 and TF7. However, it becomes impractical to extend it to beyond TF7 because of the exponential growth in the required number of Boolean operations. This study also shows TF3 to be the clear winner among the TF configurations in terms of marginal accuracy and processing time. Applying a background subtraction on the generated background images validates the competitiveness of this technique against other background modeling techniques in literature.
Keywords
-background generation, boolean operation, modal values
22
2012 – 2013
Impact of General Social Media Experience on Usefulness for Business in the Workplace
Donald L. Amoroso, Tsuneki Mukahi, Mikako Ogawa
ABSTRACT
This chapter looks at the adoption of general social media applications on usefulness for business, comparing the factors that influence adoption at work between Japan and the United States. In Japan, ease of use and usefulness for collective knowledge in general social media are predictors of usefulness for business social media, and in the United States, only usefulness for collective knowledge is a strong predictor of usefulness for business. The authors did not find behavioral intention to use social media in the workplace to be an important factor in predicting the usefulness of social media for business. The value of this research is its ability to understand the use of social media in the workplace to include how the experience of social media impacts on the expectation of usefulness for business and how the impact of ease of use differs from Japanese to the United States because of cultural, technological, and market reasons. 23
Co-Creation between Food Allergy Customers and Restaurants using Mobile Devices
Mikako Ogawa, Ayaka Tanaka, Keiichi Noda, Donald L. Amoroso
Abstract
Dealing with food allergies in the restaurant industry is becoming more important as more customers have needs, and restaurants are concerned with Corporate Social Responsibility (CSR). The objective of this chapter is to suggest how to provide information to facilitate the communication between the restaurant industry and the food allergy customers' families who want to enjoy dining out. As the first step, the authors conduct an interview with a major company in the restaurant industry to parallel the research of food allergy customers' families in order to identify communication problems. In the second step, they develop a mobile service to support communication between customers and restaurants. Lastly, as the third step, the authors set up a focus group interview to verify usability of the mobile service. They find that there are many customers (9-55%), who are allergic to the 7 specific allergens, but there are also customers who are allergic to ingredients from the 25 allergens, such as sesame (12%), and who are allergic to multiple ingredients. The authors found that the lack of information about ingredients and the lack of knowledge of the employees are responsible for the inconsiderate customer service and misses in operation, leading to communication problems. The results of the study reveal co-creation strategies enhance customer knowledge of food and create a shared environment of information value. The communication support tool utilizing the touch panel mobile device developed in this study gained favorable reviews from customers' families. 24
The Importance of Institution- Based Trust in Mobile Adoption with Online Shopping Applications
Donald L. Amoroso
ABSTRACT
This paper develops a research model that examines online purchasing by consumers. A research model was built to focus on the role of trust and its impact on inertia, loyalty, satisfaction of online consumers. 1,896 consumers in the United States were surveyed using an instrument and structural equation model that yielded respectable reliability and validity. It was discovered that certain sub constructs of trust play an important role in influencing consumers' behavioral intention toward online shopping. Both institution-based trust and structural assurances-based trust positively influence inertia and satisfaction. The data showed that greater levels of institution based trust leads to greater levels of online shopping satisfaction using mobile devices. However, a person's perception of structural assurances-based trust does not significantly influence his/her loyalty toward shopping with an online vendor. This paper adds to the understanding of online purchasing. Future researchers can refine the model and instrument to further explain consumers' acceptance of mobile online shopping applications.
Keywords
Shopping Applications, Online Shopping, Online Shopping Satisfaction - Institution-Based Trust, Mobile Adoption, Mobile
25
An Improved Data Mining Mechanism Based on PCA-GA for Agricultural Crops Characterization
Geraldin B. Dela Cruz, Bobby D. Gerardo, Bartolome T. Tanguilig III
ABSTRACT
In this study, a data mining method based on PCA-GA is presented to characterize agricultural crops. Specifically it draws improvements to classification problems by using Principal Components Analysis (PCA) as a preprocessing method and a modified Genetic Algorithm (GA) as the function optimizer. The GA performs the optimization process, selecting the most suited set of features that determines the class of a crop it belongs to. The fitness function in GA is studied and modified accordingly using efficient distance measures. The soybean dataset is used in the experiment and results are compared with several classifiers. The experimental results show improved classification rates. This lessens the time consumed of agricultural researchers in characterizing agricultural crops.
Index Terms
- Classification, data mining, genetic algorithm, k-NN, principal component analysis.
26
Generating Licensure Examination Performance Models Using PART and JRip Classifiers: A Data Mining Application in Education
Ivy M. Tarun, Bobby D. Gerardo, Bartolome T. Tanguilig III
ABSTRACT
This study focused on the generation of the licensure examination performance models implementing PART and JRip classifiers. Specifically, it identified the attributes that are significant to the response attribute; it generated prediction models using the PART and JRip classifiers of WEKA; and it determined how likely a reviewee to pass the LET. The respondents were obtained from the Education graduates of Isabela State University Cabagan campus who took a LET review and eventually took the September 2013 LET. The results obtained indicate the significance of the mock board exam, general weighted average of the reviewees in GenEd and Major Core in predicting LET performance. The reviewee is predicted to fail the LET if he will obtain a mock board rating lower than 34% of the total points. It is further predicted that if the general weighted average in all the general education subjects is fair, or the general weighted average in all the general education subjects is fairly good and has a kinesthetic learning style, then the reviewee will fail the LET.
Index Terms
- JRip, LET, PART, performance prediction.
27
Camera-Captured Writing System Recognition of Logosyllabic Han Character
Maria Christina Aragon, Melissa Juanillo, Rosmina Joy Cabauatan
ABSTRACT
The study is focused on the recognition of Logosyllabic Han writing system such as Cantonese for Chinese, Hiragana and Katakana for Japanese and Hangul for Korean from a camera-captured image using image processing algorithms: Peripheral Direction Contributivity and 3-level matching, 2D Array and Recursion methods. In order to improve performance and to reduce memory usage of a mobile device, a remote web server has been used to communicate information from the user to the server and vice versa using Simple Object Access Protocol. Experiments were conducted to test the accuracy of the application such as capturing the same image several times, checking the percentage of the features of the text in the captured image, and capturing text from images in different circumstances such as low lighting and skewed images. The overall result showed the application has 80-100% accuracy in identifying Chinese, Japanese, and Korean writing systems.
Index Terms
- Image processing, logosyllabic han character, optical character recognition, peripheral direction contributivity.
28
Antiscraping Tool: A system that blocks automatic scrapers through Computer Test and Human Test
Paul Alejandro, Algene de la Paz, John Guevara, John Ong David, Alexis Pantola
ABSTRACT
E-commerce is de_ned as the dealings and transactions that occur over the Internet [1]. The availability of the products information along with its currency value over the Internet has become the target of competing companies. Competitors use a method website scraping where they extract the information from a website for data manipulation [2]. Automatic scrapers called bots run program that automatically harvest huge amount of information at a rapid rate. They also a_ect the performance of the website because of performing requests at a very fast rate. In order to counter scraping tools, anti-scraping tools and techniques were developed. 29
iRecruit Tool : A Marketing Application for Higher Educational Institution using C4.5 Classification Technique
Sheila A. Abaya, Bobby D. Gerardo, Bartolome T. Tanguilig III
ABSTRACT
This research focuses on the application of C4.5 classification technique to help the marketing department of Higher Educational Institutions identify probable secondary schools for recruitment. A mapping feature was also provided to show possible routes from the point of origin to the target institution/s. This is to maximize the visit for every probable school. In view of this tool, the cost incurred by these educational institutions can be eliminated, if not, alleviated. Likewise, the application helps the administration recognize some qualified secondary schools for School-to-School Promotion (STSP) and utilize other resources.
Index Terms
- Data mining, C4.5, classification, recruitment
30
Comparison of Classification Techniques in Education Marketing
Sheila A. Abaya, Bobby D. Gerardo, BartolomeT. Tanguilig III
ABSTRACT
One of the predicaments of Higher Educational Institutions (HEIs) is to identify the potential schools for enrollment. Most HEIs conduct School-To-School-Promotion (STSP) to several secondary schools to sustain, if not, increases the enrollment rate. The classification techniques in data mining were used to classify feasible secondary institutions as target markets for promotion. This technique may also eliminate, if not, alleviate the expenses of HEIs by filtering which among the visited secondary schools do not contribute to the enrollment rate. Experimentation on J48, and Bayesian Network classification techniques were implemented using WEKA 3.6.0 [2] [4]. These techniques were also identified based on the accuracy of classifying the data set. C4.5 outperformed other classifying technique. The output of this research is beneficial in identifying the best classifying technique to be used in the given data set of determining which among the probable secondary schools are qualified for enrollment in the HEI.
Index Terms
- Bayesian Network, C4.5, classification technique, WEKA
31
Pest Detection and Extraction Using Image Processing Techniques
Johnny L. Miranda, Bobby D. Gerardo, Bartolome T. Tanguilig III
ABSTRACT
Detection of pests in the paddy fields is a major challenge in the field of agriculture; therefore effective measures should be developed to fight the infestation while minimizing the use of pesticides. The techniques of image analysis are extensively applied to agricultural science, and it provides maximum protection to crops, which can ultimately lead to better crop management and production. Monitoring of pests infestation relies on manpower, however automatic monitoring has been advancing in order to minimize human efforts and errors. This study extends the implementation of different image processing techniques to detect and extract insect pests by establishing an automated detection and extraction system for estimating pest densities in paddy fields. Experiment results shows that the proposed system provides a simple, efficient and fast solution in detecting pests in the rice fields.
Index Terms
- Automated pests management, image analysis object detection, object extraction.
32
Mapping of the Three Different E-Learning Management Tools: A Basis for Integrated Development Learning Environment (IDLE)
Marmelo V. Abante, Lorena W. Rabago, Bartolome T. Tanguilig III
ABSTRACT
The Internet had been experiencing considerable improvements recently. Being involved in such rapid modernism, the Internet therefore attained the significant aspects which have the capabilities of providing an even more extensive approach on how society preserves and develop knowledge. Considering these facts, the internet had been utilized by lecturers specifically those within the fields of higher education to convey information with ease. The Internet is used to deliver initiatives with regards to learning aspects and indeed this has created a more sophisticated approach in teaching. Utilizing the internet for teaching, along with other technological mediums is then referred to as E-Learning. Nowadays, E-Learning has been traversing the conceptual path of innovation with haste, due to this certain instance, educational institutions have to be able to adapt to the fast evolving environment in which it is involved in. A variety of teaching and learning techniques; specifically reorientation, are to be incorporated through a tactical method. These methods are to be attenuated in order for them to be able to provide and uphold a more flexible performance when it comes to learning styles and stratagem. A lofty university education requires a pre-requisite of certain key elements for it to be considered adept of betterment. Employers have the need to endow with a major programme of staff amelioration. Training and support are undoubtedly required to make sure that technological modernism could be prompted into the daily routines of an individual and for it to be utilized with percipient efficiency and effectiveness. Lecturers of an extensive number of departments were prompted to investigate computer aided learning in order to meet the objectives and motivating factors derived from the perspective of new students. However, many of these students had complaints regarding the lack of improvement and sustenance for this particular matter. This had been the reason why several schemes, methodologies, and proposals were introduced in order to improve and develop E 33
Learning management tools. On the other hand, the most recent advancement of knowledge-based systems has been to adopt the technologies for the development of systems that use the Internet. The Internet often has to deal with complex, unstructured data that can't be relied on to fit a specific data model. The technology of knowledge-based systems and especially the ability to classify objects on demand is ideal for such systems. Being a knowledge based system, E-Learning seeks to provide an easier approach in solving problems with complexity. This paper examines the issues surrounding the implementation of eLearning into higher education, including the structure and delivery of higher education, the implications to both students and lecturers and the global impact on society, determines how effective E-learning could serve as a knowledge based system, and also includes the mapping of three E Learning tools which may help to find out the differences between the commonly used E-Learning tools today namely Moodle, Blackboard and Claroline.
KEYWORDS -
E-Learning, Moodle, Claroline, Blackboard, Mapping, LMS
34
Development of College Completion Model Based on K-means Clustering Algorithm
Allen M. Paz, Bobby D. Gerardo, Bartolome T.Tanguilig III
ABSTRACT
The amount of data stored in educational databases is rapidly increasing because of the increase in awareness and application of information technology in the field of higher education. What can be done with these databases is to mine the hidden knowledge in it. This paper is designed to present and justify the capabilities of data mining. The main contribution of this paper is the development of college completion model based on k-means clustering algorithm. The data stored in the Student Information and Accounting System from 2009 to 2013 was used to perform an analysis of study outcome taking into consideration not to include in the final result any identifying information to protect their privacy. The results showed that majority of the students belong to the cluster which needs intervention. The dataset used can be improved by including data of students currently enrolled. The result obtained can be used as a decision support tool. The WEKA software was used to build the college completion model using k-means clustering.
Index Terms
- Database, college completion, k-means, clustering, data mining, algorithm.
35
INNOVATIVENESS OF CONSUMERS IN THE ADOPTION OF MOBILE TECHNOLOGY IN THE PHILIPPINES
Amoroso, Donald, L.Lim, Ricardo
Abstract
Global mobile technology use has grown exponentially. A survey of Philippine consumers in particular showed that more than 83% cannot live without their mobile phone. We study factors such as ease of use and personal innovativeness in order to understand the consumer adoption of mobile technologies in the Philippines, in order to build on existing adoption theories for academics and make recommendations to practitioners based on our findings. The research questions that we attempted to address include: (1) what key factors drive adoption of mobile technologies by Filipino consumers? (2) Are Filipino mobile consumers more personally innovative in their use of mobile technologies? We surveyed 725 mobile Filipino consumers, and resulting linear regression models show a significant amount of variance explained for behavioral intention and attitude toward using. In both models personal innovation had statistical impact on both attitude toward using and behavioral intention to use. Innovativeness did load on both attitude and behavioral intention for mobile applications as originally hypothesized, but was strongly loaded for attitude toward using.
Keywords
- Mobile applications, adoption, personal innovativeness, ease of use, satisfaction.
36
CHED Faculty Information System Utilizing Cloud Computing Infrastructure
Ronnie B. Santelices, Bartolome T. Tanguilig III
ABSTRACT
Higher Education Institutions (HEIs) are required to submit documents to the Commission on Higher Education (CHED) including faculty members’ data when applying for a new program offering. Based on the documents submitted, problems were encountered by CHED as some academic institutions submit documents of faculty members’ who are not connected with them, or faculty members’ who are connected but associated with other institutions. Proper and automated validation processes may be utilized to improve the commission’s regulation procedures on validation processes of the documents. The study proposed the CHED Faculty Information System (CHED-FIS) utilizing Cloud Computing Infrastructure. Relevant information where gathered through CHED’s Memorandum Orders and by interviewing CHED personnel as the bases in developing the system. The study made use of descriptive and developmental methods of research. The software development process applied is prototyping. The study likewise utilized the Hierarchical Input Process Output (HIPO) chart to describe the various components of the system and their relationships to one another during implementation. A structured analysis technique known as data flow diagram (DFDs) was used and presents a graphical representation of data processes in the organization. The framework for the information systems architecture was structured using a 3 –Tier architectural model which consists of presentation, logic and data tier. For the evaluation of the system, five-point rating scale questionnaire was used, with CHED Central Office and CHED Regional Office personnel as respondents, to determine the system’s functionality, efficiency, usability, reliability, portability and security. Descriptive statistics like frequencies and weighted means were utilized to analyze and interpret the responses. The concept of CHED-FIS is composed of a computer as a tool, cloud computing infrastructure for interactions over a network and a state-of-the-art web application. This system is capable of managing 37
faculty and school records, handles queries and generates important reports which are specifically suited to the needs of CHED and the HEIs in the country. Moreover, it can be accessed through capable mobile devices and desktop computers. With an evaluation rate of “Excellent” as perceived by the respondents, the system fully realized the objectives of the study and will be able to address the needed requirements for effective decision making and elucidate the problems encountered by CHED and its clientele.
Keywords -
Faculty Information System; Cloud Computing Infrastructure; Commission on Higher Education; CHED Central Office; CHED Regional Office; Faculty Member; Administrative Position.
38
Application of Fuzzy Logic and Neural Network Algorithm as an Input to Decision Support System Prescribing Medicine for Diabetes
J. Fidelino, B. D. Gerardo, Dr. B. T. Tangulig III
ABSTRACT
Decision support system (DSS) is a commonly used strategy to come up with a better solution. In the field of medicine, ideas from other doctors would be an effective way to determine the successful result of medicating a patient’s disease. In this paper, fuzzy logic and neural network is used as a tool to determine the right input of medicines to the DSS of doctors. Fuzzy logic would be used to filter medicines that are applicable to the patient’s capability. Through this, neural network would take the role of determining the most recommended medicine of the doctors from their previous patients. The output would serve as an input for the DSS which will be used by the doctors.
Keywords
- decision support system; fuzzy logic; neural network; diabetes
39
Implementation of Lossless Preprocessing Technique for Student Record System
Elmer C. Matela, Dr. Ariel Sison, Dr. Bartolome Tanguilig III
ABSTRACT
The Implementation of Lossless Preprocessing Technique for Student Record System of the Lyceum of the Philippines University mainly aims to apply an effective data compression algorithm to efficiently store data, improve data transmission via web-based infrastructure and ensure security of records. The system is comprised of the following modules namely: Smart ID Registration Module, Client-Side Application Module and Information Kiosk Module. For enhanced security consideration, GZIPalso known as GNU ZIP algorithm is implemented to compress records before saving in the central database. It is a lossless data compression utility that is based on the deflate algorithm with the format defined in Internet Engineering Task Force RFC1951: DEFLATE Compressed Data Format Specification version 1.32. This standard references the use of the LZ77 (Lempil-Ziv, 1977) compression algorithm combined with Huffman coding. On the other hand, the lossless decompressionrestores the data by bringing back the removed redundancy and produces an exact replica of the original source data. Results of the software evaluation indicate high acceptability on the overall system performance.
Keywords -
compression; decompression; security, smart card/ID; authentication; identification; interactivity
40
New Genetic Algorithm Crossover Technique for a Constraint Based Scheduling Agent
Jose Tan Jr., Bobby Gerardo, Bartolome Tanguilig III
ABSTRACT
A common school problem is a creating course schedules. The proponent has planned to create a scheduling system using Genetic Algorithms. Prior to this, proponent must develop this stage, the proponent compared his own SPEC algorithm with two popular crossover techniques called One-point and Cyclic crossover techniques. The test was developed in C++ and ran on an Intel i5 2.3 Ghz computer. The result turned out positively for the new technique having an average execution time of 4.52 seconds compared to 4.8 and 4.81 seconds for both Single-point and Cyclic techniques respectively. Having these execution times, the new technique was able to iterate 311 times compared to 294 and 293 iterations from the other two existing techniques. The next is the step is to develop the system itself.
Keyword
– Genetic Algorithm, New Crossover Algorithm, Computer Sciences, Time tabling Problem
41
Students Competency Model for Information Systems Specialization Tracks
Risty Moyo- Acerado, Roberto U. Acepcion
ABSTRACT
The significance of selecting a field of specialization has never been a big deal for many students. Most often they do not completely realize its impact to the success of their career. The proposed competency model will guide Information Systems students to identify which among the three of the offered tracks would be more suited for them to pursue according to their knowledge, skills, values and interests. The Holland’s RIASEC model and the Values Search Model of Bronwyn and Holt were used to determine the most dominant interest and values of the computing experts and the students. The matching, identification and classification of competencies and recommendation of track would be catered by the ANT algorithm with the heuristic process. The proposed competency model can be tested, tried, and integrated to a tool that will cater the processing of the Information Systems track identification and recommendation to the information systems students.
Keywords
- e-learning, career assessment, heuristic argument, profile matching
42
FRAMEWORK MODEL OF IMPLEMENTING SUSTAINABLE COMPUTER LITERACY PROGRAM FOR ADOPTED BARANGAY
Shiela Dala, Roselia Morco, Alvin Teruel, Marlon Castillo, Roberto Bautista, Raychelou Valencia
ABSTRACT
Sustainability is one of the most difficult factors to cover in conducting community outreach project. Community development should not stop in giving seminars, training, and Memorandum of Agreement (MOA) signing. This paper ties to design a framework model that will be used to develop a long-term computer literacy program utilizing innovative tools for monitoring the sustainability of beneficiaries’ learning. The framework divides the implementation in different logical divisions known as phases. Phases include information dissemination, internal apprenticeship, industry deployment and echo training. In designing the model, the researchers apply best practices of different institutions in conducting their community development program. We also have given emphasis that community outreach programs should not be done for accreditation purposes only. We believe that life-long learning should be taken seriously since this is one of the most significant contributions of academic institutions in building our community.
Keywords
- Sustainable Community Development, Computer Literacy Program, Sustainability
43
JVISUAL: A VISUALIZATION TOOL FOR NOVICE OBJECT-ORIENTED PROGRAMMERS IN JAVA LANGUAGE
Marlon Castillo, Shiela Dala, Raychelou Valencia, Ferdinand Hassan Flojo, Roselia Morco, Ronald Lacanilao, Alvin Teruel
ABSTRACT
Teaching object-oriented programming is very challenging since students have difficulty in adapting to a new paradigm. Knowledge in procedural programming might me very confusing when dealing with object- oriented programming. This paper tries to develop a visualization tool for teaching object oriented programming in the context of paradigm shift. The tool aims to make students comfortable with shifting from procedural to object- oriented programming This study illustrates the use of visualization in teaching introduction of object-oriented programming concepts. A Java application will be developed with the purpose of allowing the user to interact with visualization of any Java class through instantiation of objects, movement of those particular objects around class environment and the activation of class methods. The researches aim to create a visualization tool that will help not only teachers but also students in grasping object-oriented concept and is practical for classroom demonstration, individual student use in laboratory and class debugging and testing.
Keyword -
: Visualization software, Novice Object Oriented Programmers, Java Language
44
Mining Online GIS for Crime Rate and Models based on Frequent Pattern Analysis
John David Elijah Sandig, Ruby Mae Somoba, Ma . Beth Concepcion, Bobby D. Gerardo,
ABSTRACT
The researchers proposed to develop a mechanism in mining an Online Graphical Information System (GIS) for crime rate and models using frequent pattern analysis. It is a web-based system that includes GIS for robbery, homicide and physical injury incidents within Iloilo City. This system can help police identify where and what time crime frequently happen. It generates who are the frequent victims in the community. The main focus of the proposed system is the analysis of frequent crime patterns and its association rules and crime hot spots. Results show the hot spots which displays clustered crimes in the Google Map. It uses the Google Heat Map layer in clustering plotted crimes. These hot spots are showing the density of crime. Furthermore, the system is able to generate frequent patterns of crimes. This uses Apriori algorithm in generating the results.
Index Terms
- Data Mining, GIS, Apriori algorithm, frequentpattern,Association rules, clustering, cloud computing, crime mapping, hot places, hot prey; hot spot
45
Flash Flood Prediction Model based on Multiple Regression Analysis for Decision Support System
Joel T. de Castro, Gabriel M. Salistre, Jr, Young-Cheol Byun and Bobby D. Gerardo,
Member, IAENG
ABSTRACT
Philippines experience frequent flash flooding, usually with insufficient lead time which causes panic and fear to the people. In spite of decades of effort by the government and the private sectors to improve observations and warning, flash floods continue to be one of nature’s worst killers. On the average, there is at least one disastrous flood every four (4) years in the Philippines [1]. This paper proposed to develop a technology on Flash Flood Warning System Using SMS with advanced warning information based on prediction algorithm devised by the researcher regarding increasing water level and water speed. These two factors were considered as triggers to the flashflood, thus become components of the regression algorithm devised by the researchers. Based on the training data captured for seven days, the regression equation was developed while the actual/real time data were input to the regression model. Prediction of the current and forthcoming risk on flood is computed by the system based on the model and is sent through SMS to registered users for early warning purposes.
Index Terms
-
Flash Flood, Prediction Algorithm, Multiple Regression Analysis, Data Mining, Decision Support System
46
Framework for Information Sharing with Privacy and Priority Control in Long-Term Care in Japan
Shoko Miyagawa, Shigeichiro Yamasaki, Eiko Uchiyama, Donald L. Amoroso
Abstract
In this paper, the authors present a framework for information sharing with privacy and priority control in long-term care designed to promote appropriate information sharing among the people who are involved in long-term care for provision of better care service. The authors’ framework includes four agents (user agent, local information system access agent, authentication/access control agent and priority control agent) and two databases (user database and care record index database). The LIS (local information system) access agent creates and updates the care record index database, which act as an index when user agents try to access to care recipient’s record, based on the Open Authentication protocol. It also acts as a query interface from each user agent. The authentication/access control agent allows sensitive information to be shared in accordance with the policy defined by care recipient. The priority control agent judges the urgency of the information for either periodic or immediate notification. The authors also propose an implementation of this framework using the Resource Description Framework Site Summary, and demonstrate how our framework works with the scenario of care recipient’s unexpected injury. In summary, this framework is designed to help people who require long-term care and provides an effective system for each staff that is in charge of administering long-term care services. The authors’ information sharing system incorporates a multi-agent architecture to facilitate information sharing and privacy/priority control. The authors believe that this research provides an important first step for researchers who intend to build a prototype to automate the processes of information sharing for long-term health care.
Keywords
- e-Health, Information Sharing, Long-Term Care, Multi Agent System, Research
47
An Education Data Mining Tool for Marketing based on C4.5 Classification Technique
Sheila A. Abaya, Bobby D. Gerardo
ABSTRACT
This paper aims to classify the demographics that affect successful high school recruitment. It also aims to minimize the workload of the admission/recruitment personnel in planning school-to-school promotion without compromising the chance of recruiting more high school students. Historical data of College Entrance Test examinees is used for classification. In view of this, the researchers have developed a system based on the C4.5 decision tree algorithm to enhance the strategy of planning.
Keywords
- data mining, classification technique, C4.5, rules, decision tree
48
Comparing Mobile and Internet Adoption Factors of Loyalty and Satisfaction with Online Shopping Consumers
Mikako Ogawa, Donald L. Amoroso
Abstract
This research looks at the adoption of Internet and mobile applications comparing the factors that influence loyalty and satisfaction. It is the intent of this exploratory study to examine factors of adoption that are common in both Japan and the United States. After a comprehensive review of the literature, we derived a research model for and tested related hypotheses with data collected from consumers in both Japan and the United States. The authors used online shopping as the common application between Internet and mobile technologies. They found that the original technology acceptance model factors to be less important in explaining the overall variance of satisfaction, especially with mobile applications, than expected. This research takes an important first step in understanding the adoption of online shopping by differentiating mobile and Internet factors. Inertia was found to be critical in explaining satisfaction only with mobile applications. This factor is important for online retailers who count on repeat sales as a major part of their revenue. Loyalty is key to online retailers identifying the factors that will enhance the satisfaction of the online consumer. This study provides managers with a framework for online shopping which areas they need to focus upon when launching new online products, such as shaping and/or changing their consumers’ attitude toward using the Internet, making their Website easier to use, and enhancing the perceived usefulness of the technologies that allow consumers to access their products online.
Keywords
– Consumer Loyalty, E- Satisfaction, Japan, Mobile Applications, Online shopping, United States
49
TULUNGAN: A SLANDERING-RESISTANT REPUTATION SYSTEM FOR COLLABORATIVE WEB FILTERING SYSTEMS
Alexis V. Pantola, Susan Pancho-Festin, Florante Salvador
ABSTRACT
Reputation systems measure the credibility of contributions and contributors in collaborative web systems. Measuring the credibility is significant since a collaborative environment generally allows anyone with Internet access to provide contribution. Collaborative web systems are susceptible to malicious users who intentionally provide inaccurate contents. With the help of reputation systems, the effect of such malicious activities can be reduced. Reputation systems allow Internet users to rate the contributions made by other users. However, there are malicious users who will go beyond providing wrong contributions. They attempt to make reputation systems useless by launching attacks such as slandering. Slandering happens when a malicious user or group of malicious users intentionally provide a negative rating to accurate contributions provided by good users. Such activity lowers the reputation of good users and in most cases it even helps improve the reputation of slandering users. This paper presents a reputation system called Tulungan that is designed to measure the contributor and rater reputation of users of a collaborative web system that is used for web filtering. User contributions are in the form of URL categorizations. It is the role of Tulungan to determine the correctness of the categorizations. A simulation is presented to validate the resilience of Tulungan in the presence of slandering users. The result of the simulation shows that Tulungan is not only resistant to slandering but it is still effective even if the number of good users is less than its slandering counterpart. Even if there are only 15% good users, the number of correct URL categorizations outnumbers incorrect contributions.
KEYWORDS -
Reputation System, Collaborative Web Systems, Web Filtering
50
An Examination of Consumers’ High and Low Trust as Constructs for Predicting Online Shopping Behavior
Donald L. Amoroso, Tsuneki Mukahi
Abstract
This research examines the constructs of high and low trust on consumers’ behavior with online shopping. The authors developed a research model and instrument to study the trust construct in the acceptance online shopping applications. The authors hypothesized that trust positively influences a person’s intention to purchase from a virtual store and that trust positively affects the consumer’s attitude toward using the e-store. Consumers who trust an online company feel more committed to it. Previous research showed that the causal antecedents of customer confidence in e-tailers included the site’s ease of use, the level of online shopping resources, and existence of a trusted third party seal. The authors developed a survey instrument where in a sample of 940 respondents the constructs yielded respectable reliability and construct validity. The authors conducted analysis for the measurement reliability and validity by Cronbach alpha reliability coefficients and confirmatory factor analysis using AMOS 21. The measurement scales for this instrument showed strong psychometric properties. Average Variance Extracted (AVE) was extracted for assessing convergent and discriminant validity showing strong support for the research model. The causal structure of the research models was tested using a Structural Equation Model (SEM). The authors found that intrinsic motivation was more important for attitude toward online purchasing among high truster persons, and under low institution environments, people tended to form positive attitudes mainly based on preserved usefulness without intrinsic motivation. The authors found that attitude toward using acts as a strong predictor of behavioral intention to use and actual usage of online shopping technologies. According to the authors’ results, 51
trust provides the foundation with which intrinsic motivation will work well. In other words, trust may have long-term effects on online shopping behavior.
Keywords -
Consumer, Internet Adoption, Online Shopping Behavior, Technology Acceptance, Trust
52
Investigating the Number of Users and Months to Make TULUNGAN Effective Against Self-Promoting Users
Alexis V. Pantola, Susan Pancho-Festin, Florante Salvador
ABSTRACT
Tulungan is a reputation system for collaborative web filtering that is both consensus-independent and self-promoting resistant. Simulation results show that Tulungan requires less than 50% good users in order to become effective against malicious and self-promoting users (i.e., bad users). Being effective means that it is able to give high reputation values to good users relative to bad users. In addition, the effectiveness of Tulungan is also confirmed by comparing the number of correct URL categorizations that it made against the wrong ones. This is in contrast with other reputation systems that require at least 50% good users in order to be effective against malicious users and even a greater percentage of good users to work against self-promoting users. Although previous studies show the consensus-independent and self-promoting resistant properties of Tulungan, the simulation covers only a fixed number of total users and months. This paper presents additional simulation involving Tulungan that confirms the number of users and months needed for it to become effective. Results show that the reputation values of good users suffer if it involves less than 200 users and 2 simulated months.
Keywords -
Reputation System, Web Filtering.
53
e-DoX:DEPED Student Grade Records Management System with Implementation of Advanced Encryption Standard and PKI Infrastructure
Rommel B. Dy, Mary Jane A. Larida, Bartolome T. Tanguilig III
ABSTRACT
This study entitled e-DoX: DEPED Student Grade Records Management System with Implementation of Advanced Encryption Standard and PKI Infrastructure for the Department of Education in the Province of Cavite is an online based application designed to aid private and public schools in submission of reports on promotions composed of Form 18-A, Form 18-E1 and Form 18-E2 to the Division Office of the Department of Education in the province of Cavite. The system would also be eliminating factors such as transportation and storage to maximize time allotment for the evaluation of the submitted reports. In this study Advanced Encryption Standard and Public and Private Infrastructure was implemented in e-DoX to secure digital data into an undecipherable format that are sent by the schools in Cavite to DEPED application. This data is typically scrambled by using hashing algorithms, which convert data into a secret scrambled encryption format. This is the reason AES and PKI was implemented because it has the highest defined level for data encryption and security that will secure important data such as the student grade records of the schools in Cavite. The study covers all of the underlying plans and designs that were considered and executed in order to accomplish the research project. This includes collective plans and blueprints right from the conceptualization of the research project, data gathering on the existing system, knowledge requirements on different technologies included in the system, design and development of the system, up to the software evaluation. The researcher used Prototyping as the method for development. This type of approach of developing the software is used for people who are usually not good at specifying their requirements, nor can tell properly about what they expect from the software. This type of System Development Method is employed when it is very difficult to obtain exact requirements from the client. While making the model, 54
user keeps giving feedbacks from time to time and based on it, a prototype is made. The findings of this project based on all of the results gathered during the software evaluation phase were carefully tabulated and analyzed by the proponent to come up with the best possible conclusion and recommendations for the betterment of the research project. The research project during the evaluation phase received an overall strongly acceptable remark from the respondents.
Keywords -
Advanced Encryption Standard; Department of Education; Document Management; PKI; Records Management; Security, Student Grade;
55
iCCS: Development of a Mobile Web-Based Student Integrated Information System Using Hill Climbing Algorithm
Maria Cecilia G. Cantos, Lorena W. Rabago, Bartolome T. Tanguilig III
ABSTRACT
This paper describes a conducive and structured information exchange environment for the students of the College of Computer Studies in Manuel S. Enverga University Foundation in. The system was developed to help the students to check their academic result, manage profile, make self-enlistment and assist the students to manage their academic status that can be viewed also in mobile phones. Developing class schedules in a traditional way is a long process that involves making many numbers of choices. With Hill Climbing Algorithm, however, the process of class scheduling, particularly with regards to courses to be taken by the student aligned with the curriculum, can perform these processes and end up with an optimum solution. The proponent used Rapid Application Development (RAD) for the system development method. The proponent also used the PHP as the programming language and MySQL as the database.
Keywords
- Hill climbing algorithm, integrated system, mobile web-based, student information system.
56
Implementation of Improved DES Algorithm in Securing Smart Card Data
Ariel M. Sison, Bartolome T. Tanguilig III, Bobby D. Gerardo, Yung-Cheol Byun
ABSTRACT
Although smart cards have already provided secure portable storage device, security is still a major concern to electronic data systems against accidental or unlawful destruction or alteration during transmission or while in storage. One way of ensuring security is through encryption so that only the intended parties are able to read and access the confidential information. The software simulation result proved that the inclusion of the Odd-Even substitution to DES has provided additional confusion technique to DES and was essential in providing adequate security whilst having the stability and speed of handling encryption and decryption processes.
Keywords
- DES; AES Card; Card Skimming.
;
Triple DES; Blowfish; Confusion;Brute Force Attack; Linear Cryptanalysis; Differential Cryptanalysis; Smart
57
Ubiquitous Stopping Criterion for Backpropagation Learning in Multilayer Perceptron Neural Networks
J. T. Lalis, B. D. Gerardo, Y. Byun, Y. Ha
ABSTRACT
In this paper, the Fisher’s Iris data set was used as input for standard BP. The network was trained using the different training set sizes and compari-sons are made on the effectiveness of the proposed stopping criterion. The accu-racy of the network was also tested using the testing sets. The ubiquitous stop-ping criterion presented in this paper proved that the number of iterations to train the network should not be dictated by human since the accuracy of the network depends heavily on the number and quality of the training data. The proposed algorithm is capable of identifying the minimum acceptable error rate causing the network to learn to its maximum potential based on the patterns presented on it.
58
Decision Support System for Agricultural Management using Prediction Algorithm
Mark Ian Animas, Bobby D. Gerardo, Yung-Cheol Byun, Ma. Beth Concepcion
ABSTRACT
Currently climate change is one of the major problems encountered due to the climatic controls interacting in various intensities and in different combinations. The proposed system includes mechanism that accepts/processes gathered data from Agricultural Research Center. The system uses Time Series Analysis; the collection of observations of well defined data items obtained through repeated measurements over time which utilizes algorithm that is capable of formulating the trend. Upon prediction, the system displays table and graphs along with the recommended crops. The system had successfully determined the trend of rainfall and evaporation using prediction algorithm together with the recommended crops. It was able to display the result of prediction in graphical form and crop classification in tabular form.
Keywords
- Prediction Algorithm; Agricultural Management; Rainfall Evaporation Prediction; Trend;
59
A Protocol to Secure Bluetooth Communication
J. T. Lalis*, B. D. Gerardo, and Y. Byun
ABSTRACT
The focus of this paper is the development of new pairing protocol for secure data communication using Bluetooth technology. An improved pair-ing protocol has been developed by adopting the Diffie-Hellman Key Exchange protocol in computing the shared secret value of both parties. MD5 and a light-weight encryption algorithm, the Hummingbird-2, were then employed to fur-ther strengthen the pairing mechanism and at the same time, making it suitable for devices that has limited processing power and memory. The proposed pro-tocol is expected to provide Bluetooth devices a greater security against eaves-dropping and man-in-the-middle attacks. 60
Using TCP Reset for Blocking and Using Spoofing for User Notification in Non-inline Non-proxy Based Web Filters
Melesan Karen Chavez, Christine Marianne Reyes, Martin Spencer Sy, Rafferty Erik Sy, Alexis Pantola and Gregory Cu
ABSTRACT
Web filters are deployed to control network traffic such that a certain network can only access Internet resources that are allowed as defined in a security policy. There are several options on how to implement a web filtering system namely, inline proxy based, inline non-proxy based and non-inline proxy based. Though there are numerous products offering these types of implementations, several problems such as increased latency, being a single point of failure and the need for physical or logical reconfiguration of workstations, and intermediary devices when they are initially installed. Furthermore, having these implementations also surfaces the possibility of evasion of access blocking, and an absence of user notification. To address these problems, a non-inline non-proxy based web filtering system was implemented. However, the said implementation has challenges in providing connection termination and user notification. As a result, the non-inline non-proxy based web filtering system with user notification surfaced. This paper will discuss the significant modules of the said implementation which is responsible for connection termination and for user notification. 61
Delaying ARP Poisoning using an Active Network-Based Technique
Buena, Deanne Erika B., Garcia, Clarissa Mae C., Pantola, Alexis V. Villafuerte, Celine V., Yu, Allison Mae H.
ABSTRACT
The Address Resolution Protocol (ARP) introduced in RFC 826 has minimal overhead and optimal speed, but it does not have encryption or authentication mechanism, making it susceptible to security issues in the Local Area Network (LAN). ARP poisoning, specifically a Man in-the-Middle (MitM) attack, occurs when an attacker creates fake ARP packets to poison the ARP cache table of host victims. This enables the attacker to sniff traffic between two communicating target computers. There are tools that exist to counter ARP poisoning. Host-based tools are required and assumed to be installed in each host in a networked environment, making it costly and difficult to maintain. Another ARP poisoning detection approach is passive, which is time consuming and creates time lag for necessary countermeasures to be made as probes are done at the same time the attack may be taking place. An active network-based ARP poisoning detection system answers the problems of host-based tools and passive solutions. However, the current active network based ARP poisoning detection solution, needed only to be installed in a server and dynamically interacts with the network, is highly dependent on a personal firewall configuration of hosts, and this poses vulnerability to the network. Furthermore, this current solution does not provide the administrator enough time to respond to the attack. This paper discusses the modules responsible for delaying the effects of ARP poisoning to answer the aforementioned problem.
Keywords
- ARP poisoning, Man-in-the-Middle attack, detection system
62
Home Video Surveillance and Security Sensors with Mobile Application
Sheila Mae S. Gomez, Bobby D. Gerardo, Joel T. De Castro, Ma. Beth Concepcion, Cyreneo Dofitas, Yung-Cheol Byun
ABSTRACT
Crime is a significant concern in urban areas of the Philippines. There is a great importance of security surveillance system installed in one’s homes of offices. Security and surveillance technology issues are very crucial to give a person a relaxed freedom in his surroundings, a peace of mind and a feeling of security against crime incidents. The study aimed to develop a home security system using sensors and video surveillance that can send reports to a mobile phone. In the case of motion detection the comparison of two frames was used to detect motion. The security sensors further aimed to detect early unusual smoke and temperature that may lead to fire and sudden temperature change. The surveillance camera connected to the computer monitored the incidents and which would directly send a warning message to a mobile phone. 63
J-Master: An Interactive Game-based Tool for Teaching and Learning Basic Java Programming
Raymond S. Bermudez, Ariel Sison, Bartolome T. Tanguilig III
ABSTRACT
In teaching computer programming, learning of the basic concepts must always be given emphasis. Learning and teaching how to do computer programming is generally considered as a difficult concept to understand. It is a big challenge for the teachers to establish a good foundation for the students to withstand the more complex topics and to cope with the requirements of the programming course. Nowadays where most students are preoccupied in playing computer games, there is a need to utilize games as an innovative teaching strategy. Educational games will be helpful to boost the interest of the students in learning. In this paper, an educational game called “J Master” was developed. It is an interactive game-based tool for teaching and learning basic Java programming. It is generally composed of two sub-systems. The first one is the teacher console, which manages the student information, class records and game set ups. The second sub-system is the actual game to be played by the students. The students could first view their lessons before playing the two types of game, “Debug that Code” and “Write the Program”. The first type intends to enhance students’ knowledge in basic syntax of a java program by correcting errors in the code. The second type focuses on enriching the students’ logical thinking by letting them analyze the stated problem and answer it through writing the correct code. Based on the evaluation results, the whole system is found to be acceptable as a learning and teaching tool. Both teacher and student respondents rated it “Excellent” in all four (4) criteria namely Functionality, Organization and Design, Instructional Design and Deliver and Game-based Learning. 64
PREDICTING FACULTY DEVELOPMENT TRAININGS AND PERFORMANCE USING RULE-BASED CLASSIFICATION ALGORITHM
Roxanne A. Ancheta, Rosmina Joy M. Cabauatan, Bartolome T. Tanguilig, Lorena, W. Rabago
ABSTRACT
This paper yearns for the extraction of knowledge significant for predicting training needs of newly-hired faculty members in order to devise development programs necessary to enhance faculty inherent potentials using rule-based classification data mining technique particularly sequential covering algorithm and hold-out method. In discovering significant models needed for predictive analysis, the Cross Industry Standard Process for Data Mining (CRISP-DM) was employed. Results show that professional trainings are needed in order to prepare faculty members to perform their tasks effectively
Keywords -
Data Mining, Classification, Prediction
65
Research on Food Allergy Information using Smart Mobile Media Devices to Enhance Communication at Restaurants
Mikako Ogawa, Ayaka Tanaka, Keiichi Noda, Ayako Kawai, Donald L. Amoroso
Abstract
Dealing with food allergies in the restaurant industry is becoming important as more customers have needs and restaurants are concerned with corporate social responsibilitiy (CSR). This research discusses how to provide information to facilitate the communication between the restaurant industry that is interested in dealing with food allergies and the patient’s family who wants to enjoy eating at restaurants. The authors used a mixed method, combining qualitative and quantitative research, and divided the research into three steps (Creswell, 2008). First, the authors researched patients’ families and companies to organize communication. The authors conducted an interview with Company A, a big company in the restaurant industry, to parallel the research of patients’ families. In the Second step, they developed a tool and verified the method of obtaining information. Lastly, to verify the effectiveness of the information providing measure, they set up a focus group consisting of responders from the questionnaire given to parents who have children with food allergies. They found that the lack of information about ingredients and the lack of knowledge of the employees when patients’ families are selecting from the menu are responsible for the inconsiderate customer service and misses in operation.
Keywords -
Consumer Communication, Enhanced Restaurant Communication, Food Allergy Information, Restaurant Industry, Smart Mobile Media Devices.
66
Building a Research Model for Mobile Wallet Consumer Adoption: The Case of Mobile Suica in Japan
Donald L. Amoroso, Rémy Magnier-Watanabe
Abstract
The growth of mobile commerce, or the purchase of services or goods using mobile technology, heavily depends on the availability, reliability, and acceptance of mobile wallet systems. Although several researchers have attempted to create models on the acceptance of such mobile payment systems, no single comprehensive framework has yet emerged. Based upon a broad literature review of mobile technology adoption, a comprehensive model integrating eleven key consumer-related variables affecting the adoption of mobile payment systems is proposed. This model, based on established theoretical underpinnings originally established in the technology acceptance literature, extends existing frameworks by including attractiveness of alternatives and by proposing relationships between the key constructs. Japan is at the forefront of such technology and a number of domestic companies have been effectively developing and marketing mobile wallets for some time. Using this proposed framework, we present the case of the successful adoption of Mobile Suica in Japan, which can serve as a model for the rapid diffusion of such payment systems for other countries where adoption has been unexpectedly slow.
Keywords
- Contactless, Mobile payment, Electronic money, Suica, Japan
67
MATH WORLD: A GAME-BASED 3D VIRTUAL LEARNING ENVIRONMENT (3D VLE) FOR SECOND GRADERS
Jean Maitem, Rosmina Joy Cabauatan, Lorena Rabago, Bartolome Tanguilig III
ABSTRACT
This paper intends to introduce a game-based 3D Virtual Learning Environment (VLE) to second graders. The impetus arose from the need to make learning in mathematics more effective an interesting through multimedia. Applied in a game, the basic mathematical operations such as addition, subtraction, multiplication, and division are expected to performed by learners as they represent themselves as avatars while they immerse in a quest of digital objects in the VLE called Math World. Educational attributes such as mentality change, emotional fulfillment, knowledge enhancement, thinking skills development, and bodily coordination are evaluated to ensure learning effectiveness. Also, game playability measured in terms of game plays, story, mechanics and interface usability are examined for its educative design. With an aggregate of these enhanced indices, results attest that objectives were met while making mathematics an interesting, motivating and enjoyable subject, hence VLE a significant tool to complement the conventional approaches of teaching.
KEYWORDS -
3D Virtual Learning Environment, Virtual 3D world, learning environment, e-learning
68
A Rule-based Parallel Processing to Speed-Up an Application
Jo Ryan Basco, Bobby D. Gerardo, Cyreneo Dofitas Jr Bartolome Tanguilig III, Yung-Cheol Byun
ABSTRACT
Most people, at one point or another, have wondered at the extent of the capabilities of the materials they currently use. To some, this means establishing a point where they venture no farther – a limit, if you will. To others, this is the start of where find out just where they can push the boundaries. Almost every multi-core, multiprocessor or multiple unit computer setups these days largely lack optimization in the field of parallel processing and load balancing. This system will substantially increase the effectiveness and speed of the aforementioned machine setups by introducing parallel processing - the separation of an application’s processes into threads and distributing these among the processors or cores available and at the same time implementing a load balancing algorithm that will ensure optimal distribution of threads per processor
Keywords -
parallel processing; rule-based system; intelligent load balancing
69
Location Technique based on Pattern Recognition of Radio Signal Strength for Parking Management
Romeo Mark A. Mateo,1 Bobby D. Gerardo,2 and Jaewan Lee
ABSTRACT
RFID technology is used by various applications to implement smart processing of data. In the parking system, RFID together with wireless sensors are used for identifying cars entering a parking area and monitoring of parking slots. However, there is no means to identify the car parked in a specific slot. This paper proposes a location technique in WSN-based parking management system using radio signal patterns from WSN for a cost-effective method in identifying the car parked in a slot. The proposed pattern recognizer agent (PRA) uses a multilayer perceptron (MLP) to classify the patterns from radio signal strength (RSS) of wireless sensors by associating the signals in a specific parking slot. The implementations provide a training model for RSS patterns and uses classification method in the locating technique. The experiment showed a comparison of the proposed method to other classification algorithms and found that MLP is more accurate classifier and time efficient in building the classification model.
Keywords -
Please provide the keywords
70
Monitoring Environmental Changes in Agricultural Crops via SMS
Kaycee Pearl Germia, Michael Angelo G. Salvo, Cyreneo Dofitas Jr., Bobby D. Gerardo, Yung-Cheol Byun
ABSTRACT
Based on the several situations that occur on the Department of Agriculture, gathering of data from their remote areas like the rice fields is one of the problems that they encounter. Receiving results from the farmers asked to monitor the field are mostly delayed. Due to this problem the researchers construct solutions how to deal with this kind of problem which is one of the important transaction in agricultural field. The researchers proposed systems, mainly focused on how to receive and send information from the Department of Agriculture to the remote area via SMS. Through this wherever the rice field is located it will be deployed and send the data detected to the Department of Agriculture via SMS sending. 71
Ultrasonic Key Recognition; Security Algorithm for Pre composed High Frequency Sound as a Mode of Unlocking a Security Lock
Jeric Ryan R. De Josef, Ma. Beth S. Concepcion, Kyle Gabriel V. Oreta, Yung-Cheol Byun
ABSTRACT
Ultrasonic key recognition is a system that uses high-frequency sound as a mode of unlocking a security lock. The password is composed by the user using high-frequency sound and is then embedded in a music file that will serve as the "key". A music player will be used to play and emit this "key" and it is then being detected by a device which will serve as the "lock". The lock's built-in microphone will catch the sound and is then processed and analyzed by the system to compare it with the pre-composed key. Audio fingerprinting algorithm is used in processing and analysis of the sound. If a match is found, the system will allow access, otherwise if not.
INDEX TERMS
- high frequency sound, security system, audio fingerprinting
72
A Rule-Based Fuzzy Diagnostics Decision Support System for Tuberculosis
Bobby D. Gerardo , Bartolome T. Tanguilig III , Joel T. de Castro Louie F. Cervantes
ABSTRACT
The system is specialized for pulmonary physicians focusing on tuberculosis and for patients already diagnosed with tuberculosis. The main focus for the development of the system is on the architecture and algorithm used to find the probable class of tuberculosis a patient may have. The class of tuberculosis is determined by using a rule base populated by rules made for the different classes of tuberculosis. The clinical decision support system integrated with Fuzzy Logic and Rule-based method that generates classes of tuberculosis suits the needs of pulmonary physicians and lessens the time consumed in generating diagnosis.
INDEX TERMS -
Fuzzy system, rule-based, diagnostics, medical support, expert system, data mining
73
Hierarchical Clustering and Association Rule Discovery Process for Efficient Decision Support System
Bobby D. Gerardo, Yung-Cheol Byun, Bartolome Tanguilig III
ABSTRACT
This paper proposed a model based on hierarchical Clustering and Association Rule, which is intended for decision support system. The proposed system is intended to address the shortcomings of other data mining tools on the processing time and efficiency when generating association rules. This study will determine the data structures by implementing the cluster analysis which is integrated in the proposed architecture for data mining process and calculate for associations based on clustered data. The results were obtained using the proposed system as integrated approach and were rendered on the synthetic data. Although, our implementation uses heuristic approach, the experiment shows that the proposed system generated good and understandable association rules, which could be practically explained and use for the decision support purposes.
Keywords –
Data mining, Decision support system, clustering, association rule
74
Adoption of Mobile Banking: Development of a Research Model
United States and Japan
.
Amoroso, D. C. Clark, O. Sato, M. Rollins
ABSTRACT
Many banks have introduced mobile banking services like mobile credit cards checking account balances, setting up bill payment, transferring funds, and short message services (including push and pull methods). While these services offer convenience and add value, it is necessary to consider whether customers will adopt the technology. This study will examine the many variables that affect the consumer’s decision to adopt the technology. We concluded that self-efficacy, behavioral intention, attitude towards use, and user information base readiness (UIBR: awareness, knowledge, experience, exposure) are the major constructs in the adoption of mobile banking. This model can be used to determine the marketing methods, designs, and functionality of mobile banking offered in the 75
Differences Between Japan and the United States Adoption of Mobile and PC Applications
Amoroso, D., M. Ogawa, T. Mukahi
ABSTRACT
This research looks at the adoption of Internet and mobile applications comparing the factors that influence loyalty and satisfaction in both Japan and the United States. We derived a research model for and tested related hypotheses with data collected from online shopping consumers in both Japan and the United States. In the mobile market, we found Innovativeness to be an important relationship with Behavioral Intention for both the US and Japan. However we found that Attitude was more important in predicting Loyalty in the US while Innovativeness was key to predicting Loyalty in Japan. Loyalty was a strong predictor of Satisfaction in both the US and Japan.
Keywords
: Mobile Applications, Adoption, Loyalty and Satisfaction
76
Social Media Use at Work: Comparison of the United States and Japan
Ogawa, M., D. Amoroso , T. Mukahi, M. Tanabu O. Sato
ABSTRACT
This research looks at the adoption of social media (SM) applications comparing the factors that influence adoption at work. This exploratory study intends to examine factors of SM adoption that are common in both Japan and the United States. After a comprehensive literature review, we derived a research model for and tested related hypotheses with data collected from respondents in Japan (n=210) and the US (n=196). We found organizations using SM for product advertising (79%), research (55%), sales (46%), recruiting (38%), developing communities (32%) and improving customer service (33%). In this paper we analyze work-related variables between Japan and the US and found significant differences in the use of SM to improve job performance and effectiveness.
Key words:
Social Media, adoption, job performance
77
Building a Research Model for Mobile Wallet Consumer Adoption: The Case of Mobile Suica in Japan
Donald L. Amoroso1 and Rémy Magnier-Watanabe2
ABSTRACT
The growth of mobile commerce, or the purchase of services or goods using mobile technology, heavily depends on the availability, reliability, and acceptance of mobile wallet systems. Although several researchers have attempted to create models on the acceptance of such mobile payment systems, no single comprehensive framework has yet emerged. Based upon a broad literature review of mobile technology adoption, a comprehensive model integrating eleven key consumer-related variables affecting the adoption of mobile payment systems is proposed. This model, based on established theoretical underpinnings originally established in the technology acceptance literature, extends existing frameworks by including attractiveness of alternatives and by proposing relationships between the key constructs. Japan is at the forefront of such technology and a number of domestic companies have been effectively developing and marketing mobile wallets for some time. Using this proposed framework, we present the case of the successful adoption of Mobile Suica in Japan, which can serve as a model for the rapid diffusion of such payment systems for other countries where adoption has been unexpectedly slow.
Keywords:
Contactless, Mobile payment, Electronic money, Suica, Japan
78
2010-2011
Automated Video Surveillance for Monitoring Intrusions Using Intelligent Middleware Based on Neural Network
Ana Rhea Pangapalan, Bobby D. Gerardo,Yung-Cheol Byun,Joel T. De Castro,Francisca D. Osorio
ABSTRACT
Automated Video Surveillance Using Intelligent Middleware presented a Java based system that detects human activities in a security sensitive area and provides alarm for illegal activities identified. The system was developed using Netbeans IDE 6.8 [7] as the working environment, while Java as the programming language [8]. This study enhanced and strengthened existing security, therefore minimizing possibility of missed events which might be a threat to an area. The system composes three major processes: Motion Detection, Subject Identification and Behavior Classification. Motion Detection captures image of any movement detected. Subject Identification screens every captured image by classifying whether the motion is made by human and eliminating those which are caused by wind, animals and other non-human entity. Behavior Classification categorizes the image passed as to what action and outputs alarm if it is considered as illegal. In order to carry out these complex functionalities, a middleware was utilized to maintain continuous data flow from capturing to image processing and to reduce bulk of inputs that are being processed. Neural network [9, 10] was employed as the information processing paradigm for human or non-human and behavior classification. The result shows that the system processed video continuously as it classified behavior automatically. 79
Data Extraction using Preprocessing Compression Based on LZW to improve DB Performance
Bartolome T. Tanguilig III, Ariel M. Sison, Bobby D. Gerardo, Yung Cheol Byun
ABSTRACT
The Lempel-Ziv-Welch (LZW) algorithm has provided attractive data compression for storage medium with limited space. This study is motivated to improve database performance by compressing some of its attributes using LZW compression algorithm. Simulation results show that LZW is useful for practical purposes. Data compression will speed up data transmittal since the amount of memory needed is reduced including the amount of data to be stored. Data compression provides additional level of data integrity and reliability.
Keywords –
Data Mining, Data Compression, LZW Algorithm, Dictionary, Database
80
SMS-Based Automatic Billing System of Household Power Consumption Based on Active Experts Messaging
Mark Dominic Cabioc, Bobby D. Gerardo, Yung-Cheol Byun
ABSTRACT
The study about the SMS-based Automatic Billing System of Power Consumption aimed to change the conventional way the power utility provider gathers and handles billing data. The system is composed of two basic parts such as the remote site and the base station. The former calculates and sends power consumption while the latter retrieves meter readings, calculates billing charges and processes payment of the customers. Microsoft Visual Studio 2008 was used to develop the Main Server Software with Visual Basic 2008 as the Integrated Development Environment (IDE) or programming tool and Visual Basic as the programming language. The database was created in Microsoft SQL Server 2005 and ActiveXperts Messaging Server 4.1 was use as an SMS framework that allows the system to send, receive and process SMS. The use of this system will give greater benefit to the electric company and its customer because of the ease and less impediment in gathering meter readings in the remote locations and an instant delivery of billing statements to the customer’s cellular phones through SMS technology.
Keywords –
SMS messaging, automatic billing, Active Expert, power management
81
Predicting Faculty Performance using Regression Model in Data Mining
Raymond S. Bermudez,Joseph O. Manalang, Bobby D. Gerardo, Ph.D., Bartolome T. Tanguilig, III, Ph.D.
ABSTRACT
This paper investigates the different attributes used in evaluating faculty performance to come up with a regression model that predicts faculty performance. The main objective of this paper is to develop a model for predicting faculty performance and design a framework of data mining implementing ETL. The outcome of this research could be used as basis in improving the instruction in an academic institution.
Keywords-
Data mining, clustering, regression analysis,predictive algorithm, Database
82
Rater rating V2 (R2V2) : a feeloader-resistant user-driven reputation system for collaborative sites
Alexis V. Pantola
ABSTRACT
Wikipedia and other wiki domains are infamous for containing unreliable information because they allow users to freely contribute and edit content. Content-driven reputation systems like WikiTrust were developed to determine the credibility of Wikipedia articles. They analyze the stability of the contents (i.e. text entries) and the amount of time they remain unedited. However, content-driven reputation systems assume that texts with high credibility last longer which in turn could falsely label unedited incorrect entries as accurate. Another kind of reputation system is user-driven. Contrary to content driven systems, it relies on user inputs to determine the reputation of text entries. Nevertheless, it has its own share of flaws such as user feedback being subject to bias and uncooperative authors. It is possible that authors rate the articles or entries haphazardly or do not rate at all. Rater Rating is a user driven reputation system that promotes cooperation by encouraging users to rate articles. It encourages users of collaborative sites to review the work of other authors and rate them accordingly. It was inspired by reputation systems in mobile ad hoc networks (MANETS) that promote cooperation by discouraging misbehaving nodes. Like MANETs, authors who misbehave (i.e. do not review properly) are also penalized. A limitatio nof Rater Rating is that it does not take into consideration the fair distribution of reputation among its contributors upon receiving a rating from other users. A freeloader may make a minor modification on an existing article. In Rater Rating such user will be given the same amount of credit as the original author since it cannot discern their individual contributions. This paper presents a freeloader resistant variant of Rater Rating which we refer to as R2V2 that incorporates concepts from WikiTrust to discourage freeloading users. Simulation results are presented to show the performance relative to the orignal algorithm.
Index Term -
Wikipedia, Reputation System, Collaboration
83
Rating the raters: A Reputation System for Wiki-Like Domains
Alexis Velarde Pantola, Susan Pancho- Festin, Florante Salvador
ABSTRACT
Collaborative sites like Wikipedia allow the public to contribute contents to a particular domain to ensure a site's growth. However, a major concern with such sites is the credibility of the information posted. Malicious and "lazy" authors can intentionally or accidentally contribute entries that are inaccurate. This paper presents a user driven reputation system called Rater Rating that encourages authors to review entries in collaborative sites. It uses concepts adopted from reputation systems in mobile ad-hoc networks (MANETs) that promotes cooperation among network nodes. Rater Rating measures the overall reputation of authors based on the quality of their contribution and the "seriousness" of their ratings. Simulations were performed to verify the algorithm's potential in measuring the credibility of ratings made by various raters (i.e. good and lazy). The results show that only 1 out of 4 raters is needed to be a good rater in order to make the algorithm effective. 84
A MODEL FOR CREATING 3D VISUAL LEARNING ENVIRONMENT (VLE) IN TIP-QC AS A FLAGSHIP FOR MULTIMEDIA AND COMPUTER GRAPHICS APPLICATIONS
Edison T. Talla A Virtual Learning Environment (VLE) is a software system designed to facilitate teachers in the management of educational courses for their students, especially by helping teachers and learners with course administration. The system can often track the learners’ progress, which can be monitored by both teachers and learners. Virtual Learning Environment (VLE) is one of the new technologies nowadays which is being implemented especially in United States and United Kingdom. It is a multimedia software application design to support teaching and learning in educational setting through virtual environment or space. The project will focus on the development of supplement traditional learning. It will serve as a model on implementing VLE on various subjects in the Technological Institute of the Philippines, Quezon City.
Keywords –
Virtual Learning Environment (VLE), multimedia software, 3 Dimensional (3D), traditional learning
85
Application of Scaffolded Instruction allowing Cloudstorming in the Conduct of Information Technology Projects
Rosmina Joy M. Cabauatan
ABSTRACT
Among the most oft-quoted in managing Information Technology projects is the tool that can be utilized to bring non co-located project team members into a scenario that creation of ideas is possible round the clock beyond geographical locations without minding of the requirements needed for collaborations in order to meet project objectives. Likewise, in the academic settings of Information Technology Project Management courses, oftentimes, pedagogical routine to meet maximum student participation is not usually met. Responding to this state is to apply Scaffolded instruction allowing students and academicians to collaborate utilizing the resources that are freely available online with the objective to gradually remove teacher’s assistance as the project state progresses. In a deeper sense, the process sets out from the teacher by providing online verbalized immediate but temporary support to project collaborators in order to identify the potential leader of a group project. Subsequently, assistance and instruction is gradually removed in order to achieve independent self-regulatory learning. The course of employing these tools and methods are evaluated using the International Standard Organization Software Standards to measure its functionality, reliability, applicability, efficiency, and portability. Evaluation resulted to better and faster management while allowing all collaborators to learn from each other.
Keywords -
Cloudstorming, Scaffolded instruction, online learning, collaboration, project management, information technology
86
2009-2010
A High Precision Temperature Insensitive Current and Voltage Reference Generator
Kimberly Jane S. Uy, Patricia Angela Reyes-Abu, Wen Yaw Chung
ABSTRACT
Abstract—A high precision temperature insensitive current and voltage reference generator is presented. It is specifically developed for temperature compensated oscillator. The circuit, designed using MXIC 0.5um CMOS technology, has an operating voltage that ranges from 2.6V to 5V and generates a voltage of 1.21V and a current of 6.38
Ӵ ӴӴ Ӵ A. It exhibits a variation of ±0.3nA for the current reference and a stable output for voltage reference as the temperature is varied from 00C to 700C. The power supply rejection ratio obtained without any filtering capacitor at 100Hz and 10MHz is 30dB and -12dB respectively.
Index Terms -
Current reference, voltage reference, threshold voltage, temperature compensation, mobility.
87
A framework for discovering relevant patterns using aggregation and intelligent data mining agents in telematics systems
Bobby D. Gerardo , Jaewan Lee
ABS
T
RACT
The emerging technology in vehicle telematics drives several stakeholders in this field to consider services that could be beneficial for both clients and the telematics service providers. In particular this paper proposes a novel framework for insurance telematics in Korea using a mobile aggregation agent (AA) and intelligent data mining agent (IDMA). To our knowledge, this model is recent of its kind in this country and the base-line information from driver’s characteristics serves as reference for the flexible insurance policies. We are able to present a use-case scenario and illustrative examples to demonstrate our model. With this flexible insurance framework, customers can manage their own insurance premiums and lower the cost of motoring. Promising applications of this system to business and industries have been recognized and discussed.
Keywords -
Telematics systems; Aggregation; Data mining agent; Flexible insurance
88
An improved Data Encryption Standard to Secure Data using Smart Cards
Ariel M. Sison, Bartolome T. Tanguilig III, Bobby D. Gerardo, Yung Cheol Byun
ABSTRACT
This paper is directed towards the development of an improved DES to secure the data using smart cards. An improved Data Encryption Standard has been developed by incorporating an ODD/EVEN bit conversion to the existing DES algorithm. The proposed algorithm is expected to provide greater security to further protect the data in Smart Cards. The data is secured from any illegal retrieval and intended modification. The program simulation also provides a good start to explore for a more robust encryption technique that will not require so much mathematical computations.
Keywords
-
Smart card, encryption, DES, asymmetric and symmetric encryptions, reengineering
89
Acceptance of WoredaNet E-Government Services in Ethiopia: Applying the UTAUT Model Lessa, L., S. Negash, D. Amoroso ABSTRACT
WoredaNet is a Wide Area Network intended to link all woreda1 administrative units in Ethiopia. The technology presents unique opportunities to facilitate the application of e-Government packages in the country. This study is a work in progress that utilizes the Unified Theory of Acceptance and Use of Technology (UTAUT) for the understanding of acceptance and adoption of Information Technology in Ethiopian context. The study tries to further validate the model and assess acceptance of the e-Government services put in place in the WoredaNet infrastructure in the country. The government of Ethiopia, while utilizing the technology, is still in the process of extending it throughout the country. The study, thus, contributes to the success of Services implementation in the WoredaNet by examining acceptance and utilization issues amongst the users since users’ acceptance of the technology is crucial for its ultimate success.
Keywords -
WoredaNet, Technology Acceptance, Technology Adoption, Technology Utilization, Technology Acceptance Model (TAM), Unified Theory of Acceptance and Use of Technology (UTAUT)
90
Social Media Use by American-born versus Japanese-born
social media.
Respondents: Is There a Difference?
Amoroso, D., N. Amoroso, A. Orita
ABSTRACT
It appears that culture in the United States has an impact on the use of social media, as different from Japan. We hypothesized that the use of social media included age, comfort with social media, time spent communicating, number of friends, and when and where users check on social media. Data was collected from 71 respondents with approximately 34% Japanese-born and 66% were American-born. It was found that younger social media users tended to have more friends and check on their social media during work and at school more regularly. More Japanese-born users stated that they “never” checked on social media during work or class. Older respondents appeared to be as comfortable as younger respondents in using 91
Factors of Mobile Ecosystem Success in Japan: An Interview with i-Mode Founder
Amoroso, D., M. Ogawa
ABSTRACT
The goal of this research is to examine the factors of success with Japan’s mobile industry to develop the ecosystem research model. Takeshi Natsuno , former senior vice president of NTT DoCoMo and developer of i-Mode, discussed with us that a clear and huge investment I n i-Mode and e-payment technologies created the initial mobile ecosystem in 1999 in Japan. The ecosystem defined by Mr. Natsuno as a collection of roles in a collaborative balance has been established. We concluded in this research that risk-taking was the predominant factor influencing the success of the mobile ecosystem in Japan. NTT DoCoMo was the major risk-taker in Japan during this time and other players, such as mobile phone manufacturers or contents providers, could participate with little risk. 92
Adoption of Mobile and Internet Applications in Japan and the United States
Amoroso, D., M. Ogawa
ABSTRACT
This research looks at the adoption of Internet and mobile applications in Japan and the United States. It is the intent of this exploratory study to examine the factors of adoption for PC and mobile online shopping for data collected in the two countries. After a comprehensive review of the literature, we derived a research model for and tested related hypotheses with data collected from 437 students in the two countries. This study provides managers with a framework for online shopping which areas they need to focus upon when launching new online products, such as shaping and/or changing their consumers' attitude toward using the Internet, making their Website easier to use, and enhancing the perceived usefulness of the technologies that allow consumers to access their products online. 93
Mobile Payment Industry: Toward a Comprehensive Research Model
Japan. Amoroso, D., R. Watanabe
ABSTRACT
Mobile commerce refers to all applications using mobile technology that involve functions such as mobile banking, mobile shopping, and mobile marketing, resulting in a contactless payment system. Japan has been developing and integrating such technology into their culture for some time, yet no single comprehensive framework has emerged. Based upon the review of 24 empirical studies on mobile payments, we propose an integrated model with eleven constructs for mobile payment adoption. Using this proposed framework, we present the case of the Suica/Pasmo mobile payment system in 94
An Examination of Consumers’ High and Low Trust as Constructs for Predicting Online Shopping Behavior
Amoroso, D., T. Muhaki
ABSTRACT
This research examines the constructs of high and low trust on consumers’ behavior with online shopping. The authors developed a research model and instrument to study the trust construct in the acceptance online shopping applications. The authors hypothesized that trust positively influences a person’s intention to purchase from a virtual store and that trust positively affects the consumer’s attitude toward using the e-store. Consumers who trust an online company feel more committed to it. Previous research showed that the causal antecedents of customer confidence in e-tailers included the site’s ease of use, the level of online shopping resources, and existence of a trusted third party seal. The authors developed a survey instrument where in a sample of 940 respondents the constructs yielded respectable reliability and construct validity. The authors conducted analysis for the measurement reliability and validity by Cronbach alpha reliability coefficients and confirmatory factor analysis using AMOS 21. The measurement scales for this instrument showed strong psychometric properties. Average Variance Extracted (AVE) was extracted for assessing convergent and discriminant validity showing strong support for the research model. The causal structure of the research models was tested using a Structural Equation Model (SEM). The authors found that intrinsic motivation was more important for attitude toward online purchasing among high truster persons, and under low institution environments, people tended to form positive attitudes mainly based on preserved usefulness without intrinsic motivation. The authors found that attitude toward using acts as a strong predictor of behavioral intention to use and actual usage of online shopping technologies. According to the authors’ results, trust provides the foundation with which intrinsic motivation will work well. In other words, trust may have long-term effects on online shopping behavior.
Keywords -
Consumer, Internet Adoption, Online Shopping Behavior, Technology Acceptance, Trust
95
Exploring Innovation in Mobile Technology: A Comparison Between U.S. and Japan
Donald Amoroso, Andrew Small
ABSTRACT
This study looks at the differences in technology between Japanese and United States mobile phone technologies. While advancements in micro-processing, network speeds and memory capacity have played a crucial role in the development and evolution of phones in both the United States and Japan today, our study has found that the applications embedded in Japanese cell phone technology and the infrastructure to support those applications is significantly more advanced than the United States. The contribution of this paper lies in the aspect of examining innovations in mobile technology in both the Japanese and United States culture in order to evaluate the implications on both society and business. 96
Reliable Progressive to Restricted PS-STUN Algorithm
Alexis V. Pantola, Mark Lim, Andre Tuason,, Jay Go, Don Sta. Ana
ABSTRACT
Network Address Translations (NAT) offer solutions to the rapidly shrinking pool of IPv4 Internet addresses [1]. NAT brings new problems to direct peer-to-peer connection of hosts. Machines behind NAT-enabled routers face difficulties connecting to each other. Because of this, NAT traversal algorithms are introduced to solve these problems [ 2,3,4]. A solution proposed is the Predicting and Scanning STUN (PS-STUN), where it can traverses restricted and progressive symmetric NAT implementations [5]. The progressive symmetric to restricted NAT traversal algorithm of PS STUN uses a significant amount of processing power for traversal. This paper discusses an optimized traversal algorithm for progressive symmetric to restricted NAT traversal based on the implementation used by PS-STUN.
Key Words
- Network Address Translation, Symmetric NAT, Port Restricted NAT
97
ICT Assimilation in Ethiopian Institutions
Assefa, T., Negash, S., Amoroso, D.
ABSTRACT
Information and Communication Technology (ICT) affects how organizations deliver services to their customers. ICT is now used not only to improve back office routine activities but also to act as strategic partner for achieving organizational goals. Although ICT has many benefits for organizations, its assimilation is the most challenging process as there are high failure rates as reported by many researchers. This paper examines the factors that influence ICT assimilation in organizations. The extant literature in this area is focused on high-income countries. There is a dearth of ICT assimilation research in lowincome countries like Ethiopia. Therefore this study will attempt to validate ICT assimilation model developed for highincome countries with new data from a low-income country. A modified model of Chatterjee et al’s (2002) Web Assimilation model will be used to investigate ICT assimilation in Ethiopian institutions. Four variables (top management championship, extent of coordination, strategic investment rationale, and technology readiness) will be discussed in relation to ICT assimilation. This study will use survey method for data collection in service sector institutions run by the government. 98
UNDERSTANDING CONSUMERS’ ACCEPTANCE OF ONLINE PURCHASING
Amoroso, D., Hunsinger, S.
ABSTRACT
This paper examines previous Technology Acceptance Model (TAM) related studies in order to provide an expanded model that explains consumers’ acceptance of online purchasing. Our model provides extensions to the original TAM by including constructs such as social influence and voluntariness; it also examines the impact of external variables including trust, privacy, risk, and e-loyalty. We surveyed consumers in the United States and Australia. Our findings suggest that our expanded model serves as a very good predictor of consumers’ online purchasing behaviors. The linear regression model shows a respectable amount of variance explained for Behavioral Intention (R2 = .627). Suggestions are provided for the practitioner and ideas are presented for future research.
Keywords -
Technology acceptance model, Internet, behavioral intention, attitude toward using, online purchasing, ecommerce
99
The Potential of a Web Portal of Selected Professional Subject - Data Structures at the Technological Institute of the Philippines
download, links and inquiry. Rosmina Joy M. Cabauatan, Mylyn H. Nostarez
ABSTRACT
The study was conducted with the main thrust of developing a web portal of Professional Subject – Data Structures of the College of Information Technology Education and evaluated its potential to Technological Institute of the Philippines. Specifically, it aimed to embrace the web-based pedagogical fashion as a supplementary tool to cover curricular activities beyond the walls of the classroom. Distinctively, the web portal provides a convenient, accessible and flexible solution to broaden the Data Structures program. Featured academic tasks include, lecture, assessment, announcement, The web portal was evaluated using ISO 9126 – Quality Software Standards. This includes software functionality, portability, maintainability, efficiency, applicability and reliability. This was administered to respondents regardless of subjects, status and web preferences. After careful examinations of findings, it sum up that the web portal could help the College of Information Technology Education in its continuous quest for delivering quality instruction and would serve as an archetype for all colleges of the Technological Institute of the Philippines, thereby potentially providing an impact to quality and excellence.
Keywords -
Data Structures, web portal, Quality Software Standards
100
Creating an E-Portfolio for CITE Students of TIP QC
Lorena W. Rabago, Edison T. Talla
ABSTRACT
The study is entitled “Development of CITE Students’ e-Portfolio”. It aims to provide an online based environment where fourth year students of College of Information Technology Education can showcase their learning records and evidence of achievements electronically. Such electronic evidence may include inputted text, electronic files such as .doc and .pdf files, images, videos, blog and forum entries, and hyperlinks. Through the E-portfolio, students can facilitate and express personal reflections with regards to their own learning experiences, leading to the awareness of acquiring knowledge strategies and needs. The developed e-portfolio represented a technology and pedagogical approach for facilitating integration of formal and informal educational experiences of students regarding their course and job nature once graduated. To make the e-Portfolio perfect, here are the points that the study considered in the development and implementation phases: (1) Evidence - deals with the quality of the evidence in the portfolio; (2) Professionalism - evidence is in the best possible form; (3) Audience - intended audiences of your e-portfolio; (4) Learning and growth - pieces of evidence that show some sort of growth or learning; (5) Design - web page layout and design of e-portfolio; (6) Usability - ease of use; Navigation - deals with simplicity of navigating the main and sub pages ; and (7) Information Architecture - data and information can be easily located and accessed within the website. The development of the study will serve as a comprehensive solution that enables the college and the school in general to effectively record, monitor and supervise the performance of the students. 101
Enhancing the Efficiency of an Open Laboratory Management System (OLMS) of TIP QC
Lorena W. Rabago, Gleen S. Israel
ABSTRACT
This study aimed to design an open laboratory management system to effectively manage the different process in the laboratory. The development strategies used in the project analysis, design and development include a thorough analysis of the current operation of the laboratory. Rapid prototyping was used in the development of the system. The system underwent the following stages: requirements planning, user review, joint application development, document requirements, design, development, testing and deployment. The study used ISO 9126 in the evaluation of the software, which determined the acceptability of the software in terms of usability, accessibility, reliability and maintainability. The respondents were composed of selected ITE students, teaching and non-teaching employees. Comprehensive analysis of the results of the evaluation was applied as basis for conclusions. The evaluation showed that majority of the respondents from the two groups assessed the software as very usable in terms of functionality, reliability, efficiency, maintainability and portability. The software is also very acceptable in increasing the efficiency of open laboratory management system of TIP-QC. 102
Interactive Student's Performance Monitoring System for Guidance and Counseling Center Melissa P. Juanillo, Elsa V. Isip ABSTRACT
This study entitled “Interactive Student Performance Monitoring System for Guidance and Counseling” aimed to help the guidance counselors, psychometrician, and staffs of the Guidance and Counseling Center of Technological Institute of the Philippines Quezon City (GCC-TIPQC) in tracking and monitoring the academic performance of the students. This study was conceptualized in view of the difficulty of the GCC in managing and monitoring student’s academic performance as well as their guidance records. Currently, this information is stored in a folder which is also kept in a filing cabinet, where retrieval and generation of reports are the major problems. The people in the academe and the society as a whole know the importance of guidance and counseling office. This is one of the first offices being asked by the parents if there are problems on their child’s studies. Constant monitoring and follow-ups especially students who are under probation, is vital in molding the students’ future. With this system, the works of the guidance counselors and staff will be easier, faster, and more efficient, thus enriching student satisfaction to their office. The developed system is capable of managing, monitoring, and organizing student academic performance and guidance records. It integrates a decision support system that will automatically interpret psychological exam results based on standard table used by the guidance counselors, and it also provides an interactive virtual interview module to record interview sessions with the students. Reports will be easily generated to come up with inputs for decision-making. The students are also given a separate interface to personally inquire and monitor their academic performances. This study used the frequency and mean in the statistical treatment of data. ISO/IEC 9126 was the instrument used by the GCC staff and 103
guidance counselors, students, and IT Practitioners in evaluating the developed system. The respondents rated the system as 4.41 or very acceptable in terms of functionality, reliability, usability, efficiency, maintainability, and portability software quality factors. 104
AUTOMATED FACULTY LOCATOR FOR CITE
Melchor G. Erise
ABSTRACT
The study aimed to help staff in searching ITE Faculty members whenever students are looking for them. The Systems Development Life Cycle was used in the development of the system because this is the most applicable and appropriate to apply in more complex activities of system development. Virtual Basic was used as a developing language for the software to make it more dynamic and interactive. MS Access was also utilized to manipulate the database that contains important data needed by the system. Evaluation was carried out before the software was implemented. Staff and IT experts were chosen as respondents of the development software. Results of the evaluation were tabulated and statistically treated to determine the level of acceptance of the end-user to the developed software. Results of the evaluation showed that the proposed system is accepted and met the prescribed standards set by the industry as evaluated by IT Experts. Staffs’ response also showed that the developed software is accepted to the needed expectations of the user. Based on the findings, the study concluded that the proposed system is more effective and more reliable source of information against those searching tools being used in the office today. It is highly recommended to the staff to use the software in the office to augment their knowledge in information technology. The study concluded that there is no significant difference on the perception between the IT experts and the staff of the College of Information Technology on the following aspects of developed software: Objectivity Clarity Design User-friendly Effectiveness Error-handling
Keywords -
Visual Basic, MS Access, Database, Information Technology, System Development Life Cycle
105
DEVELOPMENT OF A TEMPLATE FOR DATA MANAGEMENT SYSTEM FOR STUDENTS’ RESEARCH PROJECT CUM MANUAL OF INSTRUCTIONS FOR PROSPECTIVE USERS
Jean B. Maitem Lorena W. Rabago
ABSTRACT
This study on the: Development of a Template for Data Management System for Students’ Research Project” aimed to develop a template for the monitoring and management of students’ research projects. The study aimed to design a module to store, manage, update the research projects of the students in the college, a tool to monitor the status of the student’s research projects in terms of its completeness at the same time the assessment of the adviser and panel members. The project also aimed to provide all the necessary data and reports for the improvement of the thesis program implementation. The study utilized the simplest model in the development: the waterfall model where development will be in sequential manner and has to undergo activities where progress is seen flowing downwards from the planning stage, analysis, design and implementation of the developed system. The respondents were composed of ITE students of the college. Comprehensive analysis of the results of evaluation was applied as bases for conclusions. The evaluation showed that majority of the respondents assessed the developed system very good in terms of its functionality and portability.
Keywords -
waterfall model, data management system, functionality, usability.
106
FRAMEWORK FOR AN AUTOMATED ASSESSMENT SYSTEM FOR RUBRICS
Dr. Bartolome T. Tanguilig III, Dr. Lorena W. Rabago
ABSTRACT
This study on the “Framework for an Automated Assessment System for Rubrics” aimed to develop a framework for the assessment of students’ competency using rubrics. The study aimed to design an automated assessment system for rubrics creation and assessment of reporting of students’ performance at the same provide all the necessary data and reports for the improvement of instruction delivery and assessment using the available rubrics in the college professional subjects. The study utilized the approved rubrics for laboratory exercises, essay or reflection paper, research and oral presentation. The study focused on the design of a standard framework for an automated assessment system which will work for any rubrics in the future. The framework also provided features of changing the criteria for assessment based on the current policies of the institution, college of the CHED. The respondents were composed of ITE faculty members of the college. Comprehensive analysis of the results of evaluation was applied as bases for conclusions. The evaluation showed that majority of the respondents assessed the developed system very good in terms of its functionality, reliability, usability, efficiency, maintainability and portability.
Keywords -
competency, assessment,. Rubrics, framework, automated assessment
107
ADVERTISING, PROMOTION AND MARKETING PORTAL FOR FINE LIGHT PHOTOGRAPHY COMPANY
Jean B. Maitem, Eric James L. Manalang and Lorena W. Rabago
ABSTRACT
There is a strong competition among companies at present in terms of marketing their services. Fine Light Photography is one of the companies that envisions to be the outstanding company in the industry of photography and to be the first in reaching potential clients in the Philippines and abroad. This study focused on the development of an advertising, promotion and marketing website for the company, a system that provides an aesthetic and quick means of promotion of the services of the company. This study also included the development of a rich Internet application where users can experience a more realistic website. The system was evaluated to identify its acceptability in term of functionality, usability, reliability, maintainability, efficiency and portability. This study also recommends the tools used for developing a web-based application.
Keywords -
advertising, promotion, marketing, web portal, website, Fine Light Photography
108
ELECTRONIC ADVISING FOR CITE STUDENTS
Lorena W. Rabago and Bartolome T. Tanguilig, III
ABSTRACT
This study aimed to design an electronic advising software to effectively manage gardes, subjects and enrolment advising of CITE students. The development strategies used in the project analysis, design and development include a through analysis of both the existing and the first prototype of the proposed system. Rapid Application Development (RAD), as a method for compressing the analysis, design, build, test phases into a series of short, iterative development cycles was used in the development of the system. The iteration of the said stages in the development allows for the effectiveness and self-correction. This procedure helped in the analysis, design and development, coding and testing, evaluation and implementation of the software. ISO 9126 was used in the evaluation of the software for its usability. Comprehensive analysis of the results of evaluation was able to recommend decisions for the enrolment advisers and management on the following area: regular load for the semester, simultaneous enrolment, overloading of subjects, under loading of subjects and grades management.
Keywords -
CITE students, Comprehensive analysis, Electronics advising, Rapid Application Development (RAD)
109
FACTORS RELATED TO ITE STUDENTS’ CAREER CHOICE
Elsa V. Isip and Melissa P. Juanillo
ABSTRACT
This study entitled “Factors Related to ITE Career Choice” aimed to determine the factors that influenced of the respondents in their career choices. The respondents are from the College of Information Technology Education of Technological Institute of the Philippines, Quezon City. The study also included the determination of the profile of the respondents such as the course, year level, gender, type of high school attended, means of financing their studies, accommodation, and parental employment, and the perceived career benefits of the respondents for their career choice. This study used a survey questionnaire that was designed to capture the needed data in accomplishing this research. Mean, average mean, and frequency are the statistical tools used in presenting, analysing, and interpreting the results of the survey. The primary factors or sources of influence of the respondents in career choice is based from their interest, own decision, the job opportunities offered by many industries, and through the advice of their parents’ and or relatives. The perceived career benefits also relates to the factors, this includes the availability of employment, opportunity to work for a large corporation, future high earnings potential, challenging, interesting, satisfying, and exciting profession, and career flexibility and options. The respondents’ primary source of influence and the career benefits they perceived derives the goal of the students to have a secured and satisfying career ahead of them.
Keywords -
career, career choice, factors and benefits of career choice
110
READINESS OF ITE STUDENTS IN ORACLE CERTIFICATION EXAMINATION: INPUT TO PERFORMANCE LEVELING
Elsa V. Isip
ABSTRACT
This study was aimed to determine the factors or sources of influence of the respondents in making career choices. The respondents are from the College of Information Technology Education of Technological Institute of the Philippines, Quezon City. The study looked into the profile of the respondents such as the course, year level, gender, type of high school attended, means of financing their studies, accommodation, and parental employment, and the perceived career benefits of the respondents of their career choice. This study used a survey questionnaire that was designed to capture the needed data in accomplishing this research. Means, and frequencies are the statistical tools used in presenting, analyzing, and interpreting the results of the survey. The primary factors that influenced the respondents in their career choice are their interest, own decision, job opportunities offered by many industries, and the advice of their parents and or relatives. The perceived career benefits also relates to the factors, this includes the availability of employment, opportunity to work for a large corporation, future high earnings potential, challenging, interesting, satisfying, and exciting profession, and career flexibility and options. The respondents’ primary source of influence and the career benefits they perceived derives the goal of the students to have a secured and satisfying career ahead of them.
Keywords -
Career, Career choice, Factors, Benefits of career choice
111
TRACER STUDY OF BSCS GRADUATES OF TIPQC
Bartolome T. Tanguilig III
ABSTRACT
This study on the “Tracer of BSCS Graduates of TIPQC” aimed to track the BSCS graduates to ascertain the effectiveness of the program in terms of the graduates employability. The study also expects to record/check the career paths as well as the success paths of the said graduates. The study focused on the BSCS graduates for the last five(5) years, graduates of Batch 2004 – 2008 using the CHED Graduate Tracer Study questionnaire in gathering the needed data. The questionnaire was used to identify the competency of the graduates on their personal skills, interpersonal skills and technical understanding. Comprehensive analysis of the results of evaluation was applied as bases for the evaluation of the effectiveness of the programs in terms of the graduates employability and marketability. The results showed that the graduates competencies found most useful in their job are IT skills, communication skills, human relation skills, problem solving skills and critical thinking skills. The graduates pursued their IT/CS degrees because of opportunity for immediate employment, affordable for the family, prospect for career advancement and strong passion for the profession in chosen institution. The study was able to determine that the factors related to the graduates employability are competencies learned in college especially the IT skills and non technical skills like communication skills, human relation skills and critical thinking skills. As a result, the college should implement enhancement programs through trainings and seminars to further develop the skills needed for employment of the graduates.
Keywords -
Communication skills, Competency skills, Human relation skills, IT skills, Problem solving skills
112