Title: |
An
investigation into accessible web navigation for the blind
people |
Author (s): |
Ahmad
Hisham Zainal Abidin, Hong Xie and Kok Wai Wong |
Abstract: |
Current screen-reader program
used by the blind people to access the Internet inflicts
navigation restrictions since the blind users can only
perceive the content in serial mode. The serialized access
using screen-reader program restricts the blind users from
having the multi-dimensional effects required to fully
understand the page layout. We believe that by accessing web
pages using bi-modal interaction, a blind user would be able
to perceive a two-dimensional perspective of a web page in
his or her mental model. The purpose of this study is to
investigate the differences in the mental models created by
blind people from a two-dimensional web page using two
different means: one using a screen-reader only and the
other using a touch screen with audio feedback. Ten blind
people and thirty sighted blindfolded participants
participated in this study. This study employed
within-subjects repeated measures experiments together with
observations, verbal protocols and semi-structured
questionnaires to achieve the objectives of the study.
Besides, the influence of user’s spatial ability on the
user’s performance was investigated using Tactual
Performance Test (TPT). The study revealed that using touch
screen with audio feedback, the blind people achieved more
accurate orientation. However, the accuracy seems to be
affected by page complexity. In addition, investigation of
blind users’ spatial ability on users’ sense of position
revealed that using touch screen with audio feedback, blind
participants with lower spatial ability took longer time to
locate information. Therefore, users’ spatial ability plays
an important determinant for the Web navigability using
touch screen with audio feedback. |
|
|
|
Title: |
Telemedicine
supported by data warehouse architecture |
Author (s): |
Mohd
Khanapi Abd Ghani, Mustafa Musa Jaber and Nanna Suryana |
Abstract: |
Telemedicine is the new way of
delivering health services to patients and can be defined as
the provision of medical services by using information
technology and communication systems. Moreover, it
emphasizes the interaction and collaboration with the
increase of sharing information and knowledge between
healthcare provider and patient. Healthcare information
systems contain large volumes of information that include
demographic and medical history of patients such as
medication, lab test results, radiology information and
procedures that are constantly growing. Thus, the need of
complete medical data which supports video, audio and images
has to be accomplished before implementing the telemedicine
system. The aim of this research is to propose an integrated
telemedicine framework supported by data warehouse
technique. The proposed framework is evaluated using test
case technique and the result showed that data warehouse
provides important elements of information to telemedicine
system especially during consultation. |
|
|
|
Title: |
Database remodeling and implementing table partitioning as a
solution to smart cable guard system |
Author (s): |
Humasak Tommy Argo Simanjuntak, Paul
Wagenaars and Guido Bakema |
Abstract: |
One of the services that DNV GL Netherlands provides to its
customers is to continuously monitor distribution cable
circuits for upcoming defects. This system monitors over 100
circuits with an average of 5 discharges per circuit per
minute. Regardless of the amount of circuits and pulse
discharges per minute, the system should be able to complete
all processes within one hour or even less. Meanwhile, the
current database design using SQL Server cannot adapt to the
new requirement of the user and low query performance for
inserting and retrieving Partial Discharges (PD) data. Thus,
to meet the new requirements, database remodeling should be
done. To increase query performance for inserting and
retrieving PD data, a new design to store PD data were
introduced with remodel database structure and implementing
partitioning. |
|
|
|
Title: |
Prevention of digital music file duplication |
Author (s): |
Hammuzamer Irwan Hamzah, Low Tan Jung and Ariffin Abdul Mutalib |
Abstract: |
Current digital music file duplication software only detects
the duplication of digital music file in the hard disk of a
personal device. This study develops a biologically inspired
model for storing audio data (BiMSAD) to prevent duplication
of digital music files when the data are inserted into the
hard disk. This paper presents the activities in developing
of the theoretical and conceptual frameworks. Experiments
testing are performed to show the usability of BiMSAD and
the results are reported. The outcomes of BiMSAD indicate
that it prevents duplication of digital music files in a
personal device better than the existing methods which only
detect duplication after it occurs. The hard disk of
personal device can be controlled and optimized for extra
digital music record collection by BiMSAD. |
|
|
|
Title: |
Facial emotion recognition based on two-dimensional empirical
mode decomposition and PCA plus LDA |
Author (s): |
Hasimah Ali, Muthusamy Hariharan, Sazali Yaacob and Abdul Hamid
Adom |
Abstract: |
This paper proposes a new approach of using nonlinear
technique, two-dimensional empirical mode decomposition
(2DEMD) and PCA plus LDA for facial emotion recognition. The EMD is a non-parametric
data-driven analysis tools which decomposes any nonlinear
and non-stationary signals into a number of intrinsic mode
functions (IMFs). In this work we used the 2DEMD
which is the extension of one dimensional EMD to extract the
features at multiple scales or spatial frequencies from
facial images. These features called IMFs that obtained by a
sifting process. To reduce dimensional features, PCA plus
LDA was applied on IMF features. The obtained features was
classified using k-nearest neighbor classifier. To evaluate
the effectiveness of the proposed method, Cohn-Kanade
database was employed. A series of experiment shows that the
proposed method achieves recognition rate of 98.28% thus
demonstrates a promising result for classifying the facial
emotions. |
|
|
|
Title: |
Preliminary study on semantic knowledge management model for
collaborative learning |
Author (s): |
Zaihisma Che Cob, Rusli Abdullah, Hanim Risidi and Mohd Zali Mohd Nor |
Abstract: |
Knowledge management (KM) is about collecting, organizing,
and storing the knowledge assets of an organization to make
it accessible for future knowledge reuse and application.
Effective knowledge management system (KMS) should be able
to deliver relevant knowledge to the right knowledge user at
the right time. Yet, existing KMS is limited in several
ways, and still largely relies on
human efforts to access, extract and filter information
pertinent to their knowledge need. Successful KMS
requires the identification of proper technology designed
with the right system features to support the KM activities,
hence achieve the goals of KM. Due to this motivation, this
paper aims to discuss the application of semantic technology
to enhance the KMS and propose a semantic KM model to
support collaborative learning environment. This preliminary
model has been proposed based on the review of the
literatures on KM, KMS, semantic technology and
collaborative learning environment and the verification of
the model components will be done using a questionnaire
survey. A pilot survey was conducted to several academicians
in Higher Learning Institutions (HLIs) in Malaysia to
validate the survey instruments before the actual survey is
carried out. Rasch Unified Measurement Method (RUMM) is used
to analyze the pilot data. As a result, Person reliability
is found to be quite high, but Item reliability suggested
fair data. A few respondents and items were identified as
misfits with distorted measurements. Some problematic
questions are revised and the negative questions are
considered to be reworded into positive questions. |
|
|
|
Title: |
Islamic
knowledge portal: An analysis on knowledge portal requirements |
Author (s): |
Zaihisma Che Cob, Nor’ashikin Ali, Hidayah Sulaiman and Wan
Muhammad Ilya Wan Mazuri |
Abstract: |
In this paper, drawing upon the literature review and
empirical data, we address the importance of knowledge
sharing from Islamic perspective and the relevancy of
Knowledge Management (KM) for sharing knowledge of Islam. We
propose
Islamic Knowledge Portal as a tool to effectively manage the
knowledge of Islam to be a righteous and successful Muslim.
In addition, this paper reviews successful implementation of
KM portal in several organizations and identifies the
important functional specifications to build such system. A
survey results are used to empirically investigate the
knowledge requirements for Islamic Knowledge Portal, and the
findings from these activities are used to identify the
required knowledge content and to design the important
features for Islamic Knowledge Portal. |
|
|
|
Title: |
Analytical hierarchy process (AHP) electoral college majors in
Indonesia based on android mobile |
Author (s): |
Rizal Bahaweres,
Firgiawan Indra Kusuma budiyanto and Anna
Antonyová |
Abstract: |
The
development of the Android platform on mobile devices is
experiencing rapid increase in Indonesia. This confirms that
the Android mobile platform is still a favorite mobile
system operation for Indonesia society. Along with this,
nowadays almost all high school students in Indonesia wished
to continue their education to university after graduation.
However, not all this prospective students know the majors
or courses that suit with them. Algorithm is one of the
swarm intelligence that evolves fast for almost area of
optimization and engineering. To solve this problem, we
suggest building an application that can calculate several
possible courses relevant to students based on certain
matters. Based on the DSS (Decision Support System) and
using the method of AHP (Analytical Hierarchy Process) as
one of the methods of expert system, this application can be
calculating and displays the results in the form of courses
that correspond to users that the candidate based on
ideals, interests, values, academic advice, and their
financial ability. These applications are built on the
mobile platform Android which is being favored by Indonesian
society, and society also aims to be a practical and easy to
use anywhere and anytime. Based on the results of the
questionnaire, the results obtained from the application can
be accepted as input to select majors at university. Based
on the data obtained in the questionnaires, the most
important criteria is ideals. Ideals the most attention in
choosing college majors with percentage of 48.9%, followed
by interest (25.2%), the value of academic (11.6%),
financial (8.7%), and the nearest person advice (5.7%). |
|
|
|
Title: |
Developing a
small scale cyber defense competition |
Author (s): |
Albert
Sagala and Deni P. Lumbantoruan |
Abstract: |
The growth of cyber security
competition increases in Indonesia, it is organized by
private institutions or university level. This cyber
competition will encourage students and community to
increase their level of knowledge in protecting the
infrastructure by cracker. However, most institution do not
prepare the infrastructure as an internship for students to
learn ethical hacking. So, sometimes hacking activity will
make the operational disturbed. Institution need to have an
isolated network as an arena for study ethical hacking. In
this paper, we design a lab for making lab simulation so
that red team and blue team can join together in one
network. The network topology model which we provide also
support scoring automatic for judging the cyber competition.
This scoring system will help the white team to control and
monitor the competition. |
|
|
|
Title: |
Incorporating
author’s activeness in online discussion in thread retrieval
model |
Author (s): |
Zuriati
Ismail, Atefeh Heydari, Mohamadali Tavakoli and Naomie Salim |
Abstract: |
Online forum is one of
user-generated contents available on the Internet that
provides platform for knowledge sharing. However, not all
messages posted can be considered of high quality and as it
increases in its availability, finding quality information
becomes more important and challenging. Thread retrieval
model is very important in helping users to find relevance
information pertaining to their topic search. As quality of
post messages depends upon the author, this study aims to
look at how ranking threads based on author’s activeness in
a forum could improve thread retrieval task compared to
non-quality based ranked list. Voting models were used to
convert message level quality features into thread level
features and learning to rank method to combine nine
features of activeness dimension for thread scoring.
Different combinations of nine features under the activeness
dimension with different ranking strategies are studied and
its performances also compared using normalized discounted
cumulative gain (NDCG) as performance measure. 2555 models
were generated and 23 models are identified as among the
best model. |
|
|
|
Title: |
A new
biometric template protection based on secure data hiding
approach |
Author (s): |
Emad
Taha Khalaf and Norrozila Sulaiman |
Abstract: |
Biometrics is a technology
that has been widely used in many official and commercial
identification applications. The extracted features from the
biometric sample is called biometric template which is used
during a biometric authentication process. The security of
templates is the critical part of biometric system and one
of the most crucial issues in designing a secure system. The
proposed approach focused on combining data hiding and
biometrics to take advantage of the benefits of both fields
and develop the hiding technique to find a secure solution
for protecting biometric data. We deal with dental as a
first biometric source and a user's speech as a second
biometric source at same time it a reliable key from a
user's speech for enhanced the security of the system. Two
of the popular methods are combined DWT & DCT in the
proposed security system (SDHA) for embedding and extraction
the secret data in order to compensate the drawbacks of both
of them and to make the hidden information much more secure
against the attacks, Wavelet Transform which use Dyadic
Filters to decompose cover image into 4-Levels (HH, HL, LH
and LL) and Discrete Cosine Transforms to convert a signal
of the selected coefficients (HH, HL and LH) into elementary
frequency components. Simply the proposed hiding method are
summarized by dividing the secret data into three sections
according to the percentages that have been entered by a
user then distribute these sections into the three chosen
coefficient sets (HH, HL and LH) of the cover image which is
an excellent secure locations for data hiding. The results
show the efficiency of the proposed method comparing with
other method that used skin tone region of images, DWT
method and simple LSB method. |
|
|
|
Title: |
Information
technology systems of service process innovation |
Author (s): |
Chupun
Gowanit, Natcha Thawesaengskulthai, Peraphon Sophatsathit and Thitivadee
Chaiyawat |
Abstract: |
The existing architecture of
Information technology system in service organization is
designed as a modularity structure. However, in fact, there
is a concern about information technology interdependency
especially data and processes linkage of each system. It is
sustain that information flow can be constructed of the
requirements from different users background, knowledge
ability, own interest, and in different timeframe. Even
though company put high investment in advance information
technology systems, but there is a lack of relation
interdependency among them which can be costly and caused
ineffective resource utilization. The objective of this
research is to develop holistic IT systems for a service
process innovation by following 5D model. We began by
studying the existing IT systems, process flows in case
service organizations, followed by semi-structured in-depth
interview with ten project members from the three case
studies. Action research is conducted by a better and
simpler techniques solution as an innovative 5D model of
service innovation development process in claim motor
insurance which we selected the leading top ten insurance
firms in Thailand. The 5D model approach provides a
comprehensive process with clear direction and useful tools
and techniques at each step. The new developed IT systems of
claim motor insurance re-engineering project took one year
and two months which yield the result of approximately 79
percent time-consuming reduction at each claim. The new IT
systems ensure the competitive advantage in terms of high
effective process and cost efficient for insurance firms in
long-term. |
|
|
|
Title: |
Task
scheduling algorithm based on particle swarm optimization (PSO)
and invasive weed optimization to execute tasks in overloaded
situation for preemptive system |
Author (s): |
Amir
Hatami Hardoroudi and Suriayati Bt Chuprat |
Abstract: |
A number of studies have been
done in order to execute all the tasks in real-time
scheduler systems. However, different researcher are tried
to tackle overload situation in real-time systems by using
swarm algorithm. These studies have been categorized based
on the various parameters which are important in real-time
systems. As an instance, system cost, processor waiting
time, number of tasks, balance use of system and etc. By
increasing number of the task in task set, process time will
be increased. In this situation, processor waiting time will
be high when the number of the task increased and as result
system cost is raising. To solve mentioned issue the authors
proposed a task scheduler which is used PSO algorithm in
order to cover deficiencies of previous studies in
overloaded situation. This algorithm is suggested for
preemptive tasks in uniprocessor in real-time systems. The
result of the research has been shown PSO perform better
while other common scheduling algorithm same as EDF and ACO
are being over loaded. The authors by combine PSO and
Invasive Weed Optimization (IWO) suggest a new algorithm
that is called HPI algorithm which can perform better than
PSO and schedule more tasks in overload situation. |
|
|
|
Title: |
Handover
trigger scheme for mobile communication in high speed mobile
environment |
Author (s): |
Azita
Laily Yusof, Mohd Nasrul Affendi Abu Hurairah,Norsuzila Ya’acob,
Muhammad Aiman Zainali, Mastura Rosdi and Basyirah Abu Bakar |
Abstract: |
High speed rail has been
developed rapidly in recent years. The passengers traveled
by trains demand for higher data rate and service continuity
in order for them to access the Internet. The realization to
provide reliable communication for the users in high speed
mobility is challenging due to the frequent request for
handover since the trains moving in high speed which
resulting heavy overhead implementation. Since the User
Equipment (UE) in trains communicates directly to the
outside of the Base Station (BS), it reduced handover
successful rate and hence, degraded the service quality.
This research identified the system parameters to improve
handover performance in high speed railway network.
Moreover, mathematical equation has been derived by
integrating the information of train speed and time traveled
across the cell. This research has improved handover
performances by reducing the probability of drop call rate
and increasing the number of handover successful rate. |
|
|
|
Title: |
An artificial
neural network modeling for pipeline corrosion growth prediction |
Author (s): |
Mazura
Mat Din, Norafida Ithnin, Azlan Md. Zain, Norhazilan Md Noor,
Maheyzah Md Siraj and Rosilawati Md. Rasol |
Abstract: |
Corrosion defect assessment
becoming a forte issue in pipeline reliability assessment to
accurately predict the severity of its condition. Due to the
uncertainties inherit from the pipeline inspection at
present, statistical model use to model the corrosion growth
apply a correctional methods to reduce the gap (means and
variation) between predicted values and the actual data.
This study aims to develop a time dependent corrosion growth
model for oil and gas pipeline using Artificial Neural
Network (ANN) as an alternative to the current method and to
evaluate its applicability without enforcing data
correctional methods. This model is formulated based on
parameters of defect extracted from in-line inspection data
(ILI) and quantified by statistical analysis. The develop
model gives the prediction of the corrosion depth and length
of the defect that can be used to calculate the corrosion
rate or growth. The results and outcome of the present study
can help pipeline operators to predict the reliability of
the pipeline structure in terms of its probability of
failure or lifetime estimation. |
|
|
|
Title: |
Content-based
direct access methods for face recognition biometric system:
State of the art |
Author (s): |
Iwan
Pahendra, Benhard Sitohang and Saiful Akbar |
Abstract: |
As a biometric component, the
human face has a unique information and characteristics that
are invariant, so this allows the system to do a face search
by utilizing the original information that is attached to
the face that is unique internal characteristics of the
extraction face, no longer use alphanumeric keyword to
search-based face. In the conventional method, the process
of searching is dominated by the use of external attributes
as keywords and as a basis for classification. The use of
visual attributes as a keyword is the latest method in this
field. In this research a short explanation about various
face recognition methods and application are given. A state
of the art of content-based direct access methods for face
detection is also explored. A future work on these research
areas are given as a guide for other researcher to make an
advanced research in the future. |
|
|
|
Title: |
Hidden
indexing based on syntactical approach for direct access method |
Author (s): |
Iwan
Pahendra, Benhard Sitohang and Saiful Akbar |
Abstract: |
In this paper hidden indexing
techniques that can be used in a face recognition system
have been developed. This technique is based on the
syntactic approach uses the development of octal chain code.
As an initial step, a variety of multi-dimensional image is
extracted to produce the desired binary value. Then
syntactic approach is used to determine the patterns
produced by the binary value. Binary pattern formed is set
in such a way to generate a database index to form a
sequential index that can facilitate direct access method.
The proposed method is expected to reduce the time of data
search process. Future work, better extraction methods will
be tested in this study for 3D model. |
|
|
|
Title: |
Computer
security factors effects towards online usage of internet
banking system |
Author (s): |
Mahmoud
Al-Shawabkeh, Madihah Mohd Saudi and Najwa Hayaati Mohd Alwi |
Abstract: |
Given an apparent lack of
coherence and a paucity of computer system field of studies,
research imitates and demonstrates non consensus in how
computer security fits into the satisfaction, success,
usage, efficiency, and effectiveness of computer system
field. This study is a part of research aims to extend the
Technology to Performance Chain model by including and
examining the Computer Security Self-Efficacy construct, as
recommend by several computer system field researchers. This
paper used the statistical technique structural equation
modeling and the partial least squares regression for
estimating causal relations between computer security
self-efficacy and internet banking usage. Outcomes confirm
that confidentiality and availability effects computer
security self-efficacy while in turn computer security
self-efficacy impacts on usage. Computer security
self-efficacy also partially mediates the impact of
confidentiality, integrity, and availability on usage. |
|
|
|
Title: |
A systematic
analysis on worm detection in cloud based systems |
Author (s): |
Hasan
Mahmoud Kanaker, Madihah Mohd Saudi
and Mohd Fadzli Marhusin |
Abstract: |
An innovative breakthrough in
computer science is cloud computing and involves several
computers which are connected via the Internet or it is
dispersed over a network. A large database, services,
applications, software and resources are an integral part of
this technology. It has the capability to operate a program
or applications on numerous connected computers
simultaneously and permits the users to enter applications
and resources through a web browser or web service via the
Internet anytime and anywhere. Current susceptibility in
elementary technologies gravitates to expose doors for
intrusions. Cloud computing offers enormous advantages such
as cost reduction, dynamic virtualized resources,
significant data storage and enhanced productivity. At the
same time, numerous risks occur regarding security and
intrusions, for example, worm can intercept cloud computing
services, impair service, application or virtual in the
cloud formation. Worm attacks are now more complex and
resourceful making intruders more difficult to detect than
previously. The motivation of this research is founded on
ramifications presented by the worms. This paper presents
different intrusion detection systems affecting cloud
resources and service. Moreover, this paper illustrates how
genetic algorithm can be integrated in detecting worm
attacks in cloud computing more efficiently. |
|
|
|
Title: |
Information
integration in electronic health information systems using
service oriented architecture approach |
Author (s): |
Muhamad
Shahbani Abu Bakar, Azman Ta’a and Kamarul Faizal Hashim |
Abstract: |
Health Information System
(HIS) integration constitutes one of the main challenges to
the developers. Although current integration technologies
are up to now quite mature, we confront several problems and
challenges regarding the complexity of functions and
database of the HIS. The efficiency and performance are the
issues for the HIS implementation that related to
information integration problems. This research proposed an
approach using Service Oriented Architecture (SOA) through
Web Services (WS) to integrate the information used by the
HIS. This study explored the problems and issues of
information integration in HIS and uses the WS and SOA to
improve the performance of HIS. The performance of data
integration is measured to evaluate the proposed approach.
Moreover, benchmark with the current approach is carried out
in order to describe the efficiency of the proposed
solution. |
|
|
|
Title: |
P2P file
sharing app for android devices sporting IEEE 802.15.4 Zigbee
radios |
Author (s): |
Akmal
Nurhananie Abd Rahman, Mohamed Hadi Habaebi and Mahamod Ismail |
Abstract: |
The peer-to-peer (P2P)
file sharing protocol has evolved from depending on Internet
connection provided by the cellular network, to free
Internet connectivity through Wi-Fi technology. On the other
hand, IEEE 802.15.4 is considered as today’s one of the top
growing wireless protocol. This paper introduces ZigBee
technology, which falls under this standard, into the mobile
P2P environment, where it involves devices with Android 4.0
(Ice Cream Sandwich), which is the lowest version of the
Android platform that can be found among mobile devices.
This paper integrates ZigBee into Android P2P environment
and preliminary results showed that it is possible to send
and receive files over ZigBee radio, yet the time taken for
complete file transfer depends on the file size. |
|
|
|
Title: |
CAEMON: Cloud
access execution and monitoring for Big Data analytics of sensor
system |
Author (s): |
R.S.
Ponmagal, M.P. Chitra, P. Dineshkumar,V.N. Rajavarman and G.
Dhineshkumar |
Abstract: |
This paper aims to implement
an intelligent architectural system to analyze and access
the sensor data using Big Data analytics. As cloud resources
enable the Wireless Sensor Networks to store and analyze
their vast amount of data, Sensor Cloud is designed using
Service Oriented Sensor Architecture. Sensor Cloud acts as
an enabler for Big sensor Data analytics. In the current
application these three become the compelling combination.
It is proposed to use the Hadoop Distributed File Systems (HDFS)
concept to store the streaming sensor data on to sensor
cloud for further analysis using MapReduce technique. This
paper describes a public sensor cloud delivery model through
cloud data analytics for sensor services. The proposed
architecture acts as a Cloud Access Execution and Monitoring
environment for sensor systems and is able to respond to
the requested sensor client applications with greater
intelligence. |
|
|
|
Title: |
TACIT
requirements elicitation framework |
Author (s): |
Bashir
M. Mohamed Geblawi, Nurlida Basir and Rosalina Abdul Salam |
Abstract: |
Requirements engineering (RE)
is an integral and fundamental part of software development
life cycle (SDLC). The most cited reason for software
failure is the inability to fully capture and implement the
exact user requirements in a timely, operationally and
financially expected manner. Requirements can be categorized
into two types; explicit and tacit. Explicit requirements
usually expressed clearly and well-identified requirements
in which the system must perform. In contrast, tacit
requirements are considered as hidden or embedded
requirements that incapability of getting such may caused a
software failure. The importance of tacit requirements in
requirements engineering (RE) has been acknowledged widely
as characteristics for developing projects in software
engineering (SE). Therefore, the aim of this paper is to
construct a framework for tacit requirement elicitation
process. The framework is design based on the integration of
the tacit knowledge elicitation process of Nonaka and
Takeuchi model with the tacit requirements elicitation
process. |
|
|
|
Title: |
E-WayCool:
embedding IxD theory and representation concepts in teaching
mathematics |
Author (s): |
Jasni
Ahmad and Zulikha Jamaludin |
Abstract: |
This paper introduces the use
of the theory of interaction design (IxD) and the concept of
representation in shadow play, known as Wayang Kulit (WK),
to teach mathematics. Drawing from the facts that there is
deficient in performance of primary school children in
mathematics, we proposed the e-WayCool as a means for
natural developmental progress in learning the subject. For
teachers, e-WayCool provides options for a different version
of a digital teaching tool to support teaching mathematical
operations, namely addition, subtraction, multiplication and
division whereby pre-algebraic concept is being introduced
via the concept of representation. Ten actors of WK are
utilized in delivering the teaching modules of the
operations within the range of whole numbers ranging from
1-1000. Each operation is not mutually exclusive, but bound
to a specific representation concept and activity scenarios.
The results are discussed in terms of the interests and
effectiveness of e-WayCool as a complementary digital tool
for classroom instruction and, at the same time preserving
the WK, one of the Malay endangered cultural heritages. |
|
|
|
Title: |
Significance
of parameters in genetic algorithm, the strengths, its
limitations and challenges in image recovery |
Author (s): |
Samer
M. Shorman and Sakinah Ali Pitchay |
Abstract: |
The Genetic Algorithm (GA) is
becoming very attractive and suitable for solving problems
where high computational performance is required. This paper
describes theoretical aspects of genetic algorithms which
are parameters used to get a result such as crossover,
mutation, selection and fitness. Likewise, GA performs
efficient search spaces to get an optimal solution. This
paper also highlights several issues in which GA as a tool
for recovering the image in variety domain. Generally,
however this approach has some limitations, strengths and
challenges that are also discussed in this paper. Findings
on a simple simulation of GA are also presented. |
|
|
|
Title: |
Compound
binarization for degraded document images |
Author (s): |
Arwa
Mahmoud AL-Khatatneh, Sakinah Ali Pitchay and Musab Kasim Al-qudah |
Abstract: |
In this paper, we
propose a new binarization method for degraded document
images. Hence, the existing work is focus on finding a good
global or local method in order to remove smear, strains,
uneven illumination etc. We propose a new compound method
that combines the advantages of both global and local
thresholding methods. Our method is applicable for various
types of degradation cases and the value of factors could be
determined automatically. We compare our method with five
state-of-the-art degraded document images. It also has been
tested over the dataset that is obtained from the recent
Document Image Binarization Contest (DIBCO) 2011 and 2013
for the experiments. Experimental results prove the
effectiveness of the proposed technique compared to previous
methods. |
|
|
|
Title: |
Telecardiology system for fourth generation heterogeneous
wireless networks |
Author (s): |
Hoe
Tung Yew, Yudha Aditya and Haikal Satrial |
Abstract: |
Telecardiology allows
healthcare professionals to monitor and interpret their
patients’ electrocardiography (ECG) via information and
communication technologies (ICT). It improves the cardiac
patient’s life quality by bridging the gap between
healthcare professionals and patients. With the rapid
development of ICT, telecardiology systems now can support
high quality medical image and video. However, the existing
telecardiology systems are relying on a single wireless
network. These systems are unable to guarantee that the
users will be always connected to the wireless network.
Furthermore, these systems are less reliable due to poor
network quality will results an interruption on
telecardiology application. Thus, a telecardiology system
integrated with vertical handover algorithm for Fourth
Generation (4G) heterogeneous wireless networks is proposed
to compensate the imperfection of existing telecardiology
systems. The proposed system allows users always connected
to the best quality network at anytime and anywhere in
seamless manner. The simulation result shows that the
proposed system outperforms the existing telecardiology
systems which rely on single network in term of network
quality. |
|
|
|
Title: |
A detector
generating algorithm for intrusion detection inspired by
artificial immune system |
Author (s): |
Walid
Mohamed Alsharafi and Mohd Nizam Omar |
Abstract: |
Artificial immune system (AIS)
allows us to inspire several ideas for the design of
computer intrusion detection. The standard of negative
selection algorithm (NSA), offered by Stephanie Forrest in
1994, is one of the most common mechanisms in AIS that
applied in anomaly detection for the similarity of its basic
idea. One of the most operational improvements in the
standard of NSA is how to generate effective detectors which
play a significant role in self and nonself discrimination
in intrusion detection system (IDS). In this paper, we offer
an improvement to a detector generating algorithm to
generate effective detectors which leads to improve the
standard of NSA, which in turn leads to improve the NSA
based anomaly intrusion detection. Experimental results show
that the improved algorithm able to generate more effective
detectors and keeping the space and time complexities better
than in the standard of NSA. This leads to detecting the
real-time intrusion with less false negative. |
|
|
|
Title: |
Choosing the
right threshold for cross-entropy-based stopping criteria |
Author (s): |
Roslina
Mohamad, Harlisya Harun, Makhfudzah Mokhtar, Wan Azizun Wan
Adnan, Nuzli Mohamad Anas and Kaharudin Dimyati |
Abstract: |
Cross-entropy (CE)-based
stopping criteria for turbo iterative decoding are known to
outperform fixed-iteration stopping criteria at high
signal-to-noise ratios (SNRs). While CE-based stopping
criteria have a range of thresholds, a high-value threshold
for small frame sizes, and vice versa, should be used. It is
difficult to advocate the value that can be categorized as
either a small or large frame size. Moreover, thresholds may
be specific for different SNRs. Hence, this paper provides a
systematic analysis of threshold selection for the
respective frame sizes of well-known CE-based stopping
criteria. In this work, a range of thresholds was simulated
for their error performance and required average number of
iterations. To reduce complexity in the average iteration
number, these results are thoroughly analysed and a suitable
threshold for each CE-based stopping criterion in the
specific SNR region is proposed. |
|
|
|
Title: |
Service level
agreement performance analysis on quality of service UPE-Metro
Ethernet |
Author (s): |
Mat
Ikram Yusof, Akmarul Nizam Zainudin, Ruhani Ab Rahman and
Murizah Kassim |
Abstract: |
A Service Level Agreement (SLA)
between a service provider and its customers is an assurance
to customers in fulfills the best services. Customers can
get the service they pay for which obligates the service
provider to achieve its service promises. Failing to meet
SLAs could result in serious financial consequences for a
provider and lost customers trust. This paper presents an
analysis on performance of Quality of Service (QoS) SLA on a
User Provider Edge –Metro Ethernet (UPE-ME) network. A QoS
SLA tested method called RFC 2544 is performed on four
customers in one industrial area. Actual data on four of QoS
parameters which are throughput, jitter, latency and frame
loss are tested by using test gear VeEX Vepal MX-120. The
customers are focus to the User Provider Edge (UPE)
customer. A few measurement and techniques are presented on
the tested method. Analysis result on the tested throughput,
jitter, latency and frame loss performance are presented
based on growth of bytes. Network performance tested is
identified that it is qualify as a perform network link.
Performance presented results on growth of throughput with
growth of frame length and latency increased with growth of
frame length. Analyzed on frames loss presented that there
are no errors thus this proved good quality network. Some
jitters presented that they are in a low value which means
that less jitter presents system with a better operation.
Identifications on parameter value are presented based on an
analyzed QoS using Minitab16. The produce result shows the
implemented of SLA QOS UPE-ME follow the QoS and this result
is a better proved for customer satisfaction and good
services from the service provider. |
|
|
|
Title: |
Exploration
of natural immune system for multi-agent coalition formation |
Author (s): |
Martina
Husáková |
Abstract: |
Coalition formation is used
for cooperation of intelligent agents in the multi-agent
systems. Coalition is composed of homogeneous or
heterogeneous agents able to effectively solve complex
problems requiring decomposition of the task into the
subtasks. Various approaches can be used for multi-agent
coalition formation, e. g. game theory, dynamic programming,
graph theory or genetic algorithms. Natural immune system is
complex system containing compartments where processes
similar to the coalition formation appear. The paper
identifies actual problems in multi-agent coalition
formation and investigates properties and mechanisms of
natural immune system as the source of inspiration for
solving some of these problems. The paper establishes next
steps in the research of multi-agent coalition formation
with the aid of metaphors based on the behaviour of the
natural immune system and principles of artificial immune
systems. |
|
|
|
Title: |
Simultaneous
computation of model order and parameter estimation of a heating
system based on gravitational search algorithm for
autoregressive with exogenous inputs |
Author (s): |
Kamil
Zakwan Mohd Azmi, Zuwairie Ibrahim, Dwi Pebrianti, Sophan
Wahyudi Nawawi and Nor Azlina Ab Aziz |
Abstract: |
System identification is a
class of control system engineering that determines physical
functionality of a plant and represents them in the form of
mathematical expression by utilizing real experimental data.
It is a process of acquiring, formatting, processing, and
identifying mathematical models by considering raw data from
the real-world system. Once the mathematical model is
chosen, it can be characterized in terms of suitable
descriptions such as transfer function that can be used for
controller design. Most essential stages of model
identification process can be summarized into four main
stages. The first stage is collecting experimental data.
Then, the model order and structure are chosen. The next
stage is to estimate the parameters of the model and
finally, the mathematical model is validated. Model order
selection and parameter estimation are two significant
aspects of determining the mathematical model for system
identification. In this paper, an approach termed as
Simultaneous Model Order and Parameter Estimation (SMOPE),
which is basically based on Gravitational Search Algorithm
(GSA), is proposed to combine these two parts into a
simultaneous solution. In this technique, both the model
order and the parameters of the system are computed
simultaneously to obtain the best mathematical model of a
system. According to heating system case study, it is proven
that the proposed method is outstanding in comparison with
some other approaches in literature. |
|
|
|
Title: |
SLA-based
content adaptation framework for optimizing QoE and energy
consumption |
Author (s): |
Mohd
Norasri Ismail, Rosziati Ibrahim, Mohd Farhan Md. Fudzee and
Muhammad Hanif Jofri |
Abstract: |
Mobile device advancement and
popularity has changed the way we consumed web content.
However, the heterogeneity properties of mobile devices,
subscribed network as well as its users lead to mismatch
problem. The content adaptation system is the most viable
solution for this issue. Most previous works in ADTE adapt
the MPEG-21 Digital Item Adaptation (DIA) specification.
However, only few works on optimizing energy consumption as
well as quality of experience as a vision in Universal
Multimedia Experience (UME). This paper proposes a framework
of an adaptation decision-taking engine based on Service
Level Agreement (SLA) and uses MPEG-21 Digital Item
Adaptation specification. The SLA mechanism is integrated in
this framework to enable more flexible decision-making
process in the content adaptation system. This flexibility
will support optimum QoE based on device current property
status. |
|
|
|
Title: |
Information
security strategy on mobile device based eGovernment |
Author (s): |
Tri
Kuntoro Priyambodo and Yudi Prayudi |
Abstract: |
Mobile devices today are an
important equipment to support daily activities. Nowadays,
people generally tend to use mobile devices as it has
several advantages, namely: universality, usability, high
efficiency, economy and individuation. Mobile devices will
become a major channel for eGovernment implementation in the
future. In line with the increasing number of information
presented as well as the services offered by the government,
the greater the challenges of information security are. The
exchange of information that happens should be supported by
a good security mechanism. However, when discussing on
security issues, the opposite matters are matters related to
convenience. This paper discusses some aspects of eGovernment
as well as solutions to the challenges of information
security issues when implementing a mobile device as a
communication channel. There are four things that are
offered as a solution to information security strategy to
keep a balance between security and convenience, namely:
selection of data and services, the appropriate policy,
adoption of technology and the human education aspect. |
|
|
|
Title: |
An analysis
of D-Band Gunn diode for millimeter wave application |
Author (s): |
Zaffrul
Zulkarnain Aziz Masuaud, Mohd Azlishah Othman, Nadhirah Ali,
Hamzah Asyrani Sulaiman and Mohamad Zoinol Abidin Abd. Aziz |
Abstract: |
A planar InP-based Gunn diode
is designed for millimeter wave application. The SILVACO
TCAD tool is utilized to generate the structure and I-V
characteristic of Gunn diode. The design specification
mainly focuses on varying the diameter of cathode area in
three different values which are 0.8um, 1.0um and 1.2um. It
can be seen that the threshold voltage and current display
their powerful dependences on the 0.8um diameter of cathode
area. The threshold voltage precisely at 7V alongside the
current value is approximate 1.6A. In this paper, the
diameter of cathode area is optimized. The results greatly
propose that lower cost and high reliable InP planar Gunn
diode can be utilized as single chip terahertz sources. |
|
|
|
Title: |
2 km ground
control range for UAV in disaster recovery |
Author (s): |
Duddy
Soegiarto, Simon Siregar and Nina Hendrarini |
Abstract: |
Natural disasters are natural
events that cannot be predicted. Each occurrence of natural
disasters will cause damage can even eliminate human lives.
The success of the recovery process and help victims of
natural disasters (disaster recovery) depends on the
accuracy of the information condition affected area.
Currently has developed several technology tools that can
provide information and direct assistance to victims of
natural disasters, one of which is the Unmanned Aerial
Vehicle (UAV). UAV is an aircraft type that has the ability
to fly without a crew and pilots, process control is done
directly by the operator or automatically by the device that
has been standardized. So that UAVs can be applied for
monitoring and search and rescue operations or special use
in the military. Distance is one of the obstacles using UAVs,
because when the magnitude of the distance exceeds the
ability of the central control system will cause the UAV
control process cannot be performed due to the loss of data
communications. In this study, will be developed a control
system for a UAV which has the capability of data
communication up to 2 km. The process of research is
concerned with the optimization of the ground control
station consisting of the antenna and the transceiver system
and the development of the type of UAV that will be used. |
|
|
|
Title: |
Literature
review of battery-powered and solar-powered wireless sensor node |
Author (s): |
A.T.I.
Fayeez, V.R. Gannapathy, Ida S. Md Isa, M.K. Nor and N.L. Azyze |
Abstract: |
Nowadays, sensor node networks
are designed and increasingly used in various fields and
sectors, such as in military (examples Battlefield
surveillance, nuclear, biological and chemical attack
detection and reconnaissance), in health (examples
Tele-monitoring of human physiological data, monitoring
patients and doctors inside a hospital), in environment
(examples Forest fire detection, flood detection) and in
other various applications. However, the power sources and
supply of the nodes remains as challenge. Therefore, energy
conservation plays an important role for this network.
Usually the battery powered is used as power sources for
sensor nodes, but energy harvesting offers an alternative,
although it not able to avoid from the problem. In this
paper, an analysis is performed to compares the use of
batteries powered against solar cells powered. The basic
parameter and characteristic for both of power supplies are
studied in terms of capacity or volume, low self-discharge,
shorter recharge time, energy density and power efficiency
to generate power for the sensor nodes, the lower cost and
also in terms of characteristics such as size and weight. |
|
|
|
Title: |
Investigation
on the impedance modeling of combination circle for frequency
selective surface |
Author (s): |
Noor
Azamiah Md Fauzi, Mohamad Zoinol Abidin Abd Aziz, Maizatul Alice
Meor Said, Mohd Azlishah Othman, Badrul Hisham Ahmad, Hamzah
Asyarani, Mohamad Kadim Suaidi and Mohd Fareq Abd Malek |
Abstract: |
This paper presents the
investigation of a unit cell for combination of circle
frequency selective surface (FSS). Two types of
configuration for the simulation has been investigated and
analyzed. The investigation has been done on the radius of
circle FSS (a) and the spacing between the first and another
circle (b) in order to analyze its effects towards the
resistance and reactance of the circuit. The impedance
mathematical modeling of the design FSS in terms of,
resistance and reactance have been formulated from
parameters a, b, c and d. This model can be used to design
the FSS at the ISM band application. The bandwidth of the
first configuration is 158.27 MHz which covered the
frequency range from 2.3261 GHz until 2.4843 GHz. Meanwhile,
the bandwidth for the second configuration is 297.17 MHz
which covered the frequency range from 2.1515 GHz until
2.4486 GHz. |
|
|
|
Title: |
Investigation
of SRR parameters on monopole antenna performance |
Author (s): |
T. K.
Ong, B. H. Ahmad, M. Z. A. Abd. Aziz, M. A. Othman, M. K. Suaidi,
H.A. Sulaiman and F. Abd. Malek |
Abstract: |
This paper presents an
investigation of split ring resonator (SRR) parameters on a
coaxial-fed monopole antenna. The adding of SRR slot can
create a notch in the result of coaxial-fed monopole antenna
design. Thus, this paper aims to investigate the effect of
changes to the outer ring radius and slit cut width of the
SRR slot. All antenna designs and simulations involved are
drawn and simulated in Computer Simulation Technology (CST)
Studio Suite software in an open space environment to
prevent any interference within simulation range. The
antenna design is printed on a FR4 epoxy board with
dielectric constant, εr of 4.4, tangent loss, tan δ of
0.019, and thickness, h of 1.6mm. In the investigation,
outer ring radius of SRR slot has been increased from 4mm to
10mm whereas the slit cut width of SRR slot has been
increased from 1mm to 8mm. The result shows that the
increment of outer ring radius can shift the notch and
frequency band to lower frequency. In a contrary, the
widening of slit cut width of SRR slot is able to shift the
notch and frequency band back to higher frequency. These two
characteristics can contribute to wideband or ultra wideband
system to provide frequency tunable notch function. |
|
|
|
Title: |
Multiband
planar printed monopole antenna with defected reflector for
wireless communication system |
Author (s): |
Mohamad
Hafize Ramli, Mohamad Zoinol Abidin Abd Aziz, Abdul Halim
Dahalan, Mohd Azlishah Othman and Hamzah Asyarani |
Abstract: |
In this paper, a multi-band
planar printed monopole antenna with defected reflector for
wireless communication system is presented. The antenna has
been designed based on meander lines monopole printed
elements and the rectangular ground structure with defected
reflector above the proposed antenna. The each element of
meander lines is designed with a half wavelength to radiate
at a frequency of 3.6 and 5.8 GHz for Wireless Local Area
Network (WLAN) application. The 50 ohm probe feed SMA type
is used to feed the signal into the antenna structure. The
proposed antenna is designed and simulated by using Computer
Simulation Technology (CST) software. The antenna
performance is analyzed in term of the return loss,
bandwidth, gain, directivity, and radiation pattern at the
design frequency. The bandwidth of reflection coefficient
which are less than – 10 dB can be seen at (305 and 125)
MHz, (248 and 359) MHz and (267 and 197) MHz for 2.4, 3.6
and 5.8 GHz for with/out defected reflector. The additional
defected reflector helps to improve the return loss,
bandwidth, gain and directivity. |
|
|
|
Title: |
Review on
narrow phase collision detection system in virtual environment |
Author (s): |
Hamzah
Asyrani Bin Sulaiman, Mohd Azlishah Othman, Mohamad Zoinol
Abidin Abd and Aziz Abdullah Bade |
Abstract: |
Collision detection is one of
the most important tools that has been used widely in
animation and simulation especially in computer games and
medical simulation purpose. One of the critical issues in
collision detection system is to actually prepare what kind
of technique that is suitable for virtual environment to
adapt collision detection system installed. Hence, this
research paper described a detailed review on collision
detection algorithm mainly in narrow phase collision
detection phase. |
|
|
|
Title: |
Implementation of axis-aligned bounding box for OpenGL 3D
virtual environment |
Author (s): |
Hamzah
Asyrani Bin Sulaiman, Mohd Azlishah Othman, Mohamad Zoinol
Abidin Abd and Aziz Abdullah Bade |
Abstract: |
This paper describes a simple
and straight forward implementation of Axis-Aligned
Bounding-Box (AABB) for OpenGL 3-Dimensional (3D) virtual
environment for games and simulation purpose. The
implementation of AABB is conducted in OpenGL graphic
library version 1.2 with C++ programming language by using
Visual C++. The implementation could help young and beginner
computer graphics student to master the implementation of
basic Bounding-Volume (BV) for collision detection and other
fields with related to the Axis-Aligned Bounding-Box (AABB). |
|
|
|
Title: |
Solar cloth
using TiO2 nanostructures based dye sensitized solar cell
technique |
Author (s): |
Noor
Faridah Amat, Mohd Azlishah Othman, Badrul Hisham Ahmad and Jose
Rajan |
Abstract: |
Titanium dioxide (TiO2)
nanostructures have been synthesized via hydrothermal method
by manipulating some parameters to determine which condition
show better performance. In general, TiO2 Degussa, P25
dissolve in alkaline solution. The solution was mixed by
stirring for 15-30 minutes and put into Teflon sealed into
an autoclave stainless steel tank and put in an oven without
shaking or stirring during heating. After that, the
autoclave is cooled at room temperature, the obtained sample
was stirred with dilute hydrochloric acid (HCl) aqueous
solution for 24 hour and then the sample was washed by using
deionized water for several times until the pH values
decreased. TiO2 nanostructures act as network in solar cloth
to perform the movement of electron in the device to
generate electricity. Solar cloth is describe as non-woven
fiber cloth in which a dye-anchored wide band gap
semiconductor, which is the electron conductor forms a
percolating network in polymeric medium. Because of
principles in dye sensitized solar cell is same as solar
cloth where dye sensitized solar cell consists of
dye-anchored metal oxide in the presence of electrolyte and
two conducting glass plates (such as fluorine-doped indium
tin oxide (FTO)). Dye sensitized solar cell (DSSC) will be
used TiO2 nanostructures to fabricate the device. Moreover,
the electrical conductivity of TiO2 nanostructures in the
present of polymeric medium will be measured. |
|
|
|
Title: |
3.5GHz of ice
cream cone with bow tie antenna for microwave imaging
application |
Author (s): |
Khairussakinah Nordin, Nadhirah Ali, Mohd Azlishah Othman,
Mohamad Zoinol Abidin Abd. Aziz and Hamzah Asyrani Sulaiman |
Abstract: |
The objectives of this paper
are to design, simulate, fabricate and examine Ice Cream
Cone with Bow Tie Antenna for microwave imaging application.
This antenna is designed for frequency 3.5GHz and simulated
using CST Microwave Studio Simulation. The antenna was
fabricated on FR4 substrate with relative permittivity of
dielectric constant (Ɛr), 4.6. The result of return loss,
bandwidth, gain, directivity and radiation pattern are
discussed in this paper. To achieve the best antenna
performance, the return loss must below than -10dB and gain
at 3dB. Ice Cream Cone with Bow Tie antenna is one of the
designs for microwave imaging application in the span of
breast cancer imaging. |
|
|
|
Title: |
An analysis
of d band Schottky Diode for millimeter wave application |
Author (s): |
Nur
Hazirah Binti Jamil, Nadhirah Ali, Mohd Azlishah Othman, Mohamad
Zoinol Abidin Abd. Aziz and Hamzah Asyrani Sulaiman |
Abstract: |
A Schottky Diode for
millimeter wave application proposed in this paper. The
proposed model includes the n-well thickness as a variable
to explain the operational behavior of a planar Schottky
Barrier Diode which is firstly introduced in this paper.
This paper shows the differentiation the length of the
n-well thickness with three lengths which are 1.6 µm, 1.4 µm
and 1.2µm. Then, the size of the Schottky Diode becomes too
small with dimension 2.0µm x 2.0µm. The suitable materials
that used in this diode are silicon where it has a more
advantages than other materials. The Schottky Diode was
designed by using the Silvaco TCAD tools software whereas
it’s also produced the IV and CV Characteristics graph. Both
graphs were analyzed after the three comparison the length
of the n-well thickness was specified the values. |
|
|
|
Title: |
Microwave
imaging technique using UWB signal for breast cancer detection |
Author (s): |
Siti
Hasmah binti Mohd Salleh, Mohd Azlishah Othman, Nadhirah Ali,
Hamzah Asyrani Sulaiman, Mohamad Harris Misran and Mohamad
Zoinol Abidin Abd. Aziz |
Abstract: |
Microwave Imaging modalities
used for breast cancer detection currently are not
sufficient for society’s need. The key features for
microwaves technique for tumor detection by the observation
at microwaves frequencies, the dielectric contrast of
permittivity and conductivity between normal and malignant
tissues. This project focuses on the experimental of
reflection coefficient in complex frequency domain obtained
using vector network analyzer transform into time domain
using Inverse Fast Fourier Transform (IFFT). Breast phantom
is illuminating from various points with short UWB microwave
pulse generated by RF Horn antenna with frequency of 1GHz
-10GHz and the collected backscattered energy is being
analyzed and simulated using Microwave imaging algorithms to
identify the presence and localization of the tumors. The
experiment represent medium form by a rectangular shape of
container filled with oil and small size of 3cm stone as a
reflected target that represent as a malignant tissues in
the breast sample. |
|
|
|
Title: |
A concept of
assistive courseware for hearing-impaired learners |
Author (s): |
Ariffin
Abdul Mutalib, Sobihatun Nur Ab Salam, Massudi Mahmuddin,
Mazida Ahmad and Syarifah Nadia Syed Yahya |
Abstract: |
This paper reports on an
initiative that develops a concept of teaching and learning
material for hearing-impaired learners in higher learning
institutions. It describes the needs for the concept. The
aim of the paper is to describe about the concept that is
developed through User-centered Design approach. It
involves observation and interview in three seminars in
gathering the components of the concept. In the three
seminars, users who are the hearing-impaired learners and
their teachers were involved very closely. In the end, the
concept has been derived and evaluated. The evaluation
further reveal that the concept has been well-accepted by
the users. |
|
|
|
Title: |
An efficient
analytical method for vibration problems |
Author (s): |
H.
Jodeiri and V. Imani Haddadan |
Abstract: |
In
this paper, we implement a new analytical technique,
variational iteration method for solving the some vibration
problems. The variational iteration algorithm leads to
analytical solutions in the present study. The results show
that the present method can be easily extended to other
nonlinear oscillations and it can be predicted that
variational iteration method can be found widely applicable
in engineering and physics. |
|
|
|
Title: |
Seismic
investigations of lake Chebarkul in the process of searching
Chelyabinsk meteorite |
Author (s): |
P. S.
Krylov, D. K. Nourgaliev and P. G. Yasonov |
Abstract: |
High-resolution seismic
investigations of Lake Chebarkul bottom was carried out in
the place of meteoric fall of the biggest part of
“Chelyabinsk” meteorite. The disturbance of stratification
and degassing zone on seismic sections passing through the
coordinates of the ice hole was found on the proposed
meteorite location. |
|
|
|
Title: |
Analysis of
defected ground structure notched monopole antenna |
Author (s): |
B. T.
P. Madhav, A. Manikanta Prasanth and Sreeramineni Prasanth |
Abstract: |
A compact defected ground
structure curved wideband monopole antenna and notched
monopole antenna are designed and presented in this paper.
In the basic cured monopole antenna wide band
characteristics are obtained and in the case of notched
monopole antenna, some frequency bands are cut- off in the
wide band operation. The band notched characteristic
involved the WLAN operating band. The curved monopole
antenna with defected ground structure is operating in a
wide bandwidth of 16 GHz. The designed antennas are showing
impedance band width more than 140% with VSWR less than 2 in
the desired band. |
|
|
|
Title: |
Optimization
of airport parking facilities size, location and connection |
Author (s): |
Luca
Mantecchini |
Abstract: |
In this paper, a decision
making tool for the optimization of size and location of
airport parking facilities is present. The model is
developed by considering travellers’ socioeconomic
characteristics, demand variability and supply costs. After
a review of the literature focused on parking space
allocation, parking location choice and influence of
operating costs, a mathematical model is applied for
determining the optimum size, location, connection and fee
of an airport parking facility. |
|
|
|
Title: |
Comparative
analysis of topology control algorithms to enhance network
lifetime |
Author (s): |
Manisha
Bhende and Sanjeev Wagh |
Abstract: |
Topology issues have received
more and more attentions in Wireless Sensor Networks (WSN).
WSN applications are normally optimized by the given
underlying network topology. Topology control is an
effective method to improve the energy efficiency of
wireless sensor networks. Due to the severe resource
limitations of the sensor nodes (e.g., small battery,
limited computation capabilities, inexpensive transceiver
etc.), Lifetime extension is one of the most critical
research issues in the area of wireless sensor networks. One
of the key approaches for prolonging the sensor network
operable lifetime is to deploy an effective topology control
protocol. In this survey paper, we provide a full view of
the studies in the area of topology control in Wireless
sensor network. By summarizing previous achievements and
analyzing existed issues, we also point out challenges and
research directions for future work. |
|
|
|
Title: |
Effect of
high CO2 content on formation damage of oil fields: A
field case in a south western Colombian field |
Author (s): |
Jairo
Antonio Sepulveda, Carmen Pizon-Torres, Jose Miguel Galindo,
Carolina Charry and Jorge Ivan Chavarro |
Abstract: |
Such factors as fines
migration, mud invasion, high gas phase saturation, organic
and inorganic deposition and bacterial growing are among the
causes of formation damage. Reservoirs with high CO2
content present a particular thermodynamic behavior leading
to increase formation damage by both organic and inorganic
deposition. This work deals with a field case in a Colombian
field in which CO2 content is very high. CO2
content increases asphaltene destabilization and alters
wettability which leads to a severe reduction of the near-wellbore
permeability causing a tremendous loss of the well
potential. A thermodynamic evaluation of fluid samples
coming from this reservoir was analyzed and results for a
single well are presented. |
|
|
|
Title: |
Cascade heat
pump dryer performance improvement using a solar collector |
Author (s): |
I. S.
Hwang and Y. L. Lee |
Abstract: |
Heat pump cycles are used in
heating, drying, and other applications, and have recently
seen greater use in the drying of clothes and food stuffs.
Driers using the heat pump cycle are limited in that their
performance changes in environments with a low ambient
temperature such as winter. Researchers are working to
resolve this downside, and the most prevalent solution is to
use additional heat sources, such as solar, geothermal, and
recovered heat. This paper implemented the cascade cycle
with solar radiation as an additional external heat source,
and conducted performance analyses of the drier at different
ambient temperatures. Results indicated that when a cascade
cycle combined with a solar collector is used, operational
performance at low temperatures is greatly improved. |
|
|
|
Title: |
Sustainability analysis of conventional and eco-friendly
materials: A step towards green building |
Author (s): |
Bakhoum E. S., Garas G. L. and Allam M. E. |
Abstract: |
In the construction industry, selection of sustainable
structural materials during the design phase leads to move
towards more sustainable construction. Therefore,
there is a need to select more green building materials to
be used in construction. Based on the promising vision of
future needs for sustainable development this
paper presents a comparative study between conventional and
eco-friendly building materials using sustainability
measures. A prototype of two storeys was constructed
using eco- friendly building materials (integrated bricks,
rice straw bales, M2 system, plain concrete, and Rockwool
sandwich panels). A sustainable decision support
system (SDSS) was used to compare between the structural
building materials of the two structural systems. The
results showed that the eco-friendly system had better
sustainability rank (67%) than the conventional system
(56%). In addition, the results of SDSS showed that the
Eco-friendly system was better than the conventional
system during the three phases of total life cycle
assessment (manufacturing, construction and demolition) by
11%, 0.5% and 9%, respectively. |
|
|
|
Title: |
Re-refining and recycling of used lubricating oil: An option for
foreign exchange and natural resource conservation in Ghana |
Author (s): |
Henry Mensah-Brown |
Abstract: |
The paper reviews the re-refining of used automotive engine
lubricating oils to obtain lube stock with the right
characteristics and additives’ response suitable for
blending automotive engine lubricating oil. The caustic
treatment and subsequent vacuum distillation method for
re-refining of used automotive gasoline engine
lubricating oils was used in this investigation. A lube
stock with the appropriate properties and characteristics
including additive response for the formulation of
SAE 40 grade lubricating oil suitable for an automotive
gasoline engine was obtained from a blend of re-refined used
lubricating oil and virgin bright lube stock in
the ratio 3:1. The lube stock had a viscosity index (VI) of
105. |
|
|
|
Title: |
Threshold results of a host-mortal commensal ecosystem with a
constant harvesting of the commensal species |
Author (s): |
N. Seshagiri Rao, K. V. L. N. Acharyulu and K. Kalyani |
Abstract: |
This paper focuses on phase plane diagrams for two species
ecological model comprising a mortal commensal and the host
species with a constant harvesting of the
commensal species. This model is characterized by a couple
of first order non-linear ordinary differential equations.
The possible three existing equilibrium points of
the system are identified and the nature of the ecological
interaction between the species is discussed based on the
equilibrium points of the model equations through
the phase plane diagrams for specific values to the
parameters in the model equations. |
|
|
|
Title: |
Comparative analysis of stress and strain distribution in
artificial knee implant and human knee joint |
Author (s): |
R. B. Durairaj and A. Krishnamoorthy |
Abstract: |
Knee joint is a hinge joint which posses six degrees of
freedom and withstand entire load of the human body. In
Recent statistics Knee replacement surgery has been
increased for the major issues like Bone cancer, Bone damage
etc. The TKP involves the replacement of damaged or defected
knee joint and replaced with artificial
implant. In general artificial implant is made up of
bio-compatible materials such as Titanium alloys which are
restricted in their motion (2-3 Degrees) when compared
to human knee joint. In this work it is discussed about the
comparative study of stress and strain distribution of
artificial knee implant with human knee joint. The CT scan
image of human knee joint has taken for this work and
converted in to 3D model using MIMICS software and analysed
at various loading conditions such as 300, 500, 700 and
900N. |
|
|
|
Title: |
Analytical expressions for heat transfer and entropy generation
in a pipe flow using homotopy analysis method |
Author (s): |
V. Ananthaswamy and L. Sahaya Amalraj |
Abstract: |
This paper demonstrates the effect of convective cooling on a
temperature dependent viscosity liquid flowing steadily
through a cylindrical pipe. In this model, it is assumed
that due to Newton’s cooling law heat is exchanged with the
ambient and the viscosity model varies as an inverse linear
function of temperature. The analytical expressions for
fluid velocity and temperature are derived using Homotopy
Analysis method and entropy generation rate, total entropy
generated and the Bejan number for various parametric values
are determined. Our results are compared with the previous
work and found to be in good agreement. |
|
|
|
Title: |
Performance analysis of heterogeneous networks using coalitional
games |
Author (s): |
Rajesh L. and Bhoopathy Bagan K. |
Abstract: |
A network which is best suited for a user in a heterogeneous
wireless environment is selected by using a Game Theory
technique. A statistical game theoretical model is
developed by positioning the users randomly, setting-up the
base stations of WiMAX and 3G as per standards of ITU and
defining the Grade of Service (GoS) for each type of network
respectively. Several parameters such as Received signal
strength (RSS), Reputation factor, Energy utility, Cost
utility and Mobility support are
considered. With these parameters the Utility function
payoffs are estimated for all the users. With the calculated
Payoffs, an algorithm is designed for a best network
selection by implementing Coalitional Game Theory
principles. Performance estimation is done to demonstrate
the Game Theory principles stand and compare with
conventional network selection schemes. |
|
|
|
Title: |
A new
approach for energy recovery and turbocompounding systems for
high altitude flight with common rail diesel engines |
Author (s): |
Luca
Piancastellia and Leonardo Frizzieroa |
Abstract: |
This paper introduces an
original method for the preliminary calculations and the
turbomatching of a dual stage high altitude turbocompounding
system. This method is conceived to use modified automotive
commercial turbochargers along with electric
motor/generators. The method used is innovative and uses
only the data commonly available from the manufacturer. In
the example described herein, full power and throttle
control are achieved up to 10, 000m (32, 000ft). The engine
is a Common Rail Direct Injection Diesel engine derived from
the automotive market. The calculation method and the
problems connected are widely discussed. For this
application turbocompunding is a good option that partially
compensates the unavoidable increase in TOW (Take Off
Weight). In drones that have relatively large batteries, the
ERS (Energy Recovery System) does not increase the air
vehicle mass. |
|
|
|
Title: |
A novel
compact CPW FED slot antenna with EBG structure |
Author (s): |
M. S.
S. S. Srinivas, T. V. Ramakrishna, B. T. P. Madhav, N.
Bhagyalakshmi, S. Madhavi, K. Venkateswarulu |
Abstract: |
A compact CPW fed antenna is
designed for the dual band operation. Here electromagnetic
band gap structures of rectangle-shaped lattices are placed
for the harmonic suppression. We observed that EBG
structures are not only exhibiting the band stop
characteristics, but also help to magnify the proposed
antenna bandwidth. The rectangular lattice like EBG’s have a
frequency band gap and high surface impedance
characteristics, which generally represent as in-phase
reflection band. We succeeded in integrating the rectangular
lattice EBG’s in compact slot antenna with a CPW feeding
line, to decrease the surface wave losses and bandwidth
enhancement. The complete antenna analysis with radiation
characteristics are presented in the current study. |
|
|
|
Title: |
Hard handover
optimization using time window based handover algorithm |
Author (s): |
Nagy F.
Merghani, Rania A. Mokhtar, Raed A. Alsaqour and Rashid A. Saeed |
Abstract: |
This paper shows and solves a
handover problem occurring with current power control
mechanisms in co-channel Wideband Code Division Multiple
Access (WCDMA) heterogeneous networks. The problem is the
mismatch between the required uplink transmits power when a
user is communicating to a small cell and an underlying
microcellular base-station. This paper introduces Time
Window Handover (TWHO) algorithm to adapt the transmit power
of the small cell users during the handover regime to
prevent such Signal to Interference plus Noise Ratio (SINR)
drops. |
|
|
|
Title: |
Design and
implementation of a fuzzy control system of relative humidity
and temperature for a neonatal intensive care incubator |
Author (s): |
A. Soto
Otálora, L.A. Guzmán Trujillo and J. D. Suarez Losada |
Abstract: |
This project involves in the
design and implementation of two fuzzy logic controllers
developed in a to a high performance microcontroller MSP430
series made by Texas Instruments. The whole system is able
to monitor the status of two critical variables in the first
days after birth of the preterm baby, temperature and canopy
relative humidity through a remote server system in a
software application designed on LabVIEW and communicated
with the system wirelessly via XBee devices which use the
IEEE 802.15.4 standard also known asZigBee protocol. The
application developed in LabVIEW allows the storage of
information in a database in MySQL. The equipment is
equipped with an alarm module which works with both visual
and sound alerts to avoid over heating or power supply
malfunction. |
|
|
|
Title: |
Power
transfer enhancement of existing EHVAC transmission line with
HVDC conversion- Indian scenario |
Author (s): |
M. Raju
and N.P. Subramaniam |
Abstract: |
This paper analyses the
feasibility of converting the existing 400kV and 765 kV
Double circuit AC Transmission line available in Indian
scenario to HVDC line without altering the tower structure,
line insulators and conductors. It has been observed that
though line losses are more in HVDC system compared to AC
Transmission line, there has been substantial increase in
Net power transfer capability i.e. 2.84 times and 2.75 times
increase in power transfer with +/-200kV HVDC and +/-400kV
HVDC configuration respectively by using the existing
conductors close to their thermal limits. Moreover, the
benefits of all the advantages of HVDC are obtained by
adapting this conversion. |
|
|
|
Title: |
A grid of
material and immaterial laboratories for a sustainable
transportation system: The RE.S.E.T. project in Sicily |
Author (s): |
Marco
Guerrieri, Maria La Gennusa, Barbara Lo Casto, Gianfranco Rizzo |
Abstract: |
Transportation is a crucial
sector, to be suitably approached in order of getting human
activities in more environmentally sustainable paths. In
fact, in developing, as well in less developing, countries
people and freights mobility are responsible of important
amount of pollutant emissions and are cause of significant
levels of energy consumptions. In this paper, a Sicilian
regional project is presented, aiming at establishing an
interconnected grid of material and immaterial laboratories.
These laboratories, that are devoted at inducing more
virtuous behaviors in the transportation policies, are
constituted by equipment and software tools, mainly located
in the region’s universities, acting as monitoring and
simulation stations. After a description of the structure of
the grid, first results of the laboratories activity are
provided, along with an estimation of the expected
improvement in the environmental and energy efficiency of
the transportation sector in Sicily. |
|
|
|
Title: |
Transient
analysis of elevated intze water tank-fluid-soil system |
Author (s): |
Neeraj
Tiwari and M.S. Hora |
Abstract: |
The conventional analysis
(non-interaction analysis) of over head water tank assumes
that columns rest on unyielding supports. In reality, the
structure is supported by deformable soil strata which
deforms unevenly under the action of loads and hence causes
redistribution of forces in the components of overhead water
tank. In the present work, 3-D interaction analysis of intze
type water tank-fluid-layered soil system is carried out
using ANSYS software to evaluate the principal stresses in
different parts of the tank and supporting layered soil
mass. The resultant deflections, Von-mises stress, neural
frequency of the tank are calculated and also evaluate
acceleration by Transient analysis under different filling
conditions of the intze tank. The intze tank, supporting
frame, foundation and soil mass are considered to act as
single compatible structural unit for more realistic
analysis. The tank, foundation and soil are considered to be
follow linear stress-strain relationship. The natural
frequency of the tank is evaluated for different filling
conditions and comparison is made between the
non-interaction and interaction analyses. |
|
|
|
Title: |
A review on
various data security issues in cloud computing environment and
its solutions |
Author (s): |
Balasubramanian V. and Mala T. |
Abstract: |
Cloud Computing is a
relatively new computing model that provides on demand
business and IT services over the Internet. One of the main
concerns in adapting Cloud Computing is its security. When
outsourcing the data and business application to a third
party cloud causes the security and privacy issues critical.
Cloud service users need to understand the risk of data
breaches in the cloud environment. In this paper, a survey
of the various cloud computing models, different security
risks that affects the cloud environment in the area of
confidentiality, integrity and computing on data is
thoroughly investigated. This paper also provides the
solutions for the different security issues due to the cloud
service delivery models. |
|
|
|
Title: |
Anthropometric data for Tanzania’s primary school furniture
design |
Author (s): |
Kafuku
John and Ademola James Adeyemi |
Abstract: |
Lack of anthropometric data
has been reported to be primarily responsible for furniture
mismatch, which has resulted in the high prevalence of
musculoskeletal disorders among schoolchildren. This study
is aimed at determining appropriate anthropometry dimensions
that can be used in school furniture manufacturing for
Tanzania’s children. Anthropometric data from 12 body
regions; which includes stature height, body weight,
shoulder breadth, popliteal height, reaching (overhead)
height, eye height, elbow height, hip breadth, arm length,
thigh thickness, buttock-popliteal length and buttock-knee
length; were collected from 468 children, comprising 236
boys and 232 girls. Percentile distributions of these
dimensions, grouped into four age groups, 6- to 8-, 9- to
11-, 12- to 14- and 15- to 17-year-olds were presented.
However, there was no significant difference in these
dimensions between boys and girls, except among the
9-11-year-olds. The results from this study will provide
design inputs to help furniture manufacturers to provide
well fitted furniture for Tanzania’s schoolchildren because
it is suitable for both genders and for children from both
rural and urban centers. |
|
|
|
Title: |
Kinetic
evaluation of Pd alumina supported catalyst for the reaction of
oxidative dehydrogenation of propane |
Author (s): |
Hugo
Zea and LM Carballo |
Abstract: |
Monometallic catalysts of Pd
supported on gamma-Al2O3 were prepared using wet
impregnation, pretreated under oxidative conditions and
tested for catalytic activity for the reaction of oxidative
dehydrogenation of propane (ODHP). Propane conversion and
selectivity to propylene on Pd supported catalyst was
evaluated as function of feed ratio (W/Feed C3H8), ratio of
oxygen/propane (U) and temperature, showed a strong effect
of the oxygen/propane ratio both on conversion and
selectivity. Higher concentration of oxygen in the reactor
feed increases propane conversion, but reduces propylene
selectivity; the best performance of selectivity as a
function of the ratio of oxygen/propane (U) was at the
stoichiometric condition (U=1). Propane conversion increases
as the feed ratio (W/Feed C3H8) increases, on the contrary
propylene selectivity decreases as the feed ratio (W/Feed
C3H8) increases; both behaviors are properly adjusted by a
Simplified Eley-Rideal (SEM) mechanism. |
|
|
|
Title: |
Microstrip
filter design techniques: An overview |
Author (s): |
B. H.
Ahmad, M. H. Mazlan, M. N. Husain, Z. Zakaria and N. A. Shairi |
Abstract: |
In this paper, two common
techniques indesigning microstrip microwave filterwere
reviewed which areperiodic and non-periodic microstrip line
perturbation techniques and matched filter. This technique
are widely used in RF microstrip designs such asPhotonic
Band Gap (PBG), Defected Ground Structure (DGS), Defected
Microstrip Structure (DMS), Ground Plane Aperture (GPA),
Electromagnetic Band Gap (EBG), high-impedance surface (HIPs),
and uniplanar compact photonic bandgap (UC-PBG), distorted
UC-PBG (DUC-PBG), dual-mode ring resonator, and Multi-Band
Matched Bandstop Filter Design. |
|
|
|
Title: |
Fault
tolerant control design with acceptable performance degradation |
Author (s): |
S.
Kanthalakshmi, M. Raghapriya and R. Latha |
Abstract: |
The main objective of this
work is to design a fault tolerant control approach using
multiple model technique and with acceptable performance
degradation due to faults in actuators, sensors and system
dynamics. The achievable performance under various component
failures is represented in the form of reference models,
known as acceptable performance reference models. These
models are used to synthesize a set of controllers. Under a
specific fault condition, proper controller is reconfigured
and revised command inputs are selected automatically to
achieve desired performance. The aircraft model is chosen to
demonstrate the effectiveness of the model. |
|
|
|
Title: |
Pressure and
pressure derivative analysis for naturally-fractured fractal
reservoirs |
Author (s): |
Freddy
Humberto Escobar, Lorena Lopez-Morales, Karen Tatiana Gomez |
Abstract: |
Naturally fractured reservoirs
have received considerable attention in the recent decades
since more than half of the world oil reserves are found in
this type of deposits; then, it is becoming fundamental a
good characterization of these reservoirs and their
understanding for having a better success in their
exploitation and management. Generally, as originally
proposed by Warren and Root, naturally-fractured formations
are represented by a two scale model: a fracture network and
a matrix. This modeling assumes that the fracture network is
equivalent to a homogeneous medium fixed into an Euclidean
geometry. However, it has been shown that the fracture
networks are fractal elements which must be seen as
alternative wiews for reservoirs with multiple scales and a
network of non-Euclidean fractures. Fractal geometry is a
good candidate for representing such systems. Several models
and solutions based on the transient-pressure behavior have
been presented in the literature with which were found that
the change in pressure is a function of a power-law
relationship where the exponent is related to the fractal
dimension. In this work, direct expressions were developed
from observing characteristic features on the pressure
derivative log-log plot, so fracture permeability, fractal
dimension conductivity index, flow capacity and storativity
ratio can be estimated. The equations were successfully
tested with synthetic examples. |
|
|
|
Title: |
Investigation
on voltage multiplier cells for high step-up conversion |
Author (s): |
Anoop.
K. J and V. Rajini |
Abstract: |
The demand of high gain dc-dc
converter is increasing as there is a need to utilize the
power output from the low voltage sources such as PV, fuel
cell. The high gain converters boost the low input voltage
to high output voltage. In this paper a dc-dc converter with
Cockcroft-Walton voltage multiplier cells is proposed to
obtain high voltage gain. The voltage multiplier cells are
made up of diodes and capacitors. They are used to develop a
high static gain dc-dc converter with high efficiency. |
|
|
|
Title: |
Improvement
of power system stability using D-facts controllers: A review |
Author (s): |
P.
Sivachandran, T. Hariharan and R. Pushpavathy |
Abstract: |
As the power demand has been
increasing rapidly, power generation and transmission are
being affected due to limited resources, environmental
restrictions and other losses. Transient stability control
plays a vital role in maintaining the steady state operation
of power system in the event of huge disturbance, faults and
any extinction of power generation. Flexible AC Transmission
System (FACTS) controllers were mainly used for solving
various power system control problems. This paper presents
the study of various FACTS devices and their effects on
power system for stability enhancement. |
|
|
|
Title: |
Interaction
analysis of intze tank-fluid-layered soil system |
Author (s): |
Neeraj
Tiwari and M. S. Hora |
Abstract: |
The non-interaction analysis
of over head water tank assumes that columns rest on
unyielding supports. In reality, the structure is supported
by deformable soil strata which deforms unevenly under the
action of loads and hence causes redistribution of forces in
the components of overhead water tank. In the present work,
3-D interaction analysis of intze type water
tank-fluid-layered soil system is carried out using ANSYS
software to evaluate the principal stresses in different
parts of the tank and supporting layered soil mass. The
resultant deflection, von-Mises stress and neural frequency
of the tank are also evaluated under different filling
conditions of the intze tank. The intze tank, supporting
frame, foundation and soil mass are considered to act as
single compatible structural unit for more realistic
analysis. The tank, foundation and soil are considered to be
follow linear stress-strain relationship. The natural
frequency of the tank is evaluated for different filling
conditions and comparison is made between the
non-interaction and interaction analyses. |
|
|
|
Title: |
Determination
of the projections of the velocity vector of the cooled air from
the refrigerating compartment with the door open |
Author (s): |
Lemeshko Mikhail A., Gornostaeva ZhannaV., Duvanskaya Elena. V.
and Danileko Irina N. |
Abstract: |
The article considers the
question of movement of cooled air by opening the cell doors
of a domestic refrigerator. The object of research is the
characteristics of the flow of cooling air, which include
the velocity vector of the flow. The actual flow of air
flowing out of the refrigerator compartment is
three-dimensional, ie, it is characterized at each point in
the flow values of the longitudinal, transverse and vertical
projections of the velocity, pressure, temperature,
viscosity, specific heat, thermal conductivity. To solve
this problem, we used data of field tests, which led to some
simplifications in the mathematical description of the
process of movement of cooled air without compromising
reliability and objectivity of the obtained patterns. The
studies were obtained according to determination the
projections of the velocity vector of the flow of cool air
coming out of the refrigerating compartment of the
refrigerator when the door is open at different temperatures
within the chambers and the surrounding air, which allows to
estimate the heat loss associated with the replacement of
the cooled air warmer when you open the cell doors of
domestic refrigerator. |
|
|
|
|
|