Loading...

Proceedings of

5th International Conference On Advances in Computing, Electronics and Electrical Technology CEET 2016

Date
13-Mar-2016
Location
Kuala Lumpur , Malaysia
Authors
52
ISBN
978-1-63248-087-3

23 Articles Published

1. IMPLEMENTATION OF AN OBJECT DETECTOR & WIRELESS SIGNAL TRANSMISSION SYSTEM

Authors: DILSHAD ARA HOSSAIN , MD MIZANUR RAHMAN , WAHIDUL HASAN

Abstract: Present Era is completely a technological age. There are so many instruments or devices are invented day by day which are used in our everyday life. Security has now become an important fact. To secure our residences, industries and bank (where higher security is required) - an “object detection and wireless signal transmission” circuit is designed. Using this circuit we will be able to protect our valuable things and make our life secured and safe. The circuits consist of NE555 timer, capacitor, diode, inductor, transistor, sound chip, speaker, led, resistor, IR led, TSOP 1738, 32 KHz crystal, trimmer, 4069UB. In this project, there are four sections: IR transmitter circuit IR receiver circuit Frequency transmitter circuit RF receiver circuit The proposed design has various desirable features such as low cost, simpler control and maintenance, and good efficiency.

Keywords: Wireless, TSOP 1738, 4069UB, NE555

Pages: 1 - 5 | DOI: 10.15224/978-1-63248-087-3-11

2. QUALITY OF SERVICE PROVISIONING OF HOME ENODEB IN OFDMA-BASED WIRELESS NETWORK

Authors: SEW-KIN WONG , SOON-FATT BOO , WAI-LEONG PANG

Abstract: Femtocell is a small base station designed to increase the wireless network capacity and extend the coverage. It is a promising solution to overcome the tremendous growth in mobile traffic and indoor coverage problem. In this paper, extensive simulations have been carried out to evaluate the performance of the femtocell in an urban scenario, which compromised of indoor and outdoor users. The simulations are modelled in a heterogeneous network which consists of macrocell and femtocells. Femtocells are selectively deployed in an indoor environment. Proportional Fairness (PF), Modified Largest Weight Delay First (MLWDF) and Exponential Rule (ER) are used as the downlink scheduling algorithms. Simulation results show that femtocells significantly improved the network total throughput (~1200%) compared to the macrocell only scenario. Packet delay and packet loss ratio of video flows are reduced by 70%. Meanwhile, fairness index of video flows are also improved by up to 50%.

Keywords: OFDMA, Femtocell, Scheduling Algorithms, Quality of Service (QoS)

Pages: 6 - 10 | DOI: 10.15224/978-1-63248-087-3-12

3. RANKING OF BRAIN MRI FEATURES FOR DEMENTIA DIAGNOSIS

Authors: MANASI PATIL

Abstract: Dementia refers to the loss of memory and other cognitive skills due to changes in the brain caused by disease or trauma. An estimate tells 24 million people worldwide suffer from dementia and the numbers are growing. Many people don’t understand the difference between Alzheimer’s and other forms of dementia, causing many cases to go undiagnosed and untreated. The study has been carried out on various brain MRI datasets, by applying various feature extraction techniques, and the classification results are ranked in this paper.

Keywords: Brain MRI, feature extraction, classification

Pages: 11 - 13 | DOI: 10.15224/978-1-63248-087-3-13

4. MODEL PREDICTIVE CONTROL OF PWM RECTIFIER SUPPLIED BY UNBALANCED SOURCE VOLTAGE

Authors: IMAD MERZOUK , MOHAMED LOKMANE BENDAAS

Abstract: This paper proposes a new control of pulse width modulation PWM rectifier supplied by unbalanced voltage source where model based predictive control (MPC) is the main control method. Using this new control, it is possible to obtain sinusoidal input current with unity power factor under unbalanced conditions. This control requires two steps. First, the unbalanced phase voltage and input line current are decomposed on separate positive and negative sequences. Second, compensated active and reactive powers are calculated in function of the sequences of voltage and current and added to the referencing one. Thus the referencing currents are calculated from the resulting active and reactive powers. Based on discrete model of the PWM rectifier the future value of currents are determined, next the switching state from the eight possible switching states that gives the minimum cost function is selected to be applied on a semiconductor device. The model based predictive control of PWM rectifier

Keywords: model based predictive control (MPC), PWM rectifier, unbalanced voltage supply, active and reactive powers

Pages: 14 - 18 | DOI: 10.15224/978-1-63248-087-3-14

5. INFLUENCE OF ACCELEROMETER SIGNAL FILTERING ON AUTOMATIC DETECTION OF GAIT IMPACT PARAMETERS

Authors: A. CAMACHO-GARCIA

Abstract: Filtering the signal recorded by an accelerometer is essential to remove noise recorded by the sensor, but in order to calculate gait parameters properly, the choice of a suitable cutoff frequency of the filter is critical. This paper evaluates the influence of the filter cutoff frequency in the calculation of the parameters: vertical peak tibial acceleration and acceleration rate. The accelerometer signal filtering with low-pass filter with cutoff frequency below 50 Hz gives good results in the calculation of peak tibial acceleration but produces estimations of the acceleration rate below its real value.

Keywords: Gait analysis, accelerometry, cutoff frequency, filter, acceleration rate.

Pages: 19 - 22 | DOI: 10.15224/978-1-63248-087-3-15

6. THE FORMULATION AND DISCRETIZATION ANALYSIS USING THE BEM

Authors: TWAIBU SEMWOGERERE

Abstract: Boundary discretization has been has been an ideal technique in solving boundary problems that are a common phenomenon in mathematics. The boundary element method (BEM) is one of the methods which has had an advantage of discretizing the boundary than the finite element method (FEM) and the finite difference method FDM) for quite so long. The curved and straight elements are crucial for the discretization process. In this study, the BEM has been used to analyze and compare curved or straight boundary discretization. The BEM and its applications was reviewed in relation to curved and straight elements. The Laplace equation with its boundary integral formulation was done and the BEM applied. The Dirac-Delta and the Green’s functions were behind the use of the BEM. Finally, three model problems were tested for analysis of the BEM with curved and straight elements in relation to solving the Laplace problem. The MATLAB programs and subprograms were used among others to solve the problem and

Keywords: Boundary, Curved, Straight, Elements, Formulation

Pages: 23 - 27 | DOI: 10.15224/978-1-63248-087-3-16

7. DESIGN OF INFORMATION SYSTEMS (IS) REAL-TIME AND HISTORICAL LOG EVENTS ANALYZER FOR SYSTEM ADMINISTRATOR

Authors: AYHAN AKBAL , MOHAMED MOHAMUD

Abstract: The logs generated by the operating systems, and application programs, network devices, web browsers and all devices in the information systems during their normal course of operation are very important and allow system administrators to ensure that they have a reliable information system, and track what is going on in the IS, such as what web sites clients visited, whom they are sending e-mails to and receiving e-mails from and what applications are accessed. The main goal of this study is to develop software which can parse both logs generated by the information systems (IS) in real time and logs written to historical text files, and store logs in a central database in order to perform various analyses for reporting and detecting anomaly tasks on the system. Daily log entries belonging to the information systems department of Firat University Hospital are applied with the program and various analysis results were obtained. In general, information systems logs can be easily analyzed a

Keywords: information systems, log events, logging policy, log analysis.

Pages: 28 - 32 | DOI: 10.15224/978-1-63248-087-3-17

8. SOFTWARE AND HARDWARE TOOLS USED IN DIGITAL FORENSIC DATA ANALYSIS

Authors: ERHAN AKBAL , SENGUL DOGAN

Abstract: Crimes committed though information technology increase day by day. The resources subject to cybercrime is varies. Investigation requests from the forensic authorities are collected specific groups. In this context, data analysis, voice analysis and image analysis processes is the basis of the forensic investigation. For better research and investigation, investigator uses many forensics hardware and software tools. The use of these tools to perform an accurate analysis is very important. These computer forensics software tools can also be classified into open source and with licensed. Software tools according to used Operating System, hardware tools according to the mobile and not mobile can be classified. This study represents digital forensic analyses software and hardware tools. Also tools are examined according to using purpose.

Keywords: digital forensic, data analysis, forensic tools

Pages: 33 - 36 | DOI: 10.15224/978-1-63248-087-3-18

9. THE USING OF ANN AT DESIGN OF WINDOW FUNCTION HAVING USEFUL SPECTRAL PARAMETERS

Authors: TURGAY KAYA

Abstract: The window functions are proposed structures at many application areas. The windows with helping two or more independent parameters show useful spectral characteristic. Kaiser window has been used at many areas because of the fact that it has good characteristic specification such as mainlobe width and the ripple ratio for various applications but Kaiser window having two parameters cannot control the sidelobe roll-off ratio. The ultraspherical window having three independent parameters has better sidelobe rolloff ratio than other windows in literature. At work, the coefficients of a new window function that has side-lobe roll-off ratio characteristic of ultraspherical window and Kaiser window’s main-lobe width and ripple ratio were obtained by helping of artificial neural networks (ANN). 3000 data are used for training and testing of ANN. Sixty-five percentage of these data was used for learning of ANN and thirty-five percentage of that was used for testing process. It was observed th

Keywords: Window functions, Kaiser window, Ultraspherical window, Neural networks.

Pages: 37 - 41 | DOI: 10.15224/978-1-63248-087-3-19

10. THE DESIGN OF FUZZY-BASED WEANING PROTOCOL IN LABVIEW ENVIRONMENT

Authors: HASAN GULER

Abstract: The main purpose of this study is to design universally accepted approach to weaning patients from ventilator. Fuzzy logic controller was used for achieving this aim. The reason for the use of fuzzy controller is that it represents expert notions employed in decision making. The developed all protocols were designed on LabVIEW software. The inputs of the developed system were PH, partial carbondioxide percent (PaCO2), saturation of oxygen (SpO2), the rate of PaO2/FiO2, saturation of oxygen (SaO2), hemoglobin (Hb) and positive end expiratory pressure (PEEP). 20 clinical scenarios were generated by using Monte-Carlo simulations and Gaussian distribution method to test performance of the developed protocol. The generated scenarios were applied to the developed protocol. Clinician was asked to evaluate the each scenario to determine weaning probability. Student t-test for p<0.05 was used to show statistical difference between the developed protocol and clinician’s evaluation. According to

Keywords: Weaning, fuzzy system, student t-test, Gaussion Distribution

Pages: 42 - 46 | DOI: 10.15224/978-1-63248-087-3-20

11. RECONSTRUCTION OF GENE REGULATORY NETWORK FROM GENE PERTURBATION DATA, CURRENT METHODS AND PROBLEMS

Authors: ALI SEMAN , MOHAMED SAIFULAMAN MOHAMED SAID , SHARIFALLILAH NORDIN , WINDDY PINDAH

Abstract: The inference of regulators is the core factor in interpreting the actual regulatory conditions in gene regulatory networks (GRNs). Various methods have been developed to reconstruct GRNs with the motivation of improving the accuracy and scalability of network inference. Thus, this study will brief the structure of GRNs, discuss current methods of GRNs reconstruction and problems when dealing with gene perturbation data. Most of the information gathered from bioinformatics and system biology literature. At the end of the study several of GRNs reconstruction methods will be reviewed and identified their problem when dealing with gene perturbation data. This study is useful as a reference to develop more accurate GRNs inference methods particular for gene perturbation data

Keywords: gene regulatory network, reconstruction of gene regulatory networks (GRNs), gene expression data, gene perturbation, machine learning methods

Pages: 47 - 51 | DOI: 10.15224/978-1-63248-087-3-51

12. EMOTION-BASED INTERIOR DESIGN IMAGE RECOMMENDATION SYSTEM USING COLOR IMAGE SCALE

Authors: DONGWANN KANG , KYUNGHYUN YOON

Abstract: Color is a visual element that psychologically affects people’s emotion. Most professional designers reflect colors in their product catalogs. In many cases, catalogs display similar products with different colors according to the emotion given by the color combination. However, it is not easy for nonexperts to align colors according to emotion. In this paper, we present a novel system that explores design images using a color combination based on color image scale theory. In our system, similar to the catalog example, users explore design images that have a coherent emotion in order to find appropriate images more easily. In this paper, we propose a novel method that estimates emotion based on the color image scale, which is a famous color theory in the field of design, and displays interior design images coherently according to the emotion using our proposed image recommendation method.1

Keywords: color image scale, emotion, interior design image

Pages: 52 - 56 | DOI: 10.15224/978-1-63248-087-3-52

13. NEW STANDARDIZED FRAMEWORK FOR DEVELOPING MOBILE APPLICATIONS (BASED ON REAL CASE STUDIES AND CMMI)

Authors: AMMAR KHADER ALMASRI

Abstract: the software processes play a vital role for delivering a high quality software system that meets the user’s needs. There are many software development models which are used by most system developers, which can be categorized into two categories (traditional and new methodologies). Mobile applications like other desktop applications need appropriate and well-working software development process. Nevertheless, mobile applications have different features which limit their performance and efficiency like application size, mobile hardware features. Moreover, this research aims to help developers in using a standardized model for developing mobile applications.

Keywords: software process model, mobile application development, agile approaches

Pages: 57 - 60 | DOI: 10.15224/978-1-63248-087-3-53

14. VOLTAGE STABILITY IN POWER SYSTEMS USING ARTIFICIAL INTELLIGENT APPROACHES

Authors: MUHSIN TUNAY GENCOGLU , BURAK YILDIRIM

Abstract: The events such as the increase of load demands constantly in power systems, the continuous growth of electricity networks, the use of new technologies and the controls have led to the emergence of system stability problems in different structures. For the design and operation of the power system in the optimum level, instabilities in different ways and their relations with each other should be revealed clearly. To prevent great economic losses in the system as a result of the possible instabilities, it is necessary to predict stability criteria and do the necessary regulatory works. In this study, critical values for the system voltage stability have been obtained with the Power System Analysis Toolbox (PSAT) program. By using obtained values, artificial neural network (ANN) and least squares support vector mechanism (LSSVM) algorithms have been determined with the voltage stability critical values. The achievements of ANN and LSSVM algorithms, trained with the help of power system vo

Keywords: voltage stability, artificial neural network, least squares support vector mechanism, power system analysis toolbox.

Pages: 61 - 65 | DOI: 10.15224/978-1-63248-087-3-56

15. SUITABILITY OF FRAMEWORKS, STANDARDS AND CERTIFICATION FOR GOVERNMENT ADOPTION OF THE PUBLIC CLOUD FOR ADVANCED DIGITAL CONTINUITY

Authors: FENG CHEN , WALEED ALGHANIM.

Abstract: There is increasing use of the public cloud by governments; however, this use is for non-critical systems and non-sensitive data. The potential that the public cloud has for government use lies not only in the well-known benefits of cost and scalability, but also as a more permanent solution for providing e-services to citizens and as a solution for an advanced form of digital continuity whereby in the case of a national crisis, the government can continue to function in the public cloud on an indefinite basis. To take advantage of the public cloud in this way it becomes necessary for governments to place sensitive data and critical systems in the public cloud, which they are reluctant to do because of security concerns. Towards a solution to this issue, this study examines the frameworks, standards and certification schemes (FSCs) that inform governments’ approach to adopting the public cloud. The study focuses on the extent to which they are suitable for the identification of issues

Keywords: government, public cloud, senstive data, digital continuity, cloud standards

Pages: 66 - 71 | DOI: 10.15224/978-1-63248-087-3-57

16. HUMAN EMOTION CLASSIFICATION BASED ON FUZZIFIED PHYSICAL PARAMETERS

Authors: H RANGANATHAN , SWAGATA SARKAR

Abstract: There are six basic emotions (sad, happy, fear, angry, surprise, neutral) which can be classified based on different technologies such as image processing, signal processing etc. Facial Emotion detection, fMRI based emotion classification, EEG based emotion analysis are some of the varieties which can diagnose human emotions. In this paper the human emotion classification is done based on physical parameters. The experimental physical parameters are classified by back Propagation algorithm of Artificial Neural Network classifier after fuzzification of data. It is seen that a significant improvement has happened in value of specificity and sensitivity after fuzzification of data.

Keywords: Artificial Neural Network, Fuzzification, human emotion, Sensitivity, Specificity

Pages: 72 - 77 | DOI: 10.15224/978-1-63248-087-3-58

17. INTELLIGENT MAILBOX AN APPLICATION OF INTERNET OF THINGS

Authors: ADEEL MUHAMMAD , NABEEL UR REHMAN

Abstract: Internet of things (IoT) has wide range of application and it has potential to make things easier to monitor and manage in our day to day life. This research has developed a prototypic implementation of an intelligent mailbox using the concepts of internet of things to facilitate monitoring of physical mailbox installed at homes or work places. The successful demonstration of prototype suggests that low cost embedded platforms such as Raspberry Pi 2 can be used to develop an economical, smart and easy to manage IoT applications. This project can be scaled up to commercial level for offering services to masses with further modifications

Keywords: Internet of things, Intelligent Mailbox, Matlab Simulink, embedded solution, M2M

Pages: 78 - 82 | DOI: 10.15224/978-1-63248-087-3-61

18. DESIGN AND IMPLEMENTATION OF INTELLIGENT PARKING GUIDANCE SYSTEM BASED ON INTERNET OF THINGS(IOT)

Authors: DONG-JU MIN , DONG-SEONG KIM , HAC-HEE CHOI

Abstract: This paper proposes an optimal dynamic resource allocation method in Internet of Things (IoT) Parking Guidance Systems (PSG). In the proposed method, a resource allocation using a forecasting model based on Q-learning is employed. To demonstrate efficiency of this method, it is verified by Matlab 7. Through simulation results, this paper proves that the proposed method can enhance total throughput, decrease penalty fee issued by Service Level Agreement (SLA) and reduce response time with the dynamic number of users.

Keywords: Internet of Things, Q-learning, Virtual Machine provisioning (VM provisioning), Cloud computing

Pages: 83 - 86 | DOI: 10.15224/978-1-63248-087-3-62

19. MMS OVER MQTT PROTOCOL FOR INDUSTRIAL IOT PLATFORM

Authors: DONG-SEONG KIM , HAC-HEE CHOI , HEA-MIN LEE , JOONG-HYUK CHA , SEUNG-HAN KIM

Abstract: In this paper, MoM(MMS over MQTT) protocol proposed for industrial IoT(Internet of Things) platform. The MMS(Manufacturing Message Specification), that is used for conventional industrial platform, can control only one device by one message. Because of this, when control many devices at same time, message publisher build message for each target devices. So, unnecessary delay is occurred while building messages and sending messages. And industrial devices, which use private IP(Internet Protocol) address, can’t use MMS and it is not commensurate with industrial IoT platform. So, MQTT(MQ Telemetry Transport) is introduced for overcome these weakness. Proposed scheme build MMS packet and using MQTT for communication. For implement test bed, intel edison board is used. Test bed communicate each other and actuators are controlled by value of sensors

Keywords: Industrial IoT platform; MMS; MQTT; RealTime

Pages: 87 - 89 | DOI: 10.15224/978-1-63248-087-3-63

20. ASYMMETRIC TIME DIVISION MULTIPLE ACCESS METHOD FOR TACTICAL RADIO COMMUNICATION

Authors: DONG-SEONG KIM , HAC-HEE CHOI , HEA-MIN LEE , JOONG-HYUK CHA

Abstract: This paper proposes the effective asymmetric multiple access method to improve performance of tactical radio communication for land wheeled weapon systems on the domestic tactical communication operational environment. The proposed approach adapts modified TDMA scheme in place of CSMA/CA as media access protocol on the basis of the analysis of the operational environment of tactical radio communication. For proving effectiveness of the proposed approach, the simulation model is used to overcome constraints of real experiments. The simulation results show that the response time and the throughput of tactical radio communication are improved in terms of by adapting proposed TDMA as media access protocol than CSMA/CA.

Keywords: Tactical radio communication, Multiple access method, Domestic operational environment

Pages: 90 - 93 | DOI: 10.15224/978-1-63248-087-3-64

21. USING TEXTUAL SIMILARITY FOR TEST SUITE PRIORITIZATION

Authors: IYAD ALAZZAM

Abstract: Techniques in test suite reduction concentrated on different testing activities in general and regression testing in specific. Regression testing is typically performed after updating or maintaining the software in order to verify that the occurred changes do not incur any problem. Executing all test suites after any modification increases the cost of testing. Thus reduction in test suites resolves this problem by including only relevant test cases. In this paper, a new technique is proposed and presented to reduce the test suite by calculating the similarity between test cases and the source implemented through using Latent Semantic Indexing (LSI) .Moreover the proposed technique is evaluated through calculating the code coverage using EclEmma.

Keywords: Regression testing, test case, Latent Semantic Indexing (LSI), and test suite prioritization

Pages: 94 - 96 | DOI: 10.15224/978-1-63248-087-3-65

22. ESTIMATOR DESIGN USING FOUR RELATIVE DISPLACEMENT SENSORS FOR SEMI-ACTIVE SUSPENSION SYSTEM

Authors: ARJON TURNIP , HANIF FAKHRURROJA , IWAN R. SETIAWAN , KEUM-SHIK HONG , TAUFIK HIDAYAT

Abstract: Estimator designs only using relative displacement between sprung mass and unsprung mass for semi-active suspension system are investigated. Modified sensitivity method controls semi-active suspension directly using relative velocity and MR damper model without calculating absolute velocity and parameter estimator. The comfort evaluation parameters about the driver are presented and the mathematical models of skyhook and modified skyhook ontrol suspension are simulated in Simulink. The comparison results of suggests that modified skyhook control could significantly improve riding comfort and provide more comfortable working conditions for passenger, which can be widely applied on car in the future

Keywords: Semi-Active Suspension, Skyhook Control, Estimator, MR damper, Full-vehicle Model, Relative Displacement Sensor

Pages: 103 - 107 | DOI: 10.15224/978-1-63248-087-3-70

23. MMS OVER MQTT PROTOCOL FOR INDUSTRIAL IOT PLATFORM

Authors: JOONG-HYUK CHA , DONG-SEONG KIM

Abstract: In this paper, MoM(MMS over MQTT) protocol proposed for industrial IoT(Internet of Things) platform. The MMS(Manufacturing Message Specification), that is used for conventional industrial platform, can control only one device by one message. Because of this, when control many devices at same time, message publisher build message for each target devices. So, unnecessary delay is occurred while building messages and sending messages. And industrial devices, which use private IP(Internet Protocol) address, can’t use MMS and it is not commensurate with industrial IoT platform. So, MQTT(MQ Telemetry Transport) is introduced for overcome these weakness. Proposed scheme build MMS packet and using MQTT for communication. For implement test bed, intel edison board is used. Test bed communicate each other and actuators are controlled by value of sensors

Keywords: Industrial IoT platform; MMS; MQTT; RealTime

Pages: 87 - 89 | DOI: 10.15224/978-1-63248-087-3-63

Popular Proceedings

ESSHBS 2017 - 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ICETM 2023 - 2023

9th International E-Conference on Engineering, Technology and Management

ASET 2017 - 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017 - 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017 - 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017 - 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022 - 2022

8th International E- conference on Engineering, Technology and Management

SEM 2019 - 2019

9th International Conference on Advances in Social Science, Economics and Management Study